F5 Distributed Cloud Bot Defense vs. Vulcan Cyber

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
F5 Distributed Cloud Bot Defense
Score 8.5 out of 10
N/A
F5 Distributed Cloud Bot Defense (formerly Shape Defense, acquired January 2020) provides security to protect a website from bots, fake users, and unauthorized transactions, preventing large scale fraud and eroded user experiences. Companies get visibility, detection and mitigation outcomes to reduce fraud and cloud hosting, bandwidth and compute costs, improve user experiences, and optimize their business based on real human traffic.N/A
Vulcan Cyber
Score 8.0 out of 10
Mid-Size Companies (51-1,000 employees)
Vulcan Cyber is an exposure and vulnerability risk mitigation platform that coordinates teams, tools and tasks to eliminate the most-critical exposure risk to the business. Vulcan Cyber first correlates risk signals from scanners, cyber asset and threat intelligence tools. Risk data from infrastructure, cloud, application and code projects is aggregated into the Vulcan Cyber data lake. Normalized risk data is then used to automate the prioritization and orchestration of risk mitigation…
$0
per year
Pricing
F5 Distributed Cloud Bot DefenseVulcan Cyber
Editions & Modules
Enterprise
Custom Quote
per year
Vulcan Free
$0
Vulnerability prioritization technology available for small organizations with less than 1,000 secured assets, one user and up to three integrated Vulcan Connectors.
Vulcan Enterprise
Custom licensing terms
Vulcan Enterprise is designed for large organizations with hyper-scale vulnerability and exposure risk management requirements. Custom pricing and licensing terms. Vulcan Enterprise offers scalable user licensing to help secure 5,000+ assets and unlimited integrations.
Offerings
Pricing Offerings
F5 Distributed Cloud Bot DefenseVulcan Cyber
Free Trial
YesNo
Free/Freemium Version
NoYes
Premium Consulting/Integration Services
YesYes
Entry-level Setup FeeOptionalNo setup fee
Additional Details——
More Pricing Information
Community Pulse
F5 Distributed Cloud Bot DefenseVulcan Cyber
Features
F5 Distributed Cloud Bot DefenseVulcan Cyber
Threat Intelligence
Comparison of Threat Intelligence features of Product A and Product B
F5 Distributed Cloud Bot Defense
-
Ratings
Vulcan Cyber
7.8
11 Ratings
2% below category average
Network Analytics00 Ratings7.87 Ratings
Vulnerability Classification00 Ratings8.110 Ratings
Automated Alerts and Reporting00 Ratings7.211 Ratings
Threat Analysis00 Ratings7.95 Ratings
Automated Threat Identification00 Ratings7.911 Ratings
Vulnerability Management Tools
Comparison of Vulnerability Management Tools features of Product A and Product B
F5 Distributed Cloud Bot Defense
-
Ratings
Vulcan Cyber
7.2
11 Ratings
14% below category average
IT Asset Realization00 Ratings7.78 Ratings
Configuration Monitoring00 Ratings6.43 Ratings
Vulnerability Intelligence00 Ratings7.611 Ratings
Best Alternatives
F5 Distributed Cloud Bot DefenseVulcan Cyber
Small Businesses
GitLab
GitLab
Score 8.6 out of 10
Action1
Action1
Score 9.6 out of 10
Medium-sized Companies
Veracode
Veracode
Score 9.2 out of 10
Action1
Action1
Score 9.6 out of 10
Enterprises
Veracode
Veracode
Score 9.2 out of 10
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
F5 Distributed Cloud Bot DefenseVulcan Cyber
Likelihood to Recommend
8.4
(24 ratings)
7.8
(12 ratings)
Support Rating
8.4
(24 ratings)
-
(0 ratings)
Implementation Rating
8.0
(16 ratings)
-
(0 ratings)
Ease of integration
-
(0 ratings)
7.4
(10 ratings)
User Testimonials
F5 Distributed Cloud Bot DefenseVulcan Cyber
Likelihood to Recommend
F5
It works very well as long as your protected forms are located on specific pages.However, it is less suitable if, for example, you have a login form on every page of your website. As a JavaScript needs to be injected on every page for bot detection, which increases the number of license-relevant requests - which may increase your licensing costs
Read full review
Vulcan Cyber
It's really challenging at times to contend with multiple vulnerabilities on a daily basis, and having a way to make sense of what actually needs to be prioritized and what can be shifted further down the task list is extremely helpful. Because the solution suggests what your next step should be in mitigating a specific vulnerability, it helps us save time and research by enabling us to immediately take action after being informed about an issue.
