TrustRadius: an HG Insights company

IBM Trusteer

Score9 out of 10

3 Reviews and Ratings

What is IBM Trusteer?

IBM Security offers the IBM Trusteer fraud detection and prevention application, to support financial institutions and antivirus applications with additional malware and phishing prevention, as well as provide digital identity protection and prevent fraud. IBM acquired Trusteer in 2013, and the product includes the IBM Trusteer Fraud Prevention Suite, IBM Trusteer Rapport malware and phishing protection tool, IMB Trusteer Pinpoint Detect account takeover protection, and integration with IBM Access Manager as well as IBM Risk Based Authentication Solution.

Categories & Use Cases

Great Product with some drawbacks BUT great assistance

Pros

  • Notification - the emails are timely and we are able to track users well.
  • Security! I love the security that Trusteer uses in order to make sure our customer information is safe.
  • Information - Trusteer shares information regarding breaches and security that we need to be aware of for our customers and our fellow co-workers.

Cons

  • Logins - I have issues regularly with my logins - that may be user related though.
  • It interferes with some other security products and causes issues on our website at times.

Return on Investment

  • As stated before, we've had some grumpy customers with issues regarding the security but we have them turn off the Trusteer or send them to the portal for assistance.

Alternatives Considered

FraudMAP

Other Software Used

FraudMAP

IBM Trusteer it is the platform that gives security to your dreams.

Pros

  • Protection and security for network data.
  • Protective shield mechanism in financial transactions.
  • Implementation and safeguard of user keys optimally.

Cons

  • In every business it is important the security and the veracity of the sources with IBM Trusteer it is reliable to use them for these variants.
  • IBM Trusteer is based on the protection of financial data and for anyone it is advisable to use software that has vulnerability, but in this case the condition that allows this tool to be useful is its ability to set up anti-spy shields for as long as necessary.
  • This type of tool is necessary to be constantly updating and reviewing. They usually tend to be anchored to a system of commands that allow pirates to sneak into information. It is recommended to update the platform and include other forms of verification.

Return on Investment

  • Since the implementation of this tool as a support mechanism to safeguard the identity of our treasures, the organization has had a significant return to the sustainable resources that this tool offers (ROI). It is positive since we have maintained the link of work for which we are made and the satisfaction of our customers.
  • Professional and sustainable technical support. It is worth the investment because it does not affect the budget, but there are both substantive and objective gains.
  • We have reached the goal of advancing towards the integration of our service platforms with IBM Trusteer towards the consolidation of a reliable and sustainable organization.