
![Trend Micro Deep Discovery [EOL] Logo](https://images.peerspot.com/image/upload/c_scale,dpr_3.0,f_auto,q_100,w_64/2wuq6mq8liciuy8jm6aqj4dp5bgm.jpg?_a=BACAGSGT)
Trend Micro Deep Discovery and Check Point IPS compete in the cybersecurity category, providing network traffic analysis and intrusion prevention solutions respectively. Trend Micro Deep Discovery seems to have the upper hand in terms of ease of integration and customization, while Check Point IPS excels with its extensive attack database and proactive protection features.
Features: Trend Micro Deep Discovery offers robust real-time network traffic visibility, integrates well with other Trend Micro products, and provides customizable sandboxing for tailored threat detection. Users value its performance and stability. Check Point IPS is known for its extensive database of attack signatures, proactive vulnerability measures, and well-structured reporting capabilities.
Room for Improvement: Trend Micro Deep Discovery could improve its support services, specifically in regions like India, and address issues related to false alert noise and integration flexibility. A wider support for virtual images and better pricing models are also needed. Check Point IPS can face performance challenges under extensive deployment, high resource usage, and occasional false positives. Simplifying its licensing and bundled purchasing process and enhancing support responsiveness are areas for improvement.
Ease of Deployment and Customer Service: Trend Micro Deep Discovery is primarily deployed in on-premises environments with some cloud usage, with generally positive customer service reviews but noted regional limitations. Check Point IPS provides versatile deployment options across different environments, benefiting from a wide support network. However, users have experienced inconsistent support quality and slower response times.
Pricing and ROI: Trend Micro Deep Discovery's pricing is perceived as high, but it often justifies the cost through a solid ROI by preventing breaches. Check Point IPS is seen as expensive, and users typically find better value in bundled services. Effective licensing strategies and pricing competitiveness are crucial for user satisfaction regarding its financial impact.
We have seen a return on investment with Check Point IPS because we have not seen any security events, malicious activities, or any device compromised, so we are secure now, and money has been saved.
I have seen a return on investment as it results in money saved and time saved because the security tool is very complete and modern.
I have seen a return on investment more in the risk saved since it catches a lot of stuff security-wise that is good to catch.
Our technical teams have personal relationships with our account executives and direct support people.
The customer support for Check Point IPS is very helpful, as they are able to resolve complex issues.
I reached out to customer support a couple of times, and the response has been very good.
If I were to rate them from 0 to 10, I would give them a nine or a ten.
There is no dedicated team in India for giving support for Trend Micro Deep Discovery.
We have moved to a hyper-scale master environment, allowing us to scale by adding additional gateways to the clusters.
The scalability of Check Point IPS is on point.
The scalability of Check Point IPS is great because when I deploy gateways in the cloud, I create a cluster, which offers a very scalable option.
If the appliance supports scalability, Trend Micro support will inform us, and we can implement it without replacing the hardware.
Check Point IPS provides a very stable and reliable environment.
Check Point IPS is very stable.
Check Point IPS is very stable with no problems regarding this solution.
The product updates and security updates are kept current, allowing us seamless integration with Trend Micro and getting daily updates and signatures without problems.
Automated attack path correlation in SmartEvent to improve situational awareness.
At least 60% of all the alarms generated by the IPS are false positives or something that's not important to look at, and this generates a significant workload for my team.
More granular policy customization for Check Point IPS would allow protection to be tailored more precisely to specific applications or services, which would reduce unnecessary overhead and improve accuracy.
We have multiple components such as Deep Discovery Email Inspector for mail gateways, Deep Discovery Analyzer for sandboxing, and Deep Discovery Inspector, which serves as an IDS detecting malicious network traffic.
The solution is not scalable as it is an agent product rather than a product designed for scalability.
There is no dedicated team in India for giving support for Trend Micro Deep Discovery.
Comparisons with Fortinet show that Check Point IPS is relatively more expensive, but we found it cheaper to retain it rather than switch.
My experience with pricing, setup cost, and licensing for Check Point IPS is good; it's baked into the firewall licensing, so that's very good.
My experience with pricing, setup cost, and licensing for Check Point IPS is great, and I have no problem with the price.
I do not consider it an expensive tool; its price is justified based on the capabilities that we receive when compared to another mail gateway or other vendors.
