Integrated Advanced Threat Prevention Reviews & Product Details


What is Integrated Advanced Threat Prevention?

Intrusion Prevention (IPS) Protect against known, unknown, and undisclosed vulnerabilities in network.

Write a Review

Integrated Advanced Threat Prevention Profile Details

Integrated Advanced Threat Prevention Profile Details

Vendor
Trend Micro
Company Website
Year Founded
1988
Total Revenue (USD mm)
148,811
HQ Location
Tokyo, Japan
Ownership
OTCMKTS:TMICY
LinkedIn® Page
www.linkedin.com
Employees on LinkedIn®
6,561
Twitter
@trendmicro
Twitter Followers
108,680
Show moreShow fewer

Integrated Advanced Threat Prevention Reviews

Filter Reviews
Filter Reviews
Sort by
Ratings
Company Size
User Role
All Industries
Write a Review
1-2 of 2 total Integrated Advanced Threat Prevention reviews

Integrated Advanced Threat Prevention Reviews

Write a Review
Filter By
Connections
Show reviews that mention
1-2 of 2 total Integrated Advanced Threat Prevention reviews
Copy Review URL
A
Enterprise
(1001-5000 employees)
Validated Reviewer
Verified Current User
Review Source
Copy Review URL

"Trend Micro protects production servers"

What do you like best?

Incredibly easy to deploy and manage. Very good GUI and information, basically runs itself as long as it has the proper connection. We run this on our production environment and it has protected us from countless malicious and phishing attacks. We moved from a competitor that was not doing a good job of protecting us from real time threats without requiring admin intervention which is not feasible with our size.

What do you dislike?

The ability for admins to pause protection for short spans in case it conflicts with other installations could be smoother. I would like to be able to disable and have it restart at certain times without having to circle back around and automated tasks to a large pool of servers is not feasible. Creates a labor intensive job, although it is rare that this needs to happen.

Recommendations to others considering the product:

Roll it in small test batches at a time to ensure no other conflicts. Remove existing av first!

What problems are you solving with the product? What benefits have you realized?

We are protecting our servers from Phishing, malicious payloads and other threats such as ransomeware. This as a tiered approach along with white listing, firewalls and a sound patching strategy have protected us.

Copy Review URL
UH
Validated Reviewer
Review Source
Copy Review URL
Business partner of the vendor or vendor's competitor, not included in G2 scores.

"Great at keeping computers safe "

What do you like best?

Runs in the background. It is not distracting and does the job without taking up processing space. Easy to manage.

What do you dislike?

Theres nothing I dislike at the moment. It does what it was designed to do.

What problems are you solving with the product? What benefits have you realized?

We prevented a lot of outside threats and it was great network protection for larger organizations.

There are not enough reviews of Integrated Advanced Threat Prevention for G2 to provide buying insight. Below are some alternatives with more reviews:

1
AlienVault USM (from AT&T Cybersecurity) Logo
AlienVault USM (from AT&T Cybersecurity)
4.4
(98)
AlienVault USM (from AT&T Cybersecurity) is a platform that provides five essential security capabilities in a single console to manage both compliance and threats, understanding the sensitive nature of IT environments, include active, passive and host-based technologies to match the requirements of each particular environment.
2
Darktrace Logo
Darktrace
4.1
(24)
The enterprise immune system
3
McAfee Network Security Platform Logo
McAfee Network Security Platform
3.9
(17)
McAfee Network Security Platform is a next-generation intrusion prevention system (IPS) that redefines how organizations block advanced threats.
4
Palo Alto Networks Next-Generation Firewall Logo
Palo Alto Networks Next-Generation Firewall
4.3
(16)
Our next-generation firewall classifies all traffic, including encrypted traffic, based on application, application function, user and content. You can create comprehensive, precise security policies, resulting in safe enablement of applications. This lets only authorized users run sanctioned applications, greatly reducing the surface area of cyber attacks across the organization.
5
FireEye Network Security and Forensics Logo
FireEye Network Security and Forensics
3.7
(12)
FireEye Network Security (NX) solutions protect against known and unknown advanced attacks with the signature-less Multi-Vector Virtual Execution (MVX) engine, conventional intrusion prevention system (IPS) and intelligence-driven detection.
6
Omnishield by MyDigitalShield Logo
Omnishield by MyDigitalShield
4.6
(6)
OmniShield is the next-generation cybersecurity solution that extends your company's perimeter to all your sites while providing omnipresent, enterprise-grade security.
7
ExtraHop Logo
ExtraHop
4.3
(5)
The ExtraHop Application Performance Management Solution Delivers Unified Visibility Across the IT Environment w/ Proactive Alerts & Accelerated Troubleshooting
8
Palo Alto Networks Virtualized Next-Generation Firewalls Logo
Palo Alto Networks Virtualized Next-Generation Firewalls
4.3
(5)
The VM-Series is a virtualized form factor of our next-generation firewall that can be deployed in a range of private and public cloud computing environments based on technologies from VMware, Amazon Web Services, Microsoft, Citrix, and KVM. The VM-Series natively analyzes all traffic in a single pass to determine the application identity, the content within, and the user identity. These core elements of your business can then be used as integral components of your security policy, enabling you to improve your security efficacy through a positive control model and reduce your incident repsonse time through complete visibility into applications across all ports.
9
Next-Generation Intrusion Prevention System (NGIPS) Logo
Next-Generation Intrusion Prevention System (NGIPS)
4.5
(4)
High performance. Resiliency. Security operations empowerment. NGIPS receives new policy rules and signatures every two hours, so your security is always up to date.
10
TippingPoint® Threat Protection System Logo
TippingPoint® Threat Protection System
2.5
(2)
TippingPoint integrates with the Deep Discovery Advanced Threat Protection Solution to detect and block targeted attacks and malware through preemptive threat prevention, threat insight and prioritization, and real-time enforcement and remediation.
Show more

Integrated Advanced Threat Prevention User Ratings

8.3
Ease of Use
Average: 8.6*
10.0
Quality of Support
Average: 9.0*
10.0
Ease of Setup
Average: 8.2*
* Intrusion Detection and Prevention Systems (IDPS) Category
Do you work for Integrated Advanced Threat Prevention?

Integrated Advanced Threat Prevention Categories on G2