Skip to main content
TrustRadius
F5 Distributed Cloud Bot Defense

F5 Distributed Cloud Bot Defense
Formerly Shape Security

Overview

What is F5 Distributed Cloud Bot Defense?

F5 Distributed Cloud Bot Defense (formerly Shape Defense, acquired January 2020) provides security to protect a website from bots, fake users, and unauthorized transactions, preventing large scale fraud and eroded user experiences. Companies get visibility, detection and mitigation outcomes to…

Read more
Recent Reviews

Shape is Shaping

8 out of 10
November 13, 2021
Incentivized
F5 Shape has been integrated into our critical service of the organization, purpose of the integration is to mitigate or be aware of the …
Continue reading
Read all reviews

Awards

Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards

Reviewer Pros & Cons

View all pros & cons
Return to navigation

Pricing

View all pricing

Free

$0

Cloud

Individual

$25

Cloud
per month

Teams

$200

Cloud
per month

Entry-level set up fee?

  • Setup fee optional
For the latest information on pricing, visithttps://www.f5.com/cloud/pricing

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Starting price (does not include set up fee)

  • $25 per month
Return to navigation

Product Details

What is F5 Distributed Cloud Bot Defense?

Bot attacks are difficult to stop—criminals retool to bypass defenses, rapidly solving CAPTCHAs and mimicking human behavior. To stay ahead of bots, the F5 Distributed Cloud Bot Defense uses AI solution to achieve bot protection based on analysis of devices and behavioral signals that unmask automation. This is to give users the advantage of a network effect as the platform adapts to retooling attempts across thousands of the world’s most highly trafficked apps. XC Cloud Bot Defense protects against a broad set of bot-based attacks including account takeover, carding, inventory hoarding, gift card bots, and scrapers.

F5 Distributed Cloud Bot Defense Features

  • Supported: Connectors for easier deployment - Prebuilt integrations enable cloud and on-premises deployments.
  • Supported: Real-time bot mitigation - Behavioral, network, device, and environmental signals
  • Supported: Collective defense network - Adapts to attacker retooling with global collective threat intelligence telemetry and AI
  • Supported: Obfuscation architecture - Prevents reverse engineering and tampering with advanced obfuscation
  • Supported: Managed service offering - Augments security staff with managed service offering

F5 Distributed Cloud Bot Defense Integrations

F5 Distributed Cloud Bot Defense Technical Details

Deployment TypesSoftware as a Service (SaaS), Cloud, or Web-Based
Operating SystemsUnspecified
Mobile ApplicationNo

Frequently Asked Questions

F5 Distributed Cloud Bot Defense (formerly Shape Defense, acquired January 2020) provides security to protect a website from bots, fake users, and unauthorized transactions, preventing large scale fraud and eroded user experiences. Companies get visibility, detection and mitigation outcomes to reduce fraud and cloud hosting, bandwidth and compute costs, improve user experiences, and optimize their business based on real human traffic.

F5 Distributed Cloud Bot Defense starts at $25.

Akamai, Imperva Advanced Bot Protection, and DataDome are common alternatives for F5 Distributed Cloud Bot Defense.

Reviewers rate Implementation Rating highest, with a score of 8.4.

The most common users of F5 Distributed Cloud Bot Defense are from Enterprises (1,001+ employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(40)

