Bloomberg the Company & Products

Bloomberg Anywhere Login


Connecting decision makers to a dynamic network of information, people and ideas, Bloomberg quickly and accurately delivers business and financial information, news and insight around the world.


Financial Products

Enterprise Products


Customer Support

  • Americas

    +1 212 318 2000

  • Europe, Middle East, & Africa

    +44 20 7330 7500

  • Asia Pacific

    +65 6212 1000


Industry Products

Media Services

Follow Us

May 29, 2015 9:05 PM ET

Internet Software and Services

Company Overview of Trusteer, Inc.

Company Overview

Trusteer, Inc. provides endpoint cybercrime prevention solutions that protect organizations against financial fraud and data breaches. It offers clientless fraud prevention products, including Trusteer Pinpoint Malware Detection solution for clientless detection of malware infected devices, enabling organizations to focus on fraud prevention processes based on malware risk and initiate malware removal; and Trusteer Pinpoint Account Takeover Detection solution for clientless detection of criminal access to Websites using device ID, phishing detection, and malware-driven credential theft detection. The company also provides PC and Mac security solutions, including Trusteer Apex that protects e...

545 Boylston Street

5th Floor

Boston, MA 02116

United States

Founded in 2006





Key Executives for Trusteer, Inc.

Co-Founder and Director
Age: 42
Co-Founder and Vice President of Research & Innovation
Co-Founder, Chief Technology Officer and Head of Security Research Group
Chief Financial Officer
Vice President of Operations
Compensation as of Fiscal Year 2014.

Trusteer, Inc. Key Developments

Malauzai Software and Trusteer Team Up to Help Customers Bancorp Strengthen Security of Mobile Banking Application

Malauzai Software has teamed up with Trusteer to provide an integrated solution that is being used by Wyomissing, Pa. based Customers Bancorp, Inc. to strengthen the security of its mobile banking application. With the rate of mobile malware on the rise, this solution provides end users with an additional layer of security by integrating Trusteer's Mobile SDK security solution into Malauzai's SmartApps. With Trusteer's Mobile SDK embedded into a SmartApp, the device is scanned to identify a broad range of risks, including: Jailbroken (iOS) and Rooted (Android) devices, Missing Operating System (OS) security patches, Risky application configurations and permissions, Malware infections and Unsecured Wi-Fi access. Once the scan is complete, a mobile risk score is determined. Customers Bancorp uses this result to secure mobile banking transactions. Risk data is provided to the mobile banking app and can be used to restrict account functionality based on device risk levels.

Trusteer Announces General Availability of E-Commerce Fraud Prevention Service

Trusteer announced the general availability of the Trusteer Cybercrime Prevention Architecture for e-commerce. This service provides Trusteer's award-winning "bank grade" security to retailers, social media, dating, gaming and other consumer website operators to prevent account takeover, stop payment fraud and protect their customers' data from being stolen. By monitoring the full e-commerce attack life cycle and detecting compromised user devices and accounts before unauthorized transactions can take place, Trusteer's solution short circuits fraud attempts. Criminals are targeting e-commerce sites using the same sophisticated techniques being used to attack banks. These advanced threats are rendering existing e-commerce fraud controls obsolete. The resulting increase in fraud incidents is inflicting significant financial (chargebacks), brand and customer experience damage on website operators. According to Gartner, Inc, trends in web fraud detection include: "Less reliance on device identification as criminals learn to thwart it, and also because it is not fully effective (only about 70%) on mobile devices, where less information is available to the identification process. Similarly, less reliance on proxy-piercing technology, which is becoming much less reliable (about 50% to 60%) as criminals learn to circumvent it.(1) " Trusteer's solution goes beyond current Device ID and proxy piercing solutions to track the full attack life cycle by detecting user devices and accounts compromised by malware and phishing in order to stop account takeover and payment fraud before it happens. This is accomplished by combining sophisticated device intelligence with Trusteer's proven malware and phishing detection technology. Moreover, the company can quickly identify known criminal devices through its Global Criminal Device Database that is automatically populated based on the routine analysis of over 100 million protected endpoints. By correlating device and account risk factors in real-time Trusteer prevents high-risk access attempts and transaction requests. Trusteer's solution spans mobile, PC and MAC platforms to provide highly accurate and actionable fraud risk detection.

