We performed a comparison between Check Point IPS and Trend Micro Deep Discovery based on real PeerSpot user reviews.
Find out in this report how the two Intrusion Detection and Prevention Software (IDPS) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."It protects against specific known exploits but also, with SandBlast integration, it is able to protect against unknown or zero-day attacks at the perimeter level."
"The integration is a valuable feature."
"There's an automatic update after every 2 hours which makes sure that the database is up to date and providing zero-day vulnerability protection."
"The product's initial setup is easy."
"Check Point Intrusion Prevention System has great profiles, and we can continuously create, modify, activate, deactivate or configure any specific setting to allow the profile to focus on just one thing or for certain attacks."
"The reports are useful in helping to verify the threats where we can see the level of severity in order to be able to take action."
"The tool's most valuable feature is its detection panel. Managing and updating policies within Check Point IPS is easy and without issues. It provides a secure network."
"IPS logs enable complete visibility and reporting through the smart console."
"The tool's stability and performance are good."
"One of the most valuable features is the performance, since, so far, we have not faced any issues with Deep Discovery."
"The product is very easy to install."
"I like the sales operations testing. and support."
"Deep Discovery is scalable and compatible with other products. It's crucial to have that compatibility because it's an integral part of our security solution. It integrates smoothly. The interface is user-friendly, so administration is simple."
"The most valuable feature is that the user can customize images of virtual machines in the sandbox functionality. The other vendors only use images that were created by the vendor but not the customer, end-user or partner. This helps to detect advanced threats and attacks."
"Generally speaking, it just gives us a broad understanding of exactly what kind of threats occur. The submission point, analyzing point, and virtualization are within the environment that it supports. It helped us to improve our security levels and protect our internal network from any threats outside."
"The most valuable feature of Trend Micro Deep Discovery is its complete end-to-end visibility of threats."
"Occasionally there are glitches and errors like false positives, which would be a nice area of this solution to improve upon."
"In my opinion, the Check Point software engineers should works on the performance of the blade - when it is activated with the big number of the protections in place, the monitoring shows us the significant increase in the CPU utilization for the gateway appliances - up to 30 percents, even so we are cherry-picking only the profiles that we really needed."
"The hardware-based version of Check Point IPS could be more scalable. Right now, it's not scalable."
"Support is the biggest area for improvement."
"I observed on our management that sometimes IPS does not connect to the threat cloud, we have to check and improve it. Otherwise, all of the features are good."
"Threat Prevention policies are not very easily manageable as there are several profiles/policies/etc. Therefore, there are several ways to add exceptions and check the configuration."
"It is generally good, but improving the performance would be the one thing I'd take a look at right now."
"I would like to have the possibility of adding features to this IPS solution in the future."
"Deep Discovery is easy to manage, but there is still room for improvement on the administration and operations side. Competing products have a cleaner interface that makes it easier to manage their products. Trend Micro offers a lot of features in one product suite, but it can be unwieldy for the customer to manage all that with a single interface."
"I would like to see integration with third-party tools to improve the visibility of the dashboards."
"Some of the end users may not be technically proficient, so they occasionally face problems due to a lack of knowledge."
"The stability of the solution could be improved. It should be 100% stable, but it's not there right now."
"I would like the ability to analyze all files in our internal network, at the same time on different operating systems. Not just three of them, but as many as possible."
"I would like to see them create a rule where It could integrate with the network and start mitigating with auto-detection."
"The solution could be more secure."
"There are certain aspects of flexibility in the policies that should be added to Deep Discovery."
Check Point IPS is ranked 3rd in Intrusion Detection and Prevention Software (IDPS) with 45 reviews while Trend Micro Deep Discovery is ranked 8th in Intrusion Detection and Prevention Software (IDPS) with 22 reviews. Check Point IPS is rated 8.6, while Trend Micro Deep Discovery is rated 8.4. The top reviewer of Check Point IPS writes "Great for detection and access with the capabilities of defining specific rules". On the other hand, the top reviewer of Trend Micro Deep Discovery writes "Good threat detection capabilities and offers flexibility for hosting options". Check Point IPS is most compared with Darktrace, Palo Alto Networks URL Filtering with PAN-DB, Palo Alto Networks Advanced Threat Prevention, Trend Micro TippingPoint Threat Protection System and Dragos, whereas Trend Micro Deep Discovery is most compared with Darktrace, Trend Micro TippingPoint Threat Protection System, Arista NDR, Vectra AI and Palo Alto Networks URL Filtering with PAN-DB. See our Check Point IPS vs. Trend Micro Deep Discovery report.
See our list of best Intrusion Detection and Prevention Software (IDPS) vendors.
We monitor all Intrusion Detection and Prevention Software (IDPS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.