We performed a comparison between Cisco ACI and Trend Micro TippingPoint Threat Protection System based on real PeerSpot user reviews.
Find out in this report how the two Cloud and Data Center Security solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The centralized configuration is its most valuable feature."
"The operation and maintenance costs have been reduced. It is also simple to deploy any deployment. Any configuration can be easily done."
"Because we can use automation processes with this platform, we have been able to free up our IT department's time."
"Automation is its most valuable feature."
"You can integrate Cisco ACI well with VMware."
"The integration with vCenter means that when I create something on the network, it only has to happen one time instead of many times for our many virtual hosts."
"It is a complete re-write of everything that you've ever thought of from a networking standpoint."
"ACI's most valuable feature is its SDN capabilities. Everything is on your software design controller. Everything is blocked by default until you allow it."
"It integrates easily."
"What I like about Trend Micro TippingPoint Threat Protection System is that it works okay. I don't have time to mess with the tool most of the time because I have way too many tasks to do, but Trend Micro TippingPoint Threat Protection System tells you when there's a problem, then it blocks the problem, so that's what I like most about it."
"I would rate TTPS's stability eight out of ten."
"Trend Micro TippingPoint Threat Protection System is very stable. In addition, the provider gives notice of any changes well in advance, which is important for planning updates."
"The monitoring is the most valuable feature."
"The most valuable feature is the central command center, where we can control and manage the solution."
"The solution's IDS functionality filters the traffic and blocks malware by blocking the connections."
"For intrusion detection and mitigation, it has helped us in sort of known signatures and all sorts of things. So, we're very happy with the engine. That's the work."
More Trend Micro TippingPoint Threat Protection System Pros →
"The initial set up was complex. We had to deploy 120 leads. Migrating from Legacy Cisco network to ACI was complex."
"Figuring out how to implement the product for clients is the area we struggle with the most every day. Perhaps an enhancement would be artificially intelligent solutions, but that would be further down the road."
"We have had two calls with technical support. They are not the best. We opened a case to diagnose issues and it's taken weeks to get someone on the case and to move forward."
"It needs to be able to function on the cloud."
"The tool's initial deployment is complex and takes five hours to complete."
"The way the objects are oriented on it are not as straightforward as they should be."
"The ability for us to figure out the traffic flows, to enable some of the more segmentation parts of it, is really tough with what is built into ACI."
"It is still not mature and has room to grow. As with any product out there, it requires time to develop."
"It integrates well but it takes time."
"An area for improvement in Trend Micro TippingPoint Threat Protection System is the complexity of its interface."
"There is room for improvement in customer service and support."
"Price is a significant factor that requires attention to enhance the popularity of Tipping Point among mid-sized data centres. Currently, Tipping Point is primarily adopted by sizable data centres, and smaller defenders might find it financially challenging to acquire. Recognizing this, efforts are underway to potentially introduce diverse models with varying capacities. This adjustment aims to ensure that a broader range of data sizes can benefit from the solution. Also, the continuous evolution of Tipping Point is evident in its features, particularly the personalized dashboard and related aspects."
"The solution should provide the possibility to mix traffic and the traffic's geographical source to have improved functionality."
"I find Trend Micro TippingPoint Threat Protection System a bit clunky, and updating it can be a pain in the neck because you need to do it from time to time, so this is what needs to be improved in it. I would also rather have an all-in-one system that does intrusion detection, protection, web filtering, and also serves as a firewall, and my company is moving to an all-in-one solution, but I'm unsure of how soon that's going to be. Trend Micro TippingPoint Threat Protection System also doesn't have enough bandwidth to handle the required traffic within my company, so it's going to be replaced."
"We need more integration. It would be good if Azure IPS and TippingPoint IPS and other products from Trend Micro like their DBI and IWSVA could talk between each other."
"I would like to see this solution more lightweight and easier to install."
More Trend Micro TippingPoint Threat Protection System Cons →
More Trend Micro TippingPoint Threat Protection System Pricing and Cost Advice →
Cisco ACI is ranked 2nd in Cloud and Data Center Security with 96 reviews while Trend Micro TippingPoint Threat Protection System is ranked 13th in Cloud and Data Center Security with 19 reviews. Cisco ACI is rated 8.0, while Trend Micro TippingPoint Threat Protection System is rated 8.0. The top reviewer of Cisco ACI writes "Stable, easy to extend, scalable, and has a host-based routing feature". On the other hand, the top reviewer of Trend Micro TippingPoint Threat Protection System writes "Operates in-line in the network, blocking malicious and unwanted traffic". Cisco ACI is most compared with VMware NSX, Cisco Secure Workload, Akamai Guardicore Segmentation, Nuage Networks and Juniper Contrail Networking, whereas Trend Micro TippingPoint Threat Protection System is most compared with Trend Micro Deep Discovery, Check Point IPS, Fortinet FortiGate IPS, Palo Alto Networks Advanced Threat Prevention and Cisco NGIPS. See our Cisco ACI vs. Trend Micro TippingPoint Threat Protection System report.
See our list of best Cloud and Data Center Security vendors.
We monitor all Cloud and Data Center Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.