Senior Network Engineer at a comms service provider with 10,001+ employees
Real User
Dec 31, 2020
Right now, we are stuck with an older platform, 1400 N. It's more like a software base, so bypassing is done through software. If you go with the newer system, for example, the 4-40s, that's a hardware-based bypass, so those are more powerful. It has more throughput. The initial setup is not straightforward. The solution is pretty expensive.
In terms of what can be improved, I would say, integration. Integration of Trend Micro solutions with Azure. We need more integration. It would be good if Azure IPS and TippingPoint IPS and other products from Trend Micro like their DBI and IWSVA could talk between each other. That integration should be increased so that human integration could be decreased. If it could communicate with other products, it would be great. If you see a pay-meter firewall at Checkpoint, or Palo Alto and you're using Trend Micro, and your perimeter firewall is from some other vendor, maybe you are using anti-DDoS solution or maybe you are using some other solution from some other provider. If the pinpoint can be integrated with other vendors, it would be great. I'm not talking about each and every brand available in the market, but at least, with some reputable vendors like Palo Alto or Checkpoint. It would be great if that integration actually gives us a consolidated report, which helps us to monitor from a single point by eliminating duplicates.
Our customers don't understand the process whereby we generate and supply them with license keys. They would like to have the license keys available out of the box. This documentation for this solution could be improved.
The solution is not as reliable as we would like. There are problems when we work in HA, high-availability. We have encountered it several times and it's been a disaster for that sort of device. Also, the firewall rules are limited.
Trend Micro TippingPoint Threat Protection System provides robust security features like digital vaccines and real-time responses, ensuring effective intrusion detection and seamless integration with other systems.Trend Micro TippingPoint Threat Protection System is known for its ease of use, quick installation, and efficient IPS signatures. Its real-time threat responses and cloud-based management enable virtual patch creation and effective attack blocking. It integrates seamlessly with...
It integrates well but it takes time. The integration process should be faster.
Right now, we are stuck with an older platform, 1400 N. It's more like a software base, so bypassing is done through software. If you go with the newer system, for example, the 4-40s, that's a hardware-based bypass, so those are more powerful. It has more throughput. The initial setup is not straightforward. The solution is pretty expensive.
In terms of what can be improved, I would say, integration. Integration of Trend Micro solutions with Azure. We need more integration. It would be good if Azure IPS and TippingPoint IPS and other products from Trend Micro like their DBI and IWSVA could talk between each other. That integration should be increased so that human integration could be decreased. If it could communicate with other products, it would be great. If you see a pay-meter firewall at Checkpoint, or Palo Alto and you're using Trend Micro, and your perimeter firewall is from some other vendor, maybe you are using anti-DDoS solution or maybe you are using some other solution from some other provider. If the pinpoint can be integrated with other vendors, it would be great. I'm not talking about each and every brand available in the market, but at least, with some reputable vendors like Palo Alto or Checkpoint. It would be great if that integration actually gives us a consolidated report, which helps us to monitor from a single point by eliminating duplicates.
Our customers don't understand the process whereby we generate and supply them with license keys. They would like to have the license keys available out of the box. This documentation for this solution could be improved.
The solution is not as reliable as we would like. There are problems when we work in HA, high-availability. We have encountered it several times and it's been a disaster for that sort of device. Also, the firewall rules are limited.