Best Software for 2025 is now live!
Show rating breakdown
Save to My Lists
Paid
Claimed

4 Group-IB Fraud Protection Reviews

5.0 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
4 Group-IB Fraud Protection Reviews
5.0 out of 5
4 Group-IB Fraud Protection Reviews
5.0 out of 5

Group-IB Fraud Protection Pros and Cons

How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cons
G2 reviews are authentic and verified.
Verified User in Banking
CB
Enterprise(> 1000 emp.)
Validated Reviewer
Verified Current User
Review source: G2 invite on behalf of seller
Incentivized Review
(Original )Information
What do you like best about Group-IB Fraud Protection?

Group-IB Fraud Protection solution is able to detect a wide range of fraud types, e.g., social engineering, account takeover, and payment fraud. These key features help banks improve their security posture and be well-equipped to handle future threats.

In addition, the platform is easy to use, the integration process is clear, and Group-IB customer support is satisfactory. I highly recommend Group-IB Fraud Protection solution for banks and other financial institutions looking to boost their defenses against digital fraud. Review collected by and hosted on G2.com.

What do you dislike about Group-IB Fraud Protection?

There are a few inconveniences here and there, but the team managed to quickly fix them with their updates and support. Review collected by and hosted on G2.com.

Verified User in Consulting
CC
Small-Business(50 or fewer emp.)
Validated Reviewer
Verified Current User
Review source: G2 invite on behalf of seller
Incentivized Review
What do you like best about Group-IB Fraud Protection?

Device fingerprinting, global id technology and graph analysis Review collected by and hosted on G2.com.

What do you dislike about Group-IB Fraud Protection?

Actually everything is working optimum level. But maybe we can detect and show in admin panel which aplications may cause overlay activity. Review collected by and hosted on G2.com.

Verified User in Consulting
CC
Mid-Market(51-1000 emp.)
Validated Reviewer
Review source: G2 invite on behalf of seller
Incentivized Review
What do you like best about Group-IB Fraud Protection?

There are many different rules that can help the organizations to prevent the fraud. It can be applied the both mobile and web sites. Also it has behavior analytics feature. The implementation is easy. Review collected by and hosted on G2.com.

What do you dislike about Group-IB Fraud Protection?

Actually there are not many big things about cons. The behaviour analytics feature is open to develope for better accurance. Review collected by and hosted on G2.com.

Verified User in Banking
EB
Enterprise(> 1000 emp.)
Validated Reviewer
Review source: G2 invite on behalf of seller
Incentivized Review
What do you like best about Group-IB Fraud Protection?

The collaboration of the team resources to help, comunicate, and support Review collected by and hosted on G2.com.

What do you dislike about Group-IB Fraud Protection?

- Reporting part needs to imporve for more historical data and customized reporting. Review collected by and hosted on G2.com.

There are not enough reviews of Group-IB Fraud Protection for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Sift Logo
Sift
4.7
(439)
Sift is a fraud detection system it has flexible, adaptive, and automated solution thathelps businesses of all sizes detect and prevent fraud, before it hits the bottom line.
2
LastPass Logo
LastPass
4.5
(1,750)
LastPass business solutions help teams & businesses take control of their identity management with password management, single sign-on (SSO), and adaptive multifactor authentication (MFA).
3
1Password Logo
1Password
4.7
(1,362)
1Password remembers your passwords for you — and helps you make them stronger. All your secrets are secure and always available, safe behind the one password that only you know.
4
Cloudflare Application Security and Performance Logo
Cloudflare Application Security and Performance
4.5
(530)
Cloudflare Application Security and Performance solutions provide performance, reliability, and security for all of your web applications and APIs, wherever they are hosted and wherever your users are.
5
Palo Alto Cortex XSIAM Logo
Palo Alto Cortex XSIAM
4.3
(474)
6
Cisco Duo Logo
Cisco Duo
4.5
(394)
Duo is a cloud-based access security platform built to protect access to any application, from any device. Duo’s passwordless authentication, single sign-on (SSO) and user-friendly multi-factor authentication make secure logins easy for users, reducing friction to their workflow.
7
SEON. Fraud Fighters Logo
SEON. Fraud Fighters
4.6
(310)
SEON's products are designed around two core goals: deliver effective risk prevention, and give businesses complete freedom in how they fight fraud.
8
Signifyd Logo
Signifyd
4.6
(304)
With identity and intent intelligence from the world’s largest network of online retailers, Signifyd’s Commerce Protection Platform instantly recognizes the ‘who’ behind every transaction. Every approved order is backed by a 100 percent financial guarantee against fraud and abuse, so merchants can automate payments at scale, streamline customer experiences and grow fearlessly.
9
ActivTrak Logo
ActivTrak
4.4
(290)
ActivTrak is a cloud-native workforce intelligence platform that transforms work activity data into actionable insights for employee monitoring, productivity and performance management, and workforce planning capabilities that deliver measurable ROI. Deployment is quick and easy — start collecting data in minutes.
10
CrowdStrike Falcon Endpoint Protection Platform Logo
CrowdStrike Falcon Endpoint Protection Platform
4.7
(288)
CrowdStrike Falcon endpoint protection unifies the technologies required to successfully stop breaches: next-generation antivirus, endpoint detection and response, IT hygiene, 24/7 threat hunting and threat intelligence. They combine to provide continuous breach prevention in a single agent.
Show More