Related Links

  • Trusteer
  • Reed Exhibitions Ltd is not responsible for the content of external websites.

Related Stories

Top 5 Stories


Trusteer develops no-footprint endpoint malware detection

16 March 2011

Trusteer has developed a cloud-based malware detection service that is billed as allowing corporates to defend their end points with no code footprint installed on the device.

Known as Pinpoint, the service is said to permit enterprises, financial institutions and other online service providers to transparently detect immediate threats on the user's machine before allowing them to sign-in or execute transactions.

According to Trusteer, in use, the service carries out its analysis wholly in the cloud and, where malware is detected, prompts users to download its Rapport in-browser security software to remove the offending code.

Interestingly, the firm is claiming that, by performing its main analyses in the cloud, Pinpoint avoids the problem of false positives.

It does this, the firm says, by using pooled intelligence from the millions of users of Rapport from around the world, spotting IP transactions between infected machines and cybercriminal command-and-control servers.

Thanks to this, Trusteer claims that Pinpoint achieves an 80% detection rate with zero false positives. This detection rate, which is steadily increasing, "is remarkable compared to the notoriously low industry average for malware detection products", says the firm.

Trusteer adds that several major financial institutions in North America and Europe have been using a beta version of Pinpoint for a number of months to address a variety of security challenges.

Yaron Dycian, the firm's vice president, meanwhile, describes web fraud prevention as a three-legged stool that combines detection, protection, and remediation.

"With the release of Pinpoint, we have added a no-software option for login and transaction monitoring that complements the comprehensive protection and remediation capabilities provided by Rapport", he said.

"Now organisations can deploy multi-layer protection that covers their entire customer base and generates real-time information about malware that can be used to block fraud attempts", he added.

This article is featured in:
Cloud Computing  •  Internet and Network Security  •  Malware and Hardware Security


Comment on this article

You must be registered and logged in to leave a comment about this article.

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×