Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Management & Strategy

IBM Completes Acquisition of Trusteer

IBM announced on Tuesday that it has completed the acquisition of Trusteer, a Boston-based provider of fraud and advanced threat protection solutions.

IBM announced on Tuesday that it has completed the acquisition of Trusteer, a Boston-based provider of fraud and advanced threat protection solutions.

The close of the acquisition comes just over two weeks after IBM announced that it had entered into a definitive agreement to acquire the security firm.

Financial terms were not disclosed, but some reports said IBM paid between $800 million to $1 billion to acquire Trusteer, with Techcrunch citing a source saying it was the latter of the two.

“Trusteer will extend our data security capabilities further into the cloud, mobile and endpoint security space,” said Brendan Hannigan, General Manager, IBM Security Systems. “This acquisition helps provide our clients with comprehensive network and endpoint anti-malware solutions.”

“I think Trusteer has interesting technology that fills a big hole in IBM’s product line in terms of being able to deal with advanced malware,” Mike Rothman, Analyst and President at security advisory firm Securosis, told SecurityWeek previously.

IBM also announced in August that it was forming a cybersecurity software lab in Israel that will bring together more than 200 Trusteer and IBM researchers and developers to focus on mobile and application security, advanced threat protection, malware, counter-fraud, and financial crimes.

Trusteer was founded in 2006 by Mickey Boodaei, Rakesh Loonkar, Amit Klein, Shmulik Regev, and Eldan Ben-Haim and is backed by U.S. Venture Partners and Shlomo Kramer.

IBM has created a site that provides additional information on the acquisition of Trusteer.

Advertisement. Scroll to continue reading.
Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem