F5 Distributed Cloud Bot Defense (formerly Shape Defense, acquired January 2020) provides security to protect a website from bots, fake users, and unauthorized transactions, preventing large scale fraud and eroded user experiences. Companies get visibility, detection and mitigation outcomes to reduce fraud and cloud hosting, bandwidth and compute costs, improve user experiences, and optimize their business based on real human traffic.
N/A
Wiz
Score 8.6 out of 10
N/A
Wiz is a Tel Aviv based, cloud risk visibility solution for enterprise security. It provides a 360° view of security risks across clouds, containers and workloads.
I'd strongly recommend it, but with a few caveats depending on how mature the team is with behavioral based security tools. One of our fintech clients was getting hit with low volume, widely spread login attempts, below our rate limiting thresholds. F5 Distributed Cloud Bot Defense was able to flag abnormal input timings, inconsistent device fingerprinting and high entropy in field population behavior. You can only imagine the wave of downstream account lockouts this saved the client. On the other end we had a client with a real time trading platform using Graphql over websockets. F5 Distributed Cloud Bot Defense wasn't able to tap into that stream natively. we had to reverse engineer a proxy layer to inspect events. It worked but it was clunky and not officially supported
Wiz is well-suited if you want to run real-time scans against resources that were recently patched or configured. It is good to keep track of vulnerabilities found and what can be done to resolve the issues without having to open up multiple tabs. Overall, it is good to keep an eye on how well cloud teams or cloud security teams are doing.
Quickly helps mitigate the retooling and newer advanced bot attacks
Excellent customer service from our f5 bot Defense team/partners
Easy to do Traffic Analysis/False Positive reviews with their dashboard of data
Our F5 Security/Solutions Architect and TAM is always there for us whenever we need them
First class service by the F5 Distributed Cloud Bot DefenseSOC, the Tactics Team, the F5 Testing person that helps us, the mobile SDK experts, the Client-Side Signals experts and F5 management
Industry best Threat Briefings
Not only is F5 Distributed Cloud Bot Defense great at stopping the advanced bot attacks, they also have protection against any tampering or replay attacks.
Multi-cloud: Ability of Wiz to integrate with all of our cloud platforms makes it easy to deploy and centralizes our insights into all environments
UI/UX: Wiz's UI is one of, if not -- the best UI I have ever used in a security application. Wiz is able to make it easy to follow and use the application to simplify the normally overcomplicated process of parsing through security information and tools.
Marketing: Hosting meetups such as Wizdom has demonstrated Wiz's investment into its customers by providing us with more encouragement to use the app. The merch, ads, and presentation are above and beyond many companies in the tech industry.
Threat Intel: We rely on Wiz for the latest finds in vulnerabilities across all platforms, and since it is incorporated into the application, it makes this easy and fast to push out necessary steps without going through multiple layers of communication between vendors, cyber governance, security analysts, and developers.
The UI is very user-friendly, with documentation available on every page of the application. New users can learn about the product features as they navigate through several different pages, using the instructions at the top of each page, making it quite easy to use.
Official support can sometimes take time to reach the right people. However, once you are in contact with the appropriate experts, the support is excellent, as F5 staff are true specialists. On the other hand, we always receive prompt assistance from our local sales team, who typically help us connect with the right people quickly.
Implementation of Distributed Cloud is accomplished a few different ways, it would pay to meet with the F5 team and map out your implementation prior to acquisition to make sure you Infrastructure and Operations teams are aligned to the approach and requirements.
Clodflare bot management was our other obvious option for us. We tested it on a staging version of our RFQ platform. It was great for broad traffic filtering but had a hard time with nuanced differences between real subcontractors and low volume bots mimickingt human input whereas that's where F5 Distributed Cloud Bot Defense thrived
We previously used Lacework but transitioned to Wiz as part of our effort to improve cloud security visibility and streamline risk management. While Lacework provided useful insights, we found that Wiz offered a clearer, more intuitive interface and better collaboration features, making it easier for both Security and Engineering teams to work together. The Security Graph and automated risk analysis in Wiz have been especially valuable, helping us quickly understand exposures and prioritise fixes. Overall, the transition to Wiz has improved how we manage security risks across our cloud environment.
F5 Distributed Cloud Bot Defense has helped our customers identify real human traffic and bot traffic, allowing them to prioritize real traffic to applications and improve cloud service usage.
F5 Distributed Cloud Bot Defense ha ayudado a nuestros clientes a poder identificar cuál es el tráfico real de personas y cual el de Bot para así poder priorizar el tráfico real hacia las aplicaciones mejorando los consumos de servicios en nube.
Wiz has saved us a lot of money and headaches. It finds problems we didn't even know we had, like weak passwords and open ports. This helps us fix things before hackers can find them. It's like having a team of security experts working 24/7.
Plus, Wiz can fix some problems itself, saving us time and money. It's a great investment for our business.
Wiz has made our cloud much safer. It helps us find and fix problems quickly, which means we can focus on our core business. It's like having an extra layer of protection for our data and systems.