Anomali ThreatStream vs Trend Micro TippingPoint Threat Protection System comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Anomali ThreatStream and Trend Micro TippingPoint Threat Protection System based on real PeerSpot user reviews.

Find out what your peers are saying about Recorded Future, Check Point Software Technologies, Microsoft and others in Threat Intelligence Platforms.
To learn more, read our detailed Threat Intelligence Platforms Report (Updated: April 2024).
769,599 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"The feature I have found most valuable is credential monitoring. This feature is easy and quick."

More Anomali ThreatStream Pros →

"The most valuable feature is the central command center, where we can control and manage the solution.""For intrusion detection and mitigation, it has helped us in sort of known signatures and all sorts of things. So, we're very happy with the engine. That's the work.""The monitoring is the most valuable feature.""I would rate TTPS's stability eight out of ten.""The solution's IDS functionality filters the traffic and blocks malware by blocking the connections.""The technical support on offer is very good.""A standout feature of TippingPoint is its strong integration with various solutions. It stands out as one of the leading network Intrusion Prevention Systems (IPS) in the current market and is known for its seamless integration with other solutions. For instance, when it identifies a potential threat within the traffic stream, it meticulously analyzes the data. Even in multilayer security scenarios, Tipping Point's network IPS can serve as a bypass for the basic firewall. If a threat is identified by Tipping Point, it promptly shares this information with the other systems. This ensures that they're updated and can employ the necessary solutions from their signature databases. The entire network gets safeguarded automatically. This integration extends to components like security and FX. This linkage streamlines our operations, offering a consolidated point of control for managing threats effectively.""What I like about Trend Micro TippingPoint Threat Protection System is that it works okay. I don't have time to mess with the tool most of the time because I have way too many tasks to do, but Trend Micro TippingPoint Threat Protection System tells you when there's a problem, then it blocks the problem, so that's what I like most about it."

More Trend Micro TippingPoint Threat Protection System Pros →

Cons
"Less code in integration would be nice when building blocks."

More Anomali ThreatStream Cons →

"Trend Micro TippingPoint Threat Protection System needs strong Spanish-language support.""There is room for improvement in customer service and support.""The solution should provide the possibility to mix traffic and the traffic's geographical source to have improved functionality.""The solution is pretty expensive.""Price is a significant factor that requires attention to enhance the popularity of Tipping Point among mid-sized data centres. Currently, Tipping Point is primarily adopted by sizable data centres, and smaller defenders might find it financially challenging to acquire. Recognizing this, efforts are underway to potentially introduce diverse models with varying capacities. This adjustment aims to ensure that a broader range of data sizes can benefit from the solution. Also, the continuous evolution of Tipping Point is evident in its features, particularly the personalized dashboard and related aspects.""I find Trend Micro TippingPoint Threat Protection System a bit clunky, and updating it can be a pain in the neck because you need to do it from time to time, so this is what needs to be improved in it. I would also rather have an all-in-one system that does intrusion detection, protection, web filtering, and also serves as a firewall, and my company is moving to an all-in-one solution, but I'm unsure of how soon that's going to be. Trend Micro TippingPoint Threat Protection System also doesn't have enough bandwidth to handle the required traffic within my company, so it's going to be replaced.""It integrates well but it takes time.""It takes a lot of time before you're connected to an engineer, so an area for improvement in Trend Micro TippingPoint Threat Protection System is the response time of its technical support team."

