F5 Distributed Cloud Bot Defense vs. Qualys TruRisk Platform

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
F5 Distributed Cloud Bot Defense
Score 8.3 out of 10
N/A
F5 Distributed Cloud Bot Defense (formerly Shape Defense, acquired January 2020) provides security to protect a website from bots, fake users, and unauthorized transactions, preventing large scale fraud and eroded user experiences. Companies get visibility, detection and mitigation outcomes to reduce fraud and cloud hosting, bandwidth and compute costs, improve user experiences, and optimize their business based on real human traffic.N/A
Qualys TruRisk Platform
Score 6.0 out of 10
N/A
Qualys TruRisk Platform (formerly Qualys Cloud Platform, or Qualysguard), from San Francisco-based Qualys, is network security and vulnerability management software featuring app scanning and security, network device mapping and detection, vulnerability prioritization schedule and remediation, and other features to provide vulnerability management and network attack surface reduction.N/A
Pricing
F5 Distributed Cloud Bot DefenseQualys TruRisk Platform
Editions & Modules
Enterprise
Custom Quote
per year
No answers on this topic
Offerings
Pricing Offerings
F5 Distributed Cloud Bot DefenseQualys TruRisk Platform
Free Trial
YesNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
YesNo
Entry-level Setup FeeOptionalNo setup fee
Additional Details
More Pricing Information
Community Pulse
F5 Distributed Cloud Bot DefenseQualys TruRisk Platform
Features
F5 Distributed Cloud Bot DefenseQualys TruRisk Platform
Threat Intelligence
Comparison of Threat Intelligence features of Product A and Product B
F5 Distributed Cloud Bot Defense
-
Ratings
Qualys TruRisk Platform
8.7
7 Ratings
8% above category average
Network Analytics00 Ratings8.96 Ratings
Threat Recognition00 Ratings8.37 Ratings
Vulnerability Classification00 Ratings8.87 Ratings
Automated Alerts and Reporting00 Ratings9.07 Ratings
Threat Analysis00 Ratings8.27 Ratings
Threat Intelligence Reporting00 Ratings8.97 Ratings
Automated Threat Identification00 Ratings8.77 Ratings
Vulnerability Management Tools
Comparison of Vulnerability Management Tools features of Product A and Product B
F5 Distributed Cloud Bot Defense
-
Ratings
Qualys TruRisk Platform
8.5
9 Ratings
3% above category average
IT Asset Realization00 Ratings8.89 Ratings
Authentication00 Ratings7.96 Ratings
Configuration Monitoring00 Ratings8.57 Ratings
Web Scanning00 Ratings8.88 Ratings
Vulnerability Intelligence00 Ratings8.67 Ratings
Best Alternatives
F5 Distributed Cloud Bot DefenseQualys TruRisk Platform
Small Businesses
GitLab
GitLab
Score 8.6 out of 10
Action1
Action1
Score 9.5 out of 10
Medium-sized Companies
Veracode
Veracode
Score 9.1 out of 10
Action1
Action1
Score 9.5 out of 10
Enterprises
Veracode
Veracode
Score 9.1 out of 10
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
F5 Distributed Cloud Bot DefenseQualys TruRisk Platform
Likelihood to Recommend
8.1
(32 ratings)
8.6
(25 ratings)
Likelihood to Renew
8.2
(1 ratings)
-
(0 ratings)
Usability
-
(0 ratings)
2.0
(1 ratings)
Support Rating
8.3
(32 ratings)
5.0
(7 ratings)
Implementation Rating
7.8
(22 ratings)
-
(0 ratings)
User Testimonials
F5 Distributed Cloud Bot DefenseQualys TruRisk Platform
Likelihood to Recommend
F5
I'd strongly recommend it, but with a few caveats depending on how mature the team is with behavioral based security tools. One of our fintech clients was getting hit with low volume, widely spread login attempts, below our rate limiting thresholds. F5 Distributed Cloud Bot Defense was able to flag abnormal input timings, inconsistent device fingerprinting and high entropy in field population behavior. You can only imagine the wave of downstream account lockouts this saved the client. On the other end we had a client with a real time trading platform using Graphql over websockets. F5 Distributed Cloud Bot Defense wasn't able to tap into that stream natively. we had to reverse engineer a proxy layer to inspect events. It worked but it was clunky and not officially supported
Read full review
Qualys
Qualys Cloud Platform is well suited for organizations that need additional tools to secure and bolster their security from end to end. The automated, real-time threat protection is very quick to notify an admin of potential vulnerabilities and risks, as well as recommending quick fixes to resolve/close the gap before an incident occurs. QCP excels at portraying all of these in a single pane of glass, and find that the Qualys reports are more detailed than competitor product lines. One of our big issues with QCP is that you do have to pay for each scanner, which can quickly add up to large costs. For this reason, I would rate Qualys at a ~7 due to great features and functionality, but overall value could be better for a large organization. I would also say that QCP may make more sense for smaller organizations due to this pricing model.
