IBM® Verify Trust ("Verify Trust") is designed to help companies quickly and transparently create and sustain trust with existing
customers throughout the digital omnichannel lifecycle. It uses the trust that is created to provide
security for an organization's users.
Verify Trust offers a
multilayered and holistic user view as well as a modular approach that can help organizations
transparently build identity trust with a wide range of users for a seamless digital customer
experience. It provides protection against account takeover, phishing, social engineering, bots,
malware, remote access trojans (RAT), mobile overlay attacks, authorized push payment fraud (APP
fraud), emulators, SMS stealers, rooting/jailbreaking, spoofed devices, and SIM swap attacks, while
leveraging multi-factor authentication (MFA) feedback data to both increase coverage and reduce
friction.
IBM
Trusteer® offers a multilayered and holistic user view built on top
ofVerify Trust solutions
benefit from a powerful intelligence service. This service combines AI, machine learning, and
advanced analytics technology to analyze millions of sessions every hour together with human
intelligence and experienced threat researchers. Cross-organization, global consortium, and new
threat insights are all combined to identify emerging patterns and evolving threats, and rapidly
adapt protections.
Additionally, a scalable, agile cloud platform simplifies deployment and enables real-time risk
assessment based on the latest intelligence for increased operational efficiency and reduced
costs.
To learn about the broader capabilities and value that
Pinpoint can bring to help you detect fraud, authenticate users, and
establish identity trust across the omni-channel journey, see
https://www.ibm.com/security/fraud-protection/trusteer.
Table 1. Pinpoint Business Solutions
| Pinpoint Product |
Business Solution |
Key Capabilities |
| Pinpoint Assure |
Helps organizations detect and predict identity risk for guest and new users during the new
digital account creation process. |
Correlates rich proprietary insights, mobile carrier intelligence, and global security
intelligence specific to new and anonymous users, including:
- Behavioral and user journey analysis to help detect malicious bot attacks or known malicious
activity usage patterns.
- Device identification, association, authenticity, and hygiene to identify if the device is
trustworthy.
- Phone number reputation and intelligence
- Identity linkages that show if the same identity or identity attributes are opening new accounts
or conducting transactions at a velocity or rate that does not match legitimate activity at other
companies that use IBM
Trusteer solutions.
- Malicious evidence consortium data from a worldwide network
- An ecosystem-friendly approach that exposes and enables the usage of IBM
Trusteer new account
intelligence.
|
| Pinpoint Detect |
Helps assess risk dynamically and authenticate known digital identities |
- Enables real-time assessment and provides recommended actions to help detect and mitigate
fraudulent activities.
- Enables fraud analysts to customize new policies and rapidly deploy countermeasures with
visibility to IBM
Trusteer crime logic.
- Provides device identification by using device characteristics, and a global device
identifier
- Provides environment intelligence, such as location and connection attributes
- Uses behavioral biometric capabilities to seamlessly authenticate users by building models that
are based on patterns of mouse movements, keyboard typing, and mobile touchscreen swipes in real
time and analyzing patterns against learned user behavior and known fraud patterns.
- Identifies access using compromised credentials
|
| Pinpoint Detect for Remote Workforce |
Helps assess risk dynamically and authenticate known digital identities
for a remote workforce. |
- Enables real-time assessment and provides recommended actions to help detect and mitigate
fraudulent activities.
- Enables fraud analysts to customize new policies and rapidly deploy countermeasures with
visibility to IBM
Trusteer crime logic.
- Deployed digitally as a software-as-a-service (SaaS) offering that can be up and running within
hours.
- Provides device identification by using device characteristics
- Provides environment intelligence, such as location and connection attributes
- Integration with the IBM Security QRadar SIEM solution for consolidated visibility, detection,
investigation, and response to threats from across the enterprise.
|