

KerioControl and Trend Micro TippingPoint Threat Protection System offer differing approaches within the network security category. KerioControl seems to have the upper hand for small to medium businesses due to its affordability and ease of integration, whereas Trend Micro TippingPoint is more suitable for larger enterprises with its advanced security features.
Features: KerioControl offers live monitoring, flexible security configurations, and simple VPN setups. Its comprehensive security features include a strong firewall and VPN capabilities, which are highly valued by users. Trend Micro TippingPoint excels with its robust IPS capabilities and effective threat management. Its integration with other security tools provides comprehensive network protection, and its zero-day protection offers an added layer of security.
Room for Improvement: KerioControl could improve its diagnostic tools and VPN configuration options. Issues have been reported with guest interfaces and logging inaccuracies. Trend Micro TippingPoint's main area for improvement is its price accessibility, as its cost may be prohibitive for smaller businesses. Enhancing integration with more cost-friendly models could broaden its appeal.
Ease of Deployment and Customer Service: KerioControl is known for its smooth deployment across various platforms, including on-premises and hybrid clouds. Customer service experiences vary, with some users noting a decline in responsiveness after GFI's takeover. Trend Micro TippingPoint generally requires professional deployment, and while support is reliable, there are suggestions that speed and accessibility could be improved.
Pricing and ROI: KerioControl offers a straightforward pricing model, ideal for small to medium enterprises. It delivers significant ROI through reduced management time and efficient security practices. Trend Micro TippingPoint is priced at a higher tier, reflecting its superior capabilities suited for larger environments. While its value is affirmed by strong performance in high-threat landscapes, the initial cost can be a barrier for smaller enterprises.
I have never needed to contact customer support as the product is easy to use.
KerioControl has met some of the network infrastructure needs yet could improve in terms of scalability.
The price for the product is rated as ten out of ten.
The most valuable features include geo-tagging, which blocks all other IPs except for the specified accounts, and web filtering.
The system responds to potential threats in real time, which is very important, and the Trend Micro TippingPoint Threat Protection System performs excellently.
| Product | Market Share (%) |
|---|---|
| Trend Micro TippingPoint Threat Protection System | 3.9% |
| KerioControl | 2.7% |
| Other | 93.4% |


| Company Size | Count |
|---|---|
| Small Business | 44 |
| Midsize Enterprise | 9 |
| Large Enterprise | 3 |
| Company Size | Count |
|---|---|
| Small Business | 11 |
| Midsize Enterprise | 6 |
| Large Enterprise | 4 |
Kerio Control is a popular security product for small and medium-sized businesses. It is a next-generation firewall that provides unified threat management without complexity. Kerio Control provides advanced anti-virus protection and industry-leading web and content application filtering, and has a secure VPN.
With Kerio Control you can:
Kerio Control Features
Some of Kerio Control’s most valuable features include:
High availability, deployment flexibility, deep packet inspection, advanced routing, usage reporting, quick administering, intrusion detection and prevention (IPS), gateway anti-virus, VPN, web and content application filtering, and centralized administration with MyKerio.
Kerio Control Benefits
Reviews from Real Users
Here is some feedback from some of our users who are currently using the solution:
PeerSpot user Brian C., Senior Technology Specialist, VP at Unified Technology Solutions, writes "It is very comprehensive and simple. It has all the active protections. It's updated. We love that you can set how often it is updated so you can work on what is right for you. A large company with a lot of bandwidth can update the virus definitions and security definitions hourly, if they want. A smaller site that's remote, where maybe updating the definitions will eat into the bandwidth, we can schedule those more to go later at night. It's very flexible and works for us in all types of situations. This is great because then we don't have to learn seven different products to be able to work with seven different scenarios."
Andy D., IT Manager at Flare Technologies, praises how easy it is to use and says, "One thing we use quite a lot, as well, is the DHCP Server, because we do a lot of work where all our devices need to have static IP addresses. Rather than going around and configuring every box, we do it all through DHCP reservations. It's easier. We've got a record of it. We can manipulate it if we need to change something or change some hardware. It's all easy. Even guys who are not used to using it can pick it up quite quickly."
Trend Micro TippingPoint Threat Protection System provides robust security features like digital vaccines and real-time responses, ensuring effective intrusion detection and seamless integration with other systems.
Trend Micro TippingPoint Threat Protection System is known for its ease of use, quick installation, and efficient IPS signatures. Its real-time threat responses and cloud-based management enable virtual patch creation and effective attack blocking. It integrates seamlessly with other systems, providing accurate intelligence and zero-day threat protection. Users appreciate its role in email scanning and network packet inspection. While it requires improved threat intelligence integration, streamlined processes, enhanced GUI, and less reliance on Java, its high cost limits smaller data centers. Better integration with other vendors and faster support are necessary.
What are the most important features of Trend Micro TippingPoint?Banks and government entities often deploy Trend Micro TippingPoint as an Intrusion Prevention System to counter cyber threats like malware, DDos, and brute force attacks. It is crucial for data centers managing extensive traffic, surpassing traditional firewall mechanisms. Key in regions like India and Bangladesh for securing infrastructures.
We monitor all Intrusion Detection and Prevention Software (IDPS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.