April 17, 2014 4:35 AM ET

Internet Software and Services

Company Overview of Trusteer, Inc.

Company Overview

Trusteer, Inc. provides endpoint cybercrime prevention solutions that protect organizations against financial fraud and data breaches. It offers clientless fraud prevention products, including Trusteer Pinpoint Malware Detection solution for clientless detection of malware infected devices, enabling organizations to focus on fraud prevention processes based on malware risk and initiate malware removal; and Trusteer Pinpoint Account Takeover Detection solution for clientless detection of criminal access to Websites using device ID, phishing detection, and malware-driven credential theft detection. The company also provides PC and Mac security solutions, including Trusteer Apex that protects e...

545 Boylston Street

5th Floor

Boston, MA 02116

United States

Founded in 2006

Phone:

617-606-7755

Fax:

617-606-7756

Key Executives for Trusteer, Inc.

President and Director
Co-Founder and Director
Age: 41
Co-Founder and Vice President of Research & Innovation
Co-Founder
Chief Financial Officer
Compensation as of Fiscal Year 2013.

Trusteer, Inc. Key Developments

Trusteer Announces General Availability of E-Commerce Fraud Prevention Service

Trusteer announced the general availability of the Trusteer Cybercrime Prevention Architecture for e-commerce. This service provides Trusteer's award-winning "bank grade" security to retailers, social media, dating, gaming and other consumer website operators to prevent account takeover, stop payment fraud and protect their customers' data from being stolen. By monitoring the full e-commerce attack life cycle and detecting compromised user devices and accounts before unauthorized transactions can take place, Trusteer's solution short circuits fraud attempts. Criminals are targeting e-commerce sites using the same sophisticated techniques being used to attack banks. These advanced threats are rendering existing e-commerce fraud controls obsolete. The resulting increase in fraud incidents is inflicting significant financial (chargebacks), brand and customer experience damage on website operators. According to Gartner, Inc, trends in web fraud detection include: "Less reliance on device identification as criminals learn to thwart it, and also because it is not fully effective (only about 70%) on mobile devices, where less information is available to the identification process. Similarly, less reliance on proxy-piercing technology, which is becoming much less reliable (about 50% to 60%) as criminals learn to circumvent it.(1) " Trusteer's solution goes beyond current Device ID and proxy piercing solutions to track the full attack life cycle by detecting user devices and accounts compromised by malware and phishing in order to stop account takeover and payment fraud before it happens. This is accomplished by combining sophisticated device intelligence with Trusteer's proven malware and phishing detection technology. Moreover, the company can quickly identify known criminal devices through its Global Criminal Device Database that is automatically populated based on the routine analysis of over 100 million protected endpoints. By correlating device and account risk factors in real-time Trusteer prevents high-risk access attempts and transaction requests. Trusteer's solution spans mobile, PC and MAC platforms to provide highly accurate and actionable fraud risk detection.

Trusteer Announces Trusteer Mobile Risk Engine

Trusteer announced the Trusteer Mobile Risk Engine to protect financial institutions against mobile and PC-to-mobile (cross-channel) attacks. Trusteer Mobile Risk Engine detects and stops account takeover from mobile devices by conclusively identifying criminal access attempts. It also identifies devices that are vulnerable to compromise by malware and those that have been infected. Mobile malware is commonly used to bypass strong authentication methods such as SMS One-Time Passwords (SMS OTP). Trusteer Mobile Risk Engine and its client-side components provide the following mobile fraud risk detection capabilities: Complex Device Fingerprinting for Mobile Devices: calculates a persistent device ID that uniquely identifies each mobile device. It also collects multiple device attributes such as geo location and user behavior data to enable accurate detection of risky or suspicious access; Account Takeover Prevention from Mobile Devices: correlates risk factors such as new, spoofed and known fraudster devices with evidence of account credentials compromise. This real-time capability prevents cybercriminals from using stolen user credentials acquired via Phishing and malware attacks to access the mobile banking channel; Compromised Mobile Device Detection: analyzes device vulnerabilities to mobile threats (such as jailbroken/rooted state) and detects devices compromised with mobile malware. This enables financial institutions to restrict access or transaction capabilities for high risk devices; Global Fraudster Database: maintains a global repository of known fraudster devices (PC, Mac and Mobile) that have been used to attempt fraud across hundreds of Trusteer protected financial institutions. Trusteer Mobile Risk Engine is a web-based service that includes the following client-side components: Trusteer Mobile SDK: a security library that is embedded in a native mobile banking app and generates a device ID and device risk factors that are fed into the risk engine; Trusteer Mobile App: a secure browser that is built on top of the SDK and provides device ID and device risk factors for mobile web access to online banking. By securing both the native app and requiring web access via a secure browser, financial institutions can ensure all mobile access and transactions are evaluated for fraud risk; Trusteer Mobile Out-of-Band Authentication: a secure login and transaction verification solution that is used to ensure access to sensitive operations are initiated by the genuine account holder; Mobile Risk API: allows mobile device risk data collected by banking applications to be integrated into the Mobile Risk Engine without deploying a Trusteer client-side component. Trusteer Mobile Risk Engine can also be integrated with 3(rd) party authentication systems (to drive step-up authentication for high risk access) and other risk engines. Trusteer Mobile Risk Engine is available immediately from Trusteer and its business partners worldwide. Pricing is based on the number of users of the protected banking application.

Trusteer, Inc. Expands into China; Appoints William Wei as Country Manager

Trusteer, Inc. announced that it has established a sales and service center in Beijing to meet growing demand from financial institutions in mainland China, Hong Kong and Taiwan for its fraud prevention and endpoint protection products. The company has appointed Mr. William (Xiaoqiang) Wei as country manager for Trusteer in China. Mr. Wei has more than 15 years of experience in information security and financial fraud prevention. He has held sales, business development, marketing and professional services positions with Entrust China and Venusense.

Similar Private Companies By Industry

Company Name Region
Insurint Corporation United States
Advantage Futures LLC United States
Initial Crowd Offering, Inc. United States
IDology, Inc. United States
Sproose, Inc. United States

Recent Private Companies Transactions

Type
Date
Target
Merger/Acquisition
August 15, 2013
--
 

Stock Quotes

Market data is delayed at least 15 minutes.

Company Lookup

Most Searched Private Companies

Company Name Geographic Region
NYC2012, Inc. United States
Lawyers Committee for Civil Rights Under Law United States
Bertelsmann AG Europe
Rush University United States
Greater Houston Partnership United States

Post a JobJobs

View all jobs

Sponsored Financial Commentaries

Sponsored Links

Report Data Issue

To contact Trusteer, Inc., please visit www.trusteer.com. Company data is provided by Capital IQ. Please use this form to report any data issues.

Please enter your information in the following field(s):
Update Needed*

All data changes require verification from public sources. Please include the correct value or values and a source where we can verify.

Your requested update has been submitted

Our data partners will research the update request and update the information on this page if necessary. Research and follow-up could take several weeks. If you have questions, you can contact them at bwwebmaster@businessweek.com.