We integrate the solution with our Java on the UI and try to identify fraud.
The easiest route - we'll conduct a 15 minute phone interview and write up the review for you.
Use our online form to submit your review. It's quick and you can post anonymously.
We integrate the solution with our Java on the UI and try to identify fraud.
The tool is not very accurate, and its accuracy could be improved. I saw many false positives with the solution.
I have been using Nudetect for more than three to four years.
I’ve never had any stability issues with the tool.
Nudetect is a pretty scalable solution.
It is highly unlikely that I will recommend the solution to other users. Technologies have advanced over time, and there are better tools in the market. I'm not sure if Nudetect has been able to maintain its pace with other training tools.
Nudetect is good for certain organizations, but it may not fit everyone. It depends upon the level of security and risk appetite organizations may have based on their responsibility to regulators.
Overall, I rate the solution a six out of ten.
The main use case of the solution is to block bot attacks for web users.
The most valuable feature of the solution is the ease of configuration. You just enable it, and it automatically blocks bot attacks. You don't have to do some complex configurations. It uses custom JavaScript to detect if you are a user or a bot.
There could be some improvement in the options to make custom exclusion rules to be more granular. Sometimes, the solution blocks something that you don't want to be blocked. The solution should allow exclusions based on the solution’s categories wherein it categorizes the traffic.
I want the solution's custom exclusion rules to be more granular. When the solution blocks something, there should be no need to contact the support to tweak the system, but to have more granular exclusions. Users should be able to prevent some traffic from being blocked based on the F5 Shape Security category.
I have been using F5 Shape Security for one year.
F5 Shape Security is a stable solution.
The solution's technical support is not bad because there is an internal dedicated team for support.
The solution's initial setup is easy. If the solution is on-premises, it uses JavaScript in your web applications. You just enable the solution, like a check mark, for the cloud version.
The solution provides a good return on investment because you could integrate it into the cloud, on-prem devices, or web applications.
The solution is moderately priced.
The solution is deployed on the F5 cloud. The solution's real-time analytics help you see what has been blocked. It helps to see whether the attack category was an automation attack or a fake browser. F5 Shape Security has a normal dashboard. We are doing F5 Shape Security migrations for 30 customers.
F5 Shape Security uses Javascript. For a lot of competitors, the Javascript can be reverse-engineered by attackers to bypass the protection. F5 Shape Security has machine learning authentication of the Java script. If you had hacked it, the encryption would have been changed. It's really hard for attackers to reverse engineer the F5 Shape Security JavaScript.
Overall, I rate the solution a nine out of ten.