Centralized Management and Response

Centralized management with integrated security policy, response, and visibility

Key Features

Actionable threat intelligence

The TippingPoint® Security Management System (SMS) provides global vision and security policy control for threat intelligence and enables comprehensive analysis and correlation. You can configure it to automatically check for, download, and distribute filter updates to TippingPoint systems as well as to take immediate action on events based on your security policies.

  • Operationalizes machine-readable threat intelligence (MRTI) through support for STIX and TAXII information sharing
  • Consumes threat intelligence feeds from third party sources via APIs

Windows® Mac® AndroidTM iOS new Power Up

Enterprise Vulnerability Remediation (eVR)

Map vulnerabilities to Trend Micro threat intelligence, take immediate action to maximize security coverage, and remediate through vulnerability threat prioritization.

  • Quickly optimize your network security with virtual patches for active CVEs in your network
  • Simplify policy decisions based on latest threat intelligence
  • Enhance and improve compliance processes
Windows® Mac® AndroidTM iOS new Power Up

Advanced threat analysis

TippingPoint solutions automatically block known and undisclosed vulnerabilities from the network. Added forensic capabilities automatically forward unknown or suspicious indicators of compromise (IOCs) to Deep Discovery for in-depth sandbox analysis and remediation, all without changing policy or altering network infrastructure.

Windows® Mac® AndroidTM iOS new Power Up

Contextual awareness

SMS provides contextual and end-user awareness on security and threats. Security policies can be defined and easily changed to fit the rhythm of business operations and respond to threats as they arise.

  • Detects and blocks network traffic based on a geographic region or country
  • Integrates with Active Directory (AD) to provide context, visibility, and reporting of compromised users by mapping IP addresses to AD users, machines, domains, and AD groups
Windows® Mac® AndroidTM iOS new Power Up

SMS Technical Specifications

Physical Appliance Specifications

Physical characteristics    
Dimensions 43.47 x 69.85 x 4.32 cm (17.11 x 27.5 x 1.7 in.)
48.18 x 74.39 x 4.27 cm (18.97 x 29.29 x 1.68 in.)
Form factor 1U rack mount 1U rack mount
Weight 16.78 kg (36.99 lbs) 21.9 kg (48.3 lbs)
Memory, processor, and storage 64 GB RAM
600 GB (2 x 600 GB disks, RAID 1)
2.4 TB storage (6 x 800 GB, RAID 1+0)
Operating Temperature 10 to 35°C (50 to 95°F) 10 to 35°C (50 to 95°F)
Electrical Characteristics  
Voltage 100 to 120 VAC, 200 to 240 VAC 100 to 120 VAC, 200 to 240 VAC
Frequency 50/60 Hz 50/60 Hz
Current 2.78 A (100 V) to 1.15 A (240 V) 6.3 A (100 V) to 2.62 A (240 V)
Power Supply Redundant 500 W (Hot swappable) Redundant 750 W (Hot swappable)
  200 million historical events 600 million historical events
    Provides additional processing and storage recommended for
deployments larger than 150 devices
OOB Remote Management HPE iLO 4 support with a dedicated
10/100/1000BASE-T RJ45 iLO port
Dell iDRAC9 enterprise w/ GbE RJ45

Threat Insights

Gain visibility into the volume and severity of threats attacking your network. Threat Insights aggregates and collects threat data from TippingPoint, Deep Discovery, and third-party solutions to give you visibility into which attacks require immediate response and which ones were thwarted, allowing you to prioritize, automate, and integrate network threat information.

Tipping Point Security Management Software

Proactive response and remediation

Through an automated response system called Active Responder, you can specify an action in response to a security event, ranging from directing a user to a self-remediation site, generating a trouble ticket, or – if the event is severe enough–moving to a secure VLAN or removal from the network.

Third-Party integration

SMS integrates seamlessly with other Trend Micro solutions, as well as with SIEM, vulnerability management tools, and other complementary security solutions. Gain centralized visibility into your network to make informed decisions and take immediate action on any potential threats to infrastructure or data.

Trusted expertise

Get started with Centralized Management & Response

An integrated defense

Our blend of cross-generational threat defense techniques deliver faster time to protection against known, unknown, and undisclosed threats. Our smart, optimized, and connected technology ensures that everything is working together to give you visibility and control across the evolving threat landscape.

* Source: Market Share: Enterprise Network Equipment by Market Segment, Worldwide, 4Q20 and 2020, Christian Canales, Naresh Singh, Joe Skorupa, Gartner (March 2021)