TrustRadius
IBM Security offers the IBM Trusteer fraud detection and prevention application, to support financial institutions and antivirus applications with additional malware and phishing prevention, as well as provide digital identity protection and prevent fraud. IBM acquired Trusteer in 2013, and the product includes the IBM Trusteer Fraud Prevention Suite, IBM Trusteer Rapport malware and phishing protection tool, IMB Trusteer Pinpoint Detect account takeover protection, and integration with IBM Access Manager as well as IBM Risk Based Authentication Solution.Great Product with some drawbacks BUT great assistanceWe use Trusteer in our electronic banking department for online banking. It is recommended to all our customers and we, the back office, review the alerts and notifications that come in.,Notification - the emails are timely and we are able to track users well. Security! I love the security that Trusteer uses in order to make sure our customer information is safe. Information - Trusteer shares information regarding breaches and security that we need to be aware of for our customers and our fellow co-workers.,Logins - I have issues regularly with my logins - that may be user related though. It interferes with some other security products and causes issues on our website at times.,10,As stated before, we've had some grumpy customers with issues regarding the security but we have them turn off the Trusteer or send them to the portal for assistance.,FraudMAP,FraudMAPIBM Trusteer it is the platform that gives security to your dreams.The implementation of IBM Trusteer has been very successful. The tool is useful for multiple protection and security functions, especially in the financial field. Currently we use it as a mechanism to evade attacks to our technological platforms due to the high strategic value of the information we handle. However, we are always alert to any network division.,Protection and security for network data. Protective shield mechanism in financial transactions. Implementation and safeguard of user keys optimally.,In every business it is important the security and the veracity of the sources with IBM Trusteer it is reliable to use them for these variants. IBM Trusteer is based on the protection of financial data and for anyone it is advisable to use software that has vulnerability, but in this case the condition that allows this tool to be useful is its ability to set up anti-spy shields for as long as necessary. This type of tool is necessary to be constantly updating and reviewing. They usually tend to be anchored to a system of commands that allow pirates to sneak into information. It is recommended to update the platform and include other forms of verification.,10,Since the implementation of this tool as a support mechanism to safeguard the identity of our treasures, the organization has had a significant return to the sustainable resources that this tool offers (ROI). It is positive since we have maintained the link of work for which we are made and the satisfaction of our customers. Professional and sustainable technical support. It is worth the investment because it does not affect the budget, but there are both substantive and objective gains. We have reached the goal of advancing towards the integration of our service platforms with IBM Trusteer towards the consolidation of a reliable and sustainable organization.,1000,1000,In the backup of information. Advanced data implementation. Higher level security and protection.,The use of new technologies with guaranteed support and support. Characteristics of sustainable and reciprocal investments. Elements of integration and adaptation of the technological platform.,For the response capacity in the interaction of new technological platforms. Exhaustive recording and control. Emerging virtual memory.,10
Unspecified
IBM Trusteer
2 Ratings
Score 10.0 out of 101
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow'>trScore algorithm: Learn more.</a>TRScore

IBM Trusteer Reviews

IBM Trusteer
2 Ratings
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow'>trScore algorithm: Learn more.</a>
Score 10.0 out of 101
Show Filters 
Hide Filters 
Filter 2 vetted IBM Trusteer reviews and ratings
Clear all filters
Overall Rating
Reviewer's Company Size
Last Updated
By Topic
Industry
Department
Experience
Job Type
Role
Reviews (1-2 of 2)
  Vendors can't alter or remove reviews. Here's why.
Cathy Barlow profile photo
September 26, 2018

IBM Trusteer Review: "Great Product with some drawbacks BUT great assistance"

Score 10 out of 10
Vetted Review
Verified User
Review Source
We use Trusteer in our electronic banking department for online banking. It is recommended to all our customers and we, the back office, review the alerts and notifications that come in.
  • Notification - the emails are timely and we are able to track users well.
  • Security! I love the security that Trusteer uses in order to make sure our customer information is safe.
  • Information - Trusteer shares information regarding breaches and security that we need to be aware of for our customers and our fellow co-workers.
  • Logins - I have issues regularly with my logins - that may be user related though.
  • It interferes with some other security products and causes issues on our website at times.
Trusteer is great for banking and protecting a computer beyond internet banking! There can be painful times when we try to help a customer who has Trusteer and Norton or McAfee and it doesn't want to work. But Trusteer has great services offered in their portal in the Start Menu.
Read Cathy Barlow's full review
FRANCISCO GUTIERREZ profile photo
September 21, 2018

Review: "IBM Trusteer it is the platform that gives security to your dreams."

Score 10 out of 10
Vetted Review
Verified User
Review Source
The implementation of IBM Trusteer has been very successful. The tool is useful for multiple protection and security functions, especially in the financial field. Currently we use it as a mechanism to evade attacks to our technological platforms due to the high strategic value of the information we handle. However, we are always alert to any network division.
  • Protection and security for network data.
  • Protective shield mechanism in financial transactions.
  • Implementation and safeguard of user keys optimally.
  • In every business it is important the security and the veracity of the sources with IBM Trusteer it is reliable to use them for these variants.
  • IBM Trusteer is based on the protection of financial data and for anyone it is advisable to use software that has vulnerability, but in this case the condition that allows this tool to be useful is its ability to set up anti-spy shields for as long as necessary.
  • This type of tool is necessary to be constantly updating and reviewing. They usually tend to be anchored to a system of commands that allow pirates to sneak into information. It is recommended to update the platform and include other forms of verification.
IBM Trusteer is suitable as an anti-spyware shield on platforms that use financial data and key registration data. Therefore, it is necessary to use this tool as intelligently as possible. However, it is necessary to have hidden files somewhere on your device because this tool does not contain data recovery elements, but rather those that are transmitted.
Read FRANCISCO GUTIERREZ's full review

About IBM Trusteer

IBM Security offers the IBM Trusteer fraud detection and prevention application, to support financial institutions and antivirus applications with additional malware and phishing prevention, as well as provide digital identity protection and prevent fraud. IBM acquired Trusteer in 2013, and the product includes the IBM Trusteer Fraud Prevention Suite, IBM Trusteer Rapport malware and phishing protection tool, IMB Trusteer Pinpoint Detect account takeover protection, and integration with IBM Access Manager as well as IBM Risk Based Authentication Solution.
Categories:  Fraud Detection

IBM Trusteer Technical Details

Operating Systems: Unspecified
Mobile Application:No