TrustDefender Mobile provides mobile apps with the infrastructure and intelligence needed to verify the trustworthiness of a mobile device. Legitimate users are immediately recognized and can conduct their transactions without additional authentication procedures. As a result, TrustDefender Mobile benefits both businesses and their customers. Calls to TrustDefender Mobile are inserted at strategic points within mobile applications—usually during login, payments, and account registrations. The mobile device is then profiled on a wide range of levels:
Advanced Persistent Device Identification: Identifies individual mobile devices for both iOS and Android platforms, even if they have been reset or if the application has been reinstalled.
Malware Detection: For Android-based systems, TrustDefender Mobile verifies the integrity of the application in which it is embedded to ensure it has not been modified or infected. It also analyzes all other apps installed on the device, and reports their reputation and the presence of any malicious code.
Location Services: : Latitude and longitude information is gathered from GPS hardware, and IP addresses are compared with physical locations to detect the use of proxies and VPNs.
Jailbroken (iOS) and Rooted (Android) Devices: Dynamic jailbreak and root detection technologies determine when device security controls have been thwarted.
Anomaly Detection: Detects device tampering as well as attempts to masquerade as a different device, along with a number of other anomalies that may indicate fraud.
Packet Fingerprinting: Automatically detects device and data spoofing by analyzing the network traffic packet signatures originating from the device.
Rapid, lightweight deployment: The SaaS-based TrustDefender Cybercrime Protection Platform secures your applications without the need to add or deploy additional servers or infrastructure.
Up-to-date, global insight: Integration with the shared Global Trust Intelligence Network provides constant access to current threat intelligence derived from millions of continuing transactions.
Easily protect all applications across all business units Unlike solutions that require deep levels of integration, virtually any web-based application can easily add ThreatMetrix protection, thereby benefiting from threat intelligence collected anywhere within the organization and across the globe.
Real-time responsiveness: ThreatMetrix delivers near-instant, real-time insight from data gathered around the globe, so you always have the latest fraud-related intelligence.