Trusteer

This online user group is intended for Trusteer product users to communicate with IBM experts, share advice and best practices with peers and stay up to date regarding product enhancements, regional user group meetings, webinars, how-to blogs and other helpful materials.

We invite you to participate and ask you to contact Community Manager Lauren Jensen with any questions.

General Trusteer Resources

Advanced Fraud

IBM Trusteer Pinpoint Detect

New Account Fraud

IBM Trusteer Pinpoint Assure

Adaptive Authentication

IBM Trusteer Pinpoint Verify

Malware and Phishing Prevention

IBM Trusteer Rapport

Detect Compromised and Vulnerable Devices

IBM Trusteer Mobile SDK



Search Group

Latest Posts

  • We are working and supporting more and more use cases of BOT detection, and we invite you to work with us on that. Do you want to get full visibility on what we are building and how? do you want to share with us your thoughts and feedback and your own ...

    1 person recommends this.
  • About a year ago, we spotted malicious activity that was out of the ordinary starting in Latin America, it was an aggressive and sophisticated remote overlay PC malware that was very hard to detect. I thought it is interesting to hear your experience ...

  • This webinar is now available on-demand: here ------------------------------ Lauren Jensen ------------------------------

Upcoming Events


Latest Articles

  • We are in the process of rolling out a next generation Trusteer management tool designed to help make life easier for the fraud analysts among you by simplifying and informing risk assessment management. The new tool brings data points from multiple ...

  • As many organizations tackle the challenges of “Digital Transformation,” each organization is presented with unique hurdles that they’re looking to overcome. Many of these challenges center on the attitude that consumers want to engage with organizations ...

  • By Itzik Chimino ; Co-authored by Limor Kessem | Ophir Harpaz As part of the ongoing research into cybercrime tools targeting users of financial services and e-commerce, IBM X-Force analyzes the tactics, techniques and procedures (TTPs) of organized ...

Latest Files

Community Members
169 Members
group Admin
group Admin
group Admin
group Admin
group Admin
group Admin
group Admin
group Admin
group Admin
group Admin