Try our new research platform with insights from 80,000+ expert users

F5 Shape Security vs IBM Trusteer comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

F5 Shape Security
Ranking in Fraud Detection and Prevention
6th
Average Rating
8.6
Reviews Sentiment
7.5
Number of Reviews
2
Ranking in other categories
Bot Management (1st)
IBM Trusteer
Ranking in Fraud Detection and Prevention
11th
Average Rating
9.0
Reviews Sentiment
3.6
Number of Reviews
2
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of August 2025, in the Fraud Detection and Prevention category, the mindshare of F5 Shape Security is 2.1%, up from 2.1% compared to the previous year. The mindshare of IBM Trusteer is 2.8%, down from 4.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Fraud Detection and Prevention
 

Featured Reviews

Nikolay Dimitrov - PeerSpot reviewer
Easy to configure and blocks bot attacks for web users
The solution is deployed on the F5 cloud. The solution's real-time analytics help you see what has been blocked. It helps to see whether the attack category was an automation attack or a fake browser. F5 Shape Security has a normal dashboard. We are doing F5 Shape Security migrations for 30 customers. F5 Shape Security uses Javascript. For a lot of competitors, the Javascript can be reverse-engineered by attackers to bypass the protection. F5 Shape Security has machine learning authentication of the Java script. If you had hacked it, the encryption would have been changed. It's really hard for attackers to reverse engineer the F5 Shape Security JavaScript. Overall, I rate the solution a nine out of ten.
Olawale Ayuba - PeerSpot reviewer
AI and machine learning capabilities improve fraud management
For IBM Trusteer, one of the advantages is its AI and machine learning capabilities, which are very strong. The solution provides the ability to manage fraud in every session of a user, from login to logout of the user experience. It operates quickly and can intelligently cover a wide range of threats in the field. The Adaptive Authentication feature allows for frictionless operation for the user. Based on its AI intelligence and intelligence sets, it enables frictionless flow and only creates the need for further authentication based on what it has intelligently gathered about that session. Two different users will have different login experiences based on their history and behavioral analysis that tells the system whether to proceed with the transaction or pause it, protecting users from account takeovers or new account frauds. Integration is straightforward using JSON integration. It is easy to integrate with banking solutions or middleware solutions that financial institutions already have, both from the front end and back end. Whether it is a single-paged application or a multi-page application, there are different snippets and code bases for various types of integrations with back-end applications. IBM Trusteer captures customer ID and user ID at every session, enabling it to follow users through their journey through the banking application. It has its own real-time dashboard that allows fraud analysts to quickly make decisions about ongoing activities and determine whether to deny or allow transactions. It protects sensitive information of users through session and transaction-based monitoring, capturing CSID, customer ID, and user ID, enabling analysts to take swift, real-time action.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"F5 Shape Security's most valuable feature is performance."
"The most valuable feature of the solution is the ease of configuration."
"The features were pretty straightforward. I just used them as I went along with very little interference all the years that I have used it."
 

Cons

"I want the solution's custom exclusion rules to be more granular."
"The tool's price is high."
"After a Windows update, it started acting up. It blocked several programs. It became inactive after the Windows update and I had to remove Trusteer, allowing my computer to go back to its norm."
"I would like them to make it as user-friendly as possible. Simplicity is what we need. Load and go."
 

Pricing and Cost Advice

"The solution is moderately priced."
Information not available
report
Use our free recommendation engine to learn which Fraud Detection and Prevention solutions are best for your needs.
865,295 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
32%
Retailer
8%
Healthcare Company
8%
Computer Software Company
5%
Financial Services Firm
43%
Computer Software Company
14%
Manufacturing Company
9%
Insurance Company
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
No data available
 

Questions from the Community

What do you like most about F5 Shape Security?
The most valuable feature of the solution is the ease of configuration.
What needs improvement with F5 Shape Security?
There could be some improvement in the options to make custom exclusion rules to be more granular. Sometimes, the solution blocks something that you don't want to be blocked. The solution should al...
What advice do you have for others considering F5 Shape Security?
The solution is deployed on the F5 cloud. The solution's real-time analytics help you see what has been blocked. It helps to see whether the attack category was an automation attack or a fake brows...
Ask a question
Earn 20 points
 

Also Known As

Shape Security
No data available
 

Overview

 

Sample Customers

Wells Fargo, Loblaw, JetBlue, Zoosk
Banco Satander
Find out what your peers are saying about F5 Shape Security vs. IBM Trusteer and other solutions. Updated: August 2025.
865,295 professionals have used our research since 2012.