Coming October 25: PeerSpot Awards will be announced! Learn more
2019-03-26T08:09:00Z
Julia Frohwein - PeerSpot reviewer
Senior Director of Delivery at PeerSpot (formerly IT Central Station)
  • 0
  • 1

What advice do you have for others considering Trend Micro TippingPoint NGIPS?

If you were talking to someone whose organization is considering Trend Micro TippingPoint NGIPS, what would you say?

How would you rate it and why? Any other tips or advice?

5
PeerSpot user
5 Answers
JK
Technical Manager at Digital World
Real User
Top 5Leaderboard
2021-04-03T13:12:10Z
03 April 21

From my understanding, this is a very useful solution for the government sector. I would rate Trend Micro Tipping NGIPS a nine out of ten.

HS
Senior Network Engineer at BT
Real User
Top 10
2020-12-31T01:06:53Z
31 December 20

I'd recommend the solution, however, it depends on what a company needs. Before jumping in, a company needs to ask, themselves questions like: "What's our requirement". That said, for general enterprises, it's a good enough option. For our organization, however, as of next year, we're going to move away from it and deploy with a Cisco-based solution. Overall, I would rate the solution at a seven out of ten.

it_user1015209 - PeerSpot reviewer
Director at Diamond Infotech Pvt ltd
Real User
2020-06-15T07:34:00Z
15 June 20

Trend Micro provides us technical updates and their free training if a new feature comes into their product. In general, I would of course recommend this product to other people.

MK
Head of Group at MTI LLC
Real User
2019-08-25T05:17:00Z
25 August 19

This is a good solution, but our market needs clearer deal registration process. It also needs faster PoC feedbacks. I would rate this solution a seven out of ten.

Yusif Samadov - PeerSpot reviewer
‎Network Engineer at BestComp Group
Real User
2019-03-26T08:09:00Z
26 March 19

If we can work with Trend Micro and sell TippingPoint, it's very good. It's not a bad device and, nowadays, it's very useful. At first, it was an HPE product when we started working with TippingPoint and then it was bought by Trend Micro. The number of users using this solution depends on the organization. In one organization we have approximately 2,000 users on this device. For deployment and maintenance two people are enough. In our organization, when we deployed it, only one person managed and configured it. Someone who is a network engineer can do the configuration. From the time that Trend Micro bought this product we haven't sold it anymore because we work with HPE. But we are supporting organizations who are using Trend Micro.

