Select your cookie preferences

We use essential cookies and similar tools that are necessary to provide our site and services. We use performance cookies to collect anonymous statistics, so we can understand how customers use our site and make improvements. Essential cookies cannot be deactivated, but you can choose “Customize” or “Decline” to decline performance cookies.

If you agree, AWS and approved third parties will also use cookies to provide useful site features, remember your preferences, and display relevant content, including relevant advertising. To accept or decline all non-essential cookies, choose “Accept” or “Decline.” To make more detailed choices, choose “Customize.”

    Listing Thumbnail

    Check Point Incident Response

     Info
    Check Point Incident Response PRO Plans leverage the expertise of our Incident Response team to help you prepare your organization for a security incident. The PRO Plans are structured to include a number of selected proactive services to help customers be prepared and ready to respond to an incident.
    Listing Thumbnail

    Check Point Incident Response

     Info

    Overview

    Incident Response should not be entirely reactive. Check Point Incident Response PRO Plans leverage the expertise of our Incident Response team to help you prepare your organization for a security incident. The PRO Plans are structured to include a number of selected proactive services to help customers be prepared and ready to respond to an incident. IR hours are included to cover you in the event of an incident, and for other proactive services not already included in the plan.

    Highlights

    • Preparation: Incident Response Planning, Table Top Exercise, Policy Creation, Intelligence Sharing, Attack Surface Evaluation, Customized Threat Management, SOC Training/Playbook Creation.
    • Response (during): Attack Mitigation, Full Incident Handling, Malware Forensics, Endpoint/Network/Mobile Forensics, Threat Intelligence, Attack Landscape Analysis, Full Actionable Reporting.
    • Mitigation: Compromise Assessment, Threat Hunting Engagement, Active Actor Management.

    Details

    Delivery method

    Pricing

    Custom pricing options

    Pricing is based on your specific requirements and eligibility. To get a custom quote for your needs, request a private offer.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Support

    Vendor support

    This offer includes Premium Support. For the full list of included support services visit: https://www.checkpoint.com/support-services/support-plans/  To open a support ticket, please have your Check Point user center account information available. If you do not have a user center account, sign up for one here: https://accounts.checkpoint.com . Need support? Contact us at

    Software associated with this service