Audience

IT security teams in need of a threat protection solution

About Trend Micro TippingPoint

Go beyond next-gen IPS without compromising security or performance. TippingPoint integrates with the Deep Discovery Advanced Threat Protection solution to detect and block targeted attacks and malware through preemptive threat prevention, threat insight and prioritization, and real-time enforcement and remediation. The TippingPoint®️ Threat Protection System is part of Trend Micro Network Defense. It’s powered by XGen™️ security, a blend of cross-generational threat defense techniques that deliver faster time to protection against known, unknown, and undisclosed threats. Our smart, optimized, and connected technology ensures that everything is working together to give you visibility and control across the evolving threat landscape.

Integrations

Ratings/Reviews

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Company Information

Trend Micro
Founded: 1989
United States
www.trendmicro.com/en_us/business/products/network/intrusion-prevention/tipping-point-threat-protection-system.html

Videos and Screen Captures

Product Details

Platforms Supported
Cloud
Training
Documentation
Videos
Support
Phone Support
Online

Trend Micro TippingPoint Frequently Asked Questions

Q: What kinds of users and organization types does Trend Micro TippingPoint work with?
Q: What languages does Trend Micro TippingPoint support in their product?
Q: What kind of support options does Trend Micro TippingPoint offer?
Q: What other applications or services does Trend Micro TippingPoint integrate with?
Q: What type of training does Trend Micro TippingPoint provide?

Trend Micro TippingPoint Product Features

IT Security

Intrusion Detection System
Two-Factor Authentication
Anti Virus
Event Tracking
IP Protection
Web Traffic Reporting
Internet Usage Monitoring
Web Threat Management
Anti Spam
Email Attachment Protection
Vulnerability Scanning
Spyware Removal

Network Security

Access Control
Firewalls
Internet Usage Monitoring
Intrusion Detection System
VPN
Vulnerability Scanning
Threat Response
Analytics / Reporting