How IBM Trusteer Mobile Browser works

Help prevent mobile users from accessing fraudulent websites

Trusteer Mobile Browser performs a security assessment on the mobile device whenever a protected website is accessed. It collects mobile device risk factors and creates a persistent mobile device ID. The software also analyzes the mobile device for malware and other security risk factors. Organizations can mandate that their online websites can only be accessed with IBM Trusteer Mobile Browser.

Offer security alerts to help protect users

Users can view their device security status on a dedicated dashboard. The Trusteer solution identifies malware infections, unsecured wireless connections and other security risks. It also provides step-by-step remediation guidance to help the user resolve risks.

Help protect users from pharming attacks

The Trusteer solution validates both the IP address and the Secure Sockets Layer (SSL) certificate when a protected website is accessed. It helps protect against session hijacking (man-in-the-middle attacks) and redirection attacks.

Perform risk-based analysis of web access and transactions

Trusteer Mobile Browser analyzes the user’s web access and transactions from their mobile devices. It incorporates Trusteer Mobile SDK in order to deliver device risk factors and persistent device IDs to web applications.



None required.


    None required.


      There are no system requirements to deploy this cloud-based solution. From an end-user perspective, recent versions of popular browsers and operating systems are supported. Please view the link for more information about Trusteer supported platforms.