We performed a comparison between Anomali ThreatStream and Trend Micro TippingPoint Threat Protection System based on real PeerSpot user reviews.
Find out what your peers are saying about Recorded Future, Check Point Software Technologies, Microsoft and others in Threat Intelligence Platforms."The feature I have found most valuable is credential monitoring. This feature is easy and quick."
"What I like about Trend Micro TippingPoint Threat Protection System is that it works okay. I don't have time to mess with the tool most of the time because I have way too many tasks to do, but Trend Micro TippingPoint Threat Protection System tells you when there's a problem, then it blocks the problem, so that's what I like most about it."
"The most valuable feature is the central command center, where we can control and manage the solution."
"The technical support on offer is very good."
"What I found most valuable in Trend Micro TippingPoint Threat Protection System is its accuracy. It's the best IPS solution in the market."
"The solution's IDS functionality filters the traffic and blocks malware by blocking the connections."
"The monitoring is the most valuable feature."
"I would rate TTPS's stability eight out of ten."
"It integrates easily."
More Trend Micro TippingPoint Threat Protection System Pros →
"Less code in integration would be nice when building blocks."
"There is room for improvement in customer service and support."
"Trend Micro TippingPoint Threat Protection System needs strong Spanish-language support."
"The solution should provide the possibility to mix traffic and the traffic's geographical source to have improved functionality."
"I would like to see this solution more lightweight and easier to install."
"I find Trend Micro TippingPoint Threat Protection System a bit clunky, and updating it can be a pain in the neck because you need to do it from time to time, so this is what needs to be improved in it. I would also rather have an all-in-one system that does intrusion detection, protection, web filtering, and also serves as a firewall, and my company is moving to an all-in-one solution, but I'm unsure of how soon that's going to be. Trend Micro TippingPoint Threat Protection System also doesn't have enough bandwidth to handle the required traffic within my company, so it's going to be replaced."
"It takes a lot of time before you're connected to an engineer, so an area for improvement in Trend Micro TippingPoint Threat Protection System is the response time of its technical support team."
"An area for improvement in Trend Micro TippingPoint Threat Protection System is the complexity of its interface."
"The solution is pretty expensive."
More Trend Micro TippingPoint Threat Protection System Cons →
More Trend Micro TippingPoint Threat Protection System Pricing and Cost Advice →
Anomali ThreatStream is ranked 5th in Threat Intelligence Platforms with 1 review while Trend Micro TippingPoint Threat Protection System is ranked 8th in Threat Intelligence Platforms with 19 reviews. Anomali ThreatStream is rated 7.0, while Trend Micro TippingPoint Threat Protection System is rated 8.0. The top reviewer of Anomali ThreatStream writes "Easy and quick credential monitoring; tech support could be improved". On the other hand, the top reviewer of Trend Micro TippingPoint Threat Protection System writes "Operates in-line in the network, blocking malicious and unwanted traffic". Anomali ThreatStream is most compared with Recorded Future, ThreatConnect Threat Intelligence Platform (TIP), ThreatQ, Splunk Enterprise Security and Group-IB Threat Intelligence, whereas Trend Micro TippingPoint Threat Protection System is most compared with Trend Micro Deep Discovery, Check Point IPS, Fortinet FortiGate IPS, Palo Alto Networks Advanced Threat Prevention and Cisco NGIPS.
See our list of best Threat Intelligence Platforms vendors.
We monitor all Threat Intelligence Platforms reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.