We performed a comparison between Cisco Secure Network Analytics and Trend Micro TippingPoint Threat Protection System based on real PeerSpot user reviews.
Find out what your peers are saying about Zabbix, Datadog, Auvik and others in Network Monitoring Software."We can manage the entire system across the network and troubleshoot the pain points."
"Using this solution has helped us to detect and identify viruses or malicious activity in the network early on."
"The most valuable features provided by this solution are visibility and information."
"Stealthwatch has greatly improved our network visibility, in terms of bandwidth, malware, and PCI violations."
"It's easy to set up. The deployment takes one or two days. You need to collect the data from a device and then direct it to the portal."
"The feature most valuable for us is to gain visibility of what is actually floating through, so we can stop it based on whether it's good or bad traffic."
"The search options on Cisco Stealthwatch are the most valuable. You can get very granular with it, down to the kilobits or the seconds if you want. The product supports any time frame that you need, so that is nice."
"Using the Cognitive Analytics feature, we have complete visibility that we didn’t have before."
"The most valuable features are encrypted threat analysis and the ability to run jobs on entire flows."
"I would rate TTPS's stability eight out of ten."
"Trend Micro TippingPoint Threat Protection System is very stable. In addition, the provider gives notice of any changes well in advance, which is important for planning updates."
"It integrates easily."
"The solution's IDS functionality filters the traffic and blocks malware by blocking the connections."
"The IPS signatures and the IPS database that are given are much better than what is commonly available."
"The monitoring is the most valuable feature."
"For intrusion detection and mitigation, it has helped us in sort of known signatures and all sorts of things. So, we're very happy with the engine. That's the work."
"You don't need any hardware because the solution is on the cloud. I like that Trend Micro TippingPoint Threat Protection System is easy to install and manage."
More Trend Micro TippingPoint Threat Protection System Pros →
"The Wi-Fi side needs improvement."
"There's a lot of traffic on our network that we don't see sometimes."
"I would like to see more and cleaner reporting. For example, if I pull up Steven and I want to look and maybe compare him to what you've done in the past week, and compare that to the past six months, the point would be to see what the difference in activity looks like over this time. I don't see that capability in reporting to date. You see that trend but you don't really see a straightforward comparison. That right there is key to what we want to see about the normal activity."
"Many of these tools require extensive on-premises hardware to run."
"I would like the search page available with Cisco Stealthwatch to be more intuitive. The previous release was better than the current one for the UI."
"Its granularity for RBAC roles-based access control needs improvement."
"The initial setup was straightforward but required a lot of data entry, to begin with building out the server types and network types."
"The customizability of the UI should improve."
"One thing I would like to see improved is if it could automatically be tied through ISE, instead of you having to manually get notifications and disable it yourself."
"I would like to see this solution more lightweight and easier to install."
"It takes a lot of time before you're connected to an engineer, so an area for improvement in Trend Micro TippingPoint Threat Protection System is the response time of its technical support team."
"Price is a significant factor that requires attention to enhance the popularity of Tipping Point among mid-sized data centres. Currently, Tipping Point is primarily adopted by sizable data centres, and smaller defenders might find it financially challenging to acquire. Recognizing this, efforts are underway to potentially introduce diverse models with varying capacities. This adjustment aims to ensure that a broader range of data sizes can benefit from the solution. Also, the continuous evolution of Tipping Point is evident in its features, particularly the personalized dashboard and related aspects."
"There is room for improvement in customer service and support."
"Trend Micro TippingPoint Threat Protection System needs strong Spanish-language support."
"The firewall rules are limited."
"An area for improvement in Trend Micro TippingPoint Threat Protection System is the complexity of its interface."
"TTPS is a bit behind in visuals, the UI, and some data elements."
More Trend Micro TippingPoint Threat Protection System Cons →
More Cisco Secure Network Analytics Pricing and Cost Advice →
More Trend Micro TippingPoint Threat Protection System Pricing and Cost Advice →
Cisco Secure Network Analytics is ranked 24th in Network Monitoring Software with 57 reviews while Trend Micro TippingPoint Threat Protection System is ranked 7th in Intrusion Detection and Prevention Software (IDPS) with 19 reviews. Cisco Secure Network Analytics is rated 8.2, while Trend Micro TippingPoint Threat Protection System is rated 8.0. The top reviewer of Cisco Secure Network Analytics writes "Increased the visibility of what is happening in our network". On the other hand, the top reviewer of Trend Micro TippingPoint Threat Protection System writes "Operates in-line in the network, blocking malicious and unwanted traffic". Cisco Secure Network Analytics is most compared with Darktrace, Cisco Secure Cloud Analytics, ThousandEyes, Vectra AI and Arista NDR, whereas Trend Micro TippingPoint Threat Protection System is most compared with Trend Micro Deep Discovery, Check Point IPS, Fortinet FortiGate IPS, Palo Alto Networks Advanced Threat Prevention and Lumu.
We monitor all Network Monitoring Software reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.