The solution is very expensive.
Overall, the licensing cost of Trend Micro Deep Discovery was not on the higher side earlier, but now, since the competition has increased, we need to think about the prices.
The integration with Check Point ThreatCloud ensures the IPS engine is updated with the latest attack signatures.
The solution employs behavioral heuristic analysis to block zero-day attacks using AI-powered engines.
Whenever any zero-day attack is detected, it downloads that signature into the firewall and prevents that threat.
The most valuable capabilities of Trend Micro Deep Discovery Email Inspector include its ability to perform mail detection and mail filtration against various email attacks such as phishing and spam, serving as an email gateway for both inbound and outbound traffic.
This solution allows us to see anomalies, network traffic in our network, and zero-day threats.
The impact of the Threat Intelligence Sharing feature on overall defense and security is positive.
| Product | Market Share (%) |
|---|---|
| Check Point IPS | 4.1% |
| Trend Micro Deep Discovery | 3.4% |
| Other | 92.5% |
| Company Size | Count |
|---|---|
| Small Business | 50 |
| Midsize Enterprise | 22 |
| Large Enterprise | 23 |
| Company Size | Count |
|---|---|
| Small Business | 16 |
| Midsize Enterprise | 6 |
| Large Enterprise | 9 |
Check Point IPS is an intrusion prevention system that aims to detect and prevent attempts to exploit weaknesses in vulnerable systems or applications. The solution provides complete, integrated, next-generation firewall intrusion prevention capabilities at multi-gigabit speeds with a low false positive rate and high security. It helps organizations secure their enterprise network, and protect servers and critical data against known and unknown automated malware, blended threats, and other threats.
Check Point IPS Features
Check Point IPS has many valuable key features. Some of the most useful ones include:
Check Point IPS Benefits
There are many benefits to implementing Check Point IPS. Some of the biggest advantages the solution offers include:
Reviews from Real Users
Check Point IPS is a solution that stands out when compared to many of its competitors. Some of its major advantages are that it has granularity capabilities for rule creation, quick updates of signatures, and a helpful mechanism that allows users to turn IPS signatures to a different mode automatically.
A System and Network Administrator at Auriga mentions, “The Check Point IPS module allows me granularity in creating rules. I can specify which definition to apply and to which scope or network.” The reviewer also adds, “I can create multiple profiles, which is helpful.”
“The quick updates of the signatures when a new threat is identified are great. For instance, when Microsoft releases patches, we usually see new signatures for those issues that have to be patched in a day. This gives us time to test/deploy the patches while already being protected from the threats. Also, it's very good with reporting. I can generate reports for management automatically based on the threats of the last day/week/whatever is needed,” says a Systems en networks engineer at CB.
Another PeerSpot user, a Network Engineer at VSP Vision Care, writes, “The mechanism where you can let the system automatically turn the IPS signature to a different mode (prevent / monitor / inactive) is a nice feature that allows us to easily adjust the balance between security protection and the risk of business impact.”
Trend Micro Deep Discovery [EOL] offers real-time network traffic visibility, advanced sandboxing, and threat intelligence sharing, improving threat management for organizations through seamless integration with security products and precise threat detection in simulated environments.
Recognized for its ability to detect advanced persistent threats and zero-day exploits, Trend Micro Deep Discovery [EOL] provides insights into malicious activities while maintaining compatibility with multiple platforms. Its custom sandboxing technology allows detailed environmental simulations to identify threats accurately. Despite the benefits, there are challenges such as the need for enhanced support in regions like India, better scalability, and easier usage for non-technical users. Integration with third-party tools could also improve alongside a simpler pricing model. Security features, stability, and flexibility are areas requiring enhancement to meet broader industry needs.
What are the key features of Trend Micro Deep Discovery [EOL]In industries focused on network security and compliance, Trend Micro Deep Discovery [EOL] finds use in intrusion detection and protection against malware, phishing, and ransomware. Companies deploy it for email filtration and network analysis, ensuring secure data management and virtual patching to address zero-day vulnerabilities. On-premises implementation includes role-based access and scanning of virtual environments, aiding in meeting security compliance standards and reducing server downtime.
We monitor all Intrusion Detection and Prevention Software (IDPS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.