Trend Micro TippingPoint Threat Protection System Primary Use Case

Subhendu Dhar - PeerSpot reviewer
Director at Diamond Infotech Pvt ltd

Its primarily functions as a network Intrusion Prevention System (IPS). However, it's noteworthy that the sales and proposition of this network IPS are generally confined to data centres, not typical office environments. In office settings, we tend to opt for DDIL (Deep Discovery Inspection Layer) due to its deep discovery capabilities.

In the context of data centres, especially robust ones, an IPS becomes a crucial element. Traditional intrusion protection mechanisms present in firewalls are inadequate for handling the substantial traffic influx in data centres. Therefore, the implementation of a network IPS, like Tipping Point, becomes essential to address these challenges.

View full review »
HS
Senior Network Engineer at a comms service provider with 10,001+ employees

We primarily use the solution for email scanning.

View full review »
Paolo Boscolo - PeerSpot reviewer
IT director at Comune di Prato

The filtering of the traffic on our link to the internet.

View full review »
Buyer's Guide
Trend Micro TippingPoint Threat Protection System
March 2024
Learn what your peers think about Trend Micro TippingPoint Threat Protection System. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
768,578 professionals have used our research since 2012.
Art Astafiev - PeerSpot reviewer
Information Systems, Manager - Network at a government with 1,001-5,000 employees

Trend Micro TippingPoint Threat Protection System is strictly an intrusion prevention system, so it has no other use cases versus a multipurpose solution such as Cisco Firepower.

View full review »
Bharat Shrestha - PeerSpot reviewer
Systems Architect at a construction company with 501-1,000 employees

It's more about the SIDS (Snort Intrusion Detection System).

View full review »
Haider Ali - PeerSpot reviewer
Database Developer at Core ISP Router

The solution can be deployed as a secondary protection against the firewall. It prevents the intrusion.

View full review »
Shafeeq Syed - PeerSpot reviewer
Specialist Network Services - Security Engineering at Novartis Pharmaceuticals

I primarily use TTPS to protect our organization at different levels.

View full review »
MG
Senior Systems Analyst at a government with 501-1,000 employees

We use Trend Micro TippingPoint Threat Protection System for intrusion detection.

View full review »
SS
Network Security Engineer at I Dream networks pvt ltd

I use Trend Micro TippingPoint Threat Protection System for cyberattacks, such as malware, DDos, and brute force attacks.

View full review »
WH
C.I.S.O. at ENERSA

Our primary use case for Trend Micro TippingPoint Threat Protection System is an IPS solution for the prevention of intrusions.

View full review »
JK
Technical Manager at Digital World

We use this solution to inspect the data packets before they can enter the firewall. Then, the packets can enter into our LAN infrastructure.

View full review »
it_user1015209 - PeerSpot reviewer
Director at PeerSpot

When the client chooses a security setup we first need to explain to them why the dedicated IPS assist is correct for them and its advantages. We need to determine their traffic load. With all those calculations we show them we sometimes end up with over-commitment for the TOC. If we're talking about Trend Micro, you should know that they have a range of products, from IPS, anti-security solutions, and discovery solutions.

We lay out all those products and if they feel that any of them meet their requirements then they incorporate that into their solution. After that, it normally goes through the tender process. We participate in the tender and if we win, we send the product to the customer. We generally work with larger companies or different government bodies. For the different public sector units, there is a security requirement where we go to the client to analyze their existing infrastructure, try to find out where the loopholes are, and when we find something we advise and present the solution. We then incorporate whatever product the client requires.

Maybe it's a small setup or maybe it's a multi-department dedicated IPS setup. We deliver whatever IPS featured is required.

The general use cases are for large data centers and state data centers, where people from different state departments post their applications with their servers in the data center cloud. I'm from Calcutta, India. Our company takes care of different government departments in the Eastern part of India, in West Bengal, in Bihar, in Orissa, in Jharkhand, different states there. In all these cases, the state data center or maybe some big government bodies like PUC's, public utility commissions, like ONGC have their own data centers. All their applications are hosted on this data center, or maybe there is a DR. Maybe the DR is on the cloud. Or maybe like the ONGC, they are on-premise. 

They need to process the graphs to identify whether there's an intrusion or not, and maybe some micro-sandboxing needs to be done. Right when the setup is changed, when these data centers get these devices and need to process a huge amount of data, huge incoming and outbound data, the firewall integrated into the IPS is not capable of handling that much load. Then you need to put in a dedicated IPS. That's where we introduce NGIPS from Trend Micro. That's the thing - it totally depends on the client's requirements, the site's needs, the data bandwidth, and how much processing is required. Trend Micro offers a complete solution.

Trend Micro offers the NGIPS solution, as well as the Deep Discovery Inspector or Deep Discovery Analyzer, the DDI, and DDA. If you put a DDI in line, we can create a different operating system via a sandbox to process. Whatever packet we get, whatever file is getting processed, we capture according to that and we find anything that needs to be blacklisted or whitelisted. If it's blacklisted, that informs us from the DDA that it is getting first to the IPS and the IPS can take care of it.

It's a complete security solution. We might need to introduce the INWB or IWSBA solutions from Trend Micro to analyze the base traffic as well as the main traffic. It's a combination - NGIPS is there to take care of any intrusion and APT is there to analyze the file and network traffic. I'm doing the network sandboxing. IWSBA takes care of that traffic. INSBA is there for taking care of the mail traffic. These four devices can communicate with each other and can instruct the IPS to do any ad-hoc blacklisting that is required.

View full review »
MK
Head of Group at MTI LLC

Our partner is a solution integrator and this is one of the products that he implements for our customers. We are currently working on two pilot projects that involve this solution.

Our experience is with on-premises deployments.

View full review »
YS
‎Network Engineer at BestComp Group

We use it in the banking industry.

View full review »
Buyer's Guide
Trend Micro TippingPoint Threat Protection System
March 2024
Learn what your peers think about Trend Micro TippingPoint Threat Protection System. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
768,578 professionals have used our research since 2012.