

Palo Alto Networks Advanced Threat Prevention and Trend Micro TippingPoint Threat Protection System are robust players in the comprehensive threat protection market. Palo Alto is often favored for its extensive features despite its higher cost, whereas Trend Micro offers a slightly more economical option while maintaining high accuracy.
Features: Palo Alto Networks Advanced Threat Prevention includes a next-generation firewall, URL filtering, and WildFire sandboxing, which users find easy to manage and control application bandwidth. Trend Micro TippingPoint is valued for its strong intrusion prevention system, inline SSL switch, and real-time threat response, with a focus on accurate and seamless integration.
Room for Improvement: Users suggest improving Palo Alto's DNS functions and reducing false positives while hoping for enhanced AI analytics and expanded behavioral detection. Trend Micro could benefit from better integration with platforms like Azure, enhanced UI, faster integration processes, and updates in premium support and interface.
Ease of Deployment and Customer Service: Palo Alto supports easy deployment across hybrid and public clouds but experiences inconsistent technical support, especially in regions without local offices. Trend Micro also offers versatile deployment options and receives mixed reviews on support, highlighting the need for improved communication and accessibility.
Pricing and ROI: Palo Alto tends to be more expensive, with users recognizing its premium pricing is supported by extensive features. Trend Micro is less costly than Palo Alto but remains on the higher side. Users appreciate Trend Micro's value due to bundled licenses and subscriptions, while Palo Alto's pricing strategy could be improved to better cater to smaller markets.
It offers insights into security threats, despite the inability to quantify its impact in numbers.
Overall, I find the technical support from Palo Alto Networks quite good, although getting a hold of the TAC can be challenging and sometimes requires long phone calls.
I have proof of this rating - when I escalate a case, I receive a reply from TAC support after two days.
I rate technical support from Palo Alto as eight out of ten.
Palo Alto Networks Advanced Threat Prevention is scalable and works well wherever enforcement points exist.
Proper sizing of the firewall models ensures that the system does not experience crippling performance issues.
Palo Alto needs to focus on how to bring that technology to end users and how easy it is to use, especially in a hybrid environment where users work from various locations.
The behavioral detection capabilities could be expanded to address all threats at the perimeter, reducing the reliance on endpoint detection and response systems.
Palo Alto Networks Advanced Threat Prevention requires an add-on license and is considered expensive compared to competitors like Cisco AMP and FortiGate firewalls.
As traditional signature-based mechanisms become less effective due to the evolving nature of attacks, this solution's focus on behavioral analysis is crucial.
We are satisfied with the analytic capabilities of Palo Alto Networks Advanced Threat Prevention, especially the reporting features available in the Palo Alto portal in terms of their application visibility interface, which is very good for us to get visibility on all critical applications and the associated users, as well as the risks associated with every category of traffic.
The system responds to potential threats in real time, which is very important, and the Trend Micro TippingPoint Threat Protection System performs excellently.
| Product | Market Share (%) |
|---|---|
| Trend Micro TippingPoint Threat Protection System | 3.9% |
| Palo Alto Networks Advanced Threat Prevention | 5.4% |
| Other | 90.7% |


| Company Size | Count |
|---|---|
| Small Business | 9 |
| Midsize Enterprise | 4 |
| Large Enterprise | 14 |
| Company Size | Count |
|---|---|
| Small Business | 11 |
| Midsize Enterprise | 6 |
| Large Enterprise | 4 |
Palo Alto Networks Advanced Threat Prevention is a cloud-based security service that combines cutting-edge technologies, including machine learning, artificial intelligence, and expert human monitoring, to effectively thwart advanced threats like malware, zero-day attacks, and command-and-control threats. It offers inline protection, scrutinizing all network traffic irrespective of port, protocol, or encryption. An integral component of Palo Alto Networks' security platform, it enjoys widespread adoption across diverse organizations. With its robust security capabilities, it's an ideal choice for entities of all sizes, particularly those in high-risk sectors such as finance, healthcare, and government agencies, seeking to safeguard their networks from a broad spectrum of advanced threats.
Trend Micro TippingPoint Threat Protection System provides robust security features like digital vaccines and real-time responses, ensuring effective intrusion detection and seamless integration with other systems.
Trend Micro TippingPoint Threat Protection System is known for its ease of use, quick installation, and efficient IPS signatures. Its real-time threat responses and cloud-based management enable virtual patch creation and effective attack blocking. It integrates seamlessly with other systems, providing accurate intelligence and zero-day threat protection. Users appreciate its role in email scanning and network packet inspection. While it requires improved threat intelligence integration, streamlined processes, enhanced GUI, and less reliance on Java, its high cost limits smaller data centers. Better integration with other vendors and faster support are necessary.
What are the most important features of Trend Micro TippingPoint?Banks and government entities often deploy Trend Micro TippingPoint as an Intrusion Prevention System to counter cyber threats like malware, DDos, and brute force attacks. It is crucial for data centers managing extensive traffic, surpassing traditional firewall mechanisms. Key in regions like India and Bangladesh for securing infrastructures.
We monitor all Intrusion Detection and Prevention Software (IDPS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.