Frequently asked questions
Get answers to the most commonly asked questions about this product.
FAQ
Getting started with this product
Where does IBM Security Trusteer Pinpoint Detect sit within a digital identity framework?
What is digital identity trust?
How does IBM Security Trusteer Pinpoint Detect collect information?
IBM Security Trusteer Pinpoint Detect enables the collection of intelligence from digital endpoints -- that is, the organization’s mobile app, mobile browser, or desktop browsers — and combines the information with IBM worldwide intelligence sources and complementary third party intelligence sources.
How does IBM Security Trusteer Poinpoint Detect evaluate risk?
IBM Security Trusteer Pinpoint Detect takes five context domains into consideration when evaluating risk: user identity and attributes, device information and hygiene, activity being performed or resource being accessed, environmental factors like location and IP networks, and behavioral information.
Can users tell if an organization is using Pinpoint Detect?
Pinpoint Detect works transparently, without the need for downloading executable files or plug-ins to the end user's computer. For web applications, Pinpoint uses code embedded into the webpage. For mobile applications, the organization’s app uses the IBM Security Trusteer Mobile SDK.
How is IBM Security Trusteer Pinpoint Detect deployed?
Support
Where can I learn more about how to use IBM Security Trusteer Pinpoint Detect?
Other common questions
How does the IBM Security Trusteer Pinpoint suite of products work together?
IBM Security Trusteer Pinpoint Assure assesses the risk of new or anonymous users. IBM Security Trusteer Pinpoint Detect continuously assesses the digital identities of known or enrolled users. Finally, IBM Security Trusteer Pinpoint Verify allows organizations to confirm trust for high-risk users with strong authentication.