Skip to main content
TrustRadius
F5 Distributed Cloud Bot Defense

F5 Distributed Cloud Bot Defense
Formerly Shape Security

Overview

What is F5 Distributed Cloud Bot Defense?

F5 Distributed Cloud Bot Defense (formerly Shape Defense, acquired January 2020) provides security to protect a website from bots, fake users, and unauthorized transactions, preventing large scale fraud and eroded user experiences. Companies get visibility, detection and mitigation outcomes to…

Read more
Recent Reviews

Shape is Shaping

8 out of 10
November 13, 2021
Incentivized
F5 Shape has been integrated into our critical service of the organization, purpose of the integration is to mitigate or be aware of the …
Continue reading
Read all reviews

Reviewer Pros & Cons

View all pros & cons
Return to navigation

Pricing

View all pricing

Free

$0

Cloud

Individual

$25

Cloud
per month

Teams

$200

Cloud
per month

Entry-level set up fee?

  • Setup fee optional
For the latest information on pricing, visithttps://www.f5.com/cloud/pricing

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Starting price (does not include set up fee)

  • $25 per month
Return to navigation

Product Details

What is F5 Distributed Cloud Bot Defense?

Bot attacks are difficult to stop—criminals retool to bypass defenses, rapidly solving CAPTCHAs and mimicking human behavior. To stay ahead of bots, the F5 Distributed Cloud Bot Defense uses AI solution to achieve bot protection based on analysis of devices and behavioral signals that unmask automation. This is to give users the advantage of a network effect as the platform adapts to retooling attempts across thousands of the world’s most highly trafficked apps. XC Cloud Bot Defense protects against a broad set of bot-based attacks including account takeover, carding, inventory hoarding, gift card bots, and scrapers.

F5 Distributed Cloud Bot Defense Features

  • Supported: Connectors for easier deployment - Prebuilt integrations enable cloud and on-premises deployments.
  • Supported: Real-time bot mitigation - Behavioral, network, device, and environmental signals
  • Supported: Collective defense network - Adapts to attacker retooling with global collective threat intelligence telemetry and AI
  • Supported: Obfuscation architecture - Prevents reverse engineering and tampering with advanced obfuscation
  • Supported: Managed service offering - Augments security staff with managed service offering

F5 Distributed Cloud Bot Defense Integrations

F5 Distributed Cloud Bot Defense Technical Details

Deployment TypesSoftware as a Service (SaaS), Cloud, or Web-Based
Operating SystemsUnspecified
Mobile ApplicationNo

Frequently Asked Questions

F5 Distributed Cloud Bot Defense (formerly Shape Defense, acquired January 2020) provides security to protect a website from bots, fake users, and unauthorized transactions, preventing large scale fraud and eroded user experiences. Companies get visibility, detection and mitigation outcomes to reduce fraud and cloud hosting, bandwidth and compute costs, improve user experiences, and optimize their business based on real human traffic.

F5 Distributed Cloud Bot Defense starts at $25.

Akamai, Imperva Advanced Bot Protection, and DataDome are common alternatives for F5 Distributed Cloud Bot Defense.

Reviewers rate Implementation Rating highest, with a score of 8.4.

The most common users of F5 Distributed Cloud Bot Defense are from Enterprises (1,001+ employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(38)

Attribute Ratings

Reviews

(1-3 of 3)
Companies can't remove reviews or game the system. Here's why
Score 8 out of 10
Vetted Review
Verified User
Incentivized
Needing a way to actively monitor cloud resources is a must in these times. It is difficult to keep an eye on everything for out-of-the-ordinary behavior and then act upon it at the same time. Cloud Bot Defense helps to monitor these resources and act using its AI to analyze the traffic and respond. It even detects retooling of the attack and continues to defend.
  • Ease of use and deployment.
  • Quickness of support's replies.
  • Great documentation.
  • None at this time.
Cloud Bot defense is great for protecting all cloud assets. It is near impossible to have employees monitor these resources each and every second of the day. Criminals do not sleep, so why should our defenses? Having the bots monitoring gives round-the-clock protection and security.
  • Quicker responses to issue.
  • Lower cost in employee effort.
Support is quick to respond. They help guide you through any issues you have and ensure everything has been resolved before disconnecting. Wait times can vary, but it depends on the time of day. Eventually, excellent support is reached, and you can learn a few things from them as well.
There have not been any detectible performance hits once Cloud Bot Defense was implemented. Alerting is low, which is a good thing, and it is almost set and forgotten. This frees up everyone to deal with other tasks and just keep an eye on the cloud services versus just staring at them, hoping to catch something going on.
November 13, 2021

Shape is Shaping

Score 8 out of 10
Vetted Review
Verified User
Incentivized
F5 Shape has been integrated into our critical service of the organization, purpose of the integration is to mitigate or be aware of the attacks which are automated and difficult to find. It gives a detailed analysis of the traffic being initiated towards the organization's service/application. It also provides leverage to keep it in alerting or blocking mode.
  • Mitigate automated attacks
  • Detect unrealistic traffic patterns
  • Automated emails about the attack
  • Inhouse deployment
It is suitable to detect automated attacks like BOT mitigation. To have visibility on how these attacks are triggering towards the services, the shape is the product in this regard. It will be useful in case the employee credentials are being reused by the attacker sitting on the Internet to get access to the web application.
  • It is under analysis
It is easy to get support and align with the f5 shape team.
There is no quality impact observed on the services while integration with Shape.
No other product have been used so far.
Score 8 out of 10
Vetted Review
Verified User
We use [F5] Shape [Security] to protect against automated threats to our digital environment, supplementing other F5 controls. We manage the deployment in the cybersecurity org for various IT assets.
  • Strong anti-bot protection against middle-level threats
  • Analysis and alerting on known problem areas
  • Customer support - before and after installation, [F5] Shape [Security] has supported us actively to see the product realize value.
  • On a technical side, we've had a lot of deployment issues. This is not a one-sprint solution.
  • We ran into undocumented failure modes and had to rely on L2 and L3 customer support, delaying troubleshooting significantly [in our experience].
  • Accurate log ingestion is a larger challenge than one would want in a security tool.
[F5] Shape [Security] serves its purpose well, especially up to middle-tier threats. This would include mildly skilled attackers with a reasonably costly resource pool. When necessary, their support has been available to assist any time we call, though it's unfortunate how frequent that is.
  • [F5] Shape [Security] established a clear negative trend line in bot traffic to our retail site.
  • [F5] Shape [Security's] anti-automation has moved our business out of reach for ROI for attackers.
  • So far, [F5] Shape [Security] has not caused any incidents as a technology, and has stifled attacks which would have certainly landed as a Sev 2 without this protection.
Decent responsiveness for simple issues, always willing to jump on the phone for support during an incident (related or otherwise). We have had tickets open longer than I'd like, but resolution has never let us down when it comes.
Most customers don't see [F5] Shape [Security], and that's the point. It's certainly mitigated fraud on our platform by assisting in our battle with bots and credential stuffing. While possible to circumvent, [F5] Shape [Security] has certainly moved the bar up significantly for required technical expertise of a potential attacker. For an already somewhat bloated app, we don't see any performance impact, though it has caused significant uptick in log size given our initial "dumb" deployment.
Return to navigation