No more typing reviews! Try our Samantha, our new voice AI agent.

IBM Trusteer vs ThreatMetrix comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

IBM Trusteer
Ranking in Fraud Detection and Prevention
15th
Average Rating
9.0
Reviews Sentiment
3.6
Number of Reviews
2
Ranking in other categories
No ranking in other categories
ThreatMetrix
Ranking in Fraud Detection and Prevention
1st
Average Rating
8.2
Reviews Sentiment
6.6
Number of Reviews
8
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of May 2026, in the Fraud Detection and Prevention category, the mindshare of IBM Trusteer is 2.2%, down from 3.1% compared to the previous year. The mindshare of ThreatMetrix is 5.3%, down from 12.9% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Fraud Detection and Prevention Mindshare Distribution
ProductMindshare (%)
ThreatMetrix5.3%
IBM Trusteer2.2%
Other92.5%
Fraud Detection and Prevention
 

Featured Reviews

Olawale Ayuba - PeerSpot reviewer
Head Management GRC and Privacy Solution at activedge
AI and machine learning capabilities improve fraud management
For IBM Trusteer, one of the advantages is its AI and machine learning capabilities, which are very strong. The solution provides the ability to manage fraud in every session of a user, from login to logout of the user experience. It operates quickly and can intelligently cover a wide range of threats in the field. The Adaptive Authentication feature allows for frictionless operation for the user. Based on its AI intelligence and intelligence sets, it enables frictionless flow and only creates the need for further authentication based on what it has intelligently gathered about that session. Two different users will have different login experiences based on their history and behavioral analysis that tells the system whether to proceed with the transaction or pause it, protecting users from account takeovers or new account frauds. Integration is straightforward using JSON integration. It is easy to integrate with banking solutions or middleware solutions that financial institutions already have, both from the front end and back end. Whether it is a single-paged application or a multi-page application, there are different snippets and code bases for various types of integrations with back-end applications. IBM Trusteer captures customer ID and user ID at every session, enabling it to follow users through their journey through the banking application. It has its own real-time dashboard that allows fraud analysts to quickly make decisions about ongoing activities and determine whether to deny or allow transactions. It protects sensitive information of users through session and transaction-based monitoring, capturing CSID, customer ID, and user ID, enabling analysts to take swift, real-time action.
Sohom Roy - PeerSpot reviewer
Senior Director at CSS Corp
Enables to identify and analyze real-time incidents and mitigate risks
The setup is not complex. It is pretty standard. I rate the ease of setup a nine out of ten. The deployment time depends on the applications and environment into which we integrate it. The product provides a lot of API documentation. The product is cloud-based. One or two people are enough to deploy the solution. We need some maintenance when new versions or patches need to be upgraded. It requires minimal maintenance.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The solution provides the ability to manage fraud in every session of a user, from login to logout of the user experience, operates quickly, and can intelligently cover a wide range of threats in the field."
"The features were pretty straightforward. I just used them as I went along with very little interference all the years that I have used it."
"The features were pretty straightforward, and I just used them as I went along with very little interference all the years that I have used it, and it did its job very well."
"The most valuable feature the solution has is that it is able to do a fairly accurate fraud assessment of a credit card transaction based on a variety of parameters configured by the merchant."
"The user interface, the portal, is very helpful in describing what attributes of concern are associated with the device."
"The solution can be easily integrated with applications."
"The clients do get a return on their investment; it mitigated a massive DDoS, and it definitely detects fraudulent activities on banking platforms."
"The solution is stable."
"There is excellent documentation available."
"The most valuable thing is about the IP. They have a database of malicious IP addresses against which they check. They have a huge database for routed devices and the devices that have been used in the past to commit fraud. They have extensive historical records of all of that information, and that's probably the most valuable thing about ThreatMetrix. Over the years, they have been collecting and persisting globally across all the banking and financial services. They have been storing all this information. It is this stored information that I and my team find valuable; it is not so much their technology. If you are running it on a simulator and trying to maliciously clone and copy IP addresses and stuff like that, they have a bunch of technologies, like routes section and all the other stuff. It is just that they have something that no one else can deal with, that is, massive amounts of big data about the malicious IP addresses, malicious device fingerprinting, the fingerprinting router devices, and the fingerprints. You can query against this stored information to find out whether your app is in a good, nice environment. If yes, you get a green light. The last time I checked, there were about 400 or 500 features that they can stack against, which is pretty extensive. They give you a score against all those features for every application that you installed on it. It is pretty good in that sense."
"The fact that we were able to much more easily detect if people were using VPN for travels, which country they were accessing the platform from, and we had access to a large amount of new data points that we previously didn't have was really useful for us."
 

Cons

"I would like them to make it as user-friendly as possible. Simplicity is what we need. Load and go."
"After a Windows update, it started acting up. It blocked several programs. It became inactive after the Windows update and I had to remove Trusteer, allowing my computer to go back to its norm."
"After a Windows update, it started acting up. It blocked several programs including Malwarebytes and became inactive, and I had to remove Trusteer, allowing my computer to go back to its norm."
"The interface does look a bit outdated."
"We encountered a few issues with API calls to the solution."
"It would be useful if they could offer real-time processing."
"One limitation is it only maintains six months' worth of data. It would be nice if it went back even further to help us really identify and flush out patterns that go on longer."
"One limitation is it only maintains six months' worth of data. It would be nice if it went back even further to help us really identify and flush out patterns that go on longer."
"The pricing could be lower. We are a young company; maybe for big enterprises, price doesn't matter, however, for young companies, price-wise, it's not that good; it's a bit pricey."
"Could be more intuitive and user friendly."
"It would be useful if they could offer real-time processing."
 

Pricing and Cost Advice

Information not available
"I am not aware of the price. I have always come in after it has been negotiated. The clients do get a return on their investment. It mitigated a massive DDoS, and it definitely detects fraudulent activities on banking platforms. They have definitely got their ROI back because there is continued investment in ThreatMetrix over time."
report
Use our free recommendation engine to learn which Fraud Detection and Prevention solutions are best for your needs.
893,244 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
31%
Computer Software Company
10%
Manufacturing Company
10%
Construction Company
8%
Financial Services Firm
41%
Computer Software Company
9%
Outsourcing Company
6%
Manufacturing Company
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business3
Large Enterprise4
 

Questions from the Community

What is your experience regarding pricing and costs for IBM Trusteer?
The solution is somewhat expensive. IBM could improve their pricing structure. It comes with both licensing and professional services as separate entities that must be purchased before proceeding. ...
What needs improvement with IBM Trusteer?
During integration, it is difficult to fully integrate within a specified time, primarily because code snippets must be installed on every page. This makes the process more challenging based on use...
What is your primary use case for IBM Trusteer?
IBM Trusteer is an anti-fraud solution that is used for account takeover fraud, new account fraud, account fraud, and online frauds on platforms such as mobile platforms and web applications.
What is your primary use case for ThreatMetrix?
The tool is integrated with the other solutions. It can be used to gauge threats and risks in the traffic, applications, network authenticity, and authenticity of people logging into an application...
 

Overview

 

Sample Customers

Banco Satander
Trip Advisor, Stone Hub, TD Bank, Rabobank, GoPro
Find out what your peers are saying about IBM Trusteer vs. ThreatMetrix and other solutions. Updated: April 2026.
893,244 professionals have used our research since 2012.