What is Trusteer?
Trusteer is the leading provider of cybercrime prevention solutions that protect organizations against financial fraud and data breaches. Hundreds of organizations, such as Bell State Bank & Trust, and millions of end users rely on Trusteer to protect their computers from online threats that are invisible to legacy security solutions. Trusteer’s Cybercrime Prevention Architecture combines multi-layer security software and real-time threat intelligence to defeat zero-day malware and phishing attacks, and help organizations meet regulatory compliance requirements.
Is Trusteer Rapport Free?
Bell State Bank & Trust offers Trusteer Rapport free to Personal and Business Online Banking customers.
Why do I need Rapport?
Did you know that 2 million legitimate websites download malware to your PC? 15,000 newly infected web pages are identified each day and 79% of them are legitimate websites that have been hacked. Even well-known websites such as Google and Yahoo have been reported to serve malware to users through ads. Even if you are very careful and only visit well-known websites, malware can silently find its way to your computer.
Rapport’s protection is based on a revolutionary technology that is entirely different from the technologies used by other desktop security solutions. Rapport protects your username, password, and other sensitive login information and prevents malware and fraudulent websites from stealing this information. Rapport also protects your communication and prevents malware from tampering with your transaction (for example, transferring money from your bank account to the attacker’s bank account).
Do I still need my antivirus if I install Trusteer?
Trusteer scans, and detects financial malware on your computer. Trusteer may remove, or block it from accessing sensitive information. Removing malware can damage the computer and often the malware simply re-installs, while when it is blocked it simply remains harmless on the computer. Trusteer does not replace your antivirus and is not an antivirus solution. It works differently and prevents attacks that your antivirus solution cannot detect or remove.
How exactly does Rapport protect me?
Rapport protects you against the following threats:
A Keylogger is malicious software that resides unnoticed inside your computer. The keylogger records keystrokes (i.e. each time you type something on the keyboard) and then sends this information to the attacker. By grabbing your sign-in credentials and other sensitive information and sending them to the attacker, keyloggers enable the attacker to sign into your accounts. Rapport applies basic character replacement algorithm to prevent specific old banking malware from stealing login credentials.
Malicious Browser Add-ons
(Windows only) Browser add-ons (e.g. toolbars, BHOs, and plug-ins) can control everything that happens inside your browser. A malicious add-on is capable of reading sensitive information such as your sign-in credentials and passing them to the attacker. It can also generate transactions on your behalf, such as transferring money from your account to the attacker’s account. Trusteer Rapport prevents unauthorized browser add-ons from reading sensitive information and tampering with your transactions.
(Windows only) A malicious program can connect to your browser and control everything that happens inside of it. Such a program is capable of reading sensitive information (such as your sign-in credentials) and passing them to the attacker. It can also generate transactions on your behalf, such as transferring money from your account to the attacker’s account. Trusteer Rapport prevents programs from connecting to the browser, reading sensitive information and tampering with your transactions while you are logged into protected websites.
This type of malware steals your session parameters with a specific website and sends this information to the attacker. These session parameters can then be used by the attacker to take over your session with the website and to bypass the authentication process that is required to log into the website. Trusteer Rapport prevents access to session parameters while you are connected to protected websites.
A Phishing attack is when the attacker builds a website that looks exactly like a website you know and trust (such as your bank’s website). The attacker then tries to entice you to visit this website (such as by sending you a fraudulent email). When you arrive at the fraudulent website you mistakenly believe that this is the real website. As soon as you try to sign into this fraudulent website the attacker grabs your sign-in credentials and can then use them to sign into the genuine website on your behalf.
To protect you against Phishing attacks Trusteer Rapport learns the password (and sometimes even the username) you use with protected websites. Trusteer Rapport then warns you each time you use the password or the username on a different website. Using this warning you can immediately understand that you are on the wrong website and prevent the password from being submitted.
Pharming or DNS Spoofing
A Pharming or DNS Spoofing attack is when the attacker causes your computer to go to a fraudulent website each time you type a real website’s address in the browser’s address bar. The attack achieves this using various techniques such as infecting your computer with malware or by compromising servers in your ISP’s network. Once you arrive at the fraudulent website and try to sign in, the attacker grabs your sign-in credentials and can now sign into the genuine website on your behalf. To protect you against Pharming attacks Trusteer Rapport verifies the IP address and the SSL certificate of the website each time you connect to a protected website. If the verification fails, Rapport terminates the connection and establishes a new connection to the real website.
How can I tell that Rapport is working?
You will know Trusteer Rapport is running when you see the icon in your browser’s address bar.
Which browsers and Operating Systems are supported by Trusteer?
For Windows Operating Systems (Windows XP (SP3), Vista, 7, 8, 8.1 or Server), Trusteer Endpoint Protection supports the following browsers:
For Mac OS X (Snow Leopard 10.6 and up), Trusteer Endpoint Protection supports:
We intend to expand our support for additional browsers in the future. Support for Google Chrome for Mac and Safari for Windows may be incorporated in a future release, but unfortunately there are no immediate plans of this kind.
Unfortunately, there are no current plans for supporting Ubuntu OS / Linux.
For a full list of Trusteer Endpoint Protection’s system requirements and supported platforms, click here.
How does Trusteer protect additional websites?
To protect a website, click on the Trusteer Rapport icon (if it is grey) and click “Protect this website.” The Trusteer Rapport icon will turn green to let you know it is protecting the website.
What attacks does Rapport protect against?
Trusteer proprietary browser lockdown technology is designed to prevent unauthorized access to information that flows between customers and websites regardless of which specific malware issues the threat. These techniques include redirection to a fraudulent website, server compromise, keylogging, session hijacking, and many other malicious attacks. Since Trusteer is regularly and frequently updated, it is better able to respond to the most current version of any type of known attempt to fraudulently obtain personal information.
Do I need administrative rights to download Trusteer Rapport?
If you attempt to download Trusteer, and are unable to, you may need to contact your IT department.
Does Trusteer Rapport update automatically?
Yes, Trusteer Rapport automatically applies security and software updates. Security updates are applied immediately and software updates are applied after reboot when the operating system starts up. It is a good practice to always reboot your computer after a software update.
What is the End User License Agreement (EULA)?
IBM acquired Trusteer to expand its security portfolio with advanced software that combats financial fraud and security threats. Trusteer now conducts business as IBM. Due to the integration into IBM, there is an updated End User License Agreement (EULA). This EULA will be available for all end users using IBM Security Trusteer Rapport. Click here to review the new EULA.
Who will be required to accept the EULA?
All end users of IBM Security Trusteer Rapport will be required to accept the new EULA. This includes end users who previously accepted the EULA from Trusteer.
Why am I required to accept the EULA?
In order to maintain our products’ capabilities that are designed to protect against online security threats, certain information is collected from end users’ computers when suspicious software, website activity or a malfunction is detected. The updated EULA lists the data that is collected and how it is processed. Accepting the EULA indicates that the end user consents to IBM’s collection and processing of this data.
What will happen if I do not accept the EULA?
If the new EULA is not accepted by the user, the user will not be permitted to use the product and must either abort the installation or uninstall the program.
Where can I learn more about the EULA changes?
Click here to view the EULA.
For more information on Trusteer, visit the Trusteer website.