Its primarily functions as a network Intrusion Prevention System (IPS). However, it's noteworthy that the sales and proposition of this network IPS are generally confined to data centres, not typical office environments. In office settings, we tend to opt for DDIL (Deep Discovery Inspection Layer) due to its deep discovery capabilities. In the context of data centres, especially robust ones, an IPS becomes a crucial element. Traditional intrusion protection mechanisms present in firewalls are inadequate for handling the substantial traffic influx in data centres. Therefore, the implementation of a network IPS, like Tipping Point, becomes essential to address these challenges.
Learn what your peers think about Trend Micro TippingPoint Threat Protection System. Get advice and tips from experienced pros sharing their opinions. Updated: October 2024.
Information Systems, Manager - Network at a government with 1,001-5,000 employees
Real User
Top 5
2022-12-20T15:53:26Z
Dec 20, 2022
Trend Micro TippingPoint Threat Protection System is strictly an intrusion prevention system, so it has no other use cases versus a multipurpose solution such as Cisco Firepower.
When the client chooses a security setup we first need to explain to them why the dedicated IPS assist is correct for them and its advantages. We need to determine their traffic load. With all those calculations we show them we sometimes end up with over-commitment for the TOC. If we're talking about Trend Micro, you should know that they have a range of products, from IPS, anti-security solutions, and discovery solutions. We lay out all those products and if they feel that any of them meet their requirements then they incorporate that into their solution. After that, it normally goes through the tender process. We participate in the tender and if we win, we send the product to the customer. We generally work with larger companies or different government bodies. For the different public sector units, there is a security requirement where we go to the client to analyze their existing infrastructure, try to find out where the loopholes are, and when we find something we advise and present the solution. We then incorporate whatever product the client requires. Maybe it's a small setup or maybe it's a multi-department dedicated IPS setup. We deliver whatever IPS featured is required. The general use cases are for large data centers and state data centers, where people from different state departments post their applications with their servers in the data center cloud. I'm from Calcutta, India. Our company takes care of different government departments in the Eastern part of India, in West Bengal, in Bihar, in Orissa, in Jharkhand, different states there. In all these cases, the state data center or maybe some big government bodies like PUC's, public utility commissions, like ONGC have their own data centers. All their applications are hosted on this data center, or maybe there is a DR. Maybe the DR is on the cloud. Or maybe like the ONGC, they are on-premise. They need to process the graphs to identify whether there's an intrusion or not, and maybe some micro-sandboxing needs to be done. Right when the setup is changed, when these data centers get these devices and need to process a huge amount of data, huge incoming and outbound data, the firewall integrated into the IPS is not capable of handling that much load. Then you need to put in a dedicated IPS. That's where we introduce NGIPS from Trend Micro. That's the thing - it totally depends on the client's requirements, the site's needs, the data bandwidth, and how much processing is required. Trend Micro offers a complete solution. Trend Micro offers the NGIPS solution, as well as the Deep Discovery Inspector or Deep Discovery Analyzer, the DDI, and DDA. If you put a DDI in line, we can create a different operating system via a sandbox to process. Whatever packet we get, whatever file is getting processed, we capture according to that and we find anything that needs to be blacklisted or whitelisted. If it's blacklisted, that informs us from the DDA that it is getting first to the IPS and the IPS can take care of it. It's a complete security solution. We might need to introduce the INWB or IWSBA solutions from Trend Micro to analyze the base traffic as well as the main traffic. It's a combination - NGIPS is there to take care of any intrusion and APT is there to analyze the file and network traffic. I'm doing the network sandboxing. IWSBA takes care of that traffic. INSBA is there for taking care of the mail traffic. These four devices can communicate with each other and can instruct the IPS to do any ad-hoc blacklisting that is required.
Our partner is a solution integrator and this is one of the products that he implements for our customers. We are currently working on two pilot projects that involve this solution. Our experience is with on-premises deployments.
The filtering of the traffic on our link to the internet.
The solution can be deployed as a secondary protection against the firewall. It prevents the intrusion.
