We performed a comparison between Check Point IPS and Trellix Intrusion Prevention System based on real PeerSpot user reviews.
Find out in this report how the two Intrusion Detection and Prevention Software (IDPS) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."Check Point Intrusion Prevention System has great profiles, and we can continuously create, modify, activate, deactivate or configure any specific setting to allow the profile to focus on just one thing or for certain attacks."
"IPS easily allows follow-up flags on recently updated patterns. If, in rare cases, a false positive does occur, it is quickly detected and an exception can be easily created."
"Overall, it give me a lot of insight into my network that I didn't have before."
"I can easily monitor all of our connected devices and I get instant notification of reconnections and new connections, which removes some of the monitoring burden."
"It is also worth noting that many IPS signature comes with detailed background about the vulnerability, and potentially how the vulnerability would affect the network security."
"User-friendly and easy to implement."
"The integration is a valuable feature."
"Some of the features for views and visualization are already predefined as default files."
"The threat intelligence updates are very accurate."
"The most valuable features of the solution stem from the fact that it is a good product for dealing with DDoS attacks and for the inspection of network traffic."
"Overall the solution is very good. It offers great protection and gives us a good overview of what is on the network."
"The most valuable features in Trellix for me are the automated signature updates. It is a great and convenient feature."
"The initial setup is straightforward."
"It has a lot of functions, such as firewall. We are administrators, and we create some rules to protect our network. We also monitor the traffic in and out and have disk encryption on-premises. When we detect malware, we scan for the virus on the PC. We can then delete or block the malware."
"The most valuable features are the customization of the signature and the unlimited amount of signatures in IPS."
"The product is worth the investment."
"I am not aware of a preview channel or some repository to have a preview on upcoming signatures, however, this would be nice to have."
"After the R80 release, there are almost all feature sets available under IPS Configuration. However, further to this, adding a direct vulnerability scan based on ports and protocol for every zone (LAN, DMZ, or Outside) will make Check Point very different compared to other vendors on the market."
"It is generally good, but improving the performance would be the one thing I'd take a look at right now."
"We want the solution to continue to move towards cloud-based and portability focused for telecommuting users."
"I hear from my admin that the firmware upgrade process is quite cumbersome."
"Threat Prevention policies are not very easily manageable as there are several profiles/policies/etc. Therefore, there are several ways to add exceptions and check the configuration."
"Having additional reports available would be helpful."
"In my opinion, the Check Point software engineers should works on the performance of the blade - when it is activated with the big number of the protections in place, the monitoring shows us the significant increase in the CPU utilization for the gateway appliances - up to 30 percents, even so we are cherry-picking only the profiles that we really needed."
"The management console needs to be less complex and easier to navigate."
"The Network Security Managers could be more stable, agile, and work faster. When it comes to instability, there is room for improvement."
"We would like to have a simpler version. Some settings and functions on the McAfee console are complex and complicated. I want the management console to be simpler."
"The pricing could be improved."
"Some of the documentation is not as straightforward as it could be."
"The solution could improve some aspects of detection."
"There are limited resources for configuration guidance."
"The platform’s GUI could be the latest."
More Trellix Intrusion Prevention System Pricing and Cost Advice →
Check Point IPS is ranked 3rd in Intrusion Detection and Prevention Software (IDPS) with 46 reviews while Trellix Intrusion Prevention System is ranked 14th in Intrusion Detection and Prevention Software (IDPS) with 14 reviews. Check Point IPS is rated 8.6, while Trellix Intrusion Prevention System is rated 8.4. The top reviewer of Check Point IPS writes "Great for detection and access with the capabilities of defining specific rules". On the other hand, the top reviewer of Trellix Intrusion Prevention System writes "Protects from attacks in real-time and provides accurate threat intelligence updates". Check Point IPS is most compared with Darktrace, Palo Alto Networks URL Filtering with PAN-DB, Palo Alto Networks Advanced Threat Prevention, Trend Micro TippingPoint Threat Protection System and Trend Micro Deep Discovery, whereas Trellix Intrusion Prevention System is most compared with Trend Micro TippingPoint Threat Protection System, Palo Alto Networks Advanced Threat Prevention, Cisco NGIPS, Trend Micro Deep Discovery and Vectra AI. See our Check Point IPS vs. Trellix Intrusion Prevention System report.
See our list of best Intrusion Detection and Prevention Software (IDPS) vendors.
We monitor all Intrusion Detection and Prevention Software (IDPS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.