• Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io
No Result
View All Result
Converge Digest
Saturday, April 11, 2026
  • Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io
No Result
View All Result
Converge Digest
No Result
View All Result

Home » F5 to acquire Shape Security for $1 billion

F5 to acquire Shape Security for $1 billion

December 19, 2019
in All
A A

F5 agreed to acquire Shape, a privately-held company supplying fraud and abuse prevention solutions, for approximately $1 billion in cash, subject to certain adjustments.

Shape provides protection from automated attacks, botnets, and targeted fraud. In particular, Shape defends against credential stuffing attacks, where cybercriminals use stolen passwords from third-party data breaches to take over other online accounts. Shape’s application protection platform evaluates the data flow from the user into the application and leverages highly sophisticated cloud-based analytics to discern good traffic from bad. With F5’s location in the data flow of traffic in over 80% of Fortune 500 application infrastructures, F5 provides the ideal insertion point for Shape’s security services. Together F5 and Shape will dramatically reduce the time and resources needed for organizations to deploy world-class online fraud and abuse protection.

F5 said the acquisition brings together its own expertise in protecting applications across multi-cloud environments with Shape’s fraud and abuse prevention capabilities to transform application security.

“We know from the companies we work with that applications are critical to running their business. To drive maximum business value and the best experiences for their customers, these apps need to perform flawlessly while protecting data security and user privacy. When a website or application experience is degraded by web fraud and abuse, the result is lost revenue, lost brand equity, and customers jumping ship to the competition,” said F5 President and CEO, François Locoh-Donou.

“With Shape, we will deliver end-to-end application protection, which means revenue generating, brand-anchoring applications are protected from the point at which they are created through to the point where consumers interact with them—from code to customer,” continued Locoh-Donou.

“Since Shape’s inception, we observed a consistent pattern in customer after customer: the use of F5 technology to deliver and enable their applications,” said Derek Smith, co-founder and CEO of Shape. “Now, we look forward to the opportunity to deeply integrate into F5’s platform for application delivery and security—F5 provides the optimum traffic flow insertion point for Shape’s industry-leading online fraud and abuse prevention solutions.”

https://investors.f5.com/

https://www.shapesecurity.com/

Tags: Blueprint columnsCyber SecurityF5
ShareTweetShare
Previous Post

Axiado raises $10 million for secure firewall

Next Post

Ericsson’s Connected Vehicle Cloud to run on Microsoft Azure

Staff

Staff

Related Posts

Oracle Builds Zettascale Clusters with 131,072 NVIDIA Blackwell GPUs
Security

F5 to Acquire CalypsoAI for $180M, Expands Into AI Security Guardrails

September 11, 2025
F5 posts revenue of $703 million, up 4%
Financials

F5 posts revenue of $703 million, up 4%

July 24, 2023
F5’s quarterly revenue of 11% yoy, cites macro economics for 9% job cuts
Financials

F5’s quarterly revenue of 11% yoy, cites macro economics for 9% job cuts

April 19, 2023
Blueprint: Brazil looks to municipal Wi-Fi 6E
Blueprints

Blueprint: Brazil looks to municipal Wi-Fi 6E

February 21, 2023
Blueprint: Building wholesale networks with OTN
All

Blueprint: Building wholesale networks with OTN

December 20, 2022
Oracle opens cloud region in Chicago
All

Oracle opens cloud region in Chicago

December 20, 2022
Next Post
Ericsson’s Connected Vehicle Cloud to run on Microsoft Azure

Ericsson's Connected Vehicle Cloud to run on Microsoft Azure

Please login to join discussion

Categories

  • 5G / 6G / Wi-Fi
  • AI Infrastructure
  • All
  • Automotive Networking
  • Blueprints
  • Clouds and Carriers
  • Data Centers
  • Enterprise
  • Explainer
  • Feature
  • Financials
  • Last Mile / Middle Mile
  • Legal / Regulatory
  • Optical
  • Quantum
  • Research
  • Security
  • Semiconductors
  • Space
  • Start-ups
  • Subsea
  • Sustainability
  • Video
  • Webinars

Archives

Tags

5G All AT&T Australia AWS Blueprint columns BroadbandWireless Broadcom China Ciena Cisco Data Centers Dell'Oro Ericsson FCC Financial Financials Huawei Infinera Intel Japan Juniper Last Mile Last Mille LTE Mergers and Acquisitions Mobile NFV Nokia Optical Packet Systems PacketVoice People Regulatory Satellite SDN Service Providers Silicon Silicon Valley StandardsWatch Storage TTP UK Verizon Wi-Fi
Converge Digest

A private dossier for networking and telecoms

Follow Us

  • Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io

© 2025 Converge Digest - A private dossier for networking and telecoms.

No Result
View All Result
  • Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io

© 2025 Converge Digest - A private dossier for networking and telecoms.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.
Go to mobile version