Bot Management Flashcards
Objection: Isn’t this the same as Rate Limiting? Why should I pay more for this? (2 bullet response)
Rate Limiting is an effective tool but you have to write a rule for every combination of IP, User Agents, Hostnames, ASNs, etc.
Bot Management, when enabled, automatically figures out which of the combinations should be applied (no manual writing)
Objection: I only want to pay for the requests on the specific paths I am protecting
If only requests for a specific path are considered for the pricing, it will discourage the addition of additional rules against new bot attacks on previously unprotected parts of the site. We want to offer protection that is as holistic as possible, but we also understand that this might not be something that everybody wants.
Thus we suggest two options:
1) either we only take into account requests on specific paths which are currently being attacked.
2) Or we price based on 100% of the traffic your site gets.
We would make the latter option more attractive by discounting the cost per request as compared to the individual approach.
Objection: I don’t understand this concept of “good requests” for pricing. Can you help me understand it?
Traditionally, the security industry charges on requests, but this ends up being bad for you.
When you get attacked, your request number goes up and the vendor charges you more.
We don’t think that is right.
We instead use # of good requests, which are requests successfully passed through Bot Management. We believe this number will scale nicely based on how your business grows and how good of a job we do blocking bots.
As your traffic increases, we will block more bots and see more good requests come through as well.
As your good requests grow, we’ll have a conversation about new pricing if you exceed your cap.
Objection: I do not want a single false positive.
If you do not want a single false positive, we are not the best product for you as we are not comfortable guaranteeing no false positives.
Additionally, we believe that no product in the market will provide a zero false positive rate and any product that claims to is not being honest.
We do believe that our solution will give you the best possible results as they relate to your use case and we look forward to working with you on it.
We do help reduce the likelihood by enabling them to test rules in log mode.
It won’t eliminate all false positives but can give greater confidence before turning on other actions that may impact legitimate users.
ROI: Cost Reduction
8% savings on Data Transfer - 40% of all requests tend to be automated traffic; 80% caching rate
20% lower spend vs. comp - PerimeterX and Distill charge on all requests (vs. good requests)
Spend on Disputed Txns - $15 for every disputed txn from payment processors
ROI: Productivity Increase
$150-$250k/year - cost of top security engineers spending 2 days/wk on Bot Whack-a-mole / home-grown solutions
$300-$500k/year - developer time spent on building and then managing JavaScript from competition
20%-30% + in BDRs/SDRs - spam in marketing and other CTA forms
ROI: Risk Reduction
$$ on Litigation from scraping - scraping (loss of IP), litigation from lost IPs, Trust & Safety responses
$$ spent on Support/PR - managing account takeovers/credential stuffing; what is the cost of a Twitter PR complaint?
Uptime SLAs - SREs / end customers have uptime SLAs
ROI: Revenue Improvement
Improvement in performance - dropping traffic to serve bots; direct impact on revenue from website
Inventory based - inventory not sold or sold through secondary market
What are bots?
Automated program to carry certain tasks without human intervention
Mimic human behavior on the web
Scan content, interact with web pages, chat with users
Good bot examples
Search engine crawlers, site monitoring, copyright, feed
Bat bot examples
Scraper, spam, click, fake Googlebots, botnet
Evolution of bots
Basic (simply collect info, limited number of static IP addresses, repetitive attack pattern, easy to detect) –>
Mature (steal sensitive data, commit fraud, disrupt business, botnets, more difficult to counter) –>
Sophisticated (mimic human behavior or hijack a real customers’ browser and tokens; need threat intelligence, behavioral analysis, machine learning, fingerprinting)
How have you tried to stop bots to date?
Homegrown solutions, relying on hosting providers, rate limiting, WAF, multi-factor authentication, Javascript-based bot detection
Use cases (6)
Credential stuffing, inventory hoarding, credit card stuffing, content scraping, application DDoS, content spam
Account Selection: Go After
- Don’t have bot solution
- Under attack
- Using home grown solution
- Need integrated solution (security/performance)
- Looking for ease of use
- Existing customer
- Scraping and credential stuffing