We performed a comparison between Check Point IPS and Trend Micro TippingPoint Threat Protection System based on real PeerSpot user reviews.
Find out in this report how the two Intrusion Detection and Prevention Software (IDPS) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."IPS logs enable complete visibility and reporting through the smart console."
"The integration is a valuable feature."
"There's an automatic update after every 2 hours which makes sure that the database is up to date and providing zero-day vulnerability protection."
"There's less admin burden to detect these threats as Check Point IPS will do it all for you and suggest the best preventive actions to protect the network."
"We are able to define our own rules for detection."
"The Check Point IPS feature I find the most valuable is the firewall. It is great and easy to work with."
"The product's initial setup is easy."
"Overall, it give me a lot of insight into my network that I didn't have before."
"I would rate TTPS's stability eight out of ten."
"A standout feature of TippingPoint is its strong integration with various solutions. It stands out as one of the leading network Intrusion Prevention Systems (IPS) in the current market and is known for its seamless integration with other solutions. For instance, when it identifies a potential threat within the traffic stream, it meticulously analyzes the data. Even in multilayer security scenarios, Tipping Point's network IPS can serve as a bypass for the basic firewall. If a threat is identified by Tipping Point, it promptly shares this information with the other systems. This ensures that they're updated and can employ the necessary solutions from their signature databases. The entire network gets safeguarded automatically. This integration extends to components like security and FX. This linkage streamlines our operations, offering a consolidated point of control for managing threats effectively."
"For intrusion detection and mitigation, it has helped us in sort of known signatures and all sorts of things. So, we're very happy with the engine. That's the work."
"The solution's IDS functionality filters the traffic and blocks malware by blocking the connections."
"What I found most valuable in Trend Micro TippingPoint Threat Protection System is its accuracy. It's the best IPS solution in the market."
"Trend Micro TippingPoint Threat Protection System is very stable. In addition, the provider gives notice of any changes well in advance, which is important for planning updates."
"The IPS signatures and the IPS database that are given are much better than what is commonly available."
"It integrates easily."
More Trend Micro TippingPoint Threat Protection System Pros →
"The hardware-based version of Check Point IPS could be more scalable. Right now, it's not scalable."
"Check Point IPS' main problem is it is mostly software based. The performance is dependent on the CPU power, and the limited number of patterns."
"The price has room for improvement."
"I would like the product to provide us with intelligence to understand what we really have in our environment."
"It is generally good, but improving the performance would be the one thing I'd take a look at right now."
"Sometimes Check Point documentation is not always updated, which is why when some implementations change, it generates confusion about details."
"We want the solution to continue to move towards cloud-based and portability focused for telecommuting users."
"I would like to have the possibility of adding features to this IPS solution in the future."
"The solution is pretty expensive."
"It integrates well but it takes time."
"There is room for improvement in customer service and support."
"The firewall rules are limited."
"Price is a significant factor that requires attention to enhance the popularity of Tipping Point among mid-sized data centres. Currently, Tipping Point is primarily adopted by sizable data centres, and smaller defenders might find it financially challenging to acquire. Recognizing this, efforts are underway to potentially introduce diverse models with varying capacities. This adjustment aims to ensure that a broader range of data sizes can benefit from the solution. Also, the continuous evolution of Tipping Point is evident in its features, particularly the personalized dashboard and related aspects."
"It takes a lot of time before you're connected to an engineer, so an area for improvement in Trend Micro TippingPoint Threat Protection System is the response time of its technical support team."
"TTPS is a bit behind in visuals, the UI, and some data elements."
"Trend Micro TippingPoint Threat Protection System needs strong Spanish-language support."
More Trend Micro TippingPoint Threat Protection System Cons →
More Trend Micro TippingPoint Threat Protection System Pricing and Cost Advice →
Check Point IPS is ranked 3rd in Intrusion Detection and Prevention Software (IDPS) with 46 reviews while Trend Micro TippingPoint Threat Protection System is ranked 8th in Intrusion Detection and Prevention Software (IDPS) with 19 reviews. Check Point IPS is rated 8.6, while Trend Micro TippingPoint Threat Protection System is rated 8.0. The top reviewer of Check Point IPS writes "Great for detection and access with the capabilities of defining specific rules". On the other hand, the top reviewer of Trend Micro TippingPoint Threat Protection System writes "Operates in-line in the network, blocking malicious and unwanted traffic". Check Point IPS is most compared with Darktrace, Palo Alto Networks URL Filtering with PAN-DB, Palo Alto Networks Advanced Threat Prevention, Cisco NGIPS and Fortinet FortiGate IPS, whereas Trend Micro TippingPoint Threat Protection System is most compared with Trend Micro Deep Discovery, Fortinet FortiGate IPS, Palo Alto Networks Advanced Threat Prevention, Cisco NGIPS and Trellix Intrusion Prevention System. See our Check Point IPS vs. Trend Micro TippingPoint Threat Protection System report.
See our list of best Intrusion Detection and Prevention Software (IDPS) vendors.
We monitor all Intrusion Detection and Prevention Software (IDPS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.