- Quick and professional service
- Customer filter creation/deployment
- Easy-in-use
- Quick and simple installation without specific knowledge
- Less administrative load, as after tuning only 30-40 minutes needed per day to manage it
- Sorting/Blocking/Searching can be done in one or two moves
The Chief of IT security department at a financial services firm with 501-1,000 employees
Sorting/Blocking/Searching can be done in one or two moves, although it should provide dashboard on-line alerting about current attacks and their sources.
What is most valuable?
How has it helped my organization?
- Compliance (local regulations, legislation)
- Specific filters for specific needs
- Traffic prioritization for business, video/audio streams and gamers have limitations
What needs improvement?
- Advanced DDoS protection (not only SYN flood)
- Custom reporting
- Dashboard on-line alerting about current attacks and their sources
How are customer service and support?
It has the best support, quick and professional.
Buyer's Guide
Trend Micro TippingPoint Threat Protection System
October 2024
Learn what your peers think about Trend Micro TippingPoint Threat Protection System. Get advice and tips from experienced pros sharing their opinions. Updated: October 2024.
814,649 professionals have used our research since 2012.
What other advice do I have?
- To be sure on the user-friendliness of the interface, please compare its options/features with competitors
- Check the frequency of updates (regular, urgency) with other competitors.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
The Chief of IT security department at a financial services firm with 501-1,000 employees
If you want a stable and easy to use product - it's for you but DDoS/Dos protection has room for improvement
What is most valuable?
1. Easy to use/deploy
How has it helped my organization?
1. Reputation Database - significantly reduce the load on Servers
What needs improvement?
1. DDoS/Dos protection
For how long have I used the solution?
Overall 8 Years. But the best solutions is HP TippingPoint IPS - which our organization has been using since 2009 (5 year)
What was my experience with deployment of the solution?
No, it's very easy to deploy. The manual is clear and support guys are very quick and skilled.
What do I think about the stability of the solution?
No, didn't have any.
What do I think about the scalability of the solution?
No, didn't have any.
How are customer service and technical support?
Customer Service: ExcellentTechnical Support: Excellent
Which solution did I use previously and why did I switch?
Yes we did. ISS X-Force (later IBM).
How was the initial setup?
No issues. Absolutely easy and understandable.
What about the implementation team?
In-House.
What's my experience with pricing, setup cost, and licensing?
When well tuned, there is no more administrative overload when managing the system. Just OS and filter updates and new filter review.
Which other solutions did I evaluate?
Yes, from SourceFire (or Snort team).
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Trend Micro TippingPoint Threat Protection System
October 2024
Learn what your peers think about Trend Micro TippingPoint Threat Protection System. Get advice and tips from experienced pros sharing their opinions. Updated: October 2024.
814,649 professionals have used our research since 2012.
I.T Security Consultant with 51-200 employees
Setup is straightforward, if the right planning is done everything can go smoothly
What is most valuable?
Great user interface and stable
How has it helped my organization?
Very clear on the findings, great detection features
What needs improvement?
Documentation
For how long have I used the solution?
5 years
What was my experience with deployment of the solution?
No issues
What do I think about the stability of the solution?
No issues
What do I think about the scalability of the solution?
No issues
How are customer service and technical support?
Customer Service: AverageTechnical Support: Average
Which solution did I use previously and why did I switch?
Yes, we use multiple competitive solutions
How was the initial setup?
Straightforward, if the right planning is done everything can go smoothly
What about the implementation team?
In house
Which other solutions did I evaluate?
Yes, McAfee and Sourcefire
What other advice do I have?
Spec your solution correctly, insure your 5 year network growth plan.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Download our free Trend Micro TippingPoint Threat Protection System Report and get advice and tips from experienced pros
sharing their opinions.
Updated: October 2024
Product Categories
Intrusion Detection and Prevention Software (IDPS) Cloud and Data Center Security Threat Intelligence PlatformsPopular Comparisons
Cloudflare SASE & SSE Platform
Cisco Secure Network Analytics
Palo Alto Networks Advanced Threat Prevention
Splunk User Behavior Analytics
ExtraHop Reveal(x)
Trend Micro Deep Discovery
Forcepoint Next Generation Firewall
ThreatConnect Threat Intelligence Platform (TIP)
Fortinet FortiGate IPS
Buyer's Guide
Download our free Trend Micro TippingPoint Threat Protection System Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- When evaluating Intrusion Detection, what aspect do you think is the most important to look for?
- What is your recommended cost-effective solution to detect and prevent APT attacks?
- What product do you recommend for a Campus IPS appliance implementation?
- How do you use the MITRE ATT&CK framework for improving enterprise security?
- What are the pros and cons of Darktrace vs CrowdStrike Falcon vs alternative EPP solutions?
- Which alternative solutions (other than Darktrace) do you recommend for an SMB?
- Which is the best intrusion detection and prevention solution?
- What is the best IDPS security tool and why?
- What is Cognitive Cybersecurity and what is it used for?