Integrated Advanced Threat Prevention


Intrusion Prevention (IPS) Protect against known, unknown, and undisclosed vulnerabilities in network.

Work for Integrated Advanced Threat Prevention?

Learning about Integrated Advanced Threat Prevention?

We can help you find the solution that fits you best.

Integrated Advanced Threat Prevention Reviews

Chat with a G2 Advisor
Write a Review
Filter Reviews
Filter Reviews
  • Ratings
  • Company Size
  • User Role
  • Industry
Company Size
User Role
Showing 2 Integrated Advanced Threat Prevention reviews
LinkedIn Connections
Integrated Advanced Threat Prevention review by Administrator
Validated Reviewer
Verified Current User
Review Source

"Trend Micro protects production servers"

What do you like best?

Incredibly easy to deploy and manage. Very good GUI and information, basically runs itself as long as it has the proper connection. We run this on our production environment and it has protected us from countless malicious and phishing attacks. We moved from a competitor that was not doing a good job of protecting us from real time threats without requiring admin intervention which is not feasible with our size.

What do you dislike?

The ability for admins to pause protection for short spans in case it conflicts with other installations could be smoother. I would like to be able to disable and have it restart at certain times without having to circle back around and automated tasks to a large pool of servers is not feasible. Creates a labor intensive job, although it is rare that this needs to happen.

Recommendations to others considering the product

Roll it in small test batches at a time to ensure no other conflicts. Remove existing av first!

What business problems are you solving with the product? What benefits have you realized?

We are protecting our servers from Phishing, malicious payloads and other threats such as ransomeware. This as a tiered approach along with white listing, firewalls and a sound patching strategy have protected us.

Sign in to G2 Crowd to see what your connections have to say about Integrated Advanced Threat Prevention
Integrated Advanced Threat Prevention review by User in Higher Education
User in Higher Education
Validated Reviewer
Review Source
Business partner of the vendor or vendor's competitor, not included in G2 Crowd scores.

"Great at keeping computers safe "

What do you like best?

Runs in the background. It is not distracting and does the job without taking up processing space. Easy to manage.

What do you dislike?

Theres nothing I dislike at the moment. It does what it was designed to do.

What business problems are you solving with the product? What benefits have you realized?

We prevented a lot of outside threats and it was great network protection for larger organizations.

What Intrusion Detection and Prevention Systems (IDPS) solution do you use?

Thanks for letting us know!

There are not enough reviews of Integrated Advanced Threat Prevention for G2 Crowd to provide buying insight. Below are some alternatives with more reviews:

McAfee Network Security Platform Logo
McAfee Network Security Platform
McAfee Network Security Platform is a next-generation intrusion prevention system (IPS) that redefines how organizations block advanced threats.
FireEye Network Security and Forensics Logo
FireEye Network Security and Forensics
FireEye Network Security (NX) solutions protect against known and unknown advanced attacks with the signature-less Multi-Vector Virtual Execution (MVX) engine, conventional intrusion prevention system (IPS) and intelligence-driven detection.
TippingPoint® Threat Protection System Logo
TippingPoint® Threat Protection System
TippingPoint integrates with the Deep Discovery Advanced Threat Protection Solution to detect and block targeted attacks and malware through preemptive threat prevention, threat insight and prioritization, and real-time enforcement and remediation.
Check Point IPS (Intrusion Prevention System) Logo
Check Point IPS (Intrusion Prevention System)
Check Point IPS (Intrusion Prevention System) combines industry-leading IPS protection with breakthrough performance at a lower cost than traditional, stand-alone IPS software solutions. IPS delivers complete and proactive intrusion prevention, all with the deployment and management advantages of a unified and extensible Next Generation Firewall solution.
Next-Generation Intrusion Prevention System (NGIPS) Logo
Next-Generation Intrusion Prevention System (NGIPS)
High performance. Resiliency. Security operations empowerment. NGIPS receives new policy rules and signatures every two hours, so your security is always up to date.
IBM QRadar Network Security (XGS) Logo
IBM QRadar Network Security (XGS)
Next-generation network security to keep you Ahead of the Threat. IBM keeps you Ahead of the Threat, protecting your entire network with next–generation network security that will intelligently recognize and block unknown threats, while providing increased visibility and control over network activities.
Hillstone Cloud Sandbox Logo
Hillstone Cloud Sandbox
0 reviews
Cloud Sandbox delivers a unique, advanced threat detection platform that can emulate the execution environment and analyze all activities related to malicious files, identify advanced threats and collaborate with existing solutions to provide rapid remediation.
0 reviews
Industrial cybersecurity. Secure-NOK provides innovative solutions to solve Industrial Cybersecurity needs.
EcoStruxure Security Expert Logo
EcoStruxure Security Expert
0 reviews
EcoStruxure Security Expert is a policy-based product that does audit, enforce and report on managed machines with respect to their assigned policies.
SecureNok Logo
0 reviews
Secure-NOK is a cybersecurity specialist company that provides products and solutions that detect and remove security attacks and events such as espionage, sabotage, malware and other harmful events in industrial networks.
Show more
Kate from G2 Crowd

Learning about Integrated Advanced Threat Prevention?

I can help.
* We monitor all Integrated Advanced Threat Prevention reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.