Share your experience using VigilanteATI

The easiest route - we'll conduct a 15 minute phone interview and write up the review for you.

Use our online form to submit your review. It's quick and you can post anonymously.

Your review helps others learn about this solution
The PeerSpot community is built upon trust and sharing with peers.
It's good for your career
In today's digital world, your review shows you have valuable expertise.
You can influence the market
Vendors read their reviews and make improvements based on your feedback.
Examples of the 84,000+ reviews on PeerSpot:

Paolo Boscolo - PeerSpot reviewer
IT director at Comune di Prato
Real User
Provides IDS functionality that filters the traffic and blocks malware and improper use of our on-line services
Pros and Cons
  • "The solution's IDS functionality filters the traffic and blocks malware by blocking the connections."
  • "The solution should provide the possibility to mix traffic and the traffic's geographical source to have improved functionality."

What is our primary use case?

The filtering of the traffic on our link to the internet.

How has it helped my organization?

Previously we just filtered the traffic based on the IP addresses and ports, with TippingPoint we are able to analyse the data exchanged even on the SSL connections 

What is most valuable?

The solution's IDS functionality filters the traffic and blocks malware by blocking the connections.

What needs improvement?

The way we can build the filters could be improved. The solution should provide the possibility to mix traffic parameters with traffic's geographical source to have improved functionality able to differentiate the filtering strategies also on the country of the users. The solution’s pricing could be made cheaper.

For how long have I used the solution?

I have been using the solution for three years.

What do I think about the stability of the solution?

I rate the solution an eight out of ten for stability.

What do I think about the scalability of the solution?

The solution's scalability could be improved. You need to completely change the hardware to move from one system to another. The difference in the costs of different appliances is too high in my opinion. Configuring and managing the solution involves around ten people. Trend Micro TippingPoint Threat Protection System protects around 1,000 users.

How was the initial setup?

The initial setup of the solution is a little bit difficult. We had to set many filters, and the default setting was not okay. We needed to work a lot in order to refine the filtering.

What about the implementation team?

We worked at different times for at least one month to refine the filters, and we are still doing it continuously.

What's my experience with pricing, setup cost, and licensing?

On a scale from one to ten, where one is cheap and ten is expensive, I rate the solution's pricing a seven out of ten.

What other advice do I have?

We use the solution to filter the internet connection. We are not currently using the solution for LAN but just for the border of our network. The solution was integrated into our security infrastructure very quickly. I rate the impact of the solution's Digital Vaccine service on our security posture as four out of ten. I would recommend the solution to other users.

Overall, I rate the solution an eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
Dinesh Yadav - PeerSpot reviewer
Sales Director at CLOUD MIND
Reseller
Top 10
Blocks suspicious activities and protects endpoints and servers from attacks
Pros and Cons
  • "The product provides good monitoring features."
  • "The tool is more expensive than other products in the market."

What is our primary use case?

A lot of customers face ransomware and malware attacks. The solution helps protect endpoints and servers from ransomware and malware attacks.

How has it helped my organization?

The solution has multiple layers of security, including web security. We can monitor endpoints, conduct root cause analysis, and find geolocations. If the tool finds any suspicious activity, it blocks and remediates it.

What is most valuable?

The solution makes our security operations easier. After an incident, we get complete reports and insights. The product provides good monitoring features. The product also has teams that help customers find suspicious activities. The team calls and asks us to check the updates and remediate issues. If the system can remediate it, the team does it through the system. The detection and response are in real-time. There are no security breaches. Resolving issues doesn’t take much time.

What needs improvement?

The tool is more expensive than other products in the market.

For how long have I used the solution?

I have been using the solution for more than 3 years.

What do I think about the stability of the solution?

I did not have any stability issues.

What do I think about the scalability of the solution?

It is easy to scale up. We just need to add the licenses. The product is suitable for small, medium, and large businesses. We must buy a minimum of 50 licenses.

How are customer service and support?

The support is excellent. We rarely need support.

How would you rate customer service and support?

Positive

How was the initial setup?

The initial setup is pretty simple and clear. The time taken for deployment depends on the endpoints. It's a cloud solution. We can use Active Directory or the group policies to deploy it.

What was our ROI?

The product has a lot of use cases. There are companies that need to run their operations 24/7. It will be a big challenge if their server or infrastructure goes down. They cannot afford downtime. They need to choose the right solution for their needs.

What's my experience with pricing, setup cost, and licensing?

The price depends on the kind of service we need. If we need excellent service, we must pay a reasonable price. We can choose any pricing model if we do not want excellent service. The product is excellent. We need to pay a premium price for the tool.

Which other solutions did I evaluate?

Microsoft Defender Threat Intelligence, IBM, and Cisco are some competitors. CrowdStrike entered the market with a USP to protect endpoint servers. It has a different approach. Malwarebytes has a similar setup. I prefer CrowdStrike, though.

What other advice do I have?

I will recommend the tool to others depending on their budget. If customers have a good budget and need a premium product, they can choose CrowdStrike. No product is perfect. Overall, I rate the tool an 8 out of 10.

Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
Flag as inappropriate