IBM Trusteer vs InAuth comparison

Cancel
You must select at least 2 products to compare!
IBM Logo
1,011 views|661 comparisons
100% willing to recommend
InAuth Logo
166 views|161 comparisons
100% willing to recommend
Executive Summary

We performed a comparison between IBM Trusteer and InAuth based on real PeerSpot user reviews.

Find out what your peers are saying about NICE, ThreatMetrix, FICO and others in Fraud Detection and Prevention.
To learn more, read our detailed Fraud Detection and Prevention Report (Updated: March 2024).
768,578 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"The features were pretty straightforward. I just used them as I went along with very little interference all the years that I have used it."

More IBM Trusteer Pros →

"InAuth is a stable and scalable solution that supports many devices and platforms such as Samsung, LG, etc. It also has very reasonable pricing."

More InAuth Pros →

Cons
"I would like them to make it as user-friendly as possible. Simplicity is what we need. Load and go.""After a Windows update, it started acting up. It blocked several programs. It became inactive after the Windows update and I had to remove Trusteer, allowing my computer to go back to its norm."

More IBM Trusteer Cons →

"The initial setup for InAuth could be improved, as it's not straightforward. Weak connectivity issues and user-friendliness are also areas for improvement for this solution."

More InAuth Cons →

Pricing and Cost Advice
Information Not Available
  • "Pricing for this solution is reasonable."
  • More InAuth Pricing and Cost Advice →

    Ranking
    Views
    1,011
    Comparisons
    661
    Reviews
    0
    Average Words per Review
    0
    Rating
    N/A
    Views
    166
    Comparisons
    161
    Reviews
    0
    Average Words per Review
    0
    Rating
    N/A
    Buyer's Guide
    Fraud Detection and Prevention
    March 2024
    Find out what your peers are saying about NICE, ThreatMetrix, FICO and others in Fraud Detection and Prevention. Updated: March 2024.
    768,578 professionals have used our research since 2012.
    Comparisons
    Learn More
    IBM
    Video Not Available
    InAuth
    Video Not Available
    Overview

    IBM Trusteer Pinpoint Detect, helps protect digital channels against account takeover, fraudulent transactions, and can detect end user devices infected with high risk malware. Trusteer Pinpoint Detect is a cloud-based solution that can transparently build user profiles and continuously authenticate online identities to more efficiently differentiate between a true user and fraudsters. It is designed to enable a real-time risk assessment with an actionable recommendations, employ behavioral biometrics capabilities to seamlessly build models based on patterns of mouse movements in real-time and analyze patterns against learned user behavior and known fraud patterns, identify access using compromised credentials and provide actionable recommendations to help detect and mitigate fraudulent activities and control and create custom policies to help you rapidly build and deploy countermeasures leveraging machine learning and advanced analytics.

    In this new world of digital transactions, an elegant customer experience and security are no longer mutually exclusive.

    Businesses must adjust their digital strategies to incorporate real-time risk analysis and real-time decisions.

    Security measures need to align to keep up with the faster, “always-on” world.

    We ensure that you know and understand the trustworthiness of every device interacting within your digital channels – mobile app, mobile web, and desktop.

    Sample Customers
    Banco Satander
    Bain Capital Ventures
    Top Industries
    VISITORS READING REVIEWS
    Financial Services Firm47%
    Computer Software Company12%
    Insurance Company6%
    Comms Service Provider5%
    No Data Available
    Company Size
    VISITORS READING REVIEWS
    Small Business17%
    Midsize Enterprise8%
    Large Enterprise75%
    No Data Available
    Buyer's Guide
    Fraud Detection and Prevention
    March 2024
    Find out what your peers are saying about NICE, ThreatMetrix, FICO and others in Fraud Detection and Prevention. Updated: March 2024.
    768,578 professionals have used our research since 2012.

    IBM Trusteer is ranked 12th in Fraud Detection and Prevention while InAuth is ranked 30th in Fraud Detection and Prevention. IBM Trusteer is rated 9.0, while InAuth is rated 8.0. The top reviewer of IBM Trusteer writes "The features were pretty straightforward". On the other hand, the top reviewer of InAuth writes "Scalable and stable device identification and analysis solution for fraud detection, with reasonable pricing". IBM Trusteer is most compared with BioCatch, IBM Safer Payments, ThreatMetrix, F5 Shape Security and Guardian Analytics Fraud Detection, whereas InAuth is most compared with ThreatMetrix and iovation FraudForce.

    See our list of best Fraud Detection and Prevention vendors.

    We monitor all Fraud Detection and Prevention reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.