OverviewBack to top
E-commerce firms across the globe are searching for more efficient ways to connect with customers and retain existing ones. Secure and easy-to-use applications are critical to success in rapidly changing market conditions. If an organization’s IT infrastructure is not up to the task of protecting applications that enable easy shopping, sophisticated automated attacks can happen in the blink of an eye. For example, the e-commerce industry is the most targeted industry bad bots according to the E-commerce Industry Automated Threat Landscape report.
- 28.9% of Traffic Is Bad Bot on the Login Pages of E-commerce Firms to Takeover User Accounts
- 27.3% of traffic Is Bad Bot on Cart Pages of E-commerce Firms to Perform Cart Abandonment
- 23.6% of Traffic on Category Section and Product Pages Is Bad Bot to Scrape Unique Product Listings
In collaboration with Magento, Radware Bot Manager aims to help e-commerce firms using Magento’s platform to secure their perimeter against automated attacks. E-commerce firms can deploy Radware Bot Manager with a specially developed Magento plugin within minutes. With Radware Bot Manager onboard, e-commerce firms can prevent various OWASP listed automated attacks, including account takeover, scraping of product details and pricing information, DDoS, API abuse, and carding, among others.
A pioneer in the bot management industry, Radware Bot Manager leverages proprietary Intent-based Deep Behavior Analysis (IDBA) in combination with various other advanced machine learning modules and deterministic rules to identify and avert sophisticated automated attacks. IDBA is the industry’s first visitor intent analysis module and goes beyond mouse movements and keystrokes to analyze the intent of a visitor and block sophisticated bots masquerading as humans.
With the Magento plugin, you can deploy our bot management solution within minutes. Our bot detection engine uses proprietary Intent-based Deep Behavior Analysis (IDBA) to understand the intent of visitors and filter sophisticated invalid traffic. We collect over 250 parameters, including browsing patterns, mouse movements, keystrokes, and URL traversal data points from the end user’s browser and use proprietary algorithms to build a unique digital fingerprint for each visitor. Our collective bot intelligence gathers bot signatures from across our wide-spread global client base to build a database of bot fingerprints and proactively stop bots from infiltrating into your internet properties.
Account & Pricing
You need to create a Radware Bot Manager account to use this extension. This must be done separately. Please create your account on Radware Bot Manager signup page. There will be no additional charge for the service provided by Radware Bot Manager. For more details on the pricing or any other queries, please write to firstname.lastname@example.org.
Note: You might find references to "ShieldSquare" instead of "Radware Bot Manager" while signing up on the Radware Bot Manager or during the extension installation. ShieldSquare has recently been acquired by Radware® (NASDAQ: RDWR), a leading provider of cybersecurity and application delivery solutions. The acquisition happened in March 2019 and ShieldSquare is still undergoing the transition phase of re-branding to Radware Bot Manager.
Patented Intent-Based Deep Behavior Analysis
Many sophisticated attacks are either massively distributed or adequately ‘low and slow’ to operate under the permissible limits of rule-based security measures. We use proprietary Intent-based Deep Behavior Analysis (IDBA) to understand the intent of highly sophisticated non-human traffic.
IDBA performs behavioral analysis at a higher level of abstraction of ‘intent,’ unlike the commonly used shallow ‘interaction’-based behavior analysis. Capturing intent enables IDBA to provide significantly higher levels of accuracy while detecting bots with advanced human-like interaction capabilities. IDBA builds upon Radware Bot Manager’s research findings in semi-supervised machine learning and leverages the latest developments in deep learning.
Ability To Handle Bot Traffic In Multiple Ways
The aggregators and competitors continuously target your web properties to scrape price, content, and other business-critical information. We allow you to take custom actions based on bot signatures/ types. You can outsmart competitors using our ‘feed fake data’ method that enables you to feed false pricing and product information to the bots deployed by competitors.
Our system shows challenges such as CAPTCHAs to suspected non-human traffic. The responses to these challenges help us build a closed-loop feedback system to minimize false positives down to negligible values. Our bot mitigation solution allows publishers to show ads only to humans and block non-human invalid traffic before pages load.
Transparent Reporting & Comprehensive Analytics
Transparency in traffic reports helps you build trust with internal stakeholders and partners. A granular classification of different types of bots such as search engine crawlers and malicious bots allows you to manage non-human traffic efficiently. Clean analytics and transparent reports offer a clear understanding of web traffic and give you a detailed picture of bots’ intent on your internet properties.
We provide you with comprehensive analytics of non-human traffic, their source, and URL analytics. One of the key benefits of our bot detection engine is its modularity and transparency in reports — this is particularly useful for automated threats such as digital ad fraud. Our analytics dashboard demonstrates the distinctive user behavior on your site. Our bot mitigation solution can be seamlessly integrated with leading analytics platforms including Google Analytics and Adobe Analytics.
Accuracy & Scalability
Detecting advanced bots based on shallow interaction characteristics results in a high number of false positives. Our Intent-based Deep Behavior Analysis helps you filter highly sophisticated human-like bots without causing false positives. We also ensure that website functionality and user experience remain intact. We use cutting-edge technologies such as Kubernetes container orchestration and Kafka to maintain high scalability during peak hours.
Technical SpecificationsBack to top
Magento platform compatibility
Open Source (CE): 2.3
26 October, 2020
Extensions, Payments & Security, Fraud
Quality ReportBack to top
All tests were conducted on the latest versions of Magento that existed for the compatible release lines at the moment of the extension submission. Latest versions of all other software were used, as applicable.
Release NotesBack to top
- Compatible with Open Source (CE) : 2.3
- Stability: Stable Build
Compatible with Open Source (CE) : 2.3
Stability: Stable Build
Description: Protects your Web applications, Mobile Applications and APIs
SupportBack to top
The best place to start if you need help with a specific extension is to contact the developer. All Magento developers have both a contact email and a support email listed.Contact Vendor