Trusteer Announces Trusteer Mobile Risk Engine

Trusteer announced the Trusteer Mobile Risk Engine to protect financial institutions against mobile and PC-to-mobile (cross-channel) attacks. Trusteer Mobile Risk Engine detects and stops account takeover from mobile devices by conclusively identifying criminal access attempts. It also identifies devices that are vulnerable to compromise by malware and those that have been infected. Mobile malware is commonly used to bypass strong authentication methods such as SMS One-Time Passwords (SMS OTP). Trusteer Mobile Risk Engine and its client-side components provide the following mobile fraud risk detection capabilities: Complex Device Fingerprinting for Mobile Devices: calculates a persistent device ID that uniquely identifies each mobile device. It also collects multiple device attributes such as geo location and user behavior data to enable accurate detection of risky or suspicious access; Account Takeover Prevention from Mobile Devices: correlates risk factors such as new, spoofed and known fraudster devices with evidence of account credentials compromise. This real-time capability prevents cybercriminals from using stolen user credentials acquired via Phishing and malware attacks to access the mobile banking channel; Compromised Mobile Device Detection: analyzes device vulnerabilities to mobile threats (such as jailbroken/rooted state) and detects devices compromised with mobile malware. This enables financial institutions to restrict access or transaction capabilities for high risk devices; Global Fraudster Database: maintains a global repository of known fraudster devices (PC, Mac and Mobile) that have been used to attempt fraud across hundreds of Trusteer protected financial institutions. Trusteer Mobile Risk Engine is a web-based service that includes the following client-side components: Trusteer Mobile SDK: a security library that is embedded in a native mobile banking app and generates a device ID and device risk factors that are fed into the risk engine; Trusteer Mobile App: a secure browser that is built on top of the SDK and provides device ID and device risk factors for mobile web access to online banking. By securing both the native app and requiring web access via a secure browser, financial institutions can ensure all mobile access and transactions are evaluated for fraud risk; Trusteer Mobile Out-of-Band Authentication: a secure login and transaction verification solution that is used to ensure access to sensitive operations are initiated by the genuine account holder; Mobile Risk API: allows mobile device risk data collected by banking applications to be integrated into the Mobile Risk Engine without deploying a Trusteer client-side component. Trusteer Mobile Risk Engine can also be integrated with 3(rd) party authentication systems (to drive step-up authentication for high risk access) and other risk engines. Trusteer Mobile Risk Engine is available immediately from Trusteer and its business partners worldwide. Pricing is based on the number of users of the protected banking application.

Similar Private Companies By Industry

Company Name Region
Plink, Inc. United States
Yingo Yango, Inc. United States
ENTARENA, Inc. United States
Staffly, Inc. United States United States

Recent Private Companies Transactions

No transactions available in the past 12 months.

Stock Quotes

Market data is delayed at least 15 minutes.

Company Lookup

Most Searched Private Companies

Company Name Geographic Region
Lawyers Committee for Civil Rights Under Law United States
NYC2012, Inc. United States
Bertelsmann AG Europe
Rush University United States
Greater Houston Partnership United States

Sponsored Financial Commentaries

Sponsored Links

Report Data Issue

To contact Trusteer, Inc., please visit Company data is provided by Capital IQ. Please use this form to report any data issues.

Please enter your information in the following field(s):
Update Needed*

All data changes require verification from public sources. Please include the correct value or values and a source where we can verify.

Your requested update has been submitted

Our data partners will research the update request and update the information on this page if necessary. Research and follow-up could take several weeks. If you have questions, you can contact them at