We performed a comparison between Trend Micro Deep Discovery and Trend Micro TippingPoint Threat Protection System based on real PeerSpot user reviews.
Find out in this report how the two Intrusion Detection and Prevention Software (IDPS) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The platform provides all essential features for discovery and administration."
"One of the most valuable features is the performance, since, so far, we have not faced any issues with Deep Discovery."
"Deep Discovery is scalable and compatible with other products. It's crucial to have that compatibility because it's an integral part of our security solution. It integrates smoothly. The interface is user-friendly, so administration is simple."
"There is no downtime or server vulnerability with this solution."
"The product's initial setup phase was not difficult."
"The most valuable features are the protection and that it is fast."
"Initial setup is easy. It can be done by yourself."
"Trend Micro Deep Discovery is a very specific product for threat intelligence with smart protection."
"You don't need any hardware because the solution is on the cloud. I like that Trend Micro TippingPoint Threat Protection System is easy to install and manage."
"Trend Micro TippingPoint Threat Protection System is very stable. In addition, the provider gives notice of any changes well in advance, which is important for planning updates."
"The technical support on offer is very good."
"The monitoring is the most valuable feature."
"For intrusion detection and mitigation, it has helped us in sort of known signatures and all sorts of things. So, we're very happy with the engine. That's the work."
"The most valuable feature is the central command center, where we can control and manage the solution."
"What I like about Trend Micro TippingPoint Threat Protection System is that it works okay. I don't have time to mess with the tool most of the time because I have way too many tasks to do, but Trend Micro TippingPoint Threat Protection System tells you when there's a problem, then it blocks the problem, so that's what I like most about it."
"I would rate TTPS's stability eight out of ten."
More Trend Micro TippingPoint Threat Protection System Pros →
"I would like to see integration with third-party tools to improve the visibility of the dashboards."
"The solution could be more secure."
"The product's security features need enhancement."
"I would like the ability to analyze all files in our internal network, at the same time on different operating systems. Not just three of them, but as many as possible."
"The solution needs improvement in terms of pricing."
"I would like to see them create a rule where It could integrate with the network and start mitigating with auto-detection."
"The product's scalability feature needs to be improved, as it is an area in the product with certain shortcomings."
"The solution needs to be able to integrate better with third-party infrastructure."
"It integrates well but it takes time."
"The solution should provide the possibility to mix traffic and the traffic's geographical source to have improved functionality."
"We need more integration. It would be good if Azure IPS and TippingPoint IPS and other products from Trend Micro like their DBI and IWSVA could talk between each other."
"The solution is pretty expensive."
"I would like to see this solution more lightweight and easier to install."
"Price is a significant factor that requires attention to enhance the popularity of Tipping Point among mid-sized data centres. Currently, Tipping Point is primarily adopted by sizable data centres, and smaller defenders might find it financially challenging to acquire. Recognizing this, efforts are underway to potentially introduce diverse models with varying capacities. This adjustment aims to ensure that a broader range of data sizes can benefit from the solution. Also, the continuous evolution of Tipping Point is evident in its features, particularly the personalized dashboard and related aspects."
"I find Trend Micro TippingPoint Threat Protection System a bit clunky, and updating it can be a pain in the neck because you need to do it from time to time, so this is what needs to be improved in it. I would also rather have an all-in-one system that does intrusion detection, protection, web filtering, and also serves as a firewall, and my company is moving to an all-in-one solution, but I'm unsure of how soon that's going to be. Trend Micro TippingPoint Threat Protection System also doesn't have enough bandwidth to handle the required traffic within my company, so it's going to be replaced."
"TTPS is a bit behind in visuals, the UI, and some data elements."
More Trend Micro TippingPoint Threat Protection System Cons →
More Trend Micro TippingPoint Threat Protection System Pricing and Cost Advice →
Trend Micro Deep Discovery is ranked 6th in Intrusion Detection and Prevention Software (IDPS) with 24 reviews while Trend Micro TippingPoint Threat Protection System is ranked 8th in Intrusion Detection and Prevention Software (IDPS) with 19 reviews. Trend Micro Deep Discovery is rated 8.2, while Trend Micro TippingPoint Threat Protection System is rated 8.0. The top reviewer of Trend Micro Deep Discovery writes "Good threat detection capabilities and offers flexibility for hosting options". On the other hand, the top reviewer of Trend Micro TippingPoint Threat Protection System writes "Operates in-line in the network, blocking malicious and unwanted traffic". Trend Micro Deep Discovery is most compared with Darktrace, Arista NDR, Vectra AI, Palo Alto Networks Advanced Threat Prevention and Fortra's Tripwire Enterprise, whereas Trend Micro TippingPoint Threat Protection System is most compared with Check Point IPS, Fortinet FortiGate IPS, Palo Alto Networks Advanced Threat Prevention, Cisco NGIPS and Trellix Intrusion Prevention System. See our Trend Micro Deep Discovery vs. Trend Micro TippingPoint Threat Protection System report.
See our list of best Intrusion Detection and Prevention Software (IDPS) vendors.
We monitor all Intrusion Detection and Prevention Software (IDPS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.