We performed a comparison between Splunk User Behavior Analytics and Trend Micro TippingPoint Threat Protection System based on real PeerSpot user reviews.
Find out in this report how the two Intrusion Detection and Prevention Software (IDPS) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."Because of some of the visualizations that we utilize, we are able to understand strange, unusual traffic on our networks."
"The solution is fast, flexible, and easy to use."
"The most valuable features are the indexing and powerful search features."
"This intelligent user behavior analytics package is easy to configure and use while remaining feature filled."
"The most valuable feature is being able to take data and put it into other systems so that we could see the output, and to see where we need to apply our focus."
"The solution appears to be stable, although we haven't used it heavily."
"It's easily scalable."
"The most valuable features are its data aggregation and the ability to automatically identify a number of threats, then suggest recommended actions upon them."
"Trend Micro TippingPoint Threat Protection System is very stable. In addition, the provider gives notice of any changes well in advance, which is important for planning updates."
"You don't need any hardware because the solution is on the cloud. I like that Trend Micro TippingPoint Threat Protection System is easy to install and manage."
"The IPS signatures and the IPS database that are given are much better than what is commonly available."
"The most valuable feature is the central command center, where we can control and manage the solution."
"What I like about Trend Micro TippingPoint Threat Protection System is that it works okay. I don't have time to mess with the tool most of the time because I have way too many tasks to do, but Trend Micro TippingPoint Threat Protection System tells you when there's a problem, then it blocks the problem, so that's what I like most about it."
"The solution's IDS functionality filters the traffic and blocks malware by blocking the connections."
"The monitoring is the most valuable feature."
"What I found most valuable in Trend Micro TippingPoint Threat Protection System is its accuracy. It's the best IPS solution in the market."
More Trend Micro TippingPoint Threat Protection System Pros →
"The solution is much more expensive than relative competitors like ArcSight or LogRhythm. It makes it hard to sell to customers sometimes."
"Currently, a lot of network operations need improvement. We still need people to handle incidents. Our vision is to leverage status and convert it directly from the network devices. It would be ideal if we could take action using APIs and API code and remove manual processes."
"In the future I would like to see simplified statistics and analytical threats."
"If the price was lowered and the setup process was less complex, I would consider rating it higher."
"The correlation engine should have persistent and definable rules."
"I'm not aware of any lacking features."
"I would like improved downward integration with other tools such as McAfee and other GCP solutions."
"We'd like the ability to do custom searches."
"Trend Micro TippingPoint Threat Protection System needs strong Spanish-language support."
"We need more integration. It would be good if Azure IPS and TippingPoint IPS and other products from Trend Micro like their DBI and IWSVA could talk between each other."
"The solution is pretty expensive."
"It takes a lot of time before you're connected to an engineer, so an area for improvement in Trend Micro TippingPoint Threat Protection System is the response time of its technical support team."
"The firewall rules are limited."
"An area for improvement in Trend Micro TippingPoint Threat Protection System is the complexity of its interface."
"It integrates well but it takes time."
"Price is a significant factor that requires attention to enhance the popularity of Tipping Point among mid-sized data centres. Currently, Tipping Point is primarily adopted by sizable data centres, and smaller defenders might find it financially challenging to acquire. Recognizing this, efforts are underway to potentially introduce diverse models with varying capacities. This adjustment aims to ensure that a broader range of data sizes can benefit from the solution. Also, the continuous evolution of Tipping Point is evident in its features, particularly the personalized dashboard and related aspects."
More Trend Micro TippingPoint Threat Protection System Cons →
More Splunk User Behavior Analytics Pricing and Cost Advice →
More Trend Micro TippingPoint Threat Protection System Pricing and Cost Advice →
Splunk User Behavior Analytics is ranked 12th in Intrusion Detection and Prevention Software (IDPS) with 17 reviews while Trend Micro TippingPoint Threat Protection System is ranked 7th in Intrusion Detection and Prevention Software (IDPS) with 19 reviews. Splunk User Behavior Analytics is rated 8.2, while Trend Micro TippingPoint Threat Protection System is rated 8.0. The top reviewer of Splunk User Behavior Analytics writes "Easy to configure and easy to use solution that integrates with many applications and scripts ". On the other hand, the top reviewer of Trend Micro TippingPoint Threat Protection System writes "Operates in-line in the network, blocking malicious and unwanted traffic". Splunk User Behavior Analytics is most compared with Darktrace, Microsoft Defender for Identity, IBM Security QRadar, Varonis Datalert and Cynet, whereas Trend Micro TippingPoint Threat Protection System is most compared with Trend Micro Deep Discovery, Check Point IPS, Fortinet FortiGate IPS, Palo Alto Networks Advanced Threat Prevention and Cisco NGIPS. See our Splunk User Behavior Analytics vs. Trend Micro TippingPoint Threat Protection System report.
See our list of best Intrusion Detection and Prevention Software (IDPS) vendors.
We monitor all Intrusion Detection and Prevention Software (IDPS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.