Digitized lock

IBM® Security Trusteer RapportTM

Next level fraud protection to help ensure your security online.

As part of KeyBank’s ongoing commitment to protecting our clients from the latest cyber threats, we have joined with IBM Trusteer, leading experts in financial security, to offer Trusteer Rapport software as a complimentary service to all business and commercial clients.

From the moment it’s installed, Trusteer Rapport provides a new level of fraud protection.

  • Removes any existing financial malware immediately
  • Guards against future malware infections
  • Detects threats your existing antivirus software might not detect or remove
  • Protects your user ID, password, and other sensitive information
  • Stops phishing attacks
  • Software updates automatically to keep up with the latest threats

How do I know it’s working?

Once installed, a green Trusteer Rapport icon will be displayed near (or in) your address bar if you are viewing a website protected by Trusteer Rapport. If the site is unprotected, a gray icon will appear instead. When accessing KeyBank sites, such as KeyNavigator®, you should only be looking for the green icon. If you do not see a green icon, do not click on the link.

Trusteer Rapport

Trusteer Rapport software must be downloaded and installed by the client. In the case of companies who impose limitations on individual users regarding downloading and installing software, clients may have to work through their company administrator.

Give yourself the confidence and security of knowing your personal and business information is secure online. Download IBM Trusteer Rapport today.

Who do I contact if I have questions about my security?

Please direct your questions to IBM-Trusteer Support using the link below. You may either submit a ticket or request a callback.

IBM-Trusteer Support

Software must be downloaded and installed on the client endpoint. Additionally, some companies will have limitations on individual users downloading and installing from this link and may have to work through their company admins.

©International Business Machines 2021. IBM® and Trusteer Rapporttm are registered trademarks of the International Business Machines Corporation, registered in many jurisdictions worldwide.

Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.