IBM adds security software Trusteer Apex targeting Java applications

Enterprise IT vendor IBM announced Trusteer Apex, a security software, which leverages security intelligence and behavioral analytics to protect laptops and desktops from malware attacks — especially on Java applications.

IBM’s Trusteer Apex software, the latest offering in the company’s Threat Protection System, goes beyond traditional anti-virus approaches and firewalls to disrupt attacks across the entire attack chain.

The company will assist enterprises which do not have complete protection and faces manageability challenges.

One of the focus areas of IBM’s Trusteer Apex software will be Java applications which are the target of half of the application vulnerability attacks. As per the IBM X-Force Q2 2014 report, 96 percent of Java exploits are applicative, meaning rogue Java applications that are not controlled.


An IBM study says targeted attacks are the greatest threat with 31 percent of respondents believing adequate resources are available to prevent, detect and contain these threats.

IBM is tapping a big market opportunity. Data breaches caused by such threats have cost on average $9.4 million in brand equity alone per an IBM Trusteer-commissioned Ponemon study on Advanced Persistent Threats.

Trusteer Apex endpoint protection software blocks cyber criminals from exploiting vulnerabilities on the endpoint that lead to data breaches. It provides an automated threat analysis capability to prevent attacks. It is easy for the chief security officer and the IT Security to become resourceful and effective.

Trusteer Apex can stop attacks that are embedded into Java applications.  In addition, Trusteer Apex prevents malicious Java applications through assessing application trust and activity risk, and blocking untrusted apps from doing high-risk activities, said IBM.

A major healthcare provider has recently deployed Trusteer Apex on more than 20,000 endpoints to protect sensitive patient data.  Apex detected more than 100 high-risk infections, despite the existence of an anti-virus solution and a next-generation firewall.

InfotechLead News Team