৳ 0.00

  • Item

  • Description
  • Order Information
  • Video

Trend Micro Intrusion Prevention Security (IPS)

An Intrusion Prevention System (IPS) is a network security/threat prevention technology that examines network traffic flows to detect and prevent vulnerability exploits. Signature-based detection is based on a dictionary of uniquely identifiable patterns (or signatures) in the code of each exploit. Only complete visibility into all network traffic and activity will keep network security ahead of targeted attacks that bypass traditional controls, exploit network vulnerabilities, and ransom or steal sensitive data, communications, and intellectual property.

Product Features:

Real-time security:

Get proven network reliability and availability through automated, inline inspection without impeding network performance for hybrid infrastructure – including on-premises, private, and public cloud.

  • Ideal for inline deployment with multiple fault-tolerant features that support continuous uptime and high availability
  • Extend your existing TippingPoint network protection to AWS and other hybrid cloud environments with the powerful Trend Micro™ Cloud Network Protection™

Threat intelligence:

Achieve protection from advanced threats through industry-leading global threat intelligence.

  • Protect against known vulnerabilities and all potential attack permutations with minimal false positives.
  • Protect against undisclosed threats through exclusive access to vulnerability data from the Zero Day Initiative.
  • Trend Micro Research continuously explores the threat landscape to bring you trusted insights.
  • Out-of-the-box recommended settings with automatic updates provide immediate and ongoing threat protection with little manual effort.

Centralized insight:

Integrate and prioritize security policy, response, and visibility with centralized management.

  • Gain centralized visibility into the network to make informed decisions and take immediate action on potential threats to infrastructure or data.
  • Integrate with Trend Micro and complementary third-party solutions, including SIEM, NGFW, and VA/VM, to enhance a layered security approach.
  • Centralized management provides a scalable, policy-based operational model and enables straightforward management of large-scale deployments.

Machine learning:

Maximize real-time protection with patented machine-learning techniques.

  • Leverage mathematical models to determine if network traffic is malicious or benign.
  • Block network traffic that emulates characteristics of known or unknown malware families.
  • Detect and block DNS requests from malware-infected hosts attempting to contact their C&C hosts using domain generation algorithms (DGA).


Trend Micro
Product Type
Network Security
Deep Security 11.1
Language Supported
English International
Feature 01
On-box SSL Inspection: Sophisticated and targeted attacks are increasingly using encryption to evade detection. TPS reduces security blind spots created by encrypted traffic with on-box SSL inspection.
Feature 02
Performance Scalability: The increase in data center consolidation and proliferation of cloud environments requires security solutions that can scale as network demands increase. TPS delivers unprecedented security and performance for high-capacity networks with a scalable deployment model that includes the industry’s first 40Gbps NGIPS in a 1U form factor with the ability to scale up to 120Gbps aggregate in a 3U form factor.
Feature 03
Flexible Licensing Model: Easily scale performance and security requirements with a pay-as-you-grow approach and flexible licenses that can be reassigned across TPS deployments without changing network infrastructure.
Feature 04
Real-time Machine Learning: Many security threats are short-lived and constantly evolving, at times limiting the effectiveness of traditional signature- and hash-based detection mechanisms. TPS uses statistical models developed with machine learning techniques to deliver the ability to detect and mitigate threats in real-time.
Feature 05
Enterprise Vulnerability Remediation (eVR): Quickly remediate vulnerabilities by integrating third-party vulnerability assessments with the TippingPoint product portfolio. Customers can pull in information from various vulnerability management and incident response vendors (Rapid7, Qualys, Tenable), map Common Vulnerabilities and Exposures (CVEs) to TippingPoint Digital Vaccine ® filters and take action accordingly.
Feature 06
Advanced Threat Analysis: Extend protection from unknown threats through integration with Deep Discovery™ Analyzer. TPS pre-filters known threats, forwards potential threats for automated sandbox analysis, and remediates in real-time upon confirmation of malicious content.
Feature 07
High Availability: Ideal for in-line deployment, TPS has multiple fault-tolerant features including hot-swappable power supplies, watchdog timers to continuously monitor security and management engines, built-in inspection bypass, and zero power high availability (ZPHA). In addition, TPS can be provisioned using redundant links in a transparent Active-Active or Active-Passive high availability (HA) mode.
Feature 08
Integrated Advanced Threat Prevention: TPS integrates with Trend Micro™ Deep Discovery™ advanced threat detection solutions, rated as the most effective and “recommended” breach detection system by NSS Labs.
Feature 09
Asymmetric Traffic Inspection: Traffic asymmetry is widespread and pervasive throughout enterprise and data center networks. Enterprises must overcome challenges from both flow and routing asymmetry to be able to fully protect their networks. TPS by default inspects all types of traffic, including asymmetric traffic, and applies security policies to ensure comprehensive protection.
Feature 10
Agility and Flexibility: TPS embraces software-defined network protection by deploying IPS as a service. TPS also protects virtualized applications from within your virtualized infrastructure (VMware, KVM)
Feature 11
Best-in-Class Threat Intelligence: Trend Micro™ TippingPoint ® Digital Vaccine ® Labs (DVLabs) provides cutting-edge threat analysis and security filters that cover an entire vulnerability to protect against all potential attack permutations, not just specific exploits. In addition to DVLabs, exclusive access to vulnerability information from the Zero Day Initiative (ZDI) protects customers from undisclosed and zero-day threats. ZDI is the largest vendor-agnostic bug bounty program, with 700 vulnerabilities published in 2016. In 2016, Trend Micro TippingPoint customers haveprotected an average of 57 days ahead of a vulnerability being patched by affected vendors.
Feature 12
Virtual Patching: Virtual patching provides a powerful and scalable frontline defense mechanism that protects networks from known threats and relies on vulnerability-based filters to provide an effective barrier from all attempts to exploit a particular vulnerability at the network level rather than the end user level. This helps enterprises gain control of their patch management strategy with pre-emptive coverage between the discovery of a vulnerability and the availability of a patch, as well as added protection for legacy, out-of-support software.
Feature 13
Support for a broad set of traffic types: TPS platform supports a wide variety of traffic types and protocols. It provides uncompromising IPv6/v4 simultaneous payload inspection and support for related tunneling variants (4in6, 6in4, and 6in6). It also supports inspection of IPv6/v4 traffic with VLAN and MPLS tags, mobile IPv4 traffic, GRE and GTP (GPRS tunneling), and jumbo frames. This breadth of coverage gives IT and security administrators the flexibility to deploy its protection wherever it is needed.
Feature 14
Centralized Management: The TippingPoint Security Management System(SMS) delivers a unified policy and element management graphical user interface that provides a single mechanism for monitoring operational information, editing network security policies, configuring elements and deploying network security policy across the entire infrastructure whether its physical or virtual.



Revolutiontech has made the shopping easier for its customers. Please follow those easy steps to start shopping and stay connected with us:
Step 1: Sing up with revolution tech.com first to create an account using your email address and password if you do not have one yet.
Step 2: Check your email to confirm your created account via a link that has been sent from revolution tech .com.
Step 3: Log in to your account, and fill out all necessary information like billing address, shipping address, contact info, and so on.
Step 4: Now, you are ready to shop.
Step 5: Browse and find your products, add to cart, checkout, and enjoy.
Step 6: If you want to buy so many products, add all products to your cart first, and then proceed to checkout to save your time (you can keep adding products as many times as you want and keep it as many days as you like, proceed to checkout just when you are ready).

Related Products

Copyright © 2022 Revolution Technology All Right Reserved