Read full review
Pros
F5
  • Quickly helps mitigate the retooling and newer advanced bot attacks
  • Excellent customer service from our f5 bot Defense team/partners
  • Easy to do Traffic Analysis/False Positive reviews with their dashboard of data
  • Our F5 Security/Solutions Architect and TAM is always there for us whenever we need them
  • First class service by the F5 Distributed Cloud Bot DefenseSOC, the Tactics Team, the F5 Testing person that helps us, the mobile SDK experts, the Client-Side Signals experts and F5 management
  • Industry best Threat Briefings
  • Not only is F5 Distributed Cloud Bot Defense great at stopping the advanced bot attacks, they also have protection against any tampering or replay attacks.
Read full review
Qualys
  • It really does well at vulnerability scanning, which it is well known for. It's accuracy at finding vulnerabilities is top notch, more so than a lot of other vulnerability tools out there. In an organization/company you want this kind of accuracy at finding vulnerabilities in your network/endpoints
  • It is very good at managing endpoints on a consistent basis, meaning you can add endpoints to Qualys and have the platform scan/track/protect for vulnerabilities on an ongoing basis, without user intervention
  • It does really well at separating out and identifying what levels of criticality each vulnerability should fall into. This way, an organization/company can attack the more critical vulnerabilities first
Read full review
Cons
F5
  • On a technical side, we've had a lot of deployment issues. This is not a one-sprint solution.
  • We ran into undocumented failure modes and had to rely on L2 and L3 customer support, delaying troubleshooting significantly [in our experience].
  • Accurate log ingestion is a larger challenge than one would want in a security tool.
Read full review
Qualys
  • This program is really complicated, the multiple functions that are presented to us are not very clear and in some cases, it is a matter of intuition to execute a function, it is not very informative.
  • The interface of this program can be a real problem; for our taste, this program looks a bit messy, and the interface does not help or guide you to find the options you need.
Read full review
Likelihood to Renew
F5
We are more likely than not, to renew it. It saved us from a really huge data breach 4 months ago. It has earned its shower so far
Read full review
Qualys
No answers on this topic
Usability
F5
No answers on this topic
Qualys
Again, the usability of Qualys has been a pinpoint for this entire review. It was easily the worst thing about the product and because of this, I would not recommend Qualys to anybody in my field. This should be something that Qualys strives to improve if they wish to stay in business.
Read full review
Support Rating
F5
Official support can sometimes take time to reach the right people. However, once you are in contact with the appropriate experts, the support is excellent, as F5 staff are true specialists. On the other hand, we always receive prompt assistance from our local sales team, who typically help us connect with the right people quickly.
Read full review
Qualys
They had a support page within the WAS to report any concerns or seek help. But the UI of that is not smooth. Regardless support staff were pretty responsive and helpful. They scheduled calls to understand and address our problems. Email support is good as well.
Read full review
Implementation Rating
F5
Implementation of Distributed Cloud is accomplished a few different ways, it would pay to meet with the F5 team and map out your implementation prior to acquisition to make sure you Infrastructure and Operations teams are aligned to the approach and requirements.
Read full review
Qualys
No answers on this topic
Alternatives Considered
F5
Clodflare bot management was our other obvious option for us. We tested it on a staging version of our RFQ platform. It was great for broad traffic filtering but had a hard time with nuanced differences between real subcontractors and low volume bots mimickingt human input whereas that's where F5 Distributed Cloud Bot Defense thrived
Read full review
Qualys
As described before Qualys is used to scan periodically the environment in order to check if there are some packages (Linux) or Applications (Windows) outdated, generating reports to the Service Owners, fulfilling what's is expected from us, attending all our expectations regarding the tool. That's why we'd choose Qualys to our organization.
Read full review
Return on Investment
F5
  • Prior to F5 Distributed Cloud Bot Defense, we were averaging 12k plus credential stuffing attempts weekly across client portals That number fell down to less than a thousand in just 4 weeks
  • Over 90 percent of scraping and unauthorized price harvesting blocked
Read full review
Qualys
  • Big time-saving tool vs. having to comb through several system reports which ultimately can still have you missing unapproved software.
  • Quick snapshot via the dashboard provided a nice summary of where you're assets meet or do not meet your organization's policy requirements.
Read full review
ScreenShots