- Business
- Products
- Network Defense
- Intrusion Prevention
-
- TippingPoint Threat Protection System
- Threat Intelligence
- Centralized Management & Response
Centralized management with integrated security policy, response, and visibility
Physical Appliance Specifications
TIPPINGPOINT SECURITY MANAGEMENT SYSTEM H3 APPLIANCE |
TIPPINGPOINT SECURITY MANAGEMENT SYSTEM H4 XL APPLIANCE |
|
Physical characteristics | ||
Dimensions | 43.47 x 69.85 x 4.32 cm (17.11 x 27.5 x 1.7 in.) |
48.18 x 74.39 x 4.27 cm (18.97 x 29.29 x 1.68 in.) |
Form factor | 1U rack mount | 1U rack mount |
Weight | 16.78 kg (36.99 lbs) | 21.9 kg (48.3 lbs) |
Memory, processor, and storage | 64 GB RAM 600 GB (2 x 600 GB disks, RAID 1) |
96 GB RAM 2.4 TB storage (6 x 800 GB, RAID 1+0) |
Environment | ||
Operating Temperature | 10 to 35°C (50 to 95°F) | 10 to 35°C (50 to 95°F) |
Electrical Characteristics | ||
Voltage | 100 to 120 VAC, 200 to 240 VAC | 100 to 120 VAC, 200 to 240 VAC |
Frequency | 50/60 Hz | 50/60 Hz |
Current | 2.78 A (100 V) to 1.15 A (240 V) | 6.3 A (100 V) to 2.62 A (240 V) |
Power Supply | Redundant 500 W (Hot swappable) | Redundant 750 W (Hot swappable) |
Capacity | ||
200 million historical events | 600 million historical events | |
Provides additional processing and storage recommended for deployments larger than 150 devices |
||
OOB Remote Management | HPE iLO 4 support with a dedicated 10/100/1000BASE-T RJ45 iLO port |
Dell iDRAC9 enterprise w/ GbE RJ45 |
Gain visibility into the volume and severity of threats attacking your network. Threat Insights aggregates and collects threat data from TippingPoint, Deep Discovery, and third-party solutions to give you visibility into which attacks require immediate response and which ones were thwarted, allowing you to prioritise, automate, and integrate network threat information.
Through an automated response system called Active Responder, you can specify an action in response to a security event, ranging from directing a user to a self-remediation site, generating a trouble ticket, or – if the event is severe enough–moving to a secure VLAN or removal from the network.
SMS integrates seamlessly with other Trend Micro solutions, as well as with SIEM, vulnerability management tools, and other complementary security solutions. Gain centralised visibility into your network to make informed decisions and take immediate action on any potential threats to infrastructure or data.
Trusted expertise
Get started with Centralized Management & Response
Our blend of cross-generational threat defence techniques deliver faster time to protection against known, unknown, and undisclosed threats. Our smart, optimised, and connected technology ensures that everything is working together to give you visibility and control across the evolving threat landscape.
* Source: Market Share: Enterprise Network Equipment by Market Segment, Worldwide, 4Q20 and 2020, Christian Canales, Naresh Singh, Joe Skorupa, Gartner (March 2021)