We performed a comparison between Microsoft Defender Threat Intelligence and Trend Micro TippingPoint Threat Protection System based on real PeerSpot user reviews.
Find out in this report how the two Threat Intelligence Platforms solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The tool is managed from the cloud, because of which the maintenance is very low."
"Microsoft collects trillions of signals from all over the world, which is incredibly valuable. It helps us identify zero-day vulnerabilities and global threats."
"The product's initial setup phase was straightforward."
"The technical support services are excellent."
"I value how Threat Intelligence integrates with the different platforms in Microsoft."
"The user interface is pretty user-friendly."
"The global review and remediation of malicious code is probably the most valuable feature."
"Its user-friendliness is its most valuable aspect."
"The solution's IDS functionality filters the traffic and blocks malware by blocking the connections."
"Trend Micro TippingPoint Threat Protection System is very stable. In addition, the provider gives notice of any changes well in advance, which is important for planning updates."
"What I like about Trend Micro TippingPoint Threat Protection System is that it works okay. I don't have time to mess with the tool most of the time because I have way too many tasks to do, but Trend Micro TippingPoint Threat Protection System tells you when there's a problem, then it blocks the problem, so that's what I like most about it."
"The most valuable feature is the central command center, where we can control and manage the solution."
"For intrusion detection and mitigation, it has helped us in sort of known signatures and all sorts of things. So, we're very happy with the engine. That's the work."
"A standout feature of TippingPoint is its strong integration with various solutions. It stands out as one of the leading network Intrusion Prevention Systems (IPS) in the current market and is known for its seamless integration with other solutions. For instance, when it identifies a potential threat within the traffic stream, it meticulously analyzes the data. Even in multilayer security scenarios, Tipping Point's network IPS can serve as a bypass for the basic firewall. If a threat is identified by Tipping Point, it promptly shares this information with the other systems. This ensures that they're updated and can employ the necessary solutions from their signature databases. The entire network gets safeguarded automatically. This integration extends to components like security and FX. This linkage streamlines our operations, offering a consolidated point of control for managing threats effectively."
"I would rate TTPS's stability eight out of ten."
"It integrates easily."
More Trend Micro TippingPoint Threat Protection System Pros →
"The tool's onboarding of users that use on-premise or hybrid environments needs to be improved."
"The software is expensive."
"I would like to see more AI features and capabilities."
"It's a bit complicated to manage because you have many dependencies of servers, many dependencies in queue, and so on. Entries or different endpoints, and you make different configuration topics for each one. So that's a major problem."
"Technical support could be a bit better."
"The price of the solution is an area of concern where improvements are required. In general, the solution's price needs to be reduced."
"Microsoft Defender Threat Intelligence is evolving and needs to fix and enhance numerous issues like stability and licensing. The continuous rebranding and licensing changes are confusing."
"There could be AI functionality included for features like reporting and dashboard preparation."
"It takes a lot of time before you're connected to an engineer, so an area for improvement in Trend Micro TippingPoint Threat Protection System is the response time of its technical support team."
"We need more integration. It would be good if Azure IPS and TippingPoint IPS and other products from Trend Micro like their DBI and IWSVA could talk between each other."
"The solution is pretty expensive."
"It integrates well but it takes time."
"TTPS is a bit behind in visuals, the UI, and some data elements."
"I would like to see this solution more lightweight and easier to install."
"Trend Micro TippingPoint Threat Protection System needs strong Spanish-language support."
"An area for improvement in Trend Micro TippingPoint Threat Protection System is the complexity of its interface."
More Trend Micro TippingPoint Threat Protection System Cons →
More Microsoft Defender Threat Intelligence Pricing and Cost Advice →
More Trend Micro TippingPoint Threat Protection System Pricing and Cost Advice →
Microsoft Defender Threat Intelligence is ranked 3rd in Threat Intelligence Platforms with 23 reviews while Trend Micro TippingPoint Threat Protection System is ranked 8th in Threat Intelligence Platforms with 19 reviews. Microsoft Defender Threat Intelligence is rated 8.4, while Trend Micro TippingPoint Threat Protection System is rated 8.0. The top reviewer of Microsoft Defender Threat Intelligence writes "A tool that offers endpoint protection with low maintenance costs". On the other hand, the top reviewer of Trend Micro TippingPoint Threat Protection System writes "Operates in-line in the network, blocking malicious and unwanted traffic". Microsoft Defender Threat Intelligence is most compared with Microsoft Sentinel, Cisco Threat Grid, STAXX, ThreatConnect Threat Intelligence Platform (TIP) and VirusTotal, whereas Trend Micro TippingPoint Threat Protection System is most compared with Trend Micro Deep Discovery, Check Point IPS, Fortinet FortiGate IPS, Palo Alto Networks Advanced Threat Prevention and Cisco NGIPS. See our Microsoft Defender Threat Intelligence vs. Trend Micro TippingPoint Threat Protection System report.
See our list of best Threat Intelligence Platforms vendors.
We monitor all Threat Intelligence Platforms reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.