Trend Micro TippingPoint Threat Protection System Competitors and Alternatives

Get our free report covering Check Point, Cisco, Trend Micro, and other competitors of Trend Micro TippingPoint Threat Protection System. Updated: May 2021.
511,521 professionals have used our research since 2012.

Read reviews of Trend Micro TippingPoint Threat Protection System competitors and alternatives

AHmadMhedat
Senior Network Security Engineer with 201-500 employees
Real User
Attack analysis shows who tries to exploit my vulnerabilities

What is our primary use case?

I look at the attack analysis, which shows me which attackers try to exploit my vulnerabilities. I can check the ticket to see if it's blocked or whether it's a false positive. Whatever the case, if it already exists, I will block it. McAfee IPS has a benign engine, so this may not be a target in your environment. If you just prevent attackers from using it, they will try another vulnerability. I have physical routers, but they try to make some novel vulnerabilities. This is not applicable to my environment, so when I see this alert I know it's a false positive not related to my environment… more »

Pros and Cons

  • "The feature I found most valuable is the network threat analyzer in the security platform. It also integrates with GTI, or Global Threat Intelligence. Otherwise, I just use the basic features."
  • "Integration with Global Thereat Intelligence could be better. Also, I think management solutions are end of life now at McAfee. Network threat analyzer may be used for endpoint quarantines. Integration between these sides, as well as endpoint APO, will help you quarantine the risky endpoints."

What other advice do I have?

Don't be afraid to deploy this solution. It is very simple and easy to deploy. I think there is no issue. I tested on the McAfee Network Security Platform. You just need to thinking carefully about attacks to decide if it's a sole attacker or two specific attacks. Use that information to create a decision about what action to take against the attack. Consider whether you want to lock off or block the action. Maybe I can improve myself in some of my web analysis. I read articles to improve my knowledge in this area. This is what I do to improve my experience. I would rate this solution as nine…
JS
Director of IT at a tech services company with 51-200 employees
Real User
Top 10
Responsive and fast support, easy to deploy, well-tuned to ignore false positives

What is our primary use case?

We use this product for endpoint security and threat remediation.

Pros and Cons

  • "We have a small IT Team, and this allows us to get sleep at night, knowing that someone else is taking care of any incidents that occur."
  • "It would be nice if the dashboard had some more information upfront, and looked a little better."

What other advice do I have?

My advice for anybody who is looking into implementing CrowdStrike is to go ahead and do it. There is nothing to worry about and they deliver as promised. I would rate this solution a nine out of ten.
TariqueAshraf
Chief Technology Officer at a tech services company
Real User
A modular and easily managed solution, but throughput capacity is expensive and requires upgrading of hardware

What is our primary use case?

We are a system integrator, and we resell this solution to our customers. This solution is for intrusion prevention, and the majority of deployments are on-premises.

Pros and Cons

  • "The most valuable feature of this solution is its modularity, so whenever you need to upgrade or add another service, you don't need to buy another box."
  • "If there was a software-based solution for scaling up then it would be much better."

What other advice do I have?

This is a solution that I recommend for IPS. I would rate this solution a seven out of ten.
Get our free report covering Check Point, Cisco, Trend Micro, and other competitors of Trend Micro TippingPoint Threat Protection System. Updated: May 2021.
511,521 professionals have used our research since 2012.