F5 Distributed Cloud Bot Defense vs. IBM Trusteer

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
F5 Distributed Cloud Bot Defense
Score 8.3 out of 10
N/A
F5 Distributed Cloud Bot Defense (formerly Shape Defense, acquired January 2020) provides security to protect a website from bots, fake users, and unauthorized transactions, preventing large scale fraud and eroded user experiences. Companies get visibility, detection and mitigation outcomes to reduce fraud and cloud hosting, bandwidth and compute costs, improve user experiences, and optimize their business based on real human traffic.N/A
IBM Trusteer
Score 9.0 out of 10
N/A
IBM Security offers the IBM Trusteer fraud detection and prevention application, to support financial institutions and antivirus applications with additional malware and phishing prevention, as well as provide digital identity protection and prevent fraud. IBM acquired Trusteer in 2013, and the product includes the IBM Trusteer Fraud Prevention Suite, IBM Trusteer Rapport malware and phishing protection tool, IMB Trusteer Pinpoint Detect account takeover protection, and integration with IBM…N/A
Pricing
F5 Distributed Cloud Bot DefenseIBM Trusteer
Editions & Modules
Enterprise
Custom Quote
per year
No answers on this topic
Offerings
Pricing Offerings
F5 Distributed Cloud Bot DefenseIBM Trusteer
Free Trial
YesNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
YesNo
Entry-level Setup FeeOptionalNo setup fee
Additional Details
More Pricing Information
Community Pulse
F5 Distributed Cloud Bot DefenseIBM Trusteer
Best Alternatives
F5 Distributed Cloud Bot DefenseIBM Trusteer
Small Businesses
GitLab
GitLab
Score 8.6 out of 10

No answers on this topic

Medium-sized Companies
Veracode
Veracode
Score 9.2 out of 10
F5 Distributed Cloud Bot Defense
F5 Distributed Cloud Bot Defense
Score 8.3 out of 10
Enterprises
Veracode
Veracode
Score 9.2 out of 10
F5 Distributed Cloud Bot Defense
F5 Distributed Cloud Bot Defense
Score 8.3 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
F5 Distributed Cloud Bot DefenseIBM Trusteer
Likelihood to Recommend
8.2
(33 ratings)
10.0
(2 ratings)
Likelihood to Renew
8.2
(1 ratings)
10.0
(1 ratings)
Support Rating
8.3
(33 ratings)
-
(0 ratings)
Implementation Rating
7.8
(24 ratings)
-
(0 ratings)
User Testimonials
F5 Distributed Cloud Bot DefenseIBM Trusteer
Likelihood to Recommend
F5
I'd strongly recommend it, but with a few caveats depending on how mature the team is with behavioral based security tools. One of our fintech clients was getting hit with low volume, widely spread login attempts, below our rate limiting thresholds. F5 Distributed Cloud Bot Defense was able to flag abnormal input timings, inconsistent device fingerprinting and high entropy in field population behavior. You can only imagine the wave of downstream account lockouts this saved the client. On the other end we had a client with a real time trading platform using Graphql over websockets. F5 Distributed Cloud Bot Defense wasn't able to tap into that stream natively. we had to reverse engineer a proxy layer to inspect events. It worked but it was clunky and not officially supported
Read full review
IBM
Trusteer is great for banking and protecting a computer beyond internet banking! There can be painful times when we try to help a customer who has Trusteer and Norton or McAfee and it doesn't want to work. But Trusteer has great services offered in their portal in the Start Menu.
Read full review
Pros
F5
  • Quickly helps mitigate the retooling and newer advanced bot attacks
  • Excellent customer service from our f5 bot Defense team/partners
  • Easy to do Traffic Analysis/False Positive reviews with their dashboard of data
  • Our F5 Security/Solutions Architect and TAM is always there for us whenever we need them
  • First class service by the F5 Distributed Cloud Bot DefenseSOC, the Tactics Team, the F5 Testing person that helps us, the mobile SDK experts, the Client-Side Signals experts and F5 management
  • Industry best Threat Briefings
  • Not only is F5 Distributed Cloud Bot Defense great at stopping the advanced bot attacks, they also have protection against any tampering or replay attacks.
Read full review
IBM
  • Protection and security for network data.
  • Protective shield mechanism in financial transactions.
  • Implementation and safeguard of user keys optimally.
Read full review
Cons
F5
  • On a technical side, we've had a lot of deployment issues. This is not a one-sprint solution.
  • We ran into undocumented failure modes and had to rely on L2 and L3 customer support, delaying troubleshooting significantly [in our experience].
  • Accurate log ingestion is a larger challenge than one would want in a security tool.
Read full review
IBM
  • Logins - I have issues regularly with my logins - that may be user related though.
  • It interferes with some other security products and causes issues on our website at times.
Read full review
Likelihood to Renew
F5
We are more likely than not, to renew it. It saved us from a really huge data breach 4 months ago. It has earned its shower so far
Read full review
IBM
IBM Trusteer maintains the same focus with what it offers as a comprehensive and reliable vision tool. The technical support is the best that has been handled. The integration with other elements is reciprocal and of unique quality to promote the use at the corporate and advanced level. No more saying that we use the software because it is also economically sustainable and favors us a lot
Read full review
Support Rating
F5
Official support can sometimes take time to reach the right people. However, once you are in contact with the appropriate experts, the support is excellent, as F5 staff are true specialists. On the other hand, we always receive prompt assistance from our local sales team, who typically help us connect with the right people quickly.
Read full review
IBM
No answers on this topic
Implementation Rating
F5
Implementation of Distributed Cloud is accomplished a few different ways, it would pay to meet with the F5 team and map out your implementation prior to acquisition to make sure you Infrastructure and Operations teams are aligned to the approach and requirements.
Read full review
IBM
No answers on this topic
Alternatives Considered
F5
Clodflare bot management was our other obvious option for us. We tested it on a staging version of our RFQ platform. It was great for broad traffic filtering but had a hard time with nuanced differences between real subcontractors and low volume bots mimickingt human input whereas that's where F5 Distributed Cloud Bot Defense thrived
Read full review
IBM
We use FraudMAP to monitor activity inside of the Online Banking login and we love it! It helps us to find strange IPs, inconsistent activity, fraudulent activity, and updates done within online banking. We use it in conjunction with Trusteer because Trusteer can tell us when a registered PC has a potentially malicious virus on it before any logins are processed
Read full review
Return on Investment
F5
  • Prior to F5 Distributed Cloud Bot Defense, we were averaging 12k plus credential stuffing attempts weekly across client portals That number fell down to less than a thousand in just 4 weeks
  • Over 90 percent of scraping and unauthorized price harvesting blocked
Read full review
IBM
  • Since the implementation of this tool as a support mechanism to safeguard the identity of our treasures, the organization has had a significant return to the sustainable resources that this tool offers (ROI). It is positive since we have maintained the link of work for which we are made and the satisfaction of our customers.
  • Professional and sustainable technical support. It is worth the investment because it does not affect the budget, but there are both substantive and objective gains.
  • We have reached the goal of advancing towards the integration of our service platforms with IBM Trusteer towards the consolidation of a reliable and sustainable organization.
Read full review
ScreenShots