Skip to main content
TrustRadius
F5 Distributed Cloud Bot Defense

F5 Distributed Cloud Bot Defense
Formerly Shape Security

Overview

What is F5 Distributed Cloud Bot Defense?

F5 Distributed Cloud Bot Defense (formerly Shape Defense, acquired January 2020) provides security to protect a website from bots, fake users, and unauthorized transactions, preventing large scale fraud and eroded user experiences. Companies get visibility, detection and mitigation outcomes to…

Read more
Recent Reviews

Shape is Shaping

8 out of 10
November 13, 2021
Incentivized
F5 Shape has been integrated into our critical service of the organization, purpose of the integration is to mitigate or be aware of the …
Continue reading
Read all reviews

Reviewer Pros & Cons

View all pros & cons
Return to navigation

Pricing

View all pricing

Free

$0

Cloud

Individual

$25

Cloud
per month

Teams

$200

Cloud
per month

Entry-level set up fee?

  • Setup fee optional
For the latest information on pricing, visithttps://www.f5.com/cloud/pricing

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Starting price (does not include set up fee)

  • $25 per month
Return to navigation

Product Details

What is F5 Distributed Cloud Bot Defense?

Bot attacks are difficult to stop—criminals retool to bypass defenses, rapidly solving CAPTCHAs and mimicking human behavior. To stay ahead of bots, the F5 Distributed Cloud Bot Defense uses AI solution to achieve bot protection based on analysis of devices and behavioral signals that unmask automation. This is to give users the advantage of a network effect as the platform adapts to retooling attempts across thousands of the world’s most highly trafficked apps. XC Cloud Bot Defense protects against a broad set of bot-based attacks including account takeover, carding, inventory hoarding, gift card bots, and scrapers.

F5 Distributed Cloud Bot Defense Features

  • Supported: Connectors for easier deployment - Prebuilt integrations enable cloud and on-premises deployments.
  • Supported: Real-time bot mitigation - Behavioral, network, device, and environmental signals
  • Supported: Collective defense network - Adapts to attacker retooling with global collective threat intelligence telemetry and AI
  • Supported: Obfuscation architecture - Prevents reverse engineering and tampering with advanced obfuscation
  • Supported: Managed service offering - Augments security staff with managed service offering

F5 Distributed Cloud Bot Defense Integrations

F5 Distributed Cloud Bot Defense Technical Details

Deployment TypesSoftware as a Service (SaaS), Cloud, or Web-Based
Operating SystemsUnspecified
Mobile ApplicationNo

Frequently Asked Questions

F5 Distributed Cloud Bot Defense (formerly Shape Defense, acquired January 2020) provides security to protect a website from bots, fake users, and unauthorized transactions, preventing large scale fraud and eroded user experiences. Companies get visibility, detection and mitigation outcomes to reduce fraud and cloud hosting, bandwidth and compute costs, improve user experiences, and optimize their business based on real human traffic.

F5 Distributed Cloud Bot Defense starts at $25.

Akamai, Imperva Advanced Bot Protection, and DataDome are common alternatives for F5 Distributed Cloud Bot Defense.

Reviewers rate Implementation Rating highest, with a score of 8.4.

The most common users of F5 Distributed Cloud Bot Defense are from Enterprises (1,001+ employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(38)

Attribute Ratings

Reviews

(1-13 of 13)
Companies can't remove reviews or game the system. Here's why
David Kolbo | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
  • Quickly helps mitigate the retooling and newer advanced bot attacks
  • Excellent customer service from our f5 bot Defense team/partners
  • Easy to do Traffic Analysis/False Positive reviews with their dashboard of data
  • Our F5 Security/Solutions Architect and TAM is always there for us whenever we need them
  • First class service by the F5 Distributed Cloud Bot DefenseSOC, the Tactics Team, the F5 Testing person that helps us, the mobile SDK experts, the Client-Side Signals experts and F5 management
  • Industry best Threat Briefings
  • Not only is F5 Distributed Cloud Bot Defense great at stopping the advanced bot attacks, they also have protection against any tampering or replay attacks.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
  • The setup process for F5 Distributed cloud bot defense was much easier than any other product that we have ever used.
  • The UX is great however it constantly changes and slows us down from doing or normal operations occasionally.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
  • So when the traffic increases it's auto balance and then also gives the user the stickiness to the space fake pod to run with.
  • It can be optimized to be more user-friendly. Right now it takes a little time and more training to understand things, but if it can have the self-reveal video it can improve the quality of the product.
Score 9 out of 10
Vetted Review
Verified User
  • It prevents creation of fraudulent accounts and also prevents account takeover.
  • Helps to stop bots that mimicks human behaviour.
  • It offers quick response to issues.
  • It is simple to deploy this tool.
  • This tool achieves all our organization objectives hence nothing to dislike.
Score 8 out of 10
Vetted Review
Verified User
  • Strong anti-bot protection against middle-level threats
  • Analysis and alerting on known problem areas
  • Customer support - before and after installation, [F5] Shape [Security] has supported us actively to see the product realize value.
  • On a technical side, we've had a lot of deployment issues. This is not a one-sprint solution.
  • We ran into undocumented failure modes and had to rely on L2 and L3 customer support, delaying troubleshooting significantly [in our experience].
  • Accurate log ingestion is a larger challenge than one would want in a security tool.
Return to navigation