Likelihood to Recommend It is easy to use with sufficient documentation on how to use the tools for end users or newbies. Experienced testers will find it easy to customise and configure the test cases. Just wished that I could have taken up a course on using this tool in my study days so that I could had explored more and improved my familiarity with the tool, unlike when working where access and time to explore the other features of the tool is limited
Read full review F5 Distributed Cloud Bot Defense is well suited for large Enterprises that face advanced bot attacks from Web Scraping, Credential Stuffing, Carding/Credit Card Stuffing, Fake Account Creation, and more where the collection of the Client-Side signals helps clearly show if the attackers are telling lies vs. other bot solutions that place a lot of the responsibility on their customers to tune bot scores.
Read full review Pros Easy to use. Many exploits available. Multi-platform. Read full review Quickly helps mitigate the retooling and newer advanced bot attacks Excellent customer service from our f5 bot Defense team/partners Easy to do Traffic Analysis/False Positive reviews with their dashboard of data Our F5 Security/Solutions Architect and TAM is always there for us whenever we need them First class service by the F5 Distributed Cloud Bot DefenseSOC, the Tactics Team, the F5 Testing person that helps us, the mobile SDK experts, the Client-Side Signals experts and F5 management Industry best Threat Briefings Not only is F5 Distributed Cloud Bot Defense great at stopping the advanced bot attacks, they also have protection against any tampering or replay attacks. Read full review Cons More robust menus Better plugin inter-operation Read full review On a technical side, we've had a lot of deployment issues. This is not a one-sprint solution. We ran into undocumented failure modes and had to rely on L2 and L3 customer support, delaying troubleshooting significantly [in our experience]. Accurate log ingestion is a larger challenge than one would want in a security tool. Read full review Usability My rating is for the technical security features for bot protection. Administration is very simple through the console for creating policies, configurations and dashboards. Viewing the reports helps a lot for decision making. And technical support issues with the manufacturer are easy to request. The technical documentation of the solution in the support portal and knowledge base also helps a lot.
Read full review Support Rating We don't use it.
Read full review Support is quick to respond. They help guide you through any issues you have and ensure everything has been resolved before disconnecting. Wait times can vary, but it depends on the time of day. Eventually, excellent support is reached, and you can learn a few things from them as well.
Read full review Online Training The technical content and documentation is complete. It's by order for section: Installing, Deployment, Management, Configuration and Troubleshooting. In section details the information contains best practices and recomendations. The Reports section is helping for the customers and partners for technical preparation focus in the certifications. Is very simple learning and studying the content.
Read full review Implementation Rating F5 Distributed Cloud Bot Defense and our partners are great at helping us with in-depth Traffic Analysis of protected endpoints first in Monitoring Mode. After 7-14 days of Traffic Analysis/False Positive reviews, we can clearly tell when we are ready to place protected endpoints into Mitigation Mode.
Read full review Alternatives Considered Metasploit is the most well-known tool in the average pen tester's toolkit. It's hard to compare to its neighbor's due to its size and following.
Read full review We have tried a whole bunch of solutions before we got Shape bot defense solution. But non of them worked for us the way F5 Shape solution worked
Read full review Return on Investment Positive: Improves efficiency of our network penetration testing operations. Positive: Allows for collaboration and information sharing during a penetration test. Read full review [F5] Shape [Security] established a clear negative trend line in bot traffic to our retail site. [F5] Shape [Security's] anti-automation has moved our business out of reach for ROI for attackers. So far, [F5] Shape [Security] has not caused any incidents as a technology, and has stifled attacks which would have certainly landed as a Sev 2 without this protection. Read full review ScreenShots