Sold by: Optiv
Subject Matter Expert, Remote Delivery, Contiguous Week, Normal Business Hours, No Statement of Work, Client directed utilization of time. Used to help clients get started with their new technologies. Expires 180 calendar days from purchase. Invoiced at the time of purchase. Subject to the Optiv SME Services Terms and Conditions found at Optiv.com/agreements
Overview
Optiv and Check Point help clients understand their security posture so they can design an architecture that prevents complex and zero-day cyberattacks. With a multilevel security architecture that defends enterprises’ cloud workloads, networks and endpoints, clients can be sure they are completely protected across all attack vectors. Check Point’s comprehensive and intuitive single point of control security management system increases operational efficiency and lowers the complexity of managing your security.
Highlights
- PROVEN METHODOLOGIES • Focus on Business Outcomes • Solve for Complex Security Challenges • Break Down Technology Silos • Optiv Best in Class Services
- EXTENSION OF RESOURCES Optiv MSS has multiple security operations centers running 24x7x365 and 200+ experts, analysts, and security engineers responding to alerts to provide a wide range of continuous support that is best in class to clients.
- TECHNOLOGY RