Coming October 25: PeerSpot Awards will be announced! Learn more

Trend Micro TippingPoint Threat Protection System OverviewUNIXBusinessApplication

Trend Micro TippingPoint Threat Protection System is #9 ranked solution in top Threat Intelligence Platforms and #17 ranked solution in top Intrusion Detection and Prevention Software. PeerSpot users give Trend Micro TippingPoint Threat Protection System an average rating of 7.8 out of 10. Trend Micro TippingPoint Threat Protection System is most commonly compared to Check Point IPS: Trend Micro TippingPoint Threat Protection System vs Check Point IPS. Trend Micro TippingPoint Threat Protection System is popular among the large enterprise segment, accounting for 63% of users researching this solution on PeerSpot. The top industry researching this solution are professionals from a computer software company, accounting for 19% of all views.
Buyer's Guide

Download the Intrusion Detection and Prevention Software (IDPS) Buyer's Guide including reviews and more. Updated: September 2022

What is Trend Micro TippingPoint Threat Protection System?

Keep ahead of the latest threats and protect your critical data with ongoing threat prevention and analysis.

Trend Micro TippingPoint Threat Protection System was previously known as TippingPoint Digital Vaccine, TippingPoint DV, Trend Micro Digital Vaccine, Trend Micro DV, Trend Micro TippingPoint NGIPS.

Trend Micro TippingPoint Threat Protection System Customers

Yapi Kredi

Trend Micro TippingPoint Threat Protection System Video

Archived Trend Micro TippingPoint Threat Protection System Reviews (more than two years old)

Filter by:
Filter Reviews
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Showingreviews based on the current filters. Reset all filters
it_user1015209 - PeerSpot reviewer
Director at Diamond Infotech Pvt ltd
Real User
IPS signatures and the IPS database are much better than what is commonly available
Pros and Cons
  • "The IPS signatures and the IPS database that are given are much better than what is commonly available."
  • "We need more integration. It would be good if Azure IPS and TippingPoint IPS and other products from Trend Micro like their DBI and IWSVA could talk between each other."

What is our primary use case?

When the client chooses a security setup we first need to explain to them why the dedicated IPS assist is correct for them and its advantages. We need to determine their traffic load. With all those calculations we show them we sometimes end up with over-commitment for the TOC. If we're talking about Trend Micro, you should know that they have a range of products, from IPS, anti-security solutions, and discovery solutions.

We lay out all those products and if they feel that any of them meet their requirements then they incorporate that into their solution. After that, it normally goes through the tender process. We participate in the tender and if we win, we send the product to the customer. We generally work with larger companies or different government bodies. For the different public sector units, there is a security requirement where we go to the client to analyze their existing infrastructure, try to find out where the loopholes are, and when we find something we advise and present the solution. We then incorporate whatever product the client requires.

Maybe it's a small setup or maybe it's a multi-department dedicated IPS setup. We deliver whatever IPS featured is required.

The general use cases are for large data centers and state data centers, where people from different state departments post their applications with their servers in the data center cloud. I'm from Calcutta, India. Our company takes care of different government departments in the Eastern part of India, in West Bengal, in Bihar, in Orissa, in Jharkhand, different states there. In all these cases, the state data center or maybe some big government bodies like PUC's, public utility commissions, like ONGC have their own data centers. All their applications are hosted on this data center, or maybe there is a DR. Maybe the DR is on the cloud. Or maybe like the ONGC, they are on-premise. 

They need to process the graphs to identify whether there's an intrusion or not, and maybe some micro-sandboxing needs to be done. Right when the setup is changed, when these data centers get these devices and need to process a huge amount of data, huge incoming and outbound data, the firewall integrated into the IPS is not capable of handling that much load. Then you need to put in a dedicated IPS. That's where we introduce NGIPS from Trend Micro. That's the thing - it totally depends on the client's requirements, the site's needs, the data bandwidth, and how much processing is required. Trend Micro offers a complete solution.

Trend Micro offers the NGIPS solution, as well as the Deep Discovery Inspector or Deep Discovery Analyzer, the DDI, and DDA. If you put a DDI in line, we can create a different operating system via a sandbox to process. Whatever packet we get, whatever file is getting processed, we capture according to that and we find anything that needs to be blacklisted or whitelisted. If it's blacklisted, that informs us from the DDA that it is getting first to the IPS and the IPS can take care of it.

It's a complete security solution. We might need to introduce the INWB or IWSBA solutions from Trend Micro to analyze the base traffic as well as the main traffic. It's a combination - NGIPS is there to take care of any intrusion and APT is there to analyze the file and network traffic. I'm doing the network sandboxing. IWSBA takes care of that traffic. INSBA is there for taking care of the mail traffic. These four devices can communicate with each other and can instruct the IPS to do any ad-hoc blacklisting that is required.

What is most valuable?

In TippingPoint, the IPS signatures and the IPS database are much better than what is commonly available. TippingPoint is more intelligent. It can work out bypass models if the device goes bad suddenly for any reason. It actually goes into a bridge mode where it parses from the data and finds where the problem is with the software security. We configure it like this so that if that happens, we immediately switch on the IPS in the firewall because technically the scenario is like that in the gateway. We first put on the firewall and the connection goes from there before going to the internal network or LC. We put the IPS in between the perimeter firewall, in an internal port.

One of the major reasons for choosing TippingPoint is that it acquires the intelligence of the IPS signatures. It is the first IPS solution database we tried. We actually detect a lot of intrusions not detectable by other solutions. This is an important point.

Another feature is that it can work in a base mode if the device goes down. Then, even if we do not do a modification into the network to get it working, you just switch on the IPS in the firewall and the device will pass on all those packets to the underlying devices. This way the operation doesn't stop and in the meantime, you can fix the problem.

What needs improvement?

In terms of what can be improved, I would say, integration. Integration of Trend Micro solutions with Azure. We need more integration. It would be good if Azure IPS and TippingPoint IPS and other products from Trend Micro like their DBI and IWSVA could talk between each other.

That integration should be increased so that human integration could be decreased. If it could communicate with other products, it would be great.

If you see a pay-meter firewall at Checkpoint, or Palo Alto and you're using Trend Micro, and your perimeter firewall is from some other vendor, maybe you are using anti-DDoS solution or maybe you are using some other solution from some other provider. If the pinpoint can be integrated with other vendors, it would be great. I'm not talking about each and every brand available in the market, but at least, with some reputable vendors like Palo Alto or Checkpoint. It would be great if that integration actually gives us a consolidated report, which helps us to monitor from a single point by eliminating duplicates.

For how long have I used the solution?

We have around four or five installers on TippingPoint NGIPS. We have been a partner with Trend Micro for the last two years and we sold these solutions to different state bodies, state powers, and state governments for their data centers.

Buyer's Guide
Intrusion Detection and Prevention Software (IDPS)
September 2022
Find out what your peers are saying about Trend Micro, Cisco, Palo Alto Networks and others in Intrusion Detection and Prevention Software (IDPS). Updated: September 2022.
633,572 professionals have used our research since 2012.

What do I think about the stability of the solution?

It is a stable solution. It is dedicated to IPS. It is one of the best solutions. It's a very stable and very good solution in this way. 

It does not require maintenance. Of course, it requires some operative person to manage it like monitoring the logs, fine-tuning the day to day operations, etc. We need to have a security guy in the data center, in the NOC or in the SOC, Security Operation Center, who needs to look through the logs and do the necessary monitoring. But otherwise, we do not need regular interaction with the employee. Of course troubleshooting or fault-finding or anything like that we do.

What do I think about the scalability of the solution?

In terms of scalability, it is a scalable solution.

How are customer service and support?

Trend Micro's general support is good. If we require any technical support for any of their products they are always able to help us.

How was the initial setup?

All the deployments that we have done so far are on-site because they're data centers. The traffic goes to the cloud to get processed but they prefer their setup to be on-premise.

The setup is not very long but it does require a little bit of struggling to make it work and to get it properly integrated into the environment. It takes time, it's not like it is two clicks and it will start working. It's not like that.

What's my experience with pricing, setup cost, and licensing?

In terms of price, TippingPoint is not a cheap solution. It is not a very costly solution, but comparatively it is more.

When you purchase TippingPoint, you're purchasing their subscription which gives IPS database updates. They bundle everything together. That includes the warranty and extended warranty of the box, along with the support subscription to speak to tech support, or the IPS database, signature application, all those things are provided.

Almost all those things are bundled together. They bundle all the requests and licensing. We need to go back to them to ask for additional licenses or something like that, because in my department we cannot just go back to the client and tell them, okay, these are the things you need to purchase. It is impossible. So in the beginning of the process, when we sell the solution to our client, we always bundle all the necessary licensing so that it can be used whenever it is required.

On a scale of one to ten I would give TippingPoint NGIPS an eight.

What other advice do I have?

Trend Micro provides us technical updates and their free training if a new feature comes into their product.

In general, I would of course recommend this product to other people.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
Head of Group at MTI LLC
Real User
Easy to control and manage but should be more lightweight and have better documentation
Pros and Cons
  • "The most valuable feature is the central command center, where we can control and manage the solution."
  • "I would like to see this solution more lightweight and easier to install."

What is our primary use case?

Our partner is a solution integrator and this is one of the products that he implements for our customers. We are currently working on two pilot projects that involve this solution.

Our experience is with on-premises deployments.

How has it helped my organization?

All traffic is unassembling which goes through TO. Our customer satisfied by TP.

What is most valuable?

The most valuable feature is the central command center (APEX ONE), where we can control and manage the solution.

What needs improvement?

Our customers don't understand the process whereby we generate and supply them with license keys. They would like to have the license keys available out of the box.

This documentation for this solution could be improved.

For how long have I used the solution?

Our customer has been using this solution for one year.

What do I think about the stability of the solution?

This is a stable solution. During our pilot project, we have not had any trouble.

How are customer service and technical support?

The tech team are professionals.

How was the initial setup?

This is a fast solution to deploy. But we've waited for PoC results.

What about the implementation team?

TP has been deployed by our partner integrator and vendor engineers. They have good tech experience.

What's my experience with pricing, setup cost, and licensing?

Bear in mind that if you've made the deal registration, follow it and work in that account that it only gives you a chance to grab this deal.

Which other solutions did I evaluate?

This solution is easier to install than Firepower.

What other advice do I have?

This is a good solution, but our market needs clearer deal registration process. It also needs faster PoC feedbacks.

I would rate this solution a seven out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller.
PeerSpot user
Buyer's Guide
Intrusion Detection and Prevention Software (IDPS)
September 2022
Find out what your peers are saying about Trend Micro, Cisco, Palo Alto Networks and others in Intrusion Detection and Prevention Software (IDPS). Updated: September 2022.
633,572 professionals have used our research since 2012.
Yusif Samadov - PeerSpot reviewer
‎Network Engineer at BestComp Group
Real User
Provides good monitoring and setup is easy, but solution is not as reliable as we would like
Pros and Cons
  • "The monitoring is the most valuable feature."
  • "The firewall rules are limited."

What is our primary use case?

We use it in the banking industry.

What is most valuable?

The monitoring is the most valuable feature.

What needs improvement?

The solution is not as reliable as we would like. There are problems when we work in HA, high-availability. We have encountered it several times and it's been a disaster for that sort of device.

Also, the firewall rules are limited.

For how long have I used the solution?

Three to five years.

How are customer service and technical support?

The technical support staff at Trend Micro is very knowledgeable and talented. We had several cases and they supported us and provided the best answer.

How was the initial setup?

The setup is very easy. The GUI of the device is very understandable and easy to use, and that's why it's very easy to set up. The initial setup is very comfortable, but as complicated as other firewalls.

The initial setup takes approximately half an hour, but full setup depends on the organization type. In some cases it has taken two to three months to deploy it.

What's my experience with pricing, setup cost, and licensing?

TippingPoint is not as expensive as Palo Alto but it's not as cheap as Fortigate.

Which other solutions did I evaluate?

Before Trend Micro TippingPoint we worked with Cisco ASA firewalls. We are now also using Palo Alto, Fortigate, and Juniper firewalls.

What other advice do I have?

If we can work with Trend Micro and sell TippingPoint, it's very good. It's not a bad device and, nowadays, it's very useful.

At first, it was an HPE product when we started working with TippingPoint and then it was bought by Trend Micro.

The number of users using this solution depends on the organization. In one organization we have approximately 2,000 users on this device. For deployment and maintenance two people are enough. In our organization, when we deployed it, only one person managed and configured it. Someone who is a network engineer can do the configuration.

From the time that Trend Micro bought this product we haven't sold it anymore because we work with HPE. But we are supporting organizations who are using Trend Micro.

Disclosure: My company has a business relationship with this vendor other than being a customer: Solution provider and reseller.
PeerSpot user
PeerSpot user
The Chief of IT security department at a financial services firm with 501-1,000 employees
Vendor
Sorting/Blocking/Searching can be done in one or two moves, although it should provide dashboard on-line alerting about current attacks and their sources.

Valuable Features

  • Quick and professional service
  • Customer filter creation/deployment
  • Easy-in-use
  • Quick and simple installation without specific knowledge
  • Less administrative load, as after tuning only 30-40 minutes needed per day to manage it
  • Sorting/Blocking/Searching can be done in one or two moves

Improvements to My Organization

  • Compliance (local regulations, legislation)
  • Specific filters for specific needs
  • Traffic prioritization for business, video/audio streams and gamers have limitations

Room for Improvement

  • Advanced DDoS protection (not only SYN flood)
  • Custom reporting
  • Dashboard on-line alerting about current attacks and their sources

Customer Service and Technical Support

It has the best support, quick and professional.

Other Advice

  • To be sure on the user-friendliness of the interface, please compare its options/features with competitors
  • Check the frequency of updates (regular, urgency) with other competitors.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Omar Sánchez (Mr.Tech) - PeerSpot reviewer
Information Security Advisor, CISO & CIO, Docutek Services at Docutek Services
Consultant
Leaderboard
Its default filters include, among 2300 others, protection against buffer overflows and malicious downloads, but be sure to make baseline audits and incident-handling protocols upon deployment.

Valuable Features:

It ships with a default profile that enables approximately 2300 filters for items that should never legitimately exist on a network, including certain attacks such as buffer overflows as well as malicious downloads. In addition to these default filters, more than 5400 additional filters, broadly considered policy choices, are available for use based on the requirements of the protected environment and it now offers a Reputation Digital Vaccine Service (Rep DV).

HP released a Vaccine toolkit that uses a wizard to let TippingPoint customers generate their own filters, in effect deploying "virtual patches" to protect themselves from vulnerability exploitation. Filters created by using the Digital Vaccine Toolkit can be applied directly to a single IPS or the SMS console can be used to quickly update all systems. Impressive.

Improvements to My Organization:

It has enhanced the monitoring.

Room for Improvement:

Your IPS is only as good as the threat intelligence behind it. TippingPoint should be able to combine ArcSight into IP blocking services, not wait for Fortify to pull ArcSight.

Use of Solution:

1 YEAR

Deployment Issues:

The process of establishing the baselines, policies, and procedures for information security and incident handling at the outset yields great benefit later. Know this before implementation and it will save you time and stress.

