Real-time fraud detection across digital channels

IBM Security® Trusteer® Pinpoint Detect helps organizations quickly and transparently establish digital identity trust throughout a seamless customer experience without compromising on security.

IBM Security® Trusteer® Pinpoint Detect is real-time, cloud-based risk assessment software that analyzes online identities to differentiate between malicious users and true customers. Trusteer® Pinpoint Detect uses artificial intelligence and machine learning to protect digital channels against account takeover and fraudulent transactions and detect end user devices infected with high-risk malware.

Digital identity trust with IBM Security Trusteer

Digital identity trust with IBM Security Trusteer (01:32)


Optimize digital identity trust

Pictogram representing user authentication

IBM Trusteer assesses risk to authenticate users throughout the omnichannel lifecycle.

Build seamless customer experiences

Pictogram representing target detection

IBM Trusteer provides frictionless authentication for trusted users to help reduce abandonment rates.

Detect fraud efficiently

Pictogram representing company trust

IBM Trusteer uses real-time risk assessment based on global, cross-organizational consortium data.


Sustain digital trust

Protection and authentication

Pictogram representing user authentication

Detect legitimate and malicious users transparently.

Digital identity trust scoring

Pictogram representing identity authentication

Engage customized policies and countermeasures.

Global device intelligence

Pictogram representing global detection

Leverage global device identification and intelligence.

Automatic security deployment

Pictogram representing security deployment

Get immediate protection through continuous data analyses.

Behavioral biometric capabilities

Pictogram representing identity detection

Use a real-time, cognitive approach to fraud detection.

Malware detection

Pictogram representing malware detection

Correlate a wide range of critical fraud indicators.

Agile architecture

Pictogram representing agile architecture

Boost detection accuracy and reduce operational costs.

Cross digital visibility and control

Pictogram representing digital visibility

Create an adaptive user experience while managing risk.

Security and privacy

Security and privacy in the cloud

When using IBM Cloud® offerings, your company can scale and adapt quickly to changing business needs without compromising security, privacy or risk levels.

This offering meets the following industry and global compliance standards, depending on the edition you choose.

  • EU-US Privacy Shield and Swiss-US Privacy Shield Framework
  • FFIEC for Financial USA
  • ISO 27001
  • SOC2 Type 2 (SSAE 16)

Learn more about IBM Cloud security →

Learn more about Cloud Services data security and privacy data sheets →

Frequently asked questions

Get answers to the most commonly asked questions about this product.

Where does IBM Security Trusteer Pinpoint Detect sit within a digital identity framework?

With Pinpoint Detect, Trusteer provides comprehensive digital identity insights to seamlessly determine whether the user accessing the service is the true user owning that identity.

What is digital identity trust?

Today’s threat landscape means companies must make tradeoffs between security and customer experience. Digital identity trust technology lets companies measure both risk and trust to keep the customer’s digital journey secure while offering a better digital experience than ever.

How does IBM Security Trusteer Pinpoint Detect collect information?

IBM Security Trusteer Pinpoint Detect enables the collection of intelligence from digital endpoints—that is, the organization’s mobile app, mobile browser or desktop browsers— and combines the information with IBM worldwide intelligence sources and complementary third-party intelligence sources.

How does IBM Security Trusteer Poinpoint Detect evaluate risk?

IBM Security Trusteer Pinpoint Detect takes five context domains into consideration when evaluating risk: user identity and attributes, device information and hygiene, activity being performed or resource being accessed, environmental factors like location and IP networks, and behavioral information.

Can users tell if an organization is using Pinpoint Detect?

Pinpoint Detect works transparently, without the need for downloading executable files or plug-ins to the end user's computer. For web applications, Pinpoint uses code embedded into the webpage. For mobile applications, the organization’s app uses the IBM Security Trusteer Mobile SDK.

How is IBM Security Trusteer Pinpoint Detect deployed?

As a software as a service (SaaS) solution, Pinpoint Detect can deploy quickly and easily. The best practice is to follow a four-stage deployment process, which includes scoping, implementation, launch and validation with training.

Where can I learn more about how to use IBM Security Trusteer Pinpoint Detect?

Launch the interactive demo for a step-by-step walkthrough, or get more detailed implementation techniques at the Security Learning Academy.

How does the IBM Security Trusteer Pinpoint suite of products work together?

IBM Security Trusteer Pinpoint Assure assesses the risk of new or anonymous users. IBM Security Trusteer Pinpoint Detect continuously assesses the digital identities of known or enrolled users. Finally, IBM Security Trusteer Pinpoint Verify allows organizations to confirm trust for high-risk users with strong authentication.

Launch the interactive demo for a step-by-step walkthrough, or get more detailed implementation techniques at the Security Learning Academy.

What industries does IBM Security Trusteer Pinpoint Detect support?

IBM Trusteer products are primarily used by banks, financial institutions, insurers, retailers, telco, travel and transportation industries.

What are the benefits of a SaaS digital identity trust solution?

In general, software as a service (SaaS) solutions offer the ability to deploy quickly and easily. The SaaS deployment also allows Trusteer to employ agile, ongoing threat protections using AI and analytics to identify new threats and patterns.

Next steps

Talk to an expert about how Trusteer fits into your fraud prevention strategy