How IBM Trusteer Mobile Browser works

Help prevent mobile users from accessing fraudulent websites

Trusteer Mobile Browser performs a security assessment on the mobile device whenever a protected website is accessed. It collects mobile device risk factors and creates a persistent mobile device ID. The software also analyzes the mobile device for malware and other security risk factors. Organizations can mandate that their online websites can only be accessed with IBM Trusteer Mobile Browser.

Offer security alerts to help protect users

Users can view their device security status on a dedicated dashboard. The Trusteer solution identifies malware infections, unsecured wireless connections and other security risks. It also provides step-by-step remediation guidance to help the user resolve risks.

Help protect users from pharming attacks

The Trusteer solution validates both the IP address and the Secure Sockets Layer (SSL) certificate when a protected website is accessed. It helps protect against session hijacking (man-in-the-middle attacks) and redirection attacks.

Perform risk-based analysis of web access and transactions

Trusteer Mobile Browser analyzes the user’s web access and transactions from their mobile devices. It incorporates Trusteer Mobile SDK in order to deliver device risk factors and persistent device IDs to web applications.

How customers use it

  • Obtain omni-channel risk assessment

    Obtain omni-channel risk assessment

    Problem

    It is a business imperative to provide the same smooth user experience across any digital device.

    Solution

    Correlate mobile risk data for an in-context, holistic view of the user across digital channels.

  • Detect mobile malware and fraud risk

    Detect mobile malware and fraud risk

    Problem

    For mobile to be a strong authentication channel, it must be trustworthy and clean.

    Solution

    Assess risk in context. Create device hygiene using root and jailbroken detection/hider detection, emulation, spoofing and malware detection, certificate and SSL pinning, real-time overlay attack detection, SMS stealer, and a strong deviceID.

Technical details

Software requirements

None required.

    Hardware requirements

    None required.

      Technical specifications

      There are no system requirements to deploy this cloud-based solution. From an end-user perspective, recent versions of popular browsers and operating systems are supported. Please view the link for more information about Trusteer supported platforms.

        See a complete list of technical specifications

        You may also be interested in

        Consider these products in the IBM Trusteer solution family

        IBM Trusteer Pinpoint Assure

        Seamlessly assessing the risk of new digital identities.

        Learn more

        IBM Trusteer Pinpoint Detect

        Protect digital channels against fraudulent transactions

        Learn more

        IBM Trusteer Pinpoint Verify

        Trusteer Pinpoint Verify brings user friendly adaptive authentication

        Learn more

        IBM Trusteer Mobile SDK

        Offers an embedded security library for native mobile web applications

        Learn more

        IBM Trusteer Rapport

        Help to protect customers from malware and phishing attacks

        Learn more