It's more about the SIDS (Snort Intrusion Detection System).
Its primarily functions as a network Intrusion Prevention System (IPS). However, it's noteworthy that the sales and proposition of this network IPS are generally confined to data centres, not typical office environments. In office settings, we tend to opt for DDIL (Deep Discovery Inspection Layer) due to its deep discovery capabilities. In the context of data centres, especially robust ones, an IPS becomes a crucial element. Traditional intrusion protection mechanisms present in firewalls are inadequate for handling the substantial traffic influx in data centres. Therefore, the implementation of a network IPS, like Tipping Point, becomes essential to address these challenges.
I primarily use TTPS to protect our organization at different levels.
I use Trend Micro TippingPoint Threat Protection System for cyberattacks, such as malware, DDos, and brute force attacks.
Trend Micro TippingPoint Threat Protection System is strictly an intrusion prevention system, so it has no other use cases versus a multipurpose solution such as Cisco Firepower.
Our primary use case for Trend Micro TippingPoint Threat Protection System is an IPS solution for the prevention of intrusions.
We use this solution to inspect the data packets before they can enter the firewall. Then, the packets can enter into our LAN infrastructure.
We primarily use the solution for email scanning.
When the client chooses a security setup we first need to explain to them why the dedicated IPS assist is correct for them and its advantages. We need to determine their traffic load. With all those calculations we show them we sometimes end up with over-commitment for the TOC. If we're talking about Trend Micro, you should know that they have a range of products, from IPS, anti-security solutions, and discovery solutions. We lay out all those products and if they feel that any of them meet their requirements then they incorporate that into their solution. After that, it normally goes through the tender process. We participate in the tender and if we win, we send the product to the customer. We generally work with larger companies or different government bodies. For the different public sector units, there is a security requirement where we go to the client to analyze their existing infrastructure, try to find out where the loopholes are, and when we find something we advise and present the solution. We then incorporate whatever product the client requires. Maybe it's a small setup or maybe it's a multi-department dedicated IPS setup. We deliver whatever IPS featured is required. The general use cases are for large data centers and state data centers, where people from different state departments post their applications with their servers in the data center cloud. I'm from Calcutta, India. Our company takes care of different government departments in the Eastern part of India, in West Bengal, in Bihar, in Orissa, in Jharkhand, different states there. In all these cases, the state data center or maybe some big government bodies like PUC's, public utility commissions, like ONGC have their own data centers. All their applications are hosted on this data center, or maybe there is a DR. Maybe the DR is on the cloud. Or maybe like the ONGC, they are on-premise. They need to process the graphs to identify whether there's an intrusion or not, and maybe some micro-sandboxing needs to be done. Right when the setup is changed, when these data centers get these devices and need to process a huge amount of data, huge incoming and outbound data, the firewall integrated into the IPS is not capable of handling that much load. Then you need to put in a dedicated IPS. That's where we introduce NGIPS from Trend Micro. That's the thing - it totally depends on the client's requirements, the site's needs, the data bandwidth, and how much processing is required. Trend Micro offers a complete solution. Trend Micro offers the NGIPS solution, as well as the Deep Discovery Inspector or Deep Discovery Analyzer, the DDI, and DDA. If you put a DDI in line, we can create a different operating system via a sandbox to process. Whatever packet we get, whatever file is getting processed, we capture according to that and we find anything that needs to be blacklisted or whitelisted. If it's blacklisted, that informs us from the DDA that it is getting first to the IPS and the IPS can take care of it. It's a complete security solution. We might need to introduce the INWB or IWSBA solutions from Trend Micro to analyze the base traffic as well as the main traffic. It's a combination - NGIPS is there to take care of any intrusion and APT is there to analyze the file and network traffic. I'm doing the network sandboxing. IWSBA takes care of that traffic. INSBA is there for taking care of the mail traffic. These four devices can communicate with each other and can instruct the IPS to do any ad-hoc blacklisting that is required.
Our partner is a solution integrator and this is one of the products that he implements for our customers. We are currently working on two pilot projects that involve this solution. Our experience is with on-premises deployments.