Try our new research platform with insights from 80,000+ expert users

IBM Trusteer vs RSA Adaptive Authentication comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

IBM Trusteer
Average Rating
9.0
Reviews Sentiment
3.6
Number of Reviews
2
Ranking in other categories
Fraud Detection and Prevention (11th)
RSA Adaptive Authentication
Average Rating
6.8
Number of Reviews
6
Ranking in other categories
Authentication Systems (26th)
 

Mindshare comparison

IBM Trusteer and RSA Adaptive Authentication aren’t in the same category and serve different purposes. IBM Trusteer is designed for Fraud Detection and Prevention and holds a mindshare of 2.6%, down 3.9% compared to last year.
RSA Adaptive Authentication, on the other hand, focuses on Authentication Systems, holds 0.8% mindshare, up 0.6% since last year.
Fraud Detection and Prevention Market Share Distribution
ProductMarket Share (%)
IBM Trusteer2.6%
ThreatMetrix11.3%
FICO Falcon Platform7.6%
Other78.5%
Fraud Detection and Prevention
Authentication Systems Market Share Distribution
ProductMarket Share (%)
RSA Adaptive Authentication0.8%
Microsoft Entra ID13.8%
Cisco Duo8.5%
Other76.9%
Authentication Systems
 

Featured Reviews

Olawale Ayuba - PeerSpot reviewer
AI and machine learning capabilities improve fraud management
For IBM Trusteer, one of the advantages is its AI and machine learning capabilities, which are very strong. The solution provides the ability to manage fraud in every session of a user, from login to logout of the user experience. It operates quickly and can intelligently cover a wide range of threats in the field. The Adaptive Authentication feature allows for frictionless operation for the user. Based on its AI intelligence and intelligence sets, it enables frictionless flow and only creates the need for further authentication based on what it has intelligently gathered about that session. Two different users will have different login experiences based on their history and behavioral analysis that tells the system whether to proceed with the transaction or pause it, protecting users from account takeovers or new account frauds. Integration is straightforward using JSON integration. It is easy to integrate with banking solutions or middleware solutions that financial institutions already have, both from the front end and back end. Whether it is a single-paged application or a multi-page application, there are different snippets and code bases for various types of integrations with back-end applications. IBM Trusteer captures customer ID and user ID at every session, enabling it to follow users through their journey through the banking application. It has its own real-time dashboard that allows fraud analysts to quickly make decisions about ongoing activities and determine whether to deny or allow transactions. It protects sensitive information of users through session and transaction-based monitoring, capturing CSID, customer ID, and user ID, enabling analysts to take swift, real-time action.
Directorc4e7 - PeerSpot reviewer
We need better ease of use; the product is overly complicated
There are many use cases that we have defined based on our business needs Ingestion of logs and raising alert space on those logs are the most valuable features. The product is basically unusable. We need better ease of use; it's overly complicated. It has taken years to implement. We used RSA…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The features were pretty straightforward. I just used them as I went along with very little interference all the years that I have used it."
"The capability to manage your business policy related to security when required without vendor involvement."
"Ingestion of logs and raising alert space on those logs are the most valuable features."
"Our customer are seeing value from the product, as they experience cost reductions. They can stop fraud from their customers, then their customers can have a better experience from their services."
"Risk Engine’s risk score, eFN, GeoIP, and device binding all coming together in the Policy Rules to decide when to escalate to MFA."
"The most valuable feature is the stock tokens. That works the best for us."
 

Cons

"After a Windows update, it started acting up. It blocked several programs. It became inactive after the Windows update and I had to remove Trusteer, allowing my computer to go back to its norm."
"I would like them to make it as user-friendly as possible. Simplicity is what we need. Load and go."
"RSA Adaptive Authentication lacks a mechanism to verify the identity of a new user in the Enrollment event workflow."
"Better filters when searching for events. The current features for current filters when searching fraud events are not very comprehensive. You can only filter by certain fields in the transaction."
"Reporting modules is one of the major areas that can be improved further."
"I would like to see a more adaptive type of solution, something that we could use on our web pages..."
"It has taken years to implement."
"The product is basically unusable. We need better ease of use; it's overly complicated."
 

Pricing and Cost Advice

Information not available
"Keep the proxy service layer on premises. That consumes SaaS security services on the back-end."
"The pricing is $50 per head, yearly."
"You may need to opt for second best if funding is low and the number of users is huge. However, the pricing is able to be negotiated if your user figures are huge."
"Customers need to deploy the solution in a very expensive infrastructure. RSA should should think about a less expensive infrastructure for customers because the solution costs around $100,000, and the infrastructure needed to support that solution may be even more expensive than that price."
report
Use our free recommendation engine to learn which Fraud Detection and Prevention solutions are best for your needs.
867,497 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
45%
Computer Software Company
15%
Manufacturing Company
10%
Insurance Company
6%
Financial Services Firm
43%
Comms Service Provider
7%
Manufacturing Company
7%
Computer Software Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Midsize Enterprise1
Large Enterprise6
 

Questions from the Community

What is your experience regarding pricing and costs for IBM Trusteer?
The solution is somewhat expensive. IBM could improve their pricing structure. It comes with both licensing and professional services as separate entities that must be purchased before proceeding. ...
What needs improvement with IBM Trusteer?
During integration, it is difficult to fully integrate within a specified time, primarily because code snippets must be installed on every page. This makes the process more challenging based on use...
What is your primary use case for IBM Trusteer?
IBM Trusteer is an anti-fraud solution that is used for account takeover fraud, new account fraud, account fraud, and online frauds on platforms such as mobile platforms and web applications.
Ask a question
Earn 20 points
 

Overview

 

Sample Customers

Banco Satander
ADP, Ameritas, Partners Healthcare
Find out what your peers are saying about ThreatMetrix, NICE, FICO and others in Fraud Detection and Prevention. Updated: August 2025.
867,497 professionals have used our research since 2012.