How IBM Trusteer Mobile Browser works
Help prevent mobile users from accessing fraudulent websites
Trusteer Mobile Browser performs a security assessment on the mobile device whenever a protected website is accessed. It collects mobile device risk factors and creates a persistent mobile device ID. The software also analyzes the mobile device for malware and other security risk factors. Organizations can mandate that their online websites can only be accessed with IBM Trusteer Mobile Browser.
Offer security alerts to help protect users
Users can view their device security status on a dedicated dashboard. The Trusteer solution identifies malware infections, unsecured wireless connections and other security risks. It also provides step-by-step remediation guidance to help the user resolve risks.
Help protect users from pharming attacks
The Trusteer solution validates both the IP address and the Secure Sockets Layer (SSL) certificate when a protected website is accessed. It helps protect against session hijacking (man-in-the-middle attacks) and redirection attacks.
Perform risk-based analysis of web access and transactions
Trusteer Mobile Browser analyzes the user’s web access and transactions from their mobile devices. It incorporates Trusteer Mobile SDK in order to deliver device risk factors and persistent device IDs to web applications.
How customers use it