Skip to main content
TrustRadius
F5 Distributed Cloud Bot Defense

F5 Distributed Cloud Bot Defense
Formerly Shape Security

Overview

What is F5 Distributed Cloud Bot Defense?

F5 Distributed Cloud Bot Defense (formerly Shape Defense, acquired January 2020) provides security to protect a website from bots, fake users, and unauthorized transactions, preventing large scale fraud and eroded user experiences. Companies get visibility, detection and mitigation outcomes to…

Read more
Recent Reviews

Shape is Shaping

8 out of 10
November 13, 2021
Incentivized
F5 Shape has been integrated into our critical service of the organization, purpose of the integration is to mitigate or be aware of the …
Continue reading
Read all reviews

Awards

Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards

Reviewer Pros & Cons

View all pros & cons
Return to navigation

Pricing

View all pricing

Free

$0

Cloud

Individual

$25

Cloud
per month

Teams

$200

Cloud
per month

Entry-level set up fee?

  • Setup fee optional
For the latest information on pricing, visithttps://www.f5.com/cloud/pricing

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Starting price (does not include set up fee)

  • $25 per month
Return to navigation

Product Details

What is F5 Distributed Cloud Bot Defense?

Bot attacks are difficult to stop—criminals retool to bypass defenses, rapidly solving CAPTCHAs and mimicking human behavior. To stay ahead of bots, the F5 Distributed Cloud Bot Defense uses AI solution to achieve bot protection based on analysis of devices and behavioral signals that unmask automation. This is to give users the advantage of a network effect as the platform adapts to retooling attempts across thousands of the world’s most highly trafficked apps. XC Cloud Bot Defense protects against a broad set of bot-based attacks including account takeover, carding, inventory hoarding, gift card bots, and scrapers.

F5 Distributed Cloud Bot Defense Features

  • Supported: Connectors for easier deployment - Prebuilt integrations enable cloud and on-premises deployments.
  • Supported: Real-time bot mitigation - Behavioral, network, device, and environmental signals
  • Supported: Collective defense network - Adapts to attacker retooling with global collective threat intelligence telemetry and AI
  • Supported: Obfuscation architecture - Prevents reverse engineering and tampering with advanced obfuscation
  • Supported: Managed service offering - Augments security staff with managed service offering

F5 Distributed Cloud Bot Defense Integrations

F5 Distributed Cloud Bot Defense Technical Details

Deployment TypesSoftware as a Service (SaaS), Cloud, or Web-Based
Operating SystemsUnspecified
Mobile ApplicationNo

Frequently Asked Questions

F5 Distributed Cloud Bot Defense (formerly Shape Defense, acquired January 2020) provides security to protect a website from bots, fake users, and unauthorized transactions, preventing large scale fraud and eroded user experiences. Companies get visibility, detection and mitigation outcomes to reduce fraud and cloud hosting, bandwidth and compute costs, improve user experiences, and optimize their business based on real human traffic.

F5 Distributed Cloud Bot Defense starts at $25.

Akamai, Imperva Advanced Bot Protection, and DataDome are common alternatives for F5 Distributed Cloud Bot Defense.

Reviewers rate Implementation Rating highest, with a score of 8.4.

The most common users of F5 Distributed Cloud Bot Defense are from Enterprises (1,001+ employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(39)

Attribute Ratings

Reviews

(1-5 of 5)
Companies can't remove reviews or game the system. Here's why
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We use F5 Distributed Cloud Bot Defense for bot defense and bot mitigation. Trying to address all the telemetry's of various threats.
  • Mitigating Credential Stuffing Attacks
  • Bot Mitigation
  • DDoS
  • Dictionary attacks
  • Excellent product, need to be customized for individual customer budgets
  • Including IP Intelligence into BOT Defense
Excellent tool for mitigating BOT attacks. Some of the credential stuffing attacks can be mitigated within seconds, as it detects the abnormalities very quickly.
  • Excellent reporting and monitoring system, providing the 10000 feet overview of applications.
Never faced any dearth of technology support for shape security currently known as distributed bot defense.
Previously known as shape security, the solution uses irule to integrate the virtual server traffic being routed to the shape security servers.
Leaps and bounds ahead of the game from competitors
Score 9 out of 10
Vetted Review
Verified User
F5 Distributed Cloud Bot Defence helps to defend against malicious bots.It protects our web applications and APIs against malicious bots.It protects data privacy violations as it prevents loss of sensitive data.
  • It prevents creation of fraudulent accounts and also prevents account takeover.
  • Helps to stop bots that mimicks human behaviour.
  • It offers quick response to issues.
  • It is simple to deploy this tool.
  • This tool achieves all our organization objectives hence nothing to dislike.
It's best suited for malicious bot detection and prevention hence any organization should purpose to use it.
  • Ease to identify and mitigate malicious bots.
  • It protects our organization web applications and networks against bot attacks.
  • Save operations time and cost.
F5 Distributed Cloud Bot Defence provides quick response to security incidents thus saving time.
This tool helps to detect and mitigate frauds and malicious bots thus it increases the performance of our web applications.
April 26, 2023

