

Check Point IPS and Trend Micro TippingPoint compete in the network security space, specifically in intrusion prevention. Check Point IPS seems to have the upper hand due to its highly customizable capabilities and robust threat management features.
Features: Check Point IPS offers highly customizable intrusion prevention with detailed threat reports and granular security policy controls. It boasts automatic updates and comprehensive attack databases. Trend Micro TippingPoint provides seamless integration across platforms, robust zero-day threat protection, and detailed reporting capabilities.
Room for Improvement: Check Point IPS users experience performance issues due to high CPU usage, the need for faster threat signature updates, and improved support interactions. Trend Micro TippingPoint users note the need for a better interface design, quicker system updates, and improved pricing models.
Ease of Deployment and Customer Service: Check Point IPS is versatile, supporting deployments across on-premises, hybrid, and public cloud environments, and is favored for its strong technical support with rapid response. Trend Micro TippingPoint has fewer deployment options but excels in threat protection, though its customer support speed and efficiency are mixed.
Pricing and ROI: Check Point IPS is considered expensive but valuable due to its comprehensive security solutions and ROI in reduced security incidents. Trend Micro TippingPoint maintains a premium pricing tier, valued for its bundled approach covering various needs but challenging for mid-sized organizations. Both are seen as essential security investments offering strong returns in network protection.
We have seen a return on investment with Check Point IPS because we have not seen any security events, malicious activities, or any device compromised, so we are secure now, and money has been saved.
I have seen a return on investment as it results in money saved and time saved because the security tool is very complete and modern.
I have seen a return on investment more in the risk saved since it catches a lot of stuff security-wise that is good to catch.
Our technical teams have personal relationships with our account executives and direct support people.
The customer support for Check Point IPS is very helpful, as they are able to resolve complex issues.
I reached out to customer support a couple of times, and the response has been very good.
We have moved to a hyper-scale master environment, allowing us to scale by adding additional gateways to the clusters.
The scalability of Check Point IPS is on point.
The scalability of Check Point IPS is great because when I deploy gateways in the cloud, I create a cluster, which offers a very scalable option.
Check Point IPS provides a very stable and reliable environment.
Check Point IPS is very stable.
Check Point IPS is very stable with no problems regarding this solution.
Automated attack path correlation in SmartEvent to improve situational awareness.
At least 60% of all the alarms generated by the IPS are false positives or something that's not important to look at, and this generates a significant workload for my team.
More granular policy customization for Check Point IPS would allow protection to be tailored more precisely to specific applications or services, which would reduce unnecessary overhead and improve accuracy.
Comparisons with Fortinet show that Check Point IPS is relatively more expensive, but we found it cheaper to retain it rather than switch.
My experience with pricing, setup cost, and licensing for Check Point IPS is good; it's baked into the firewall licensing, so that's very good.
My experience with pricing, setup cost, and licensing for Check Point IPS is great, and I have no problem with the price.
The integration with Check Point ThreatCloud ensures the IPS engine is updated with the latest attack signatures.
The solution employs behavioral heuristic analysis to block zero-day attacks using AI-powered engines.
Whenever any zero-day attack is detected, it downloads that signature into the firewall and prevents that threat.
The system responds to potential threats in real time, which is very important, and the Trend Micro TippingPoint Threat Protection System performs excellently.
| Product | Market Share (%) |
|---|---|
| Check Point IPS | 4.1% |
| Trend Micro TippingPoint Threat Protection System | 3.9% |
| Other | 92.0% |

| Company Size | Count |
|---|---|
| Small Business | 50 |
| Midsize Enterprise | 22 |
| Large Enterprise | 23 |
| Company Size | Count |
|---|---|
| Small Business | 11 |
| Midsize Enterprise | 6 |
| Large Enterprise | 4 |
Check Point IPS is an intrusion prevention system that aims to detect and prevent attempts to exploit weaknesses in vulnerable systems or applications. The solution provides complete, integrated, next-generation firewall intrusion prevention capabilities at multi-gigabit speeds with a low false positive rate and high security. It helps organizations secure their enterprise network, and protect servers and critical data against known and unknown automated malware, blended threats, and other threats.
Check Point IPS Features
Check Point IPS has many valuable key features. Some of the most useful ones include:
Check Point IPS Benefits
There are many benefits to implementing Check Point IPS. Some of the biggest advantages the solution offers include:
Reviews from Real Users
Check Point IPS is a solution that stands out when compared to many of its competitors. Some of its major advantages are that it has granularity capabilities for rule creation, quick updates of signatures, and a helpful mechanism that allows users to turn IPS signatures to a different mode automatically.
A System and Network Administrator at Auriga mentions, “The Check Point IPS module allows me granularity in creating rules. I can specify which definition to apply and to which scope or network.” The reviewer also adds, “I can create multiple profiles, which is helpful.”
“The quick updates of the signatures when a new threat is identified are great. For instance, when Microsoft releases patches, we usually see new signatures for those issues that have to be patched in a day. This gives us time to test/deploy the patches while already being protected from the threats. Also, it's very good with reporting. I can generate reports for management automatically based on the threats of the last day/week/whatever is needed,” says a Systems en networks engineer at CB.
Another PeerSpot user, a Network Engineer at VSP Vision Care, writes, “The mechanism where you can let the system automatically turn the IPS signature to a different mode (prevent / monitor / inactive) is a nice feature that allows us to easily adjust the balance between security protection and the risk of business impact.”
Trend Micro TippingPoint Threat Protection System provides robust security features like digital vaccines and real-time responses, ensuring effective intrusion detection and seamless integration with other systems.
Trend Micro TippingPoint Threat Protection System is known for its ease of use, quick installation, and efficient IPS signatures. Its real-time threat responses and cloud-based management enable virtual patch creation and effective attack blocking. It integrates seamlessly with other systems, providing accurate intelligence and zero-day threat protection. Users appreciate its role in email scanning and network packet inspection. While it requires improved threat intelligence integration, streamlined processes, enhanced GUI, and less reliance on Java, its high cost limits smaller data centers. Better integration with other vendors and faster support are necessary.
What are the most important features of Trend Micro TippingPoint?Banks and government entities often deploy Trend Micro TippingPoint as an Intrusion Prevention System to counter cyber threats like malware, DDos, and brute force attacks. It is crucial for data centers managing extensive traffic, surpassing traditional firewall mechanisms. Key in regions like India and Bangladesh for securing infrastructures.
We monitor all Intrusion Detection and Prevention Software (IDPS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.