Top Rated F5 Distributed Cloud Bot Defense Alternatives
23 F5 Distributed Cloud Bot Defense Reviews
Overall Review Sentiment for F5 Distributed Cloud Bot Defense
Log in to view review sentiment.
You can tell F5 is a very secure login application and offers multi-factor authentication. It is easy to know exactly what inputs you need to enter in in order to get into your intended system. Review collected by and hosted on G2.com.
I dislike the user interface of F5. It is antiquated and very text heavy. I feel F5 would benefit from doing user research or a re-design of their tool. Additionally, I feel other security platforms such as Duo have updated their security interface more and are gaining in more popularity (though I do acknowledge Duo is more of a MFA tool then an in-house security platform - I am just using this as an example) Review collected by and hosted on G2.com.

F5 Big IP client has been an amazing product being away from main centre miles away can access and work on files and tools easily and very smoothly. Easy troubleshooting and works with Microsoft Azure Key hand in hand. Review collected by and hosted on G2.com.
The Auto Connect feature is good, but when it disconnects or new session is required it doesn't give popup until you open the app and restart a new session. Atleast there needs to be a signal or status feature Review collected by and hosted on G2.com.
The F5 Shape Bot Defense is straightforward to use. You need to put it on your head, and it will do its job. Review collected by and hosted on G2.com.
My biggest complaint is that the bot is not always accurate when shooting the ball. Sometimes it will hit the ball too high or too low, and it doesn't always make contact with the ball. Review collected by and hosted on G2.com.

Application inspects the data traffic from end user to application which gives end to end traffic security using cloud based analytics on top of load balancers which is in demand in the world of IoT. Review collected by and hosted on G2.com.
At times it adds up latency at times as F5 Shape security is hosted on cloud and goes through different components of Shape system to determine the fraudulent request. Review collected by and hosted on G2.com.
First of all, it is working entirely on a cloud platform and doesn't need a physical server. It has many platforms ready for engagement. Always keeps being updated for newer threats. Review collected by and hosted on G2.com.
Not so easy to set up for first time use. You will need a bunch of time or get support from F5 team. Also it's pricing is little bit higher than other compepitors. Review collected by and hosted on G2.com.
Very easy to use, the interface is intuitive and simple to understand. I like the connection to Microsoft Authenticator on my iPhone, which allows me to easily get online. Review collected by and hosted on G2.com.
The connection time is sometimes slower than I would like, anywhere from 30-90 seconds. There are other times where I am forced to restart in order to get access to VPN. Review collected by and hosted on G2.com.
This f5 shape security helped us in avoiding frauds in our banking applications especially for scraping and unauthorised login Review collected by and hosted on G2.com.
I could see no issues or drWbacks with this Review collected by and hosted on G2.com.
When it comes to infrastructure, security is of utmost necessity. Login plays a huge role. When it comes to login traffic, shape serves a heavy number of account and protects a lot of money in the process. Review collected by and hosted on G2.com.
There is nothing much to dislike, I have used SAFE of shape personally and can vouch for the role that it plays in security aspect. Review collected by and hosted on G2.com.

They stay up to date on security issues and give that feedback. Review collected by and hosted on G2.com.
the complexity of the tools,from there the rest I see everything fine Review collected by and hosted on G2.com.
Able to detect fraud attacks for our web and mobile applications. Review collected by and hosted on G2.com.
Honestly speaking, we haven't found any issues with this software at the moment. Review collected by and hosted on G2.com.