At F5, we hate fake application traffic. And there’s a lot to hate—up to 90% of traffic is bot-based, and all that fake traffic is trying to steal from legitimate sources by leveraging billions of stolen credentials each year. Attackers then use these credentials for account takeovers, scraping, gift card attacks, and carding—resulting in literally billions of dollars lost annually.
This probably isn’t news to you. We all know application security is a top priority, but many customers simply don’t have the budget to devote to the overhead of an entire in-house security team. That leaves them especially vulnerable to the ravages of bots.
To meet this challenge we have joined our stack of Silverline cloud-based security with Shape Silverline Defense, delivering world-class application protection by leveraging the power of the Shape network.
The new solution offers a better way to protect online businesses from imitation attacks—delivered by bots and other forms of automation—that simulate human behavior using highly sophisticated attack tools, with the goal of conducting crime or disrupting business. With this new offering, companies get the visibility, detection, and mitigation outcomes they need to slash fraud; reduce cloud hosting, bandwidth, and compute costs; improve user experiences; and optimize their business based on real human traffic.
The introduction of Silverline Shape Defense within the F5 Silverline managed security services portfolio gives customers:
- Simplified buying, deployment, and ongoing support – Single-vendor solution for integrated, multi-service application security, deployed at the customer’s edge, and with 24x7 Security Operations Center support.
- Powerful AI and ML to defeat attackers and prevent fraud – Accurately determines in real-time if an application request is from a fraudulent source and then mitigates it while allowing legitimate human users without additional friction.
- One integrated portal – Provides a single pane of glass to get the most from managed and self-service capabilities, including configuration proxy and routing, visibility into threat details, attack analytics, and actions taken by SOC experts.
- Global application security footprint – F5 Silverline managed services offer local points of presence in geographies around the world.
As the first new offering that spans F5 and Shape capabilities, we have aligned our product engineering teams, operations, and product marketing teams to deliver this new Silverline offering in just 5 months.
We’re especially proud of Silverline’s robust customer support. Silverline is designed for seamless deployment and support, but our Security Operations Center experts are available 24/7 to protect your apps from attack and abuse. Plus, Silverline can be implemented in as quickly as 30 minutes and is totally customizable to fit the needs of your organization.
For additional details on Shape Silverline Defense, visit here.
About the Author
Related Blog Posts

F5 accelerates and secures AI inference at scale with NVIDIA Cloud Partner reference architecture
F5’s inclusion within the NVIDIA Cloud Partner (NCP) reference architecture enables secure, high-performance AI infrastructure that scales efficiently to support advanced AI workloads.
F5 Silverline Mitigates Record-Breaking DDoS Attacks
Malicious attacks are increasing in scale and complexity, threatening to overwhelm and breach the internal resources of businesses globally. Often, these attacks combine high-volume traffic with stealthy, low-and-slow, application-targeted attack techniques, powered by either automated botnets or human-driven tools.
F5 Silverline: Our Data Centers are your Data Centers
Customers count on F5 Silverline Managed Security Services to secure their digital assets, and in order for us to deliver a highly dependable service at global scale we host our infrastructure in the most reliable and well-connected locations in the world. And when F5 needs reliable and well-connected locations, we turn to Equinix, a leading provider of digital infrastructure.
Volterra and the Power of the Distributed Cloud (Video)
How can organizations fully harness the power of multi-cloud and edge computing? VPs Mark Weiner and James Feger join the DevCentral team for a video discussion on how F5 and Volterra can help.
Phishing Attacks Soar 220% During COVID-19 Peak as Cybercriminal Opportunism Intensifies
David Warburton, author of the F5 Labs 2020 Phishing and Fraud Report, describes how fraudsters are adapting to the pandemic and maps out the trends ahead in this video, with summary comments.
The Internet of (Increasingly Scary) Things
There is a lot of FUD (Fear, Uncertainty, and Doubt) that gets attached to any emerging technology trend, particularly when it involves vast legions of consumers eager to participate. And while it’s easy enough to shrug off the paranoia that bots...