Likelihood to Recommend F5 Distributed Cloud Bot Defense is well suited for large Enterprises that face advanced bot attacks from Web Scraping, Credential Stuffing, Carding/Credit Card Stuffing, Fake Account Creation, and more where the collection of the Client-Side signals helps clearly show if the attackers are telling lies vs. other bot solutions that place a lot of the responsibility on their customers to tune bot scores.
Read full review The product works great when I have to quarantine a mass email attack. Seems students are always susceptible to email base attacks, we are no different, but when one occurs on a mass email basis I can very easy and quickly block/quarantine those emails either by sender, domain, or URL or all three if need be. We have played with the data loss component but it is hard to do anything but "monitor" because there are way too many false positives. Such as with SSNs and bank routing numbers, but I figure any solution provider would experience the same problem. However, even with monitor and notification only, it is useful to make our users aware they are potentially sending personal information.
Read full review Pros Quickly helps mitigate the retooling and newer advanced bot attacks Excellent customer service from our f5 bot Defense team/partners Easy to do Traffic Analysis/False Positive reviews with their dashboard of data Our F5 Security/Solutions Architect and TAM is always there for us whenever we need them First class service by the F5 Distributed Cloud Bot DefenseSOC, the Tactics Team, the F5 Testing person that helps us, the mobile SDK experts, the Client-Side Signals experts and F5 management Industry best Threat Briefings Not only is F5 Distributed Cloud Bot Defense great at stopping the advanced bot attacks, they also have protection against any tampering or replay attacks. Read full review Provides a great summarized view of all user end-points via a web-based portal Provides a simple but strong policy format for users and computers Fairly light agent installed on end-points Read full review Cons On a technical side, we've had a lot of deployment issues. This is not a one-sprint solution. We ran into undocumented failure modes and had to rely on L2 and L3 customer support, delaying troubleshooting significantly [in our experience]. Accurate log ingestion is a larger challenge than one would want in a security tool. Read full review Wish I could customize the notification emails more, like including html code to personalize and highlight messages that my end users see when an item is flagged. Wish there was a word or phrase component to block/flag emails as I can with files, links, senders and domains. Automation of the BEC list would be a plus...such as pulling in an OU or security group so that I do not have to do manually perform this task. We have multiple TrendMicro products. Thus it would be nice to have one dash board to "see" or login at least for ApexOne, CAS, etc. Read full review Likelihood to Renew Only a 9 if the product become completely unaffordable. Covid-19 has adversely affected Higher Ed budgets, if that should happen I would lobby hard to find cuts elsewhere...TrendMicro CAS is a necessary tool for any business to have!
Read full review Usability Once Cloud App Security is up and running there is no need to do anything additional. The program will begin protecting all the environment immediately and end results are proven. All notifications come to the administrator email to verify and mitigate a response and check the endpoint if necessary. Very easy to use.
Read full review Reliability and Availability Has always been available for us in 2+ years...100% uptime thus far
Read full review Performance On the desktop/laptop it works flawlessly, just need a mobile friendly site or an app to support a workaholic like me
Read full review Support Rating Support is quick to respond. They help guide you through any issues you have and ensure everything has been resolved before disconnecting. Wait times can vary, but it depends on the time of day. Eventually, excellent support is reached, and you can learn a few things from them as well.
Read full review Trend Micro Cloud App Security’s support has been highly competent and thorough when we have needed their assistance. Their support has been quickly dispatched, both through telephone and Email, while answer our questions and providing the “inside baseball” answers we have wanted when discussing the why and how of certain issues. When it came to implementation, their support sat through us as we deployed agents and took us on an adventure few implementations have.
Read full review Implementation Rating F5 Distributed Cloud Bot Defense and our partners are great at helping us with in-depth Traffic Analysis of protected endpoints first in Monitoring Mode. After 7-14 days of Traffic Analysis/False Positive reviews, we can clearly tell when we are ready to place protected endpoints into Mitigation Mode.
Read full review Alternatives Considered We have tried a whole bunch of solutions before we got Shape bot defense solution. But non of them worked for us the way F5 Shape solution worked
Read full review To date we had only utilized Symantec Small Business Suite for all of our antivirus needs. We had only moved to the cloud environment during the summer of 2020, and after doing so I'm not sure that I would ever change from Trend Micro Cloud App Security. The cost and features all are a great fit for the small to medium-sized business such as ours.
Read full review Return on Investment [F5] Shape [Security] established a clear negative trend line in bot traffic to our retail site. [F5] Shape [Security's] anti-automation has moved our business out of reach for ROI for attackers. So far, [F5] Shape [Security] has not caused any incidents as a technology, and has stifled attacks which would have certainly landed as a Sev 2 without this protection. Read full review CAS gives us peace of mind knowing the file systems we rely on in the cloud are protected the same way they would be if they were sitting in our office. This leads to a reduced risk of downtime that could otherwise limit us from being able to properly support our customers. Read full review ScreenShots