Discover what the world is thinking. Join us at Think 2018 | March 19–22 | Las Vegas
Get $500 USD off registration with any purchase in IBM Marketplace

How IBM Trusteer Mobile Browser works

Help prevent mobile users from accessing fraudulent websites

Trusteer Mobile Browser performs a security assessment on the mobile device whenever a protected website is accessed. It collects mobile device risk factors and creates a persistent mobile device ID. The software also analyzes the mobile device for malware and other security risk factors. Organizations can mandate that their online websites can only be accessed with IBM Trusteer Mobile Browser.

Offer security alerts to help protect users

Users can view their device security status on a dedicated dashboard. The Trusteer solution identifies malware infections, unsecured wireless connections and other security risks. It also provides step-by-step remediation guidance to help the user resolve risks.

Help protect users from pharming attacks

The Trusteer solution validates both the IP address and the Secure Sockets Layer (SSL) certificate when a protected website is accessed. It helps protect against session hijacking (man-in-the-middle attacks) and redirection attacks.

Perform risk-based analysis of web access and transactions

Trusteer Mobile Browser analyzes the user’s web access and transactions from their mobile devices. It incorporates Trusteer Mobile SDK in order to deliver device risk factors and persistent device IDs to web applications.

Technical details

Software requirements

None required.

    Hardware requirements

    None required.

      Technical specifications

      There are no system requirements to deploy this cloud-based solution. From an end-user perspective, recent versions of popular browsers and operating systems are supported. Please view the link for more information about Trusteer supported platforms.

        See a complete list of technical specifications

        See how it works