2019-08-25T05:17:00Z
Miriam Tover - PeerSpot reviewer
Service Delivery Manager at PeerSpot (formerly IT Central Station)
  • 0
  • 12

What needs improvement with Trend Micro TippingPoint Threat Protection System?

Please share with the community what you think needs improvement with Trend Micro TippingPoint Threat Protection System.

What are its weaknesses? What would you like to see changed in a future version?

5
PeerSpot user
5 Answers
WH
C.I.S.O. at ENERSA
Real User
2022-06-21T16:12:00Z
Jun 21, 2022

Trend Micro TippingPoint Threat Protection System needs strong Spanish-language support. In addition, the user interface was built with Java and does not allow you to see all your options on the monitor. A new interface, perhaps one built on HTML 5, would be great.

Search for a product comparison
JK
Technical Manager at Digital World
Real User
Top 5Leaderboard
2021-04-03T13:12:10Z
Apr 3, 2021

It integrates well but it takes time. The integration process should be faster.

HS
Senior Network Engineer at BT
Real User
Top 10
2020-12-31T01:06:53Z
Dec 31, 2020

Right now, we are stuck with an older platform, 1400 N. It's more like a software base, so bypassing is done through software. If you go with the newer system, for example, the 4-40s, that's a hardware-based bypass, so those are more powerful. It has more throughput. The initial setup is not straightforward. The solution is pretty expensive.

it_user1015209 - PeerSpot reviewer
Director at Diamond Infotech Pvt ltd
Real User
2020-06-15T07:34:00Z
Jun 15, 2020

In terms of what can be improved, I would say, integration. Integration of Trend Micro solutions with Azure. We need more integration. It would be good if Azure IPS and TippingPoint IPS and other products from Trend Micro like their DBI and IWSVA could talk between each other. That integration should be increased so that human integration could be decreased. If it could communicate with other products, it would be great. If you see a pay-meter firewall at Checkpoint, or Palo Alto and you're using Trend Micro, and your perimeter firewall is from some other vendor, maybe you are using anti-DDoS solution or maybe you are using some other solution from some other provider. If the pinpoint can be integrated with other vendors, it would be great. I'm not talking about each and every brand available in the market, but at least, with some reputable vendors like Palo Alto or Checkpoint. It would be great if that integration actually gives us a consolidated report, which helps us to monitor from a single point by eliminating duplicates.

MK
Head of Group at MTI LLC
Real User
2019-08-25T05:17:00Z
Aug 25, 2019

Our customers don't understand the process whereby we generate and supply them with license keys. They would like to have the license keys available out of the box. This documentation for this solution could be improved.

Related Questions
Miriam Tover - PeerSpot reviewer
Service Delivery Manager at PeerSpot (formerly IT Central Station)
Jun 21, 2022
How do you or your organization use this solution? Please share with us so that your peers can learn from your experiences. Thank you!
2 out of 5 answers
MK
Head of Group at MTI LLC
Aug 25, 2019
Our partner is a solution integrator and this is one of the products that he implements for our customers. We are currently working on two pilot projects that involve this solution. Our experience is with on-premises deployments.
it_user1015209 - PeerSpot reviewer
Director at Diamond Infotech Pvt ltd
Jun 15, 2020
When the client chooses a security setup we first need to explain to them why the dedicated IPS assist is correct for them and its advantages. We need to determine their traffic load. With all those calculations we show them we sometimes end up with over-commitment for the TOC. If we're talking about Trend Micro, you should know that they have a range of products, from IPS, anti-security solutions, and discovery solutions. We lay out all those products and if they feel that any of them meet their requirements then they incorporate that into their solution. After that, it normally goes through the tender process. We participate in the tender and if we win, we send the product to the customer. We generally work with larger companies or different government bodies. For the different public sector units, there is a security requirement where we go to the client to analyze their existing infrastructure, try to find out where the loopholes are, and when we find something we advise and present the solution. We then incorporate whatever product the client requires. Maybe it's a small setup or maybe it's a multi-department dedicated IPS setup. We deliver whatever IPS featured is required. The general use cases are for large data centers and state data centers, where people from different state departments post their applications with their servers in the data center cloud. I'm from Calcutta, India. Our company takes care of different government departments in the Eastern part of India, in West Bengal, in Bihar, in Orissa, in Jharkhand, different states there. In all these cases, the state data center or maybe some big government bodies like PUC's, public utility commissions, like ONGC have their own data centers. All their applications are hosted on this data center, or maybe there is a DR. Maybe the DR is on the cloud. Or maybe like the ONGC, they are on-premise. They need to process the graphs to identify whether there's an intrusion or not, and maybe some micro-sandboxing needs to be done. Right when the setup is changed, when these data centers get these devices and need to process a huge amount of data, huge incoming and outbound data, the firewall integrated into the IPS is not capable of handling that much load. Then you need to put in a dedicated IPS. That's where we introduce NGIPS from Trend Micro. That's the thing - it totally depends on the client's requirements, the site's needs, the data bandwidth, and how much processing is required. Trend Micro offers a complete solution. Trend Micro offers the NGIPS solution, as well as the Deep Discovery Inspector or Deep Discovery Analyzer, the DDI, and DDA. If you put a DDI in line, we can create a different operating system via a sandbox to process. Whatever packet we get, whatever file is getting processed, we capture according to that and we find anything that needs to be blacklisted or whitelisted. If it's blacklisted, that informs us from the DDA that it is getting first to the IPS and the IPS can take care of it. It's a complete security solution. We might need to introduce the INWB or IWSBA solutions from Trend Micro to analyze the base traffic as well as the main traffic. It's a combination - NGIPS is there to take care of any intrusion and APT is there to analyze the file and network traffic. I'm doing the network sandboxing. IWSBA takes care of that traffic. INSBA is there for taking care of the mail traffic. These four devices can communicate with each other and can instruct the IPS to do any ad-hoc blacklisting that is required.
Miriam Tover - PeerSpot reviewer
Service Delivery Manager at PeerSpot (formerly IT Central Station)
Jun 21, 2022
Hi Everyone, What do you like most about Trend Micro TippingPoint Threat Protection System? Thanks for sharing your thoughts with the community!
2 out of 5 answers
MK
Head of Group at MTI LLC
Aug 25, 2019
The most valuable feature is the central command center, where we can control and manage the solution.
it_user1015209 - PeerSpot reviewer
Director at Diamond Infotech Pvt ltd
Jun 15, 2020
The IPS signatures and the IPS database that are given are much better than what is commonly available.
Download Free Report
Download our free Intrusion Detection and Prevention Software (IDPS) Report and find out what your peers are saying about Trend Micro, Check Point, Palo Alto Networks, and more! Updated: November 2022.
DOWNLOAD NOW
653,522 professionals have used our research since 2012.