More Trend Micro TippingPoint Threat Protection System Cons →

Pricing and Cost Advice
Information Not Available
  • "TippingPoint is not as expensive as Palo Alto but it's not as cheap as Fortigate."
  • "It's an expensive product."
  • "Trend Micro TippingPoint Threat Protection System is an expensive product."
  • "We pay for Trend Micro TippingPoint Threat Protection System yearly. The cost increases if you add more users."
  • "TTPS is reasonably priced."
  • "It is an expensive solution and I would rate it three out of ten."
  • "The price is in a market-suitable price range. So it's not expensive, but it's also not cheap either. The price is a strong point."
  • "On a scale from one to ten, where one is cheap and ten is expensive, I rate the solution's pricing a seven out of ten."
  • More Trend Micro TippingPoint Threat Protection System Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Threat Intelligence Platforms solutions are best for your needs.
    769,599 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The feature I have found most valuable is credential monitoring. This feature is easy and quick.
    Top Answer:I think that this solution should improve its integrations. This part of the solution could be bigger and moved into the no-code direction. Less code in integration would be nice when building blocks.
    Top Answer:Our primary use case for this solution is as a threat intelligence platform. We stream various threat feeds into this platform. We also make correlations between the feeds to duplicate the data… more »
    Top Answer:The solution's IDS functionality filters the traffic and blocks malware by blocking the connections.
    Top Answer:On a scale from one to ten, where one is cheap and ten is expensive, I rate the solution's pricing a seven out of ten.
    Top Answer:The way we can build the filters could be improved. The solution should provide the possibility to mix traffic parameters with traffic's geographical source to have improved functionality able to… more »
    Ranking
    Views
    1,246
    Comparisons
    968
    Reviews
    1
    Average Words per Review
    516
    Rating
    7.0
    Views
    247
    Comparisons
    140
    Reviews
    8
    Average Words per Review
    390
    Rating
    7.9
    Comparisons
    Also Known As
    ThreatStream OPTIC
    TippingPoint Digital Vaccine, TippingPoint DV, Trend Micro Digital Vaccine, Trend Micro DV, Trend Micro TippingPoint NGIPS
    Learn More
    Overview

    Anomali ThreatStream is a Threat Intelligence Management Platform that automates the collection and processing of raw data and transforms it into actionable threat intelligence for security teams.

    For the VP/Director of Security or Threat Intelligence who needs helps actioning threat data, Anomali ThreatStream helps automate the threat intelligence collection and management lifecycle to speed detection and streamline investigations to increase analyst productivity unlike other solutions unable to easily integrate into existing security infrastructure that cannot operationalize threat intelligence.

    Keep ahead of the latest threats and protect your critical data with ongoing threat prevention and analysis.

    Sample Customers
    BBCN Bank
    Yapi Kredi
    Top Industries
    VISITORS READING REVIEWS
    Financial Services Firm16%
    Computer Software Company13%
    Government12%
    Manufacturing Company9%
    REVIEWERS
    Financial Services Firm17%
    Comms Service Provider17%
    Government17%
    Healthcare Company8%
    VISITORS READING REVIEWS
    Computer Software Company14%
    Financial Services Firm10%
    Manufacturing Company9%
    Government8%
    Company Size
    VISITORS READING REVIEWS
    Small Business16%
    Midsize Enterprise15%
    Large Enterprise69%
    REVIEWERS
    Small Business50%
    Midsize Enterprise30%
    Large Enterprise20%
    VISITORS READING REVIEWS
    Small Business20%
    Midsize Enterprise17%
    Large Enterprise62%
    Buyer's Guide
    Threat Intelligence Platforms
    April 2024
    Find out what your peers are saying about Recorded Future, Check Point Software Technologies, Microsoft and others in Threat Intelligence Platforms. Updated: April 2024.
    769,599 professionals have used our research since 2012.

    Anomali ThreatStream is ranked 5th in Threat Intelligence Platforms with 1 review while Trend Micro TippingPoint Threat Protection System is ranked 8th in Threat Intelligence Platforms with 19 reviews. Anomali ThreatStream is rated 7.0, while Trend Micro TippingPoint Threat Protection System is rated 8.0. The top reviewer of Anomali ThreatStream writes "Easy and quick credential monitoring; tech support could be improved". On the other hand, the top reviewer of Trend Micro TippingPoint Threat Protection System writes "Operates in-line in the network, blocking malicious and unwanted traffic". Anomali ThreatStream is most compared with Recorded Future, ThreatConnect Threat Intelligence Platform (TIP), ThreatQ, Splunk Enterprise Security and Group-IB Threat Intelligence, whereas Trend Micro TippingPoint Threat Protection System is most compared with Trend Micro Deep Discovery, Check Point IPS, Fortinet FortiGate IPS, Palo Alto Networks Advanced Threat Prevention and Cisco NGIPS.

    See our list of best Threat Intelligence Platforms vendors.

    We monitor all Threat Intelligence Platforms reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.