Other Advice:

Baseline audits, inventories, and vulnerability assessments of systems may reveal opportunities for improvement. Configuring an appropriately sized IPS with a majority of the filters enabled using detection protocol only, or “Permit + Notify” action, allows for the deeper discovery of the types of network transactions being performed and the systems involved. This process can also identify surprise applications that may be present in the environment, such as user-installed downloads that are outside of organizational norms or unpatched applications installed on servers for some long-forgotten test. In other words, know the exposures.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
it_user153066 - PeerSpot reviewer
I.T Security Consultant with 51-200 employees
Vendor
Setup is straightforward, if the right planning is done everything can go smoothly

What is most valuable?

Great user interface and stable

How has it helped my organization?

Very clear on the findings, great detection features

What needs improvement?

Documentation

For how long have I used the solution?

5 years

What was my experience with deployment of the solution?

No issues

What do I think about the stability of the solution?

No issues

What do I think about the scalability of the solution?

No issues

How are customer service and technical support?

Customer Service: AverageTechnical Support: Average

Which solution did I use previously and why did I switch?

Yes, we use multiple competitive solutions

How was the initial setup?

Straightforward, if the right planning is done everything can go smoothly

What about the implementation team?

In house

Which other solutions did I evaluate?

Yes, McAfee and Sourcefire

What other advice do I have?

Spec your solution correctly, insure your 5 year network growth plan.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
it_user149700 - PeerSpot reviewer
Network Sec. Technical Specialist at a healthcare company with 1,001-5,000 employees
Vendor
The GUI needs to be improved.

Valuable Features

<ul> <li>Intrusion prevention</li> <li>Digital vaccines</li> <li>Profile deployment</li> <li>Reputation database</li> </ul>

Improvements to My Organization

It has helped strengthen our security posture, mostly in the perimeter.

Room for Improvement

GUI

Use of Solution

4 years

Deployment Issues

No, it is easy to deploy.

Stability Issues

Except for a few issues with the Manager, it has been stable.

Scalability Issues

A very scalable solution.

Customer Service and Technical Support

Customer Service: OK, but not great ... very US centric.Technical Support: Good

Initial Setup

Straightforward. It is very well documented.

Implementation Team

In-house

ROI

Very impressive

Other Solutions Considered

Yes, Checkpoint, sourcefire

Other Advice

Look into the more recent models of the device.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
PeerSpot user
The Chief of IT security department at a financial services firm with 501-1,000 employees
Vendor
If you want a stable and easy to use product - it's for you but DDoS/Dos protection has room for improvement

What is most valuable?

1. Easy to use/deploy

How has it helped my organization?

1. Reputation Database - significantly reduce the load on Servers

What needs improvement?

1. DDoS/Dos protection

For how long have I used the solution?

Overall 8 Years. But the best solutions is HP TippingPoint IPS - which our organization has been using since 2009 (5 year)

What was my experience with deployment of the solution?

No, it's very easy to deploy. The manual is clear and support guys are very quick and skilled.

What do I think about the stability of the solution?

No, didn't have any.

What do I think about the scalability of the solution?

No, didn't have any.

How are customer service and technical support?

Customer Service: ExcellentTechnical Support: Excellent

Which solution did I use previously and why did I switch?

Yes we did. ISS X-Force (later IBM).

How was the initial setup?

No issues. Absolutely easy and understandable.

What about the implementation team?

In-House.

What's my experience with pricing, setup cost, and licensing?

When well tuned, there is no more administrative overload when managing the system. Just OS and filter updates and new filter review.

Which other solutions did I evaluate?

Yes, from SourceFire (or Snort team).
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free Intrusion Detection and Prevention Software (IDPS) Report and find out what your peers are saying about Trend Micro, Cisco, Palo Alto Networks, and more!
Updated: September 2022
Buyer's Guide
Download our free Intrusion Detection and Prevention Software (IDPS) Report and find out what your peers are saying about Trend Micro, Cisco, Palo Alto Networks, and more!