

Trend Micro Deep Discovery and Check Point IPS are competing products in the realm of network security. Check Point IPS shows an edge with its robust feature set, positioning it as a worthwhile investment despite higher setup costs, while Trend Micro Deep Discovery offers more favorable pricing and support.
Features: Trend Micro Deep Discovery is notable for advanced threat detection, sandboxing capabilities, and complete end-to-end visibility of threats. Check Point IPS provides comprehensive threat prevention, adaptable policy enforcement, and a vast database of intrusion prevention signatures.
Room for Improvement: Trend Micro Deep Discovery could improve integration flexibility, reporting capabilities, and support for third-party features. Check Point IPS may enhance its user interface, reduce false positives, and streamline licensing options.
Ease of Deployment and Customer Service: Trend Micro Deep Discovery offers a straightforward deployment and responsive customer support. Check Point IPS provides smooth deployment with premium customer service, especially beneficial for complex network environments.
Pricing and ROI: Trend Micro Deep Discovery is competitively priced, offering good ROI for budget-conscious enterprises. Check Point IPS, although more expensive initially, promises substantial long-term ROI due to its advanced threat coverage and robust features.
We have seen a return on investment with Check Point IPS because we have not seen any security events, malicious activities, or any device compromised, so we are secure now, and money has been saved.
I have seen a return on investment more in the risk saved since it catches a lot of stuff security-wise that is good to catch.
I have seen a return on investment since using Check Point IPS, as evidenced by fewer incidents.
Our technical teams have personal relationships with our account executives and direct support people.
Customer support for Check Point IPS is satisfactory.
The customer support for Check Point IPS is very good.
If I were to rate them from 0 to 10, I would give them a nine or a ten.
We have moved to a hyper-scale master environment, allowing us to scale by adding additional gateways to the clusters.
The scalability of Check Point IPS is on point.
The scalability of Check Point IPS is great because when I deploy gateways in the cloud, I create a cluster, which offers a very scalable option.
If the appliance supports scalability, Trend Micro support will inform us, and we can implement it without replacing the hardware.
Check Point IPS provides a very stable and reliable environment.
Check Point IPS is very stable.
The product updates and security updates are kept current, allowing us seamless integration with Trend Micro and getting daily updates and signatures without problems.
Automated attack path correlation in SmartEvent to improve situational awareness.
At least 60% of all the alarms generated by the IPS are false positives or something that's not important to look at, and this generates a significant workload for my team.
Visual analytics and automated attack path correlation in SmartEvent to enhance situational awareness and attack identification.
We have multiple components such as Deep Discovery Email Inspector for mail gateways, Deep Discovery Analyzer for sandboxing, and Deep Discovery Inspector, which serves as an IDS detecting malicious network traffic.
The solution is not scalable as it is an agent product rather than a product designed for scalability.
Comparisons with Fortinet show that Check Point IPS is relatively more expensive, but we found it cheaper to retain it rather than switch.
My experience with pricing, setup cost, and licensing for Check Point IPS is good; it's baked into the firewall licensing, so that's very good.
My experience with pricing, setup cost, and licensing for Check Point IPS has been satisfactory.
I do not consider it an expensive tool; its price is justified based on the capabilities that we receive when compared to another mail gateway or other vendors.
The solution is very expensive.
The integration with Check Point ThreatCloud ensures the IPS engine is updated with the latest attack signatures.
The solution employs behavioral heuristic analysis to block zero-day attacks using AI-powered engines.
Whenever any zero-day attack is detected, it downloads that signature into the firewall and prevents that threat.
The most valuable capabilities of Trend Micro Deep Discovery Email Inspector include its ability to perform mail detection and mail filtration against various email attacks such as phishing and spam, serving as an email gateway for both inbound and outbound traffic.
This solution allows us to see anomalies, network traffic in our network, and zero-day threats.
| Product | Market Share (%) |
|---|---|
| Check Point IPS | 3.8% |
| Trend Micro Deep Discovery | 3.8% |
| Other | 92.4% |


| Company Size | Count |
|---|---|
| Small Business | 41 |
| Midsize Enterprise | 21 |
| Large Enterprise | 23 |
| Company Size | Count |
|---|---|
| Small Business | 15 |
| Midsize Enterprise | 6 |
| Large Enterprise | 9 |
Check Point IPS is an intrusion prevention system that aims to detect and prevent attempts to exploit weaknesses in vulnerable systems or applications. The solution provides complete, integrated, next-generation firewall intrusion prevention capabilities at multi-gigabit speeds with a low false positive rate and high security. It helps organizations secure their enterprise network, and protect servers and critical data against known and unknown automated malware, blended threats, and other threats.
Check Point IPS Features
Check Point IPS has many valuable key features. Some of the most useful ones include:
Check Point IPS Benefits
There are many benefits to implementing Check Point IPS. Some of the biggest advantages the solution offers include:
Reviews from Real Users
Check Point IPS is a solution that stands out when compared to many of its competitors. Some of its major advantages are that it has granularity capabilities for rule creation, quick updates of signatures, and a helpful mechanism that allows users to turn IPS signatures to a different mode automatically.
A System and Network Administrator at Auriga mentions, “The Check Point IPS module allows me granularity in creating rules. I can specify which definition to apply and to which scope or network.” The reviewer also adds, “I can create multiple profiles, which is helpful.”
“The quick updates of the signatures when a new threat is identified are great. For instance, when Microsoft releases patches, we usually see new signatures for those issues that have to be patched in a day. This gives us time to test/deploy the patches while already being protected from the threats. Also, it's very good with reporting. I can generate reports for management automatically based on the threats of the last day/week/whatever is needed,” says a Systems en networks engineer at CB.
Another PeerSpot user, a Network Engineer at VSP Vision Care, writes, “The mechanism where you can let the system automatically turn the IPS signature to a different mode (prevent / monitor / inactive) is a nice feature that allows us to easily adjust the balance between security protection and the risk of business impact.”
Trend Micro Deep Discovery provides an intuitive interface and extensive threat visibility. It enhances detection with sandboxing and custom virtual machine images. Integration with Trend Micro Office Scan and Vision One ensures robust defense and detailed threat analysis.
Trend Micro Deep Discovery is a comprehensive network security tool used for intrusion detection, malware analysis, and zero-day vulnerability sandboxing. It supports various platforms and can be integrated with email and server protection. It's particularly useful for compliance with regulatory requirements through signature-based behavior analysis and virtual patching. Users benefit from easy installation, management, and responsive technical support.
What are the key features of Trend Micro Deep Discovery?Trend Micro Deep Discovery is implemented across sectors requiring stringent security measures, such as finance, healthcare, and government. It's favored for its ability to analyze diverse network traffic and provide exceptional protection against sophisticated threats while ensuring compliance with strict data regulations. Industry reviews highlight its role in safeguarding sensitive information through robust security frameworks and adaptable deployment options.
We monitor all Intrusion Detection and Prevention Software (IDPS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.