F5 Distributed Cloud Bot Defense vs. Transmit Security CIAM Platform

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
F5 Distributed Cloud Bot Defense
Score 8.6 out of 10
N/A
F5 Distributed Cloud Bot Defense (formerly Shape Defense, acquired January 2020) provides security to protect a website from bots, fake users, and unauthorized transactions, preventing large scale fraud and eroded user experiences. Companies get visibility, detection and mitigation outcomes to reduce fraud and cloud hosting, bandwidth and compute costs, improve user experiences, and optimize their business based on real human traffic.N/A
Transmit Security CIAM Platform
Score 8.0 out of 10
N/A
Transmit Security headquartered in Boston offers their identity orchestration solution, providing strong customer authentication and authorization for entities that need it.N/A
Pricing
F5 Distributed Cloud Bot DefenseTransmit Security CIAM Platform
Editions & Modules
Enterprise
Custom Quote
per year
No answers on this topic
Offerings
Pricing Offerings
F5 Distributed Cloud Bot DefenseTransmit Security CIAM Platform
Free Trial
YesNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
YesNo
Entry-level Setup FeeOptionalNo setup fee
Additional Details
More Pricing Information
Community Pulse
F5 Distributed Cloud Bot DefenseTransmit Security CIAM Platform
Top Pros
Top Cons

No answers on this topic

Best Alternatives
F5 Distributed Cloud Bot DefenseTransmit Security CIAM Platform
Small Businesses
GitLab
GitLab
Score 8.6 out of 10
Auth0
Auth0
Score 8.2 out of 10
Medium-sized Companies
Veracode
Veracode
Score 8.9 out of 10
OneLogin by One Identity
OneLogin by One Identity
Score 9.7 out of 10
Enterprises
Checkmarx
Checkmarx
Score 9.1 out of 10
OneLogin by One Identity
OneLogin by One Identity
Score 9.7 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
F5 Distributed Cloud Bot DefenseTransmit Security CIAM Platform
Likelihood to Recommend
8.5
(19 ratings)
10.0
(1 ratings)
Support Rating
8.5
(19 ratings)
10.0
(1 ratings)
Implementation Rating
8.3
(11 ratings)
-
(0 ratings)
User Testimonials
F5 Distributed Cloud Bot DefenseTransmit Security CIAM Platform
Likelihood to Recommend
F5
It works very well as long as your protected forms are located on specific pages.However, it is less suitable if, for example, you have a login form on every page of your website. As a JavaScript needs to be injected on every page for bot detection, which increases the number of license-relevant requests - which may increase your licensing costs
Read full review
Transmit Security
Transmit Security hides nicely in the taskbar until needed. It works behind the scenes. It is seamlessly integrated into the Macs functionality. Transmit Security has helped us keep our systems secure while helping make our job easier all round. We would not change it for anything else now. It is our go-to FTP client.
Read full review
Pros
F5
  • Quickly helps mitigate the retooling and newer advanced bot attacks
  • Excellent customer service from our f5 bot Defense team/partners
  • Easy to do Traffic Analysis/False Positive reviews with their dashboard of data
  • Our F5 Security/Solutions Architect and TAM is always there for us whenever we need them
  • First class service by the F5 Distributed Cloud Bot DefenseSOC, the Tactics Team, the F5 Testing person that helps us, the mobile SDK experts, the Client-Side Signals experts and F5 management
  • Industry best Threat Briefings
  • Not only is F5 Distributed Cloud Bot Defense great at stopping the advanced bot attacks, they also have protection against any tampering or replay attacks.
Read full review
Transmit Security
  • Designed to work seamlessly with the Mac
  • Keep security as a top priority
  • Simple drag and drop functionality
Read full review
Cons
F5
  • On a technical side, we've had a lot of deployment issues. This is not a one-sprint solution.
  • We ran into undocumented failure modes and had to rely on L2 and L3 customer support, delaying troubleshooting significantly [in our experience].
  • Accurate log ingestion is a larger challenge than one would want in a security tool.
Read full review
Transmit Security
  • Updates were not happening as often, but that could be because they were not needed.
  • Some settings were being lost and had to be re-entered, but that has since been resolved.
  • Interface has improved tremendously since first it launched.
Read full review
Support Rating
F5
Support is quick to respond. They help guide you through any issues you have and ensure everything has been resolved before disconnecting. Wait times can vary, but it depends on the time of day. Eventually, excellent support is reached, and you can learn a few things from them as well.
Read full review
Transmit Security
It has seldom been we needed any support with Transmit Security, but when we did, they were on it. We got help in minutes rather than hours or days like other suppliers in this marketplace. Indeed, their support convinced us in the beginning that we had made the right decision.
Read full review
Implementation Rating
F5
Implementation of Distributed Cloud is accomplished a few different ways, it would pay to meet with the F5 team and map out your implementation prior to acquisition to make sure you Infrastructure and Operations teams are aligned to the approach and requirements.
Read full review
Transmit Security
No answers on this topic
Alternatives Considered
F5
F5 Distributed Cloud Bot Defense provides strong protection against automated threats, but there are always opportunities for enhancement.
Read full review
Transmit Security
No answers on this topic
Return on Investment
F5
  • We experience large web/data scraping attack campaigns and F5 Distributed Cloud Bot Defense over the years has helped mitigate these for us and significantly reducing load off of our origin servers.
  • Also, we experience many large Credential Stuffing attacks and F5 Distributed Cloud Bot Defense helps us stop these attacks and protects our customers.
Read full review
Transmit Security
  • Saved us time with remote connections
  • Keeps our data secure
  • It helps us maintain our customer's information in the highest confidence.
Read full review
ScreenShots