Detect compromised and vulnerable devices

IBM Trusteer Mobile SDK helps detect real-time device and session risks. It helps maintain the integrity of the application in which it has been embedded by leveraging advanced analytics and real-time device risk detection. Trusteer Mobile SDK assesses the device to determine if it is compromised, such as malware, Remote Access Trojans, jailbroken/rooted detection, overlay attack evidence and SMS stealing apps. Additional cross-channel indicators are continuously processed leveraging advanced technologies such as behavioral anomalies, navigation discrepancies and phishing compromise.

Protection from mobile threats

Detect and assess the risks associated with the mobile device, the account and connection prior to accessing the banking app.

Strong and persistent device ID

Generate a persistent mobile device ID based on hardware and software attributes that is resilient to application reinstallation.

Cross-channel visibility

Correlate online and mobile banking risk data for mobile risk detection.

IBM Trusteer Mobile SDK features

  • Proactively detect high-risk access
  • Detect rooted/jailbroken devices
  • Offers Certificate Pinning/SSL Pinning
  • Overlay protection and emulator detection
  • Complex device fingerprinting
  • Complete view across channels

Security and privacy in the cloud

  • IBM enables companies to scale and adapt quickly to changing business needs without compromising security, privacy or risk levels when using IBM cloud offerings.

    Learn more about IBM Cloud security

See how it works