Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

Trusteer develops no-footprint endpoint malware detection

Known as Pinpoint, the service is said to permit enterprises, financial institutions and other online service providers to transparently detect immediate threats on the user's machine before allowing them to sign-in or execute transactions.

According to Trusteer, in use, the service carries out its analysis wholly in the cloud and, where malware is detected, prompts users to download its Rapport in-browser security software to remove the offending code.

Interestingly, the firm is claiming that, by performing its main analyses in the cloud, Pinpoint avoids the problem of false positives.

It does this, the firm says, by using pooled intelligence from the millions of users of Rapport from around the world, spotting IP transactions between infected machines and cybercriminal command-and-control servers.

Thanks to this, Trusteer claims that Pinpoint achieves an 80% detection rate with zero false positives. This detection rate, which is steadily increasing, "is remarkable compared to the notoriously low industry average for malware detection products", says the firm.

Trusteer adds that several major financial institutions in North America and Europe have been using a beta version of Pinpoint for a number of months to address a variety of security challenges.

Yaron Dycian, the firm's vice president, meanwhile, describes web fraud prevention as a three-legged stool that combines detection, protection, and remediation.

"With the release of Pinpoint, we have added a no-software option for login and transaction monitoring that complements the comprehensive protection and remediation capabilities provided by Rapport", he said.

"Now organisations can deploy multi-layer protection that covers their entire customer base and generates real-time information about malware that can be used to block fraud attempts", he added.

What’s Hot on Infosecurity Magazine?