Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & Training

Safeguarding the user experience starts with tackling bots

By Benjamin Fabre
bots-freepik1170x658 (1).jpg

Image via Freepik

March 4, 2022

Although there used to be a good mix of people shopping both in-store and online, the pandemic accelerated the rate at which shoppers flocked to online retailers. Because of this shift, customer experience (CX) is more important than ever for keeping customers happy, including mobile applications and APIs. Without an easy-to-use website or mobile app, users won’t stick with your business when other options are available. And the key to a good user experience is mitigating bot traffic.


DataDome recently commissioned a survey with Forrester, which showed that while 84% of businesses prioritize customer and app experience, bots persist. A powerful, flexible bot management solution and complete endpoint protection are necessary to protect the user experience (UX) and maximize business outcomes.


Types of Online Fraud

Bots perpetuate several types of online fraud, including inventory fraud, card fraud, and account fraud. Businesses often face inventory fraud when dealing with high-value item releases, like gaming consoles or limited shoe releases. Bots hoard these items because they can grab them faster than actual humans, and then the people behind the bots sell the items for higher retail prices. This frustrates actual users because they can’t get the items, they want without going through a third party.


Bots use credit card skimmers on payment pages to gather stolen card numbers and use them for fraudulent purchases. If these purchases make it past the business’s anti-fraud protocols, they risk chargebacks and customer ire. With chargebacks, not only do businesses lose the money paid for their product, but they can’t even recuperate the product. And, once an user has their information stolen, they’re unlikely to trust that business again, likely warning their friends and family away as well.


Account fraud, also sometimes called account takeover (ATO), is similar to credit card fraud, but bots add malicious keylogging code to the login page to gather user credentials instead of payment details. Then, they can use that login information to gain personally identifiable information (PII) about the business’s users or make fraudulent purchases. A login from a new location or device type is often a good indicator of account fraud.


Internal and External Effects of Bot Traffic

Malicious bot traffic causes problems for organizations both internally and externally. For one, most IT departments are already overburdened; responding to automated threats only adds to their plates. This may lead to burnout in IT employees, causing them to seek new roles or become less effective. Bot attacks can also increase a company’s operating costs. Replacing burnt-out IT professionals is expensive and difficult, and 45% of respondents in the commissioned Forrester survey listed the cost of hours spent mitigating bot attacks as the top impact of these threats.


Externally, bot attacks can cause users to lose trust in the business. The users no longer feel that their data is safe, and they’ll likely look to have their needs met elsewhere. Bot attacks may also cause user frustration thanks to a poor user experience. They slow the website down, cause glitches, and prevent real customers from getting the items they want. Between lower user satisfaction and the loss of trust, bot attacks can cost online businesses a major chunk of revenue.


Obstacles to Effective Bot Mitigation

Some 24% of businesses surveyed said their IT department is unable to keep up with the number of attacks, likely because many IT teams are understaffed. As companies employ more technology, they need more IT professionals to run it. However, there aren’t currently enough trained IT professionals to fill all of the open roles, leading to understaffed departments and overwhelmed teams.


Consequently, organizations rely on bot mitigation solutions to alert them to attacks and automate remediation. Unfortunately, many of these solutions don’t provide real-time information about attacks, or they produce false positives, leading to alert fatigue. As such, a majority (76%) of businesses say identifying false positives in real-time is a priority for the coming year. Otherwise, security administrators can’t respond fast enough to actual attacks because they have to investigate every alert.


Many bot mitigation solutions also suffer from a lack of integrations and flexibility, making it difficult for organizations to use them effectively. If vendors have to constantly update their tools to account for new attacks, they aren’t allowing their clients to actually use the platform to protect their business. Instead, bot management software should include features that address a variety of attack types, including distributed denial of service (DDoS), information skimming and inventory hoarding.


How Bot Management Improves User Experience

A flexible bot management solution is critical for improving the user experience. By blocking bots, both your site and mobile app can load faster, and you’ll suffer less downtime due to bot attacks. And performance isn’t the only benefit you’ll see.

Users are more likely to score high-value items when they aren’t hoarded by bots, leading to higher satisfaction ratings and products going into the hands of actual fans instead of resellers. According to the survey, 7 out of 10 bot attacks target high-profile events, making it even more essential for businesses to protect themselves against card, account, and inventory fraud. When fraud isn’t an option on your site, users can trust you to keep their data safe.


Connecting the Dots Between Bad Bots & Online Fraud

Bot attacks have lasting and far-reaching impacts on businesses both internally and externally. User experiences are directly related to growth, higher cross-sell and upsell opportunities, and increased customer retention. Bots put the user experience at risk. To fully protect your organization, you need a complete bot management solution that includes coverage for mobile apps and APIs, not just your website. Look for responsiveness, expertise and flexibility in bot management vendors to block bots and reduce online fraud in your system.

KEYWORDS: bots cyber security fraud online crime risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Benjamin Fabre is co-founder and Chief Technology Officer at DataDome

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • employees trained in cybersecurity

    User cybersecurity awareness starts with training

    See More
  • identity management freepik

    The evolving role of user experience in security

    See More
  • User experience at top of mind for security professionals

    New survey shows security versus the user experience remain at top of mind for enterprises

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Risk Analysis and the Security Survey, 4th Edition

  • The Complete Guide to Physical Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing