We performed a comparison between ExtraHop Reveal(x) and Trend Micro TippingPoint Threat Protection System based on real PeerSpot user reviews.
Find out what your peers are saying about Darktrace, Vectra AI, Auvik and others in Network Traffic Analysis (NTA)."With ExtraHop Reveal(x), it gives me more visibility into the packets. It doesn't provide the entire packet capture, but it offers more information on how connections are made at the network layer. This can be helpful for detecting network attacks. Additionally, I really like the customizable dashboards and reports. The incident dashboard and alerts provide a good summary initially, and diving deeper into them gives more detailed information. It's also great for analyzing specific attacks and victim logs. The feature that tracks the full attack chain makes it easier to monitor the progress of attacks. Plus, it's connected to the Netria.com app, which I find useful for certain tasks."
"We had useful information within the hour of deployment. The ability to trace back for historical analysis, as well as the behavioral analysis done with the security information, puts the user in a position to make an informed decision to mitigate the performance or security incidents. Regarding the security incidents, Reveal (x) is able to create incident cards that guide your teams through the incidents and gives you the option to delve into the transaction detail to potentially view payloads as well."
"Setting up the solution is relatively easy."
"Reveal X integrates seamlessly with CrowdStrike. If you see something sketchy on the network, you can quarantine devices through ExtraHop and it'll push to the CrowdStrike server."
"It's a wire analytics tool. We use it for isolating and determining issues on our network or applications. It does a lot for crediting the network as opposed to discrediting the network. A lot of people come along and say that it's a network issue. It's always considered to be a network issue, but by using ExtraHop, we can quickly tell them that it's not a networking issue. It's something to do with your application or something at the other end. It could be a database issue. This tool gives us the ability to pinpoint with great accuracy the comings and goings on our network."
"ExtraHop Reveal(x) is one of the tools that works out of the box when it comes to threat hunting."
"When there are performance issues with an HTTP app, ExtraHop enables us to identify the causes within a few minutes. We can see what transactions are being impacted by something that may be happening within the server environment."
"The security features of this solution are the most valuable."
"Trend Micro TippingPoint Threat Protection System is very stable. In addition, the provider gives notice of any changes well in advance, which is important for planning updates."
"The IPS signatures and the IPS database that are given are much better than what is commonly available."
"I would rate TTPS's stability eight out of ten."
"The technical support on offer is very good."
"It integrates easily."
"The most valuable feature is the central command center, where we can control and manage the solution."
"For intrusion detection and mitigation, it has helped us in sort of known signatures and all sorts of things. So, we're very happy with the engine. That's the work."
"A standout feature of TippingPoint is its strong integration with various solutions. It stands out as one of the leading network Intrusion Prevention Systems (IPS) in the current market and is known for its seamless integration with other solutions. For instance, when it identifies a potential threat within the traffic stream, it meticulously analyzes the data. Even in multilayer security scenarios, Tipping Point's network IPS can serve as a bypass for the basic firewall. If a threat is identified by Tipping Point, it promptly shares this information with the other systems. This ensures that they're updated and can employ the necessary solutions from their signature databases. The entire network gets safeguarded automatically. This integration extends to components like security and FX. This linkage streamlines our operations, offering a consolidated point of control for managing threats effectively."
More Trend Micro TippingPoint Threat Protection System Pros →
"I would like to see more cloud capability."
"They used to have the ability to decode Citrix sign-on, setup, and tear down. Unfortunately, Citrix has stopped sharing that knowledge. Citrix has continued to change its model of processing, making it harder and harder to troubleshoot."
"Agent management could certainly use some focus. It should also be a little bit easier to work with collections. We should be able to nest collections within collections. There should be better nesting."
"The solution’s pricing could be improved."
"ExtraHop Reveal(x) could improve by allowing a longer look back in the feature. Right now you have a limit of 30 days to look back on your activity. I've used Darktrace before, and they allow you the ability to play back events. This would be a good feature to have in ExtraHop Reveal(x)."
"I think the tuning capabilities could be improved. We're working on minimizing false positives. Apart from that, everything seems fine to me."
"There is a little training online, but it'd be cool if ExtraHop provided certifications. CrowdStrike does elective training that gives you a certification as a Falcon administrator. It'd be nice to see ExtraHop have something like that"
"The solution should include more support protocols."
"We need more integration. It would be good if Azure IPS and TippingPoint IPS and other products from Trend Micro like their DBI and IWSVA could talk between each other."
"It takes a lot of time before you're connected to an engineer, so an area for improvement in Trend Micro TippingPoint Threat Protection System is the response time of its technical support team."
"I would like to see this solution more lightweight and easier to install."
"TTPS is a bit behind in visuals, the UI, and some data elements."
"The firewall rules are limited."
"Price is a significant factor that requires attention to enhance the popularity of Tipping Point among mid-sized data centres. Currently, Tipping Point is primarily adopted by sizable data centres, and smaller defenders might find it financially challenging to acquire. Recognizing this, efforts are underway to potentially introduce diverse models with varying capacities. This adjustment aims to ensure that a broader range of data sizes can benefit from the solution. Also, the continuous evolution of Tipping Point is evident in its features, particularly the personalized dashboard and related aspects."
"There is room for improvement in customer service and support."
"An area for improvement in Trend Micro TippingPoint Threat Protection System is the complexity of its interface."
More Trend Micro TippingPoint Threat Protection System Cons →
More Trend Micro TippingPoint Threat Protection System Pricing and Cost Advice →
ExtraHop Reveal(x) is ranked 5th in Network Traffic Analysis (NTA) with 12 reviews while Trend Micro TippingPoint Threat Protection System is ranked 8th in Intrusion Detection and Prevention Software (IDPS) with 19 reviews. ExtraHop Reveal(x) is rated 8.6, while Trend Micro TippingPoint Threat Protection System is rated 8.0. The top reviewer of ExtraHop Reveal(x) writes "It helps you visualize how data moves across your network". On the other hand, the top reviewer of Trend Micro TippingPoint Threat Protection System writes "Operates in-line in the network, blocking malicious and unwanted traffic". ExtraHop Reveal(x) is most compared with Darktrace, Vectra AI, Corelight, Cisco Secure Network Analytics and Arista NDR, whereas Trend Micro TippingPoint Threat Protection System is most compared with Trend Micro Deep Discovery, Check Point IPS, Fortinet FortiGate IPS, Palo Alto Networks Advanced Threat Prevention and Cisco NGIPS.
We monitor all Network Traffic Analysis (NTA) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.