Intrusion Prevention (IPS)
Protect against known, unknown, and undisclosed vulnerabilities in your network
The cyber threat landscape
As threats continue to evolve in sophistication and speed, enterprises need effective, flexible, comprehensive security that meets the security and performance requirements of their hybrid networks.
Going beyond traditional intrusion prevention system (IPS) capabilities, it includes virtual patching and post-compromise detection and disruption as part of a powerful hybrid cloud security platform.
Protect against the full range of threats in your network
Only complete visibility into all network traffic and activity will keep your network security ahead of targeted attacks that bypass traditional controls, exploit network vulnerabilities, and ransom or steal sensitive data, communications, and intellectual property.
Trend Micro™ TippingPoint™ provides best-of-breed intrusion prevention to protect against the full range of threats at wire speed anywhere on your network to protect your critical data and reputation.
Real-time security
Get proven network reliability and availability through automated, inline inspection without impeding network performance for hybrid infrastructure – including on-premises, private, and public cloud.
- Ideal for inline deployment with multiple fault-tolerant features that support continuous uptime and high availability
- Extend your existing TippingPoint network protection to AWS and other hybrid cloud environments with the powerful Trend Micro™ Cloud Network Protection™
Threat intelligence
Achieve protection from advanced threats through industry-leading global threat intelligence
- Protect against known vulnerabilities and all potential attack permutations with minimal false positives
- Protect against undisclosed threats through exclusive access to vulnerability data from the Zero Day Initiative
- Trend Micro Research continuously explores the threat landscape to bring you the trusted insights
- Out-of-the-box recommended settings with automatic updates provide immediate and ongoing threat protection with little manual effort
Centralized insight
Integrate and prioritize security policy, response, and visibility with centralized management
- Gain centralized visibility into the network to make informed decisions and take immediate action on potential threats to infrastructure or data
- Integrate with Trend Micro and complementary third-party solutions, including SIEM, NGFW and VA/VM, to enhance a layered security approach
- Centralized management provides a scalable, policy-based operational model and enables straightforward management of large-scale deployments
Machine learning
Maximize real-time protection with patented machine learning techniques
- Leverage mathematical models to determine if network traffic is malicious or benign
- Block network traffic that emulates characteristics of known or unknown malware families
- Detect and block DNS requests from malware infected hosts attempting to contact their C&C hosts using domain generation algorithms (DGA)