Detect compromised and vulnerable devices

IBM Security® Trusteer® Mobile SDK helps detect real-time device and session risks. It helps maintain the integrity of the application in which it has been embedded by using advanced analytics and real-time device risk detection. Trusteer Mobile SDK assesses the device to determine if it has been compromised by malicious actors such as malware, remote access Trojans (RAT) and SMS stealing apps or through jailbreaking and rooting, overlay attacks and more. Additional cross-channel indicators such as behavioral anomalies, navigation discrepancies and phishing compromise evidence are continuously processed by using advanced technologies.

Digital Identity Trust with IBM Security Trusteer

Digital Identity Trust with IBM Security Trusteer (01:32)


Protection from mobile threats

Icon representing protection from mobile threats

Detect and assess the risks associated with the mobile device, account and connection prior to accessing the banking app.

Strong and persistent device ID

Icon representing strong and persistent device ID

Generate a persistent mobile device ID, based on hardware and software attributes, that is resilient to application reinstallation.

Cross-channel visibility

Icon representing cross-channel visibility

Correlate online and mobile banking risk data for mobile risk detection.


Proactive high-risk access detection

By combining a set of robust fraud protection capabilities, Trusteer Mobile SDK is designed to maintain the integrity of the banking application in which it has been embedded. By using real-time risk detection, the solution helps organizations streamline the overall risk assessment and protect their mobile apps from financial malware.

Rooted and jailbroken device detection

Trusteer Mobile SDK contains a root/jailbreak detection capability that helps determine whether a modified version of the operating system is installed on a device that is trying to connect to an online banking service. The solution also offers enhanced detection of root evasion techniques, root hiders and other active hiding techniques.

Certificate pinning

Protocols that rely on certificate chain verification, such as SSL and TLS, can be vulnerable to various dangerous cyberattacks, including man-in-the-middle (MITM) attacks. Trusteer Mobile SDK enables certificate pinning, also known as SSL Pinning or augmented certificate authority security, to help detect and block such attacks.

Overlay protection and emulator detection

Trusteer Mobile SDK provides a set of APIs that natively integrate into your mobile banking app to provide real-time risk analysis and detection of overlay attacks. The solution can also help detect transactions originating from virtual machines or emulators and provide actionable recommendations on whether to allow, restrict or deny user or device access.

Complex device fingerprinting

By generating a persistent mobile device ID based on hardware and software attributes that is resilient to application reinstallation, Trusteer Mobile SDK helps detect new, spoofed (proxy) and known criminal devices. The ID is dynamically generated by a strong and persistent mobile device ID component.

Complete view across channels

When integrated with IBM Security® Trusteer® Pinpoint Detect, Trusteer Mobile SDK can correlate rich proprietary insights with global mobile carrier intelligence to help financial service providers detect fraudulent intent during new digital account creation. The IBM Security® Trusteer® New Account Fraud solution helps assess risk by enabling a seamless digital account creation experience.

How it’s used

Omnichannel risk assessment

Person looking at tablet next to window in bright office

Omnichannel risk assessment

It is a business imperative to provide the same smooth user experience across any digital device.

Correlate mobile risk data for an in-context, holistic view of the user across digital channels.

Mobile malware and fraud risk

Closeup of smartphone in person’s hand

Mobile malware and fraud risk

For mobile to be a strong authentication channel, it must be trustworthy and clean.

Assess risk in context. Support device hygiene by using root and jailbroken detection, hider detection, emulation, spoofing and malware detection, certificate and SSL pinning, real-time overlay attack detection, SMS stealer detection, and a strong device ID.


Technical details

There are no system, software or hardware requirements to deploy this cloud-based solution.

Trusteer solution brief

Establish digital identity trust across the omnichannel customer journey with Trusteer.

Trusteer Seamless Authentication

Learn how trust scoring enables seamless authentication customer experiences.

Trusteer user Community

Get technical tips and insights from others who use IBM Security Trusteer Mobile SDK.

Trusteer technical support

Explore product support options.

Frequently asked questions

Get answers to the most commonly asked questions about this product.

What is digital identity trust?

Today’s threat landscape means companies must make tradeoffs between security and customer experience. Digital identity trust technology lets companies measure both risk and trust to keep the customer’s digital journey secure while also offering a better digital experience.

How does Trusteer Mobile SDK establish trust with known devices?

Trusteer creates a strong device ID that helps differentiate a known device from others. To help determine whether a device has been compromised and that the user is the trusted user, Trusteer applies extensive risk protection capabilities, behavioral analytics and contextual vectors.

How does Trusteer Mobile SDK establish trust with new devices?

A new device can usher in threat through poor hygiene or questionable activity. Trusteer Mobile SDK uses a global consortium database and threat intelligence platform with AI and machine learning to help identify bad devices and malicious patterns.

How does Trusteer Mobile SDK establish trust with new or guest users?

Trusteer Mobile can help identify fraud early during digital account creation or one-time guest engagement from a mobile device. Trusteer correlates provided identifiers and context with known fraud and assesses risk by scanning for indicators such as recent mobile carrier changes and suspicious timing.

What are the benefits of a SaaS digital identity trust solution?

In general, software as a service (SaaS) solutions offer the ability to deploy quickly and easily. The SaaS deployment also allows Trusteer to employ agile, ongoing threat protections that use AI and analytics to identify new threats and patterns.

How does Trusteer Mobile SDK work with IBM Security Trusteer Pinpoint Detect?

Trusteer Mobile SDK combines with IBM Security Trusteer Pinpoint Detect to offer multi-factor omnichannel risk assessment by understanding user activity. The solution collects a wide range of attributes and performs multi-layered assessments of network, device, environment and behavioral patterns.

How does Trusteer Mobile SDK work with IBM Security® Trusteer® Pinpoint Assure?

Trusteer Mobile SDK combines with IBM Security Trusteer Pinpoint Assure to help identify fraudsters and establish digital trust with customers by using cloud-based threat intelligence and global visibility during account creation and guest-user transactions.

Next steps

Talk to an expert about how Trusteer fits into your fraud prevention strategy