IBM Trusteer Mobile SDK provides an embedded security library for native mobile web applications.
Vendor
IBM
Company Website
Detect compromised and vulnerable devices
IBM Trusteer® Mobile protects native iOS and Android applications through device risk factor analysis, behavior anomaly detection, and persistent mobile device IDs. IBM Trusteer Mobile is fully integrated into the Pinpoint cloud risk platform.
IBM Trusteer Mobile helps detect device and session risks in real time, helping maintain the integrity of the application in which it has been embedded by using advanced analytics. Trusteer Mobile assesses the device to determine if it has been compromised by malicious actors such as malware, remote access Trojans (RAT) and SMS stealing apps or through jailbreaking and rooting, overlay attacks and more. It uses advanced technologies to continuously process additional cross-channel indicators such as behavioral anomalies, navigation discrepancies and phishing compromise evidence.
Features
- **Continuous mobile risk detection: **Automatic updated risk assessment detects mobile threats.
- **Rooted and jailbroken device detection: **Trusteer Mobile SDK contains a root/jailbreak detection capability that helps determine whether a modified version of the operating system is installed.
- **Certificate pinning: **Trusteer Mobile SDK enables certificate pinning, also known as SSL Pinning or augmented certificate authority security, to help detect and block such attacks.
- **Overlay protection: **Trusteer Mobile provides a set of APIs that natively integrate into your mobile banking app to provide real-time risk analysis and detection of overlay attacks.
- **Emulator and simulator detection: **Trusteer Mobile detects transactions originating from virtual machines or emulators and provides actionable recommendations on whether to allow, restrict or deny user or device access.
- **Device fingerprinting: **By generating a persistent mobile device ID (based on hardware and software attributes) that is resilient to application reinstallation, Trusteer Mobile SDK helps detect new, spoofed (proxy) and known criminal devices.
- **Mobile behavior biometrics: **The Trusteer native user behaviour biometric profiling capability uses device telemetry and built-in accelerators and motion sensors for securing user identities.
- **Mobile remote access tolls: **Trusteer Mobile detects installed malicious mobile remote access tools on devices as well as real-time remote access sessions.
- **Mobile device intelligence: **The global consortium provides mobile intelligence including carrier intelligence and known fraudsters intelligence.
- **Mobile device hygiene: **Trusteer Mobile detects on-device risk such as malware, re-packaged applications or rooted/jailbroken devices.
Benefits
- **Protection from mobile threats: **Detect and assess the risks associated with the mobile device, account and connection prior to accessing the mobile app.
- **Accurate and persistent device ID: **Generate a persistent mobile device ID, based on hardware and software attributes, that is resilient to application reinstallation.
- **Advanced cross-channel detection: **Correlate online and mobile banking risk data for mobile risk detection through Pinpoint Cloud scalable machine learning and AI capabilities.