Read full review
Pros
F5
  • Quickly helps mitigate the retooling and newer advanced bot attacks
  • Excellent customer service from our f5 bot Defense team/partners
  • Easy to do Traffic Analysis/False Positive reviews with their dashboard of data
  • Our F5 Security/Solutions Architect and TAM is always there for us whenever we need them
  • First class service by the F5 Distributed Cloud Bot DefenseSOC, the Tactics Team, the F5 Testing person that helps us, the mobile SDK experts, the Client-Side Signals experts and F5 management
  • Industry best Threat Briefings
  • Not only is F5 Distributed Cloud Bot Defense great at stopping the advanced bot attacks, they also have protection against any tampering or replay attacks.
Read full review
Vulcan Cyber
  • Identifies vulnerabilities and they are easily understood.
  • Easy to identify remedies in an instant.
  • Campaign feature is a true time saver
  • Our CSM, Nino, is the best I have ever worked with!
Read full review
Cons
F5
  • On a technical side, we've had a lot of deployment issues. This is not a one-sprint solution.
  • We ran into undocumented failure modes and had to rely on L2 and L3 customer support, delaying troubleshooting significantly [in our experience].
  • Accurate log ingestion is a larger challenge than one would want in a security tool.
Read full review
Vulcan Cyber
  • Deduping of assets could be better.
  • The weighting of vulnerabilities is hard to describe to non technical executives.
  • The Business Groups and Tagging needs improvement. Or at least allow tags to be removed if not needed. Now they are static from the API feed.
Read full review
Support Rating
F5
Support is quick to respond. They help guide you through any issues you have and ensure everything has been resolved before disconnecting. Wait times can vary, but it depends on the time of day. Eventually, excellent support is reached, and you can learn a few things from them as well.
Read full review
Vulcan Cyber
No answers on this topic
Implementation Rating
F5
Implementation of Distributed Cloud is accomplished a few different ways, it would pay to meet with the F5 team and map out your implementation prior to acquisition to make sure you Infrastructure and Operations teams are aligned to the approach and requirements.
Read full review
Vulcan Cyber
No answers on this topic
Alternatives Considered
F5
F5 Distributed Cloud Bot Defense provides strong protection against automated threats, but there are always opportunities for enhancement.
Read full review
Vulcan Cyber
I wasn't here at the time when the company compared different vulnerability management platforms so I'm not sure on the reasoning and difference between the 2. It could be that the team went through different choices and found Vulcan to be the best fit. It's hard for me to say why Vulcan was specifically chosen
Read full review
Return on Investment
F5
  • F5 Distributed Cloud Bot Defense has helped our customers identify real human traffic and bot traffic, allowing them to prioritize real traffic to applications and improve cloud service usage.
  • F5 Distributed Cloud Bot Defense ha ayudado a nuestros clientes a poder identificar cuál es el tráfico real de personas y cual el de Bot para asĂ­ poder priorizar el tráfico real hacia las aplicaciones mejorando los consumos de servicios en nube.
Read full review
Vulcan Cyber
  • Allows much better prioritizing of which assets are most vulnerable
  • Allow a better understanding of what assets are actually under real threat vs. what is assumed to be vulnerable, but the real world fact is the system would be hard to reach internally, so it's not as vulnerable.
Read full review
ScreenShots