Skip to main content
TrustRadius
F5 Distributed Cloud Bot Defense

F5 Distributed Cloud Bot Defense
Formerly Shape Security

Overview

What is F5 Distributed Cloud Bot Defense?

F5 Distributed Cloud Bot Defense (formerly Shape Defense, acquired January 2020) provides security to protect a website from bots, fake users, and unauthorized transactions, preventing large scale fraud and eroded user experiences. Companies get visibility, detection and mitigation outcomes to…

Read more
Recent Reviews

Shape is Shaping

8 out of 10
November 13, 2021
Incentivized
F5 Shape has been integrated into our critical service of the organization, purpose of the integration is to mitigate or be aware of the …
Continue reading
Read all reviews

Reviewer Pros & Cons

View all pros & cons
Return to navigation

Pricing

View all pricing

Free

$0

Cloud

Individual

$25

Cloud
per month

Teams

$200

Cloud
per month

Entry-level set up fee?

  • Setup fee optional
For the latest information on pricing, visithttps://www.f5.com/cloud/pricing

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Starting price (does not include set up fee)

  • $25 per month
Return to navigation

Product Details

What is F5 Distributed Cloud Bot Defense?

Bot attacks are difficult to stop—criminals retool to bypass defenses, rapidly solving CAPTCHAs and mimicking human behavior. To stay ahead of bots, the F5 Distributed Cloud Bot Defense uses AI solution to achieve bot protection based on analysis of devices and behavioral signals that unmask automation. This is to give users the advantage of a network effect as the platform adapts to retooling attempts across thousands of the world’s most highly trafficked apps. XC Cloud Bot Defense protects against a broad set of bot-based attacks including account takeover, carding, inventory hoarding, gift card bots, and scrapers.

F5 Distributed Cloud Bot Defense Features

  • Supported: Connectors for easier deployment - Prebuilt integrations enable cloud and on-premises deployments.
  • Supported: Real-time bot mitigation - Behavioral, network, device, and environmental signals
  • Supported: Collective defense network - Adapts to attacker retooling with global collective threat intelligence telemetry and AI
  • Supported: Obfuscation architecture - Prevents reverse engineering and tampering with advanced obfuscation
  • Supported: Managed service offering - Augments security staff with managed service offering

F5 Distributed Cloud Bot Defense Integrations

F5 Distributed Cloud Bot Defense Technical Details

Deployment TypesSoftware as a Service (SaaS), Cloud, or Web-Based
Operating SystemsUnspecified
Mobile ApplicationNo

Frequently Asked Questions

F5 Distributed Cloud Bot Defense (formerly Shape Defense, acquired January 2020) provides security to protect a website from bots, fake users, and unauthorized transactions, preventing large scale fraud and eroded user experiences. Companies get visibility, detection and mitigation outcomes to reduce fraud and cloud hosting, bandwidth and compute costs, improve user experiences, and optimize their business based on real human traffic.

F5 Distributed Cloud Bot Defense starts at $25.

Akamai, Imperva Advanced Bot Protection, and DataDome are common alternatives for F5 Distributed Cloud Bot Defense.

Reviewers rate Implementation Rating highest, with a score of 8.4.

The most common users of F5 Distributed Cloud Bot Defense are from Enterprises (1,001+ employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(38)

Attribute Ratings

Reviews

(1-13 of 13)
Companies can't remove reviews or game the system. Here's why
David Kolbo | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Our company is the target of many large web/data scraping campaigns, Credential Stuffing, Carding/Credit Card Stuffing, Fake Account Creation for Points Laundering, and much more. We use F5 Distributed Cloud Bot Defense to protection our customers against these advanced bot attacks with our web and mobile native apps.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We used F5 Distributed Cloud Bot Defense in testing how to protect a critical customer facing portal. After moving the portal from our on-premises data center to a cloud provider really limited our analytics and insights on what was happening with the portal. F5 Distributed cloud was able to provide much needed deeper analytics and protection.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
Our organization uses F5 Distributed Cloud Bot Defense to protect our customer facing applications, primarily around API security. As a large travel website, we are a primary target for both our pricing and inventory information as well as our customer information. Bot Defense has helped protect both, and the people behind the product support have been instrumental in making our partnership and posture a success.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We had a huge issue with bad actors trying to get into our online platform with DoS and bot generated traffic and F5 Distributed Cloud Bot Defense helped us in the right time and precisely solving our issue with 100% accuracy.
Score 9 out of 10
Vetted Review
Verified User
F5 Distributed Cloud Bot Defence helps to defend against malicious bots.It protects our web applications and APIs against malicious bots.It protects data privacy violations as it prevents loss of sensitive data.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
Needing a way to actively monitor cloud resources is a must in these times. It is difficult to keep an eye on everything for out-of-the-ordinary behavior and then act upon it at the same time. Cloud Bot Defense helps to monitor these resources and act using its AI to analyze the traffic and respond. It even detects retooling of the attack and continues to defend.
November 13, 2021

Shape is Shaping

Score 8 out of 10
Vetted Review
Verified User
Incentivized
F5 Shape has been integrated into our critical service of the organization, purpose of the integration is to mitigate or be aware of the attacks which are automated and difficult to find. It gives a detailed analysis of the traffic being initiated towards the organization's service/application. It also provides leverage to keep it in alerting or blocking mode.
Return to navigation