• Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io
No Result
View All Result
Converge Digest
Thursday, April 16, 2026
  • Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io
No Result
View All Result
Converge Digest
No Result
View All Result

Home » IBM Intros Trusteer Endpoint Protection Software

IBM Intros Trusteer Endpoint Protection Software

May 21, 2014
in All
A A

IBM introduced its new Trusteer Apex endpoint software aimed at stopping advanced malware at the weakest link, the endpoint, including laptops and desktops.

IBM’s Trusteer Apex software, which is the newest offering in the company’s Threat Protection System announced earlier this month, leverages security intelligence and behavioral analytics to go beyond traditional anti-virus approaches and firewalls to disrupt attacks across the entire attack chain – from break-in to exfiltrate.

IBM said its new Trusteer Apex software addresses strategic chokepoints where cybercriminals focus their attention, take hold of a user’s endpoint and infect it with malware. For example, Java is the target of half of the application vulnerability attacks. Trusteer Apex can stop attacks that are embedded into Java applications and lock them from wreaking havoc on the enterprise.  Trusteer Apex prevents malicious Java applications through assessing application trust and activity risk, and blocking untrusted apps from doing high-risk activities.

“Through extensive research, IBM has identified specific stages of the attack chain where cyber criminals have relatively few options to execute their malicious content,” said Yaron Dycian, Vice President of Marketing, Products & Services at Trusteer, an IBM company.  “Current point solutions in the market offer narrow protections against specific attack vectors and create significant workload on overstretched security teams, making it difficult to manage against cyber threats. Our strategic chokepoint technology introduces a fresh approach for breaking the threat lifecycle and preempting cyber attacks.”

http://www.ibm.com

Tags: Blueprint columnsCyber SecurityIBM
ShareTweetShare
Previous Post

Mimosa Raises $20 Million for Massive MIMO Wi-Fi

Next Post

Australia Japan Cable Completes Multi-Terabit Upgrade with Infinera

Staff

Staff

Related Posts

IBM and Cisco Aim for Networked, Fault-Tolerant Quantum by Early 2030s
Quantum

IBM and Cisco Aim for Networked, Fault-Tolerant Quantum by Early 2030s

November 20, 2025
IBM Doubles Quantum R&D Speed With 300 mm Fab
Quantum

IBM Doubles Quantum R&D Speed With 300 mm Fab

November 12, 2025
Airtel and IBM Partner to Expand AI-Ready Cloud Infrastructure
All

Airtel and IBM Partner to Expand AI-Ready Cloud Infrastructure

October 23, 2025
IBM Launches Spyre Accelerator to Power Generative and AgenticAI
Data Centers

IBM Launches Spyre Accelerator to Power Generative and AgenticAI

October 8, 2025
Video: AI Automation for Real-Time, Multi-Vendor Networks
Video

#AINetworking25: What’s Next for AI-Driven Networking – Director’s Cut

October 6, 2025
IBM Launches Power11 Server Family with AI Acceleration
Data Centers

IBM Launches Power11 Server Family with AI Acceleration

July 8, 2025
Next Post
Australia Japan Cable Completes Multi-Terabit Upgrade with Infinera

Australia Japan Cable Completes Multi-Terabit Upgrade with Infinera

Please login to join discussion

Categories

  • 5G / 6G / Wi-Fi
  • AI Infrastructure
  • All
  • Automotive Networking
  • Blueprints
  • Clouds and Carriers
  • Data Centers
  • Enterprise
  • Explainer
  • Feature
  • Financials
  • Last Mile / Middle Mile
  • Legal / Regulatory
  • Optical
  • Quantum
  • Research
  • Security
  • Semiconductors
  • Space
  • Start-ups
  • Subsea
  • Sustainability
  • Video
  • Webinars

Archives

Tags

5G All AT&T Australia AWS Blueprint columns BroadbandWireless Broadcom China Ciena Cisco Data Centers Dell'Oro Ericsson FCC Financial Financials Huawei Infinera Intel Japan Juniper Last Mile Last Mille LTE Mergers and Acquisitions Mobile NFV Nokia Optical Packet Systems PacketVoice People Regulatory Satellite SDN Service Providers Silicon Silicon Valley StandardsWatch Storage TTP UK Verizon Wi-Fi
Converge Digest

A private dossier for networking and telecoms

Follow Us

  • Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io

© 2025 Converge Digest - A private dossier for networking and telecoms.

No Result
View All Result
  • Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io

© 2025 Converge Digest - A private dossier for networking and telecoms.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.
Go to mobile version