Attribute Ratings

Reviews

(1-12 of 12)
Companies can't remove reviews or game the system. Here's why
David Kolbo | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Our company is the target of many large web/data scraping campaigns, Credential Stuffing, Carding/Credit Card Stuffing, Fake Account Creation for Points Laundering, and much more. We use F5 Distributed Cloud Bot Defense to protection our customers against these advanced bot attacks with our web and mobile native apps.
  • Quickly helps mitigate the retooling and newer advanced bot attacks
  • Excellent customer service from our f5 bot Defense team/partners
  • Easy to do Traffic Analysis/False Positive reviews with their dashboard of data
  • Our F5 Security/Solutions Architect and TAM is always there for us whenever we need them
  • First class service by the F5 Distributed Cloud Bot DefenseSOC, the Tactics Team, the F5 Testing person that helps us, the mobile SDK experts, the Client-Side Signals experts and F5 management
  • Industry best Threat Briefings
  • Not only is F5 Distributed Cloud Bot Defense great at stopping the advanced bot attacks, they also have protection against any tampering or replay attacks.
F5 Distributed Cloud Bot Defense is well suited for large Enterprises that face advanced bot attacks from Web Scraping, Credential Stuffing, Carding/Credit Card Stuffing, Fake Account Creation, and more where the collection of the Client-Side signals helps clearly show if the attackers are telling lies vs. other bot solutions that place a lot of the responsibility on their customers to tune bot scores.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We used F5 Distributed Cloud Bot Defense in testing how to protect a critical customer facing portal. After moving the portal from our on-premises data center to a cloud provider really limited our analytics and insights on what was happening with the portal. F5 Distributed cloud was able to provide much needed deeper analytics and protection.
  • The setup process for F5 Distributed cloud bot defense was much easier than any other product that we have ever used.
  • The UX is great however it constantly changes and slows us down from doing or normal operations occasionally.
Having a hybrid multi-cloud environment has been a struggle for us to protect and gather analytics for. F5 Distributed Cloud Bot Defense has become a must have too for our organization. The single pane of glass for us to showcase to upper management has been invaluable.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
Our organization uses F5 Distributed Cloud Bot Defense to protect our customer facing applications, primarily around API security. As a large travel website, we are a primary target for both our pricing and inventory information as well as our customer information. Bot Defense has helped protect both, and the people behind the product support have been instrumental in making our partnership and posture a success.
  • The people behind the product
  • identifying potential bad actors
  • mitigating risk quickly
  • visuals
F5 Distributed Cloud Bot Defense is a bot defense product, so it is based on telemetry not volume. This is not necessarily a ddos protection. It is also not as well suited, currently, for fraud protection.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We use F5 Distributed Cloud Bot Defense for bot defense and bot mitigation. Trying to address all the telemetry's of various threats.
  • Mitigating Credential Stuffing Attacks
  • Bot Mitigation
  • DDoS
  • Dictionary attacks
  • Excellent product, need to be customized for individual customer budgets
  • Including IP Intelligence into BOT Defense
Excellent tool for mitigating BOT attacks. Some of the credential stuffing attacks can be mitigated within seconds, as it detects the abnormalities very quickly.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We had a huge issue with bad actors trying to get into our online platform with DoS and bot generated traffic and F5 Distributed Cloud Bot Defense helped us in the right time and precisely solving our issue with 100% accuracy.
  • Visibility of all the traffic
  • Stop bot generated traffic
  • Great support team
Very well created solution to cater a very specific issue of bot intrusion prevention.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
In our industry, we are under continuous bot attack and malicious attack from bad actors. Thereby causing degradation of service to bad customer experience.
  • DDos attack
  • Blocking bot attack
  • Manual Attack
Service degradations with F5 Distributed Cloud Bot Defense.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
I was using F5 to do the load balancing in our server where we wanted to run behind the scenes on the parts and we wanted to run all the docker images where F5 is held to refresh the problem.
  • So when the traffic increases it's auto balance and then also gives the user the stickiness to the space fake pod to run with.
  • It can be optimized to be more user-friendly. Right now it takes a little time and more training to understand things, but if it can have the self-reveal video it can improve the quality of the product.
When we wanted to have the load balancing on a different environment, it was really very well suited there. But it needs to be scaled down very quickly.
Score 9 out of 10
Vetted Review
Verified User
F5 Distributed Cloud Bot Defence helps to defend against malicious bots.It protects our web applications and APIs against malicious bots.It protects data privacy violations as it prevents loss of sensitive data.
  • It prevents creation of fraudulent accounts and also prevents account takeover.
  • Helps to stop bots that mimicks human behaviour.
  • It offers quick response to issues.
  • It is simple to deploy this tool.
  • This tool achieves all our organization objectives hence nothing to dislike.
It's best suited for malicious bot detection and prevention hence any organization should purpose to use it.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
Needing a way to actively monitor cloud resources is a must in these times. It is difficult to keep an eye on everything for out-of-the-ordinary behavior and then act upon it at the same time. Cloud Bot Defense helps to monitor these resources and act using its AI to analyze the traffic and respond. It even detects retooling of the attack and continues to defend.
  • Ease of use and deployment.
  • Quickness of support's replies.
  • Great documentation.
  • None at this time.
Cloud Bot defense is great for protecting all cloud assets. It is near impossible to have employees monitor these resources each and every second of the day. Criminals do not sleep, so why should our defenses? Having the bots monitoring gives round-the-clock protection and security.
November 13, 2021

Shape is Shaping

Score 8 out of 10
Vetted Review
Verified User
Incentivized
F5 Shape has been integrated into our critical service of the organization, purpose of the integration is to mitigate or be aware of the attacks which are automated and difficult to find. It gives a detailed analysis of the traffic being initiated towards the organization's service/application. It also provides leverage to keep it in alerting or blocking mode.
  • Mitigate automated attacks
  • Detect unrealistic traffic patterns
  • Automated emails about the attack
  • Inhouse deployment
It is suitable to detect automated attacks like BOT mitigation. To have visibility on how these attacks are triggering towards the services, the shape is the product in this regard. It will be useful in case the employee credentials are being reused by the attacker sitting on the Internet to get access to the web application.
Score 8 out of 10
Vetted Review
Verified User
We use [F5] Shape [Security] to protect against automated threats to our digital environment, supplementing other F5 controls. We manage the deployment in the cybersecurity org for various IT assets.
  • Strong anti-bot protection against middle-level threats
  • Analysis and alerting on known problem areas
  • Customer support - before and after installation, [F5] Shape [Security] has supported us actively to see the product realize value.
  • On a technical side, we've had a lot of deployment issues. This is not a one-sprint solution.
  • We ran into undocumented failure modes and had to rely on L2 and L3 customer support, delaying troubleshooting significantly [in our experience].
  • Accurate log ingestion is a larger challenge than one would want in a security tool.
[F5] Shape [Security] serves its purpose well, especially up to middle-tier threats. This would include mildly skilled attackers with a reasonably costly resource pool. When necessary, their support has been available to assist any time we call, though it's unfortunate how frequent that is.
Return to navigation