Try our new research platform with insights from 80,000+ expert users

F5 Shape Security vs IBM Trusteer comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

F5 Shape Security
Ranking in Fraud Detection and Prevention
6th
Average Rating
8.6
Reviews Sentiment
7.5
Number of Reviews
2
Ranking in other categories
Bot Management (1st)
IBM Trusteer
Ranking in Fraud Detection and Prevention
11th
Average Rating
9.0
Reviews Sentiment
3.6
Number of Reviews
2
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of September 2025, in the Fraud Detection and Prevention category, the mindshare of F5 Shape Security is 2.1%, up from 1.9% compared to the previous year. The mindshare of IBM Trusteer is 2.6%, down from 3.9% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Fraud Detection and Prevention Market Share Distribution
ProductMarket Share (%)
F5 Shape Security2.1%
IBM Trusteer2.6%
Other95.3%
Fraud Detection and Prevention
 

Featured Reviews

Nikolay Dimitrov - PeerSpot reviewer
Easy to configure and blocks bot attacks for web users
The solution is deployed on the F5 cloud. The solution's real-time analytics help you see what has been blocked. It helps to see whether the attack category was an automation attack or a fake browser. F5 Shape Security has a normal dashboard. We are doing F5 Shape Security migrations for 30 customers. F5 Shape Security uses Javascript. For a lot of competitors, the Javascript can be reverse-engineered by attackers to bypass the protection. F5 Shape Security has machine learning authentication of the Java script. If you had hacked it, the encryption would have been changed. It's really hard for attackers to reverse engineer the F5 Shape Security JavaScript. Overall, I rate the solution a nine out of ten.
Olawale Ayuba - PeerSpot reviewer
AI and machine learning capabilities improve fraud management
For IBM Trusteer, one of the advantages is its AI and machine learning capabilities, which are very strong. The solution provides the ability to manage fraud in every session of a user, from login to logout of the user experience. It operates quickly and can intelligently cover a wide range of threats in the field. The Adaptive Authentication feature allows for frictionless operation for the user. Based on its AI intelligence and intelligence sets, it enables frictionless flow and only creates the need for further authentication based on what it has intelligently gathered about that session. Two different users will have different login experiences based on their history and behavioral analysis that tells the system whether to proceed with the transaction or pause it, protecting users from account takeovers or new account frauds. Integration is straightforward using JSON integration. It is easy to integrate with banking solutions or middleware solutions that financial institutions already have, both from the front end and back end. Whether it is a single-paged application or a multi-page application, there are different snippets and code bases for various types of integrations with back-end applications. IBM Trusteer captures customer ID and user ID at every session, enabling it to follow users through their journey through the banking application. It has its own real-time dashboard that allows fraud analysts to quickly make decisions about ongoing activities and determine whether to deny or allow transactions. It protects sensitive information of users through session and transaction-based monitoring, capturing CSID, customer ID, and user ID, enabling analysts to take swift, real-time action.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"F5 Shape Security's most valuable feature is performance."
"The most valuable feature of the solution is the ease of configuration."
"The features were pretty straightforward. I just used them as I went along with very little interference all the years that I have used it."
 

Cons

"I want the solution's custom exclusion rules to be more granular."
"The tool's price is high."
"I would like them to make it as user-friendly as possible. Simplicity is what we need. Load and go."
"After a Windows update, it started acting up. It blocked several programs. It became inactive after the Windows update and I had to remove Trusteer, allowing my computer to go back to its norm."
 

Pricing and Cost Advice

"The solution is moderately priced."
Information not available
report
Use our free recommendation engine to learn which Fraud Detection and Prevention solutions are best for your needs.
867,445 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
32%
Retailer
8%
Healthcare Company
7%
Comms Service Provider
6%
Financial Services Firm
45%
Computer Software Company
15%
Manufacturing Company
10%
Insurance Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
No data available
 

Questions from the Community

What do you like most about F5 Shape Security?
The most valuable feature of the solution is the ease of configuration.
What needs improvement with F5 Shape Security?
There could be some improvement in the options to make custom exclusion rules to be more granular. Sometimes, the solution blocks something that you don't want to be blocked. The solution should al...
What advice do you have for others considering F5 Shape Security?
The solution is deployed on the F5 cloud. The solution's real-time analytics help you see what has been blocked. It helps to see whether the attack category was an automation attack or a fake brows...
What is your experience regarding pricing and costs for IBM Trusteer?
The solution is somewhat expensive. IBM could improve their pricing structure. It comes with both licensing and professional services as separate entities that must be purchased before proceeding. ...
What needs improvement with IBM Trusteer?
During integration, it is difficult to fully integrate within a specified time, primarily because code snippets must be installed on every page. This makes the process more challenging based on use...
What is your primary use case for IBM Trusteer?
IBM Trusteer is an anti-fraud solution that is used for account takeover fraud, new account fraud, account fraud, and online frauds on platforms such as mobile platforms and web applications.
 

Also Known As

Shape Security
No data available
 

Overview

 

Sample Customers

Wells Fargo, Loblaw, JetBlue, Zoosk
Banco Satander
Find out what your peers are saying about F5 Shape Security vs. IBM Trusteer and other solutions. Updated: September 2025.
867,445 professionals have used our research since 2012.