SecurityCloud

Jesus Enrique Gonzales Azcarate | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
Protect the infraestructure in the cloud how virtual machines, services and apps. The scope is protect many resources about the services.
  • Easy
  • Security
  • Fast configuration
  • IT
  • Development
  • Financial services
Security in the protect resources in the cloud.
  • Licenses
  • Costs
  • Model license
Services support is important for the attention at customers.
Securyting the access application
For the support, security and supporting for the customers
Score 8 out of 10
Vetted Review
Verified User
Incentivized
Needing a way to actively monitor cloud resources is a must in these times. It is difficult to keep an eye on everything for out-of-the-ordinary behavior and then act upon it at the same time. Cloud Bot Defense helps to monitor these resources and act using its AI to analyze the traffic and respond. It even detects retooling of the attack and continues to defend.
  • Ease of use and deployment.
  • Quickness of support's replies.
  • Great documentation.
  • None at this time.
Cloud Bot defense is great for protecting all cloud assets. It is near impossible to have employees monitor these resources each and every second of the day. Criminals do not sleep, so why should our defenses? Having the bots monitoring gives round-the-clock protection and security.
  • Quicker responses to issue.
  • Lower cost in employee effort.
Support is quick to respond. They help guide you through any issues you have and ensure everything has been resolved before disconnecting. Wait times can vary, but it depends on the time of day. Eventually, excellent support is reached, and you can learn a few things from them as well.
There have not been any detectible performance hits once Cloud Bot Defense was implemented. Alerting is low, which is a good thing, and it is almost set and forgotten. This frees up everyone to deal with other tasks and just keep an eye on the cloud services versus just staring at them, hoping to catch something going on.
Score 8 out of 10
Vetted Review
Verified User
We use [F5] Shape [Security] to protect against automated threats to our digital environment, supplementing other F5 controls. We manage the deployment in the cybersecurity org for various IT assets.
  • Strong anti-bot protection against middle-level threats
  • Analysis and alerting on known problem areas
  • Customer support - before and after installation, [F5] Shape [Security] has supported us actively to see the product realize value.
  • On a technical side, we've had a lot of deployment issues. This is not a one-sprint solution.
  • We ran into undocumented failure modes and had to rely on L2 and L3 customer support, delaying troubleshooting significantly [in our experience].
  • Accurate log ingestion is a larger challenge than one would want in a security tool.
[F5] Shape [Security] serves its purpose well, especially up to middle-tier threats. This would include mildly skilled attackers with a reasonably costly resource pool. When necessary, their support has been available to assist any time we call, though it's unfortunate how frequent that is.
  • [F5] Shape [Security] established a clear negative trend line in bot traffic to our retail site.
  • [F5] Shape [Security's] anti-automation has moved our business out of reach for ROI for attackers.
  • So far, [F5] Shape [Security] has not caused any incidents as a technology, and has stifled attacks which would have certainly landed as a Sev 2 without this protection.
Decent responsiveness for simple issues, always willing to jump on the phone for support during an incident (related or otherwise). We have had tickets open longer than I'd like, but resolution has never let us down when it comes.
Most customers don't see [F5] Shape [Security], and that's the point. It's certainly mitigated fraud on our platform by assisting in our battle with bots and credential stuffing. While possible to circumvent, [F5] Shape [Security] has certainly moved the bar up significantly for required technical expertise of a potential attacker. For an already somewhat bloated app, we don't see any performance impact, though it has caused significant uptick in log size given our initial "dumb" deployment.
Return to navigation