The filtering of the traffic on our link to the internet.
The easiest route - we'll conduct a 15 minute phone interview and write up the review for you.
Use our online form to submit your review. It's quick and you can post anonymously.
The filtering of the traffic on our link to the internet.
Previously we just filtered the traffic based on the IP addresses and ports, with TippingPoint we are able to analyse the data exchanged even on the SSL connections
The solution's IDS functionality filters the traffic and blocks malware by blocking the connections.
The way we can build the filters could be improved. The solution should provide the possibility to mix traffic parameters with traffic's geographical source to have improved functionality able to differentiate the filtering strategies also on the country of the users. The solution’s pricing could be made cheaper.
I have been using the solution for three years.
I rate the solution an eight out of ten for stability.
The solution's scalability could be improved. You need to completely change the hardware to move from one system to another. The difference in the costs of different appliances is too high in my opinion. Configuring and managing the solution involves around ten people. Trend Micro TippingPoint Threat Protection System protects around 1,000 users.
The initial setup of the solution is a little bit difficult. We had to set many filters, and the default setting was not okay. We needed to work a lot in order to refine the filtering.
We worked at different times for at least one month to refine the filters, and we are still doing it continuously.
On a scale from one to ten, where one is cheap and ten is expensive, I rate the solution's pricing a seven out of ten.
We use the solution to filter the internet connection. We are not currently using the solution for LAN but just for the border of our network. The solution was integrated into our security infrastructure very quickly. I rate the impact of the solution's Digital Vaccine service on our security posture as four out of ten. I would recommend the solution to other users.
Overall, I rate the solution an eight out of ten.
A lot of customers face ransomware and malware attacks. The solution helps protect endpoints and servers from ransomware and malware attacks.
The solution has multiple layers of security, including web security. We can monitor endpoints, conduct root cause analysis, and find geolocations. If the tool finds any suspicious activity, it blocks and remediates it.
The solution makes our security operations easier. After an incident, we get complete reports and insights. The product provides good monitoring features. The product also has teams that help customers find suspicious activities. The team calls and asks us to check the updates and remediate issues. If the system can remediate it, the team does it through the system. The detection and response are in real-time. There are no security breaches. Resolving issues doesn’t take much time.
The tool is more expensive than other products in the market.
I have been using the solution for more than 3 years.
I did not have any stability issues.
It is easy to scale up. We just need to add the licenses. The product is suitable for small, medium, and large businesses. We must buy a minimum of 50 licenses.
The support is excellent. We rarely need support.
Positive
The initial setup is pretty simple and clear. The time taken for deployment depends on the endpoints. It's a cloud solution. We can use Active Directory or the group policies to deploy it.
The product has a lot of use cases. There are companies that need to run their operations 24/7. It will be a big challenge if their server or infrastructure goes down. They cannot afford downtime. They need to choose the right solution for their needs.
The price depends on the kind of service we need. If we need excellent service, we must pay a reasonable price. We can choose any pricing model if we do not want excellent service. The product is excellent. We need to pay a premium price for the tool.
Microsoft Defender Threat Intelligence, IBM, and Cisco are some competitors. CrowdStrike entered the market with a USP to protect endpoint servers. It has a different approach. Malwarebytes has a similar setup. I prefer CrowdStrike, though.
I will recommend the tool to others depending on their budget. If customers have a good budget and need a premium product, they can choose CrowdStrike. No product is perfect. Overall, I rate the tool an 8 out of 10.