Related Questions
Miriam Tover - PeerSpot reviewer
Service Delivery Manager at PeerSpot (formerly IT Central Station)
Jun 21, 2022
How do you or your organization use this solution? Please share with us so that your peers can learn from your experiences. Thank you!
2 out of 5 answers
MK
Head of Group at MTI LLC
25 August 19
Our partner is a solution integrator and this is one of the products that he implements for our customers. We are currently working on two pilot projects that involve this solution. Our experience is with on-premises deployments.
it_user1015209 - PeerSpot reviewer
Director at Diamond Infotech Pvt ltd
15 June 20
When the client chooses a security setup we first need to explain to them why the dedicated IPS assist is correct for them and its advantages. We need to determine their traffic load. With all those calculations we show them we sometimes end up with over-commitment for the TOC. If we're talking about Trend Micro, you should know that they have a range of products, from IPS, anti-security solutions, and discovery solutions. We lay out all those products and if they feel that any of them meet their requirements then they incorporate that into their solution. After that, it normally goes through the tender process. We participate in the tender and if we win, we send the product to the customer. We generally work with larger companies or different government bodies. For the different public sector units, there is a security requirement where we go to the client to analyze their existing infrastructure, try to find out where the loopholes are, and when we find something we advise and present the solution. We then incorporate whatever product the client requires. Maybe it's a small setup or maybe it's a multi-department dedicated IPS setup. We deliver whatever IPS featured is required. The general use cases are for large data centers and state data centers, where people from different state departments post their applications with their servers in the data center cloud. I'm from Calcutta, India. Our company takes care of different government departments in the Eastern part of India, in West Bengal, in Bihar, in Orissa, in Jharkhand, different states there. In all these cases, the state data center or maybe some big government bodies like PUC's, public utility commissions, like ONGC have their own data centers. All their applications are hosted on this data center, or maybe there is a DR. Maybe the DR is on the cloud. Or maybe like the ONGC, they are on-premise. They need to process the graphs to identify whether there's an intrusion or not, and maybe some micro-sandboxing needs to be done. Right when the setup is changed, when these data centers get these devices and need to process a huge amount of data, huge incoming and outbound data, the firewall integrated into the IPS is not capable of handling that much load. Then you need to put in a dedicated IPS. That's where we introduce NGIPS from Trend Micro. That's the thing - it totally depends on the client's requirements, the site's needs, the data bandwidth, and how much processing is required. Trend Micro offers a complete solution. Trend Micro offers the NGIPS solution, as well as the Deep Discovery Inspector or Deep Discovery Analyzer, the DDI, and DDA. If you put a DDI in line, we can create a different operating system via a sandbox to process. Whatever packet we get, whatever file is getting processed, we capture according to that and we find anything that needs to be blacklisted or whitelisted. If it's blacklisted, that informs us from the DDA that it is getting first to the IPS and the IPS can take care of it. It's a complete security solution. We might need to introduce the INWB or IWSBA solutions from Trend Micro to analyze the base traffic as well as the main traffic. It's a combination - NGIPS is there to take care of any intrusion and APT is there to analyze the file and network traffic. I'm doing the network sandboxing. IWSBA takes care of that traffic. INSBA is there for taking care of the mail traffic. These four devices can communicate with each other and can instruct the IPS to do any ad-hoc blacklisting that is required.
Miriam Tover - PeerSpot reviewer
Service Delivery Manager at PeerSpot (formerly IT Central Station)
Apr 03, 2021
Hi, We all know it's really hard to get good pricing and cost information. Please share what you can so you can help your peers.
2 out of 4 answers
MK
Head of Group at MTI LLC
25 August 19
Bear in mind that if you've made the deal registration, follow it and work in that account that it only gives you a chance to grab this deal.
it_user1015209 - PeerSpot reviewer
Director at Diamond Infotech Pvt ltd
15 June 20
In terms of price, TippingPoint is not a cheap solution. It is not a very costly solution, but comparatively it is more. When you purchase TippingPoint, you're purchasing their subscription which gives IPS database updates. They bundle everything together. That includes the warranty and extended warranty of the box, along with the support subscription to speak to tech support, or the IPS database, signature application, all those things are provided. Almost all those things are bundled together. They bundle all the requests and licensing. We need to go back to them to ask for additional licenses or something like that, because in my department we cannot just go back to the client and tell them, okay, these are the things you need to purchase. It is impossible. So in the beginning of the process, when we sell the solution to our client, we always bundle all the necessary licensing so that it can be used whenever it is required. On a scale of one to ten I would give TippingPoint NGIPS an eight.
Related Articles
CristianoLima - PeerSpot reviewer
Senior IT Infrastructure Engineer at Tecnoage
Nov 05, 2021
Keeping up with the evolution of cybersecurity and the threats that are haunting the IT industry across all industries, this text pays special attention to ransomware, as this practice is on the rise in the world of cybercrime. Let's focus on the subject, specifically on the Healthcare sector. We are based on Sophos' annual report on cyber threats, which discusses the continuity of ransomware...
Giusel - PeerSpot reviewer
IT Engineer at UTMStack
Aug 15, 2021
What is HIDS in Cybersecurity? A HIDS (Host Intrusion Detection System) is software that detects malicious behavior on the host. It monitors all the operating system operations, tracks user behavior, and operates independently without human assistance. How does a Host-based Intrusion Detection System work? HIDS operates at the OS level, unlike others antivirus systems that operate at the a...
See 1 comment
Shibu Babuchandran - PeerSpot reviewer
Regional Manager/ Service Delivery Manager at ASPL INFO Services
15 August 21
Thanks for sharing its very informative
Related Articles
CristianoLima - PeerSpot reviewer
Senior IT Infrastructure Engineer at Tecnoage
Nov 05, 2021
An Overview of Ransomware in Healthcare Organizations in 2021
Keeping up with the evolution of cybersecurity and the threats that are haunting the IT industr...
Giusel - PeerSpot reviewer
IT Engineer at UTMStack
Aug 15, 2021
What is HIDS? – A guide about the HIDS tools
What is HIDS in Cybersecurity? A HIDS (Host Intrusion Detection System) is software that detec...
Download Free Report
Download our free Intrusion Detection and Prevention Software (IDPS) Report and find out what your peers are saying about Trend Micro, Cisco, Palo Alto Networks, and more! Updated: September 2022.
DOWNLOAD NOW
634,325 professionals have used our research since 2012.