IBM Trusteer vs. Microsoft Defender for Endpoint

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
IBM Trusteer
Score 9.0 out of 10
N/A
IBM Security offers the IBM Trusteer fraud detection and prevention application, to support financial institutions and antivirus applications with additional malware and phishing prevention, as well as provide digital identity protection and prevent fraud. IBM acquired Trusteer in 2013, and the product includes the IBM Trusteer Fraud Prevention Suite, IBM Trusteer Rapport malware and phishing protection tool, IMB Trusteer Pinpoint Detect account takeover protection, and integration with IBM…N/A
Microsoft Defender for Endpoint
Score 8.3 out of 10
N/A
Microsoft Defender for Endpoint (formerly Microsoft Defender ATP) is a holistic, cloud delivered endpoint security solution that includes risk-based vulnerability management and assessment, attack surface reduction, behavioral based and cloud-powered next generation protection, endpoint detection and response (EDR), automatic investigation and remediation, managed hunting services, rich APIs, and unified security management.
$2.50
per user/per month
Pricing
IBM TrusteerMicrosoft Defender for Endpoint
Editions & Modules
No answers on this topic
Academic
$2.50
per user/per month
Standalone
$5.20
per user/per month
Offerings
Pricing Offerings
IBM TrusteerMicrosoft Defender for Endpoint
Free Trial
NoYes
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details——
More Pricing Information
Community Pulse
IBM TrusteerMicrosoft Defender for Endpoint
Top Pros
Top Cons
Features
IBM TrusteerMicrosoft Defender for Endpoint
Endpoint Security
Comparison of Endpoint Security features of Product A and Product B
IBM Trusteer
-
Ratings
Microsoft Defender for Endpoint
8.2
53 Ratings
4% below category average
Anti-Exploit Technology00 Ratings8.051 Ratings
Endpoint Detection and Response (EDR)00 Ratings8.551 Ratings
Centralized Management00 Ratings7.952 Ratings
Hybrid Deployment Support00 Ratings7.810 Ratings
Infection Remediation00 Ratings8.252 Ratings
Vulnerability Management00 Ratings8.350 Ratings
Malware Detection00 Ratings8.553 Ratings
Best Alternatives
IBM TrusteerMicrosoft Defender for Endpoint
Small Businesses

No answers on this topic

SentinelOne Singularity
SentinelOne Singularity
Score 9.1 out of 10
Medium-sized Companies

No answers on this topic

SentinelOne Singularity
SentinelOne Singularity
Score 9.1 out of 10
Enterprises
F5 Distributed Cloud Bot Defense
F5 Distributed Cloud Bot Defense
Score 8.3 out of 10
BeyondTrust Endpoint Privilege Management
BeyondTrust Endpoint Privilege Management
Score 8.7 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
IBM TrusteerMicrosoft Defender for Endpoint
Likelihood to Recommend
10.0
(2 ratings)
8.2
(73 ratings)
Likelihood to Renew
10.0
(1 ratings)
-
(0 ratings)
Support Rating
-
(0 ratings)
9.0
(5 ratings)
User Testimonials
IBM TrusteerMicrosoft Defender for Endpoint
Likelihood to Recommend
IBM
Trusteer is great for banking and protecting a computer beyond internet banking! There can be painful times when we try to help a customer who has Trusteer and Norton or McAfee and it doesn't want to work. But Trusteer has great services offered in their portal in the Start Menu.
Read full review
Microsoft
Usually we had lots two platforms tasked with scanning exposures, anti-malware and provision for information and threat management. But with Microsoft Defender for Endpoint we have an all inclusive platform that even integrate with other Microsoft security apps such as Microsoft Defender for Cloud for enhanced threat insights and visibility.
Read full review
Pros
IBM
  • Protection and security for network data.
  • Protective shield mechanism in financial transactions.
  • Implementation and safeguard of user keys optimally.
Read full review
Microsoft
  • It provides a unified security experience when combined with other Microsoft products such as Microsoft Defender for 365 and Azure Defender.
  • It has an excellent dashboard and centralized view that make it easy to see and control everything from one location.
  • It's an EDR tool designed to help you understand incidents and alerts better.
  • Real-time detection of attacks and prompt endpoint device responses. It effortlessly interacts with additional Microsoft security products.
Read full review
Cons
IBM
  • Logins - I have issues regularly with my logins - that may be user related though.
  • It interferes with some other security products and causes issues on our website at times.
Read full review
Microsoft
  • Does not allow for remediation from the management console.
  • The ticket system doesn't alert the person assigned to the ticket.
  • You have to submit requests for whitelisting applications.
  • Scanning exclusions are tricky to find.
  • Adding devices, especially Apple devices, is very cumbersome.
Read full review
Likelihood to Renew
IBM
IBM Trusteer maintains the same focus with what it offers as a comprehensive and reliable vision tool. The technical support is the best that has been handled. The integration with other elements is reciprocal and of unique quality to promote the use at the corporate and advanced level. No more saying that we use the software because it is also economically sustainable and favors us a lot
Read full review
Microsoft
No answers on this topic
Support Rating
IBM
No answers on this topic
Microsoft
The first time I tried to onboard my macOS endpoints to MDE I struggled for quite a bit. I had to reach out to Microsoft's MDE support team. The tech was very helpful in walking me through the steps during a screen share session
Read full review
Alternatives Considered
IBM
We use FraudMAP to monitor activity inside of the Online Banking login and we love it! It helps us to find strange IPs, inconsistent activity, fraudulent activity, and updates done within online banking. We use it in conjunction with Trusteer because Trusteer can tell us when a registered PC has a potentially malicious virus on it before any logins are processed
Read full review
Microsoft
in an overall protection sentinelone is providing better protection for us, but as it comes with subscription's limitation, we have to be really careful in managing the licenses, the MS Defender for endpoint is providing us a decent protection which we are not complaining about, why we chose them ? as mentioned, this is coming with our subscription
Read full review
Return on Investment
IBM
  • Since the implementation of this tool as a support mechanism to safeguard the identity of our treasures, the organization has had a significant return to the sustainable resources that this tool offers (ROI). It is positive since we have maintained the link of work for which we are made and the satisfaction of our customers.
  • Professional and sustainable technical support. It is worth the investment because it does not affect the budget, but there are both substantive and objective gains.
  • We have reached the goal of advancing towards the integration of our service platforms with IBM Trusteer towards the consolidation of a reliable and sustainable organization.
Read full review
Microsoft
  • By providing robust threat protection, Defender for Endpoint can prevent downtime caused by security issues. Employees can work without interruptions, leading to increased productivity.
  • By significantly decreasing the frequency of security incidents like malware infections and data breaches, Microsoft Defender for Endpoint can protect your network. The cost of incident response, cleanup, and potential regulatory fines are reduced as a result of the decrease in events.
  • The implementation and configuration of Microsoft Defender for Endpoint may require an initial investment in licensing, training, and deployment, which can temporarily affect ROI.
  • The cost of licensing can be substantial, especially for larger organizations. This cost needs to be factored into the ROI calculation.
Read full review
ScreenShots

Microsoft Defender for Endpoint Screenshots

Screenshot of blocked activitiesScreenshot of Detects & respondsScreenshot of discovers vulnerabilityScreenshot of Eliminates blind spotsScreenshot of Risk management