
![Trend Micro Deep Discovery [EOL] Logo](https://images.peerspot.com/image/upload/c_scale,dpr_3.0,f_auto,q_100,w_64/2wuq6mq8liciuy8jm6aqj4dp5bgm.jpg?_a=BACAGSGT)
Trend Micro Deep Discovery and Check Point IPS compete in the cybersecurity category, providing network traffic analysis and intrusion prevention solutions respectively. Trend Micro Deep Discovery seems to have the upper hand in terms of ease of integration and customization, while Check Point IPS excels with its extensive attack database and proactive protection features.
Features: Trend Micro Deep Discovery offers robust real-time network traffic visibility, integrates well with other Trend Micro products, and provides customizable sandboxing for tailored threat detection. Users value its performance and stability. Check Point IPS is known for its extensive database of attack signatures, proactive vulnerability measures, and well-structured reporting capabilities.
Room for Improvement: Trend Micro Deep Discovery could improve its support services, specifically in regions like India, and address issues related to false alert noise and integration flexibility. A wider support for virtual images and better pricing models are also needed. Check Point IPS can face performance challenges under extensive deployment, high resource usage, and occasional false positives. Simplifying its licensing and bundled purchasing process and enhancing support responsiveness are areas for improvement.
Ease of Deployment and Customer Service: Trend Micro Deep Discovery is primarily deployed in on-premises environments with some cloud usage, with generally positive customer service reviews but noted regional limitations. Check Point IPS provides versatile deployment options across different environments, benefiting from a wide support network. However, users have experienced inconsistent support quality and slower response times.
Pricing and ROI: Trend Micro Deep Discovery's pricing is perceived as high, but it often justifies the cost through a solid ROI by preventing breaches. Check Point IPS is seen as expensive, and users typically find better value in bundled services. Effective licensing strategies and pricing competitiveness are crucial for user satisfaction regarding its financial impact.
I have seen a return on investment as it results in money saved and time saved because the security tool is very complete and modern.
I have seen a return on investment more in the risk saved since it catches a lot of stuff security-wise that is good to catch.
I have seen a return on investment since using Check Point IPS, as evidenced by fewer incidents.
Our technical teams have personal relationships with our account executives and direct support people.
The customer support for Check Point IPS is excellent.
I have had an excellent experience with Check Point IPS's customer team, as their technical knowledge and troubleshooting skills are excellent.
If I were to rate them from 0 to 10, I would give them a nine or a ten.
There is no dedicated team in India for giving support for Trend Micro Deep Discovery.
We have moved to a hyper-scale master environment, allowing us to scale by adding additional gateways to the clusters.
The scalability of Check Point IPS is on point.
The scalability of Check Point IPS is great because when I deploy gateways in the cloud, I create a cluster, which offers a very scalable option.
If the appliance supports scalability, Trend Micro support will inform us, and we can implement it without replacing the hardware.
Check Point IPS provides a very stable and reliable environment.
Check Point IPS is very stable.
Check Point IPS is very stable with no problems regarding this solution.
The product updates and security updates are kept current, allowing us seamless integration with Trend Micro and getting daily updates and signatures without problems.
Automated attack path correlation in SmartEvent to improve situational awareness.
At least 60% of all the alarms generated by the IPS are false positives or something that's not important to look at, and this generates a significant workload for my team.
More granular policy customization for Check Point IPS would allow protection to be tailored more precisely to specific applications or services, which would reduce unnecessary overhead and improve accuracy.
We have multiple components such as Deep Discovery Email Inspector for mail gateways, Deep Discovery Analyzer for sandboxing, and Deep Discovery Inspector, which serves as an IDS detecting malicious network traffic.
The solution is not scalable as it is an agent product rather than a product designed for scalability.
There is no dedicated team in India for giving support for Trend Micro Deep Discovery.
Comparisons with Fortinet show that Check Point IPS is relatively more expensive, but we found it cheaper to retain it rather than switch.
My experience with pricing, setup cost, and licensing for Check Point IPS is good; it's baked into the firewall licensing, so that's very good.
My experience with pricing, setup cost, and licensing for Check Point IPS is great, and I have no problem with the price.
I do not consider it an expensive tool; its price is justified based on the capabilities that we receive when compared to another mail gateway or other vendors.
The solution is very expensive.
Overall, the licensing cost of Trend Micro Deep Discovery was not on the higher side earlier, but now, since the competition has increased, we need to think about the prices.
The integration with Check Point ThreatCloud ensures the IPS engine is updated with the latest attack signatures.
The solution employs behavioral heuristic analysis to block zero-day attacks using AI-powered engines.
Whenever any zero-day attack is detected, it downloads that signature into the firewall and prevents that threat.
The most valuable capabilities of Trend Micro Deep Discovery Email Inspector include its ability to perform mail detection and mail filtration against various email attacks such as phishing and spam, serving as an email gateway for both inbound and outbound traffic.
This solution allows us to see anomalies, network traffic in our network, and zero-day threats.
The impact of the Threat Intelligence Sharing feature on overall defense and security is positive.
| Company Size | Count |
|---|---|
| Small Business | 50 |
| Midsize Enterprise | 22 |
| Large Enterprise | 23 |
| Company Size | Count |
|---|---|
| Small Business | 16 |
| Midsize Enterprise | 6 |
| Large Enterprise | 9 |
Check Point IPS provides robust real-time threat prevention by blocking threats before they can harm critical systems, integrating seamlessly with ThreatCloud for enhanced security management and efficiency while minimizing false positives.
Check Point IPS enhances network security through AI-powered behavioral analysis, centralized management, and customizable policies. It ensures strong protection against known and unknown threats, including zero-day attacks, and its integration with ThreatCloud allows for automatic updates, minimizing manual interventions. However, improvements in documentation, support responsiveness, and a more intuitive interface could enhance user experience. Pricing flexibility for cloud environments and quicker signature updates are needed along with better support for high traffic and enhanced visual analytics.
What Are the Key Features of Check Point IPS?Check Point IPS is widely deployed to protect networks from unauthorized access and security threats, ensuring communication channel integrity and preventing exploits. Used across sectors, it aids in compliance with security policies, supporting enterprises in maintaining secure operations.
Trend Micro Deep Discovery [EOL] offers real-time network traffic visibility, advanced sandboxing, and threat intelligence sharing, improving threat management for organizations through seamless integration with security products and precise threat detection in simulated environments.
Recognized for its ability to detect advanced persistent threats and zero-day exploits, Trend Micro Deep Discovery [EOL] provides insights into malicious activities while maintaining compatibility with multiple platforms. Its custom sandboxing technology allows detailed environmental simulations to identify threats accurately. Despite the benefits, there are challenges such as the need for enhanced support in regions like India, better scalability, and easier usage for non-technical users. Integration with third-party tools could also improve alongside a simpler pricing model. Security features, stability, and flexibility are areas requiring enhancement to meet broader industry needs.
What are the key features of Trend Micro Deep Discovery [EOL]In industries focused on network security and compliance, Trend Micro Deep Discovery [EOL] finds use in intrusion detection and protection against malware, phishing, and ransomware. Companies deploy it for email filtration and network analysis, ensuring secure data management and virtual patching to address zero-day vulnerabilities. On-premises implementation includes role-based access and scanning of virtual environments, aiding in meeting security compliance standards and reducing server downtime.
We monitor all Intrusion Detection and Prevention Software (IDPS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.