Try our new research platform with insights from 80,000+ expert users

Check Point Security Management vs Trend Micro TippingPoint Threat Protection System comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Aug 11, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Security Manage...
Ranking in Threat Intelligence Platforms
5th
Average Rating
9.0
Reviews Sentiment
7.3
Number of Reviews
63
Ranking in other categories
Log Management (10th), Advanced Threat Protection (ATP) (15th)
Trend Micro TippingPoint Th...
Ranking in Threat Intelligence Platforms
25th
Average Rating
8.0
Reviews Sentiment
7.0
Number of Reviews
19
Ranking in other categories
Intrusion Detection and Prevention Software (IDPS) (9th), Cloud and Data Center Security (16th)
 

Mindshare comparison

As of May 2025, in the Threat Intelligence Platforms category, the mindshare of Check Point Security Management is 0.3%, up from 0.2% compared to the previous year. The mindshare of Trend Micro TippingPoint Threat Protection System is 0.5%, up from 0.4% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Threat Intelligence Platforms
 

Featured Reviews

Ozan Durmus - PeerSpot reviewer
Good documentation and proxy support with a helpful community available for troubleshooting
It's useful that we can find unused objects. This helps us to get rid of unused objects in our database, Proxy support is valuable for us. We can apply centralized proxy settings to get additional databases when we need them. Revision history and detailed audit log is a good feature with this we can always feeling safe if somethings go wrong, I'm sure that I can go back the old one. Smart Event is a very good feature. It provides a graphical view of the traffics and provides history. The filter syntax is very good and helps control when we need it.
Subhendu Dhar - PeerSpot reviewer
Operates in-line in the network, blocking malicious and unwanted traffic
A standout feature of TippingPoint is its strong integration with various solutions. It stands out as one of the leading network Intrusion Prevention Systems (IPS) in the current market and is known for its seamless integration with other solutions. For instance, when it identifies a potential threat within the traffic stream, it meticulously analyzes the data. Even in multilayer security scenarios, Tipping Point's network IPS can serve as a bypass for the basic firewall. If a threat is identified by Tipping Point, it promptly shares this information with the other systems. This ensures that they're updated and can employ the necessary solutions from their signature databases. The entire network gets safeguarded automatically. This integration extends to components like security and FX. This linkage streamlines our operations, offering a consolidated point of control for managing threats effectively.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The solution is ideal for use and deployment in a large infrastructure environment."
"The additional features offered by the solution are excellent. We didn't have a lot fo these on a previous solution, and they've proven to be an advantage for us."
"We are now able to monitor the different VPN communities in real-time."
"The SSL VPN monitoring based on users and tunnel monitoring are great value-added features present in the management console."
"The control is granular, so you can set policy profiles for different organizational profiles."
"The most valuable feature of Check Point Security Management is the high level of visibility"
"The centralized logs and management are helpful."
"The Check Point Management server is isolated from security gateways, which means that in case there is an issue, we have our configuration ready and we can directly replace the device and push the configuration."
"A standout feature of TippingPoint is its strong integration with various solutions. It stands out as one of the leading network Intrusion Prevention Systems (IPS) in the current market and is known for its seamless integration with other solutions. For instance, when it identifies a potential threat within the traffic stream, it meticulously analyzes the data. Even in multilayer security scenarios, Tipping Point's network IPS can serve as a bypass for the basic firewall. If a threat is identified by Tipping Point, it promptly shares this information with the other systems. This ensures that they're updated and can employ the necessary solutions from their signature databases. The entire network gets safeguarded automatically. This integration extends to components like security and FX. This linkage streamlines our operations, offering a consolidated point of control for managing threats effectively."
"What I like about Trend Micro TippingPoint Threat Protection System is that it works okay. I don't have time to mess with the tool most of the time because I have way too many tasks to do, but Trend Micro TippingPoint Threat Protection System tells you when there's a problem, then it blocks the problem, so that's what I like most about it."
"I would rate TTPS's stability eight out of ten."
"You don't need any hardware because the solution is on the cloud. I like that Trend Micro TippingPoint Threat Protection System is easy to install and manage."
"What I found most valuable in Trend Micro TippingPoint Threat Protection System is its accuracy. It's the best IPS solution in the market."
"For intrusion detection and mitigation, it has helped us in sort of known signatures and all sorts of things. So, we're very happy with the engine. That's the work."
"It integrates easily."
"The monitoring is the most valuable feature."
 

