Trusteer global identity consortium
Validates if the device or the user evidence is known as good or bad in the Trusteer global network.
Digital Identity Trust
with IBM Security Trusteer
Discover
Onboard/Verify
Verify/Login
Use
07:15 AM . Home . Laptop
IBM Security Trusteer kicks into action the second a user discovers an organization’s site. As visitors travel throughout the site, Trusteer analyzes the full context of the user and interactions to begin to build a trust score.
Looks at network data for signs of a potential known bad actor.
Analyzes whether malware is active on the user’s device or if anomalies exist in the session, which can be a sign of a compromised user.
The use of machine learning helps to build profiles of how users interact with their devices and detects anomalies which may signify a potential threat.
Looks up a device’s specific identification and matches it with Trusteer global network details to determine the validity of the activity.
Determines if the navigation is conducted by a bot or a human to identify suspicious behavior.
12:45 PM . Work . Mobile
Even as users switch devices, Trusteer works to detect fraud and build digital identity trust. Behind the scenes, Trusteer scans movements, speed of data entry, session length, behavioral patterns, and more to determine the legitimacy of the user.
Looks at the information the user provides during the on-boarding process to determine potential bad actors based on evidence within Trusteer’s network.
Analyzes device vulnerability to see if it’s been jailbroken or includes a root hider, spoofing evidence, emulator or malware infection.
Determines if a user has rapidly created different accounts in different applications via the same device, creating cause for concern.
Trusteer identifies if phone number is registered as a pre-paid or burner device and analyzes the number’s address, country, roaming indication, and more to determine legitimacy.
Trusteer determines if the email was randomly generated or used in the past to identify potential known malicious users.
06:15 PM . Work . Mobile
While data and credentials are entered across different sessions, Trusteer provides a nuanced trust score that can help determine customized access and authentication policies for each user. Highly trusted users can be served a more seamless digital experience.
Understands what other webpages the user is arriving from to determine if the user previously visited a known phishing page.
Analyzes cross channel patterns that match known fraudulent activity such as logins from an infected device, new mobile device, or frequent logins from different channels.
Highly trusted users can be authenticated without a password. Challenge only those with lower levels of identity trust with further authentication steps.
Determines if there is any evidence or characteristics of potential social engineering.
Identifies if there is an active Remote Access Trojan (RAT) that would fraudulently log keystrokes, steal passwords, or capture other session details.
09:15 PM . Home . Tablet
As users revisit and continue to navigate the site or make changes to their account details, Trusteer determines if the behavior pattern is normal for that specific user, and more. If any anomalies arise that signal it may be a different user, then it could be a sign of malicious intent.
Looks for changes in the session and identifies signs of potential malicious activity.
For activity deemed sensitive, Trusteer may enforce additional verification to increase trust in the identity, with step-up authentication: OTP or biometric authentication
Analyzes user interactions with the site and determines if it matches with regular behavior of previous sessions of the known user.
Detects abnormal activity surrounding transactions and identifies if the activity matches known fraudulent patterns.
Identifies how the user is connecting to validate the trustworthiness of the network, as well as identifying any RAT patterns.