Share your experience using Broadcom Merchant Risk Analytics

The easiest route - we'll conduct a 15 minute phone interview and write up the review for you.

Use our online form to submit your review. It's quick and you can post anonymously.

Your review helps others learn about this solution
The PeerSpot community is built upon trust and sharing with peers.
It's good for your career
In today's digital world, your review shows you have valuable expertise.
You can influence the market
Vendors read their reviews and make improvements based on your feedback.
Examples of the 84,000+ reviews on PeerSpot:

Vice President at a newspaper with 201-500 employees
Real User
Used to identify frauds, but its accuracy could be improved
Pros and Cons
  • "We integrate the solution with our Java on the UI and try to identify fraud."
  • "The tool is not very accurate, and its accuracy could be improved."

What is most valuable?

We integrate the solution with our Java on the UI and try to identify fraud.

What needs improvement?

The tool is not very accurate, and its accuracy could be improved. I saw many false positives with the solution.

For how long have I used the solution?

I have been using Nudetect for more than three to four years.

What do I think about the stability of the solution?

I’ve never had any stability issues with the tool.

What do I think about the scalability of the solution?

Nudetect is a pretty scalable solution.

What other advice do I have?

It is highly unlikely that I will recommend the solution to other users. Technologies have advanced over time, and there are better tools in the market. I'm not sure if Nudetect has been able to maintain its pace with other training tools.

Nudetect is good for certain organizations, but it may not fit everyone. It depends upon the level of security and risk appetite organizations may have based on their responsibility to regulators.

Overall, I rate the solution a six out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
Nikolay Dimitrov - PeerSpot reviewer
Cyber Security Engineer at Paysafe / IBM
Real User
Top 5Leaderboard
Easy to configure and blocks bot attacks for web users
Pros and Cons
  • "The most valuable feature of the solution is the ease of configuration."
  • "I want the solution's custom exclusion rules to be more granular."

What is our primary use case?

The main use case of the solution is to block bot attacks for web users.

What is most valuable?

The most valuable feature of the solution is the ease of configuration. You just enable it, and it automatically blocks bot attacks. You don't have to do some complex configurations. It uses custom JavaScript to detect if you are a user or a bot.

What needs improvement?

There could be some improvement in the options to make custom exclusion rules to be more granular. Sometimes, the solution blocks something that you don't want to be blocked. The solution should allow exclusions based on the solution’s categories wherein it categorizes the traffic.

I want the solution's custom exclusion rules to be more granular. When the solution blocks something, there should be no need to contact the support to tweak the system, but to have more granular exclusions. Users should be able to prevent some traffic from being blocked based on the F5 Shape Security category.

For how long have I used the solution?

I have been using F5 Shape Security for one year.

What do I think about the stability of the solution?

F5 Shape Security is a stable solution.

How are customer service and support?

The solution's technical support is not bad because there is an internal dedicated team for support.

How was the initial setup?

The solution's initial setup is easy. If the solution is on-premises, it uses JavaScript in your web applications. You just enable the solution, like a check mark, for the cloud version.

What was our ROI?

The solution provides a good return on investment because you could integrate it into the cloud, on-prem devices, or web applications.

What's my experience with pricing, setup cost, and licensing?

The solution is moderately priced.

What other advice do I have?

The solution is deployed on the F5 cloud. The solution's real-time analytics help you see what has been blocked. It helps to see whether the attack category was an automation attack or a fake browser. F5 Shape Security has a normal dashboard. We are doing F5 Shape Security migrations for 30 customers.

F5 Shape Security uses Javascript. For a lot of competitors, the Javascript can be reverse-engineered by attackers to bypass the protection. F5 Shape Security has machine learning authentication of the Java script. If you had hacked it, the encryption would have been changed. It's really hard for attackers to reverse engineer the F5 Shape Security JavaScript.

Overall, I rate the solution a nine out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: customer/partner
Flag as inappropriate