Close
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    IBM Closes Trusteer Acquisition, Establishes Cyber-Security Lab

    By
    Darryl K. Taft
    -
    September 3, 2013
    Share
    Facebook
    Twitter
    Linkedin

      IBM announced the completion of its deal to acquire Trusteer, a privately held provider of software that helps protect organizations against fraud and advanced security threats.

      The completion of the deal comes quickly on the heels of IBM’s initial announcement of its plans to acquire Trusteer. On Aug. 15, IBM announced that it had entered into a definitive agreement to acquire Trusteer. Financial terms were not disclosed.

      “The acquisition of Trusteer builds on more than 40 years of IBM’s rich contribution to the security space,” said Brendan Hannigan, general manager of IBM Security Systems, in a statement. “Trusteer will extend our data security capabilities further into the cloud, mobile and endpoint security space. This acquisition helps provide our clients with comprehensive network and endpoint anti-malware solutions.”

      Among the capabilities Trusteer will bring to the IBM security portfolio are comprehensive counter-fraud and advanced persistent threat (APT) protection. Trusteer’s cyber-security protection scales to help protect tens of millions of endpoints, including smartphones and tablets. Malware and fraudulent activity can be identified and removed using solutions from Trusteer.

      Trusteer also brings security-as-a-service technology delivered through the cloud. Cloud-delivered security solutions by Trusteer will complement more than 100 software-as-a-service (SaaS) solutions offered by IBM. Because Trusteer software can be delivered through the cloud, organizations can receive accurate, real-time updates on malicious activities and the latest threats, better protecting data from fraud and compromise.

      The Trusteer technology also will help IBM secure mobile transactions. Trusteer can help provide account takeover prevention with compromised device detection, complex device fingerprinting and a global fraudster database.

      “We’ve done a lot of work on how we protect an enterprise inside its own walls,” Caleb Barlow, director of mobile security at IBM, told eWEEK. “And then over time with things like BYOD we’ve reached out to how do you protect enterprise data on individual endpoints on mobile devices. But there really hasn’t been a series of good answers for how do I protect a transaction.

      “And if we also think about online brands, whether that is a retail company you’re buying something from or an insurance company you’re working with, a big portion of the value of that brand is now associated with trust,” Barlow said. “If you can trust that brand, if you can trust them with your data, it’s going to make a big difference in who you choose to do business with. So by acquiring this company, it gives us the ability to bring trust into these relationships around the transactions that you as the consumer make.”

      Also announced Aug. 15, IBM is forming a cyber-security software lab in Israel that will bring together more than 200 Trusteer and IBM researchers and developers to focus on mobile and application security, advanced threat protection, malware, counter-fraud and financial crimes. This lab is an addition to IBM’s existing research and development facilities in Israel.

      “This acquisition is further proof that IBM is serious about providing clients with the security intelligence capabilities to help protect organizations in a constantly evolving threat landscape,” said John Johnson, global security strategist at John Deere, in a statement. “As part of IBM, Trusteer’s counter-fraud capabilities, along with the creation of a cyber-security software lab, will help make advances in counter-fraud and malware protection.”

      IBM provides the security intelligence to help enterprises protect their people, data, applications and infrastructure. IBM operates a broad security research and development organization. The company manages and monitors 15 billion security events every day for nearly 4,000 clients around the world and holds more than 3,000 security patents.

      “At the end of the day the biggest enemy in all of this is you, the end user, where you accidentally click on that link that looks all too compelling and the next thing you know your workstation is chock full of malware,” Barlow said. “So this really provides that level of protection for the consumer and the ability for the brands that are offering this service to protect their brand and their customers’ data.”

      Darryl K. Taft
      Darryl K. Taft covers the development tools and developer-related issues beat from his office in Baltimore. He has more than 10 years of experience in the business and is always looking for the next scoop. Taft is a member of the Association for Computing Machinery (ACM) and was named 'one of the most active middleware reporters in the world' by The Middleware Co. He also has his own card in the 'Who's Who in Enterprise Java' deck.

      MOST POPULAR ARTICLES

      Cybersecurity

      Visa’s Michael Jabbara on Cybersecurity and Digital...

      James Maguire - May 17, 2022 0
      I spoke with Michael Jabbara, VP and Global Head of Fraud Services at Visa, about the cybersecurity technology used to ensure the safe transfer...
      Read more
      Big Data and Analytics

      Alteryx’s Suresh Vittal on the Democratization of...

      James Maguire - May 31, 2022 0
      I spoke with Suresh Vittal, Chief Product Officer at Alteryx, about the industry mega-shift toward making data analytics tools accessible to a company’s complete...
      Read more
      Big Data and Analytics

      GoodData CEO Roman Stanek on Business Intelligence...

      James Maguire - May 4, 2022 0
      I spoke with Roman Stanek, CEO of GoodData, about business intelligence, data as a service, and the frustration that many executives have with data...
      Read more
      Applications

      Cisco’s Thimaya Subaiya on Customer Experience in...

      James Maguire - May 10, 2022 0
      I spoke with Thimaya Subaiya, SVP and GM of Global Customer Experience at Cisco, about the factors that create good customer experience – and...
      Read more
      Cloud

      Yotascale CEO Asim Razzaq on Controlling Multicloud...

      James Maguire - May 5, 2022 0
      Asim Razzaq, CEO of Yotascale, provides guidance on understanding—and containing—the complex cost structure of multicloud computing. Among the topics we covered:  As you survey the...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×