Cons

"I would like to bind users to their network, as well as their local office machine."
"For those not familiar with the Command Line interface, there should be an option in the GUI for operating backups."
"We'd like to see more and more integration possibilities between Checkpoint and other vendor security solutions such as Malwarebytes, SIEM solution providers, and standalone vulnerability scanners."
"The usability of the solution could be improved."
"In the future, I would like to see more frequent updates because of the changing security landscape."
"License update and upgrade processes can be made a little easier."
"Check Point could possibly lighten up the software code so that it is not as resource-intensive and will run more smoothly on a variety of hardware and cloud or virtual machine platforms."
"The migration from R77 Manager to R80 is a major upgrade. It's not very easy to do. There should be some kind of Wizard for a direct upgrade from the R77 to the R80. There should be an easy way for the customers to do the upgrade."
"I find Trend Micro TippingPoint Threat Protection System a bit clunky, and updating it can be a pain in the neck because you need to do it from time to time, so this is what needs to be improved in it. I would also rather have an all-in-one system that does intrusion detection, protection, web filtering, and also serves as a firewall, and my company is moving to an all-in-one solution, but I'm unsure of how soon that's going to be. Trend Micro TippingPoint Threat Protection System also doesn't have enough bandwidth to handle the required traffic within my company, so it's going to be replaced."
"The solution is pretty expensive."
"We need more integration. It would be good if Azure IPS and TippingPoint IPS and other products from Trend Micro like their DBI and IWSVA could talk between each other."
"The solution should provide the possibility to mix traffic and the traffic's geographical source to have improved functionality."
"It takes a lot of time before you're connected to an engineer, so an area for improvement in Trend Micro TippingPoint Threat Protection System is the response time of its technical support team."
"TTPS is a bit behind in visuals, the UI, and some data elements."
"There is room for improvement in customer service and support."
"Trend Micro TippingPoint Threat Protection System needs strong Spanish-language support."
 

Pricing and Cost Advice

"The solution is expensive."
"Price-wise, it is an expensive solution."
"Check Point is much cheaper than the competition ($4/server as compared to $17/server)."
"Do the homework because Check Point is rather expensive."
"This product can be used for 25 security gateways on a basic license."
"The solution is expensive and there is an annual license."
"If one will be very expensive, and ten means low price, I rate the tool's price as a three out of ten."
"The pricing can be estimated around 3 or 4 out of 10 in terms of expense."
"Trend Micro TippingPoint Threat Protection System is an expensive product."
"It is an expensive solution and I would rate it three out of ten."
"TippingPoint is not as expensive as Palo Alto but it's not as cheap as Fortigate."
"We pay for Trend Micro TippingPoint Threat Protection System yearly. The cost increases if you add more users."
"It's an expensive product."
"TTPS is reasonably priced."
"On a scale from one to ten, where one is cheap and ten is expensive, I rate the solution's pricing a seven out of ten."
"The price is in a market-suitable price range. So it's not expensive, but it's also not cheap either. The price is a strong point."
report
Use our free recommendation engine to learn which Threat Intelligence Platforms solutions are best for your needs.
850,028 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
14%
Financial Services Firm
11%
Government
10%
Manufacturing Company
6%
Computer Software Company
13%
Financial Services Firm
13%
Manufacturing Company
9%
University
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Check Point Security Management?
The most beneficial features for us are the alert classifications, which help us prioritize critical issues, and the detailed reports that provide insights into attack origins and purposes, such as...
What needs improvement with Check Point Security Management?
One case I saw was with the logs, which gave me the transfer and the vibration. There's a lot of logs, and I'm unsure about their validity, however, they take up a lot of space. We had to provision...
What is your primary use case for Check Point Security Management?
This is the Wi-Fi documentation. I work with the service, and we are partners with Check Point. One of our clients, Parliament, required an upgrade from physical to virtual implementation. This was...
What do you like most about Trend Micro TippingPoint Threat Protection System?
The solution's IDS functionality filters the traffic and blocks malware by blocking the connections.
What is your experience regarding pricing and costs for Trend Micro TippingPoint Threat Protection System?
On a scale from one to ten, where one is cheap and ten is expensive, I rate the solution's pricing a seven out of ten.
What needs improvement with Trend Micro TippingPoint Threat Protection System?
The way we can build the filters could be improved. The solution should provide the possibility to mix traffic parameters with traffic's geographical source to have improved functionality able to d...
 

Also Known As

R80.10, R80, R77.30, R77, Check Point R80.10 Security Management, R80 Security Management
TippingPoint Digital Vaccine, TippingPoint DV, Trend Micro Digital Vaccine, Trend Micro DV, Trend Micro TippingPoint NGIPS
 

Overview

 

Sample Customers

Hedgetec, Geiger
Yapi Kredi
Find out what your peers are saying about Check Point Security Management vs. Trend Micro TippingPoint Threat Protection System and other solutions. Updated: April 2025.
850,028 professionals have used our research since 2012.