Less then a year after acquiring Israeli company Trusteer, IBM has Launched a new security software for end points.
“Trusteer Apex” secures both laptops and desktops that are exposed and vulnrable to malicious code. The new products is an addition to the threat defence initiaitive IBM recently Introduced.
The initative is said to use security tools and a deep analysis of user activites, to create a whole security suit, meant to cover the extent of the different stages of attacks – ranging from the first penetration to the data leak.
The software is designed to stop Cyber-criminals from exploiting security holes, and IBM claim that its strenght lies in its being an automatic analysis tool with an easy to use interface.
Another ability of the software is its multi layerd defence, combining a number of attack-breaking methods. IBM managed to identify strategic failures where cyber criminals focus their attentions to take over the end machine and infect it with malicious code. The system has another capality: it deflects identity theft attemptes (Phishing).
The threat anlysis service offered to Trusteer users assists in evaluating and identifying suspicious behavior, and offers reccomendations for action and defence. Over 100 Million end points which are serviced by IBM along with a large, constanly updated database containing over 70,000 known threats (also run by Big Blue). This security inteligence is translated to updates.
Trusteer’s vice president for products, services and markeing, Yaron Ditsian, commented that “A profound research process allowed us to identify critical stages in the attack chain, where the intruders have compartively small variety of opportunities to activate the malicious code. The currently available end-point security solutions offer narrow defence, that deals with a specific array of attacks.They create a substential extra load on the already overworked security personnel and make the defending process harder. Trusteer’s technology offers a new method to handle cyber threats both responsive and premeptive”.