Try our new research platform with insights from 80,000+ expert users

Cisco Secure Network Analytics vs Trellix Intrusion Prevention System vs Trend Micro TippingPoint Threat Protection System comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Mindshare comparison

Network Monitoring Software
Intrusion Detection and Prevention Software (IDPS)
Intrusion Detection and Prevention Software (IDPS)
 

Featured Reviews

Muhammad Harun-Owr-Roshid - PeerSpot reviewer
Have streamlined network visibility and troubleshooting while seeing benefits from AI integration
In terms of improvements for Cisco Secure Network Analytics, from the implementation point of view, now that AI is in use, some other features need to be upgraded considering AI solutions. Proper management of the database is also important; it should be centralized for easier data collection from a single database. When precise manual analysis is needed, it's sometimes difficult, so having a centralized database will allow network admins to find actual scenarios more effectively, especially since some information may not be visible on the GUI. Cisco should upgrade their hardware part to run the database, because sometimes it cannot handle the load while all features are running in the network. The database management should indeed be centralized because while AI runs behind the systems, central management is essential. For example, in a network with 100 Cisco switches, a few routers, firewalls, and access points, all data generated should be preserved in a central database. This approach simplifies management and analysis for troubleshooting, as GUI interfaces may not always provide visible information. Centralizing the database will allow for better understanding of which information is preserved for each specific device.
Juan Muriel - PeerSpot reviewer
Protects from attacks in real-time and provides accurate threat intelligence updates
I rate the ease of setup a seven or eight out of ten. The platform functions very well. We need technical support to make improvements to the platform. The deployment takes eight months. We need two or three system engineers and one electronic engineer specialized in Trellix platforms to deploy the tool. We need only one system engineer to maintain the product.
Rejwana Rahman - PeerSpot reviewer
Client feedback highlights smooth performance with enhancements expected over time
The system responds to potential threats in real time, which is very important, and the Trend Micro TippingPoint Threat Protection System performs excellently. In Bangladesh, one bank keeps performing with this solution, and I think it will be an example for others as well. The bank wants to protect their network, and this is a cybersecurity solution. For providing cybersecurity solutions, they explore many things. Basically, every kind of BFSI uses a network firewall, which is a very basic component.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It has been pretty stable since we deployed it, and everything seems to be working fine."
"The beginning of any security investigation starts with net flow data."
"Provides easily identifiable anomalies that you can't see with signature detections."
"The deployment was a breeze. It is a very innovative and robust platform that allows us to bi-directionally stitch together data elements from Netflow-enabled devices to provide a context for network utilization."
"StealthWatch lets me see the ports running in and out and the country. It has excellent reporting, telemetry, and artificial intelligence features. With the telemetry, I can set thresholds to detect sudden changes and the alarms go through the PLC parts. I can see all the ports running on that trunk."
"The most valuable features are encrypted threat analysis and the ability to run jobs on entire flows."
"If you are using Darktrace or NAC solutions you can integrate Stealthwatch."
"The most valuable features include encrypted traffic analytics and the ability to fulfill requirements at the network level."
"Great monitoring feature."
"The most valuable features in Trellix for me are the automated signature updates. It is a great and convenient feature."
"There's a good dashboard you can drill down into. It helps you easily locate intrusions and the source of attacks."
"The product is worth the investment."
"Overall the solution is very good. It offers great protection and gives us a good overview of what is on the network."
"The feature I found most valuable is the network threat analyzer in the security platform. It also integrates with GTI, or Global Threat Intelligence. Otherwise, I just use the basic features."
"The most valuable features are the customization of the signature and the unlimited amount of signatures in IPS."
"The initial setup is straightforward."
"I would rate TTPS's stability eight out of ten."
"The IPS signatures and the IPS database that are given are much better than what is commonly available."
"The solution's IDS functionality filters the traffic and blocks malware by blocking the connections."
"The most valuable feature is the central command center, where we can control and manage the solution."
"Trend Micro TippingPoint Threat Protection System is very stable. In addition, the provider gives notice of any changes well in advance, which is important for planning updates."
"You don't need any hardware because the solution is on the cloud. I like that Trend Micro TippingPoint Threat Protection System is easy to install and manage."
"The technical support on offer is very good."
"A standout feature of TippingPoint is its strong integration with various solutions. It stands out as one of the leading network Intrusion Prevention Systems (IPS) in the current market and is known for its seamless integration with other solutions. For instance, when it identifies a potential threat within the traffic stream, it meticulously analyzes the data. Even in multilayer security scenarios, Tipping Point's network IPS can serve as a bypass for the basic firewall. If a threat is identified by Tipping Point, it promptly shares this information with the other systems. This ensures that they're updated and can employ the necessary solutions from their signature databases. The entire network gets safeguarded automatically. This integration extends to components like security and FX. This linkage streamlines our operations, offering a consolidated point of control for managing threats effectively."
 

Cons

"Its granularity for RBAC roles-based access control needs improvement."
"One update I would like to see is an agent-based client. Currently StealthWatch is network based."
"The solution should have the ability to analyze security events not only at the network layer but also at the application and OS layers."
"I would like to see more and cleaner reporting. For example, if I pull up Steven and I want to look and maybe compare him to what you've done in the past week, and compare that to the past six months, the point would be to see what the difference in activity looks like over this time. I don't see that capability in reporting to date. You see that trend but you don't really see a straightforward comparison. That right there is key to what we want to see about the normal activity."
"The customizability of the UI should improve."
"We had some trouble with the installation as we migrated from our previous solution."
"I would like to see more expansion in artificial intelligence and machine learning features."
"Better integration between Cisco Secure Network Analytics and Cisco Secure Workload would be beneficial."
"The area of concern where the tool needs improvement is how the product prompts users at a network level that helps prevent any wireless network attacks through alerts and notifications."
"Some of the documentation is not as straightforward as it could be."
"The technical support must be improved."
"We would like to have a simpler version. Some settings and functions on the McAfee console are complex and complicated. I want the management console to be simpler."
"There are limited resources for configuration guidance."
"The solution needs to improve the graphical interface. And they had a limitation in some of the sensor modems as well."
"The solution could improve some aspects of detection."
"The pricing could be improved."
"The firewall rules are limited."
"I find Trend Micro TippingPoint Threat Protection System a bit clunky, and updating it can be a pain in the neck because you need to do it from time to time, so this is what needs to be improved in it. I would also rather have an all-in-one system that does intrusion detection, protection, web filtering, and also serves as a firewall, and my company is moving to an all-in-one solution, but I'm unsure of how soon that's going to be. Trend Micro TippingPoint Threat Protection System also doesn't have enough bandwidth to handle the required traffic within my company, so it's going to be replaced."
"The solution should provide the possibility to mix traffic and the traffic's geographical source to have improved functionality."
"Price is a significant factor that requires attention to enhance the popularity of Tipping Point among mid-sized data centres. Currently, Tipping Point is primarily adopted by sizable data centres, and smaller defenders might find it financially challenging to acquire. Recognizing this, efforts are underway to potentially introduce diverse models with varying capacities. This adjustment aims to ensure that a broader range of data sizes can benefit from the solution. Also, the continuous evolution of Tipping Point is evident in its features, particularly the personalized dashboard and related aspects."
"The solution is pretty expensive."
"There is room for improvement in customer service and support."
"An area for improvement in Trend Micro TippingPoint Threat Protection System is the complexity of its interface."
"TTPS is a bit behind in visuals, the UI, and some data elements."
 

Pricing and Cost Advice

"On a yearly basis, licensing is somewhere around $30,000."
"NetFlow is very expensive."
"Today, we are part of the big Cisco ELA, and it is a la carte. We can get orders for whatever we want. At the end of the day, we have to pay for it in one big expense, but that is fine. We are okay with that."
"Licensing is on a yearly basis."
"The yearly licensing cost is about $50,000."
"The solution is expensive. It costs several hundred thousand dollars per year (depending on how many flows you are collecting)."
"The licensing costs are outrageous."
"​Licensing is done by flows per second, not including outside (in traffic)."
"I rate the product’s pricing an eight out of ten."
"The tool is competitively priced."
"The price is in a market-suitable price range. So it's not expensive, but it's also not cheap either. The price is a strong point."
"It's an expensive product."
"On a scale from one to ten, where one is cheap and ten is expensive, I rate the solution's pricing a seven out of ten."
"We pay for Trend Micro TippingPoint Threat Protection System yearly. The cost increases if you add more users."
"TTPS is reasonably priced."
"Trend Micro TippingPoint Threat Protection System is an expensive product."
"TippingPoint is not as expensive as Palo Alto but it's not as cheap as Fortigate."
"It is an expensive solution and I would rate it three out of ten."
report
Use our free recommendation engine to learn which Network Monitoring Software solutions are best for your needs.
860,592 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
26%
Financial Services Firm
10%
Government
9%
Manufacturing Company
7%
Financial Services Firm
12%
Computer Software Company
11%
Manufacturing Company
11%
Comms Service Provider
7%
Computer Software Company
12%
Financial Services Firm
12%
Manufacturing Company
9%
University
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Cisco Stealthwatch?
The most valuable feature of Cisco Secure Network Analytics is the Threat Intelligence integration.
What is your experience regarding pricing and costs for Cisco Stealthwatch?
Regarding cost, for the Bangladesh context, Cisco Secure Network Analytics is a little bit high-priced because we are...
What needs improvement with Cisco Stealthwatch?
In terms of improvements for Cisco Secure Network Analytics, from the implementation point of view, now that AI is in...
What do you like most about McAfee Network Security Platform?
The threat intelligence updates are very accurate.
What is your experience regarding pricing and costs for McAfee Network Security Platform?
The tool is competitively priced. I rate the pricing a six out of ten.
What needs improvement with McAfee Network Security Platform?
Network Threat Behavior Analysis must be improved. The technical support must be improved. The support team must prov...
What do you like most about Trend Micro TippingPoint Threat Protection System?
The solution's IDS functionality filters the traffic and blocks malware by blocking the connections.
What is your experience regarding pricing and costs for Trend Micro TippingPoint Threat Protection System?
On a scale from one to ten, where one is cheap and ten is expensive, I rate the solution's pricing a seven out of ten.
 

Also Known As

Cisco Stealthwatch, Cisco Stealthwatch Enterprise, Lancope StealthWatch
McAfee Network Security Platform, McAfee NSP, IntruShield Network Intrusion Prevention System, IntruShield Network IPS
TippingPoint Digital Vaccine, TippingPoint DV, Trend Micro Digital Vaccine, Trend Micro DV, Trend Micro TippingPoint NGIPS
 

Overview

 

Sample Customers

Edge Web Hosting, Telenor Norway, Ivy Tech Community College of Indiana, Webster Financial Corporation, Westinghouse Electric, VMware, TIAA-CREF
Desjardins Group, HollyFrontier, Nubia, Agbar, WNS Global Services, INAIL, Universidad de Las Américas Puebla (UDLAP), Cook County, China Pacific Insurance, Bank Central Asia, California Department of Corrections and Rehabilitation, City of Chicago, Macquarie Telecom, Sutherland Global Services, Texas Tech University Health Sciences Center, United Automotive Electronic Systems
Yapi Kredi
Find out what your peers are saying about Zabbix, Auvik, SolarWinds and others in Network Monitoring Software. Updated: May 2025.
860,592 professionals have used our research since 2012.