Compare IBM Trusteer vs. RSA Adaptive Authentication

Cancel
You must select at least 2 products to compare!
IBM Trusteer Logo
1,388 views|926 comparisons
RSA Adaptive Authentication Logo
1,065 views|676 comparisons
Ranking
Views
1,388
Comparisons
926
Reviews
0
Average Words per Review
0
Rating
N/A
16th
Views
1,065
Comparisons
676
Reviews
0
Average Words per Review
0
Rating
N/A
Find out what your peers are saying about ThreatMetrix, NICE, Forter and others in Fraud Detection and Prevention. Updated: June 2021.
510,534 professionals have used our research since 2012.
Popular Comparisons
Learn More
Overview

IBM Trusteer Pinpoint Detect, helps protect digital channels against account takeover, fraudulent transactions, and can detect end user devices infected with high risk malware. Trusteer Pinpoint Detect is a cloud-based solution that can transparently build user profiles and continuously authenticate online identities to more efficiently differentiate between a true user and fraudsters. It is designed to enable a real-time risk assessment with an actionable recommendations, employ behavioral biometrics capabilities to seamlessly build models based on patterns of mouse movements in real-time and analyze patterns against learned user behavior and known fraud patterns, identify access using compromised credentials and provide actionable recommendations to help detect and mitigate fraudulent activities and control and create custom policies to help you rapidly build and deploy countermeasures leveraging machine learning and advanced analytics.

RSA Adaptive Authentication is a risk-based two-factor authentication solution providing cost-effective protection for an entire user base. Adaptive Authentication secures online portals, SSL VPNs, and web access management portals for different types of organizations in the healthcare, insurance, enterprise, government, financial services, and other industries. Based on the transparent two-factor authentication technology, Adaptive Authentication works behind the scenes to authenticate end users and transactions based on individual end user and device profiles. In addition, Adaptive Authentication uses the RSA Risk Engine to estimate the level of risk for the specific activity and uses information collected from the RSAeFraudNetwork (a cross-organization, cross-application, cross-border online fraud network) to identify fraudulent activities. The Policy Manager determines what actions must be performed, depending on the risk score and other parameters.
Offer
Learn more about IBM Trusteer
Learn more about RSA Adaptive Authentication
Sample Customers
Banco Satander
ADP, Ameritas, Partners Healthcare
Top Industries
VISITORS READING REVIEWS
Computer Software Company32%
Financial Services Firm24%
Comms Service Provider16%
Insurance Company11%
VISITORS READING REVIEWS
Computer Software Company30%
Financial Services Firm28%
Comms Service Provider12%
Manufacturing Company7%
Company Size
No Data Available
REVIEWERS
Midsize Enterprise14%
Large Enterprise86%
Find out what your peers are saying about ThreatMetrix, NICE, Forter and others in Fraud Detection and Prevention. Updated: June 2021.
510,534 professionals have used our research since 2012.

IBM Trusteer is ranked 8th in Fraud Detection and Prevention while RSA Adaptive Authentication is ranked 16th in Authentication Systems. IBM Trusteer is rated 0.0, while RSA Adaptive Authentication is rated 0.0. On the other hand, IBM Trusteer is most compared with ThreatMetrix, IBM Safer Payments, Shape Security, BioCatch and Guardian Analytics Fraud Detection, whereas RSA Adaptive Authentication is most compared with RSA Authentication Manager, ThreatMetrix, Fortinet FortiAuthenticator, Duo Security and Symantec Advanced Authentication.

See our list of .

We monitor all Fraud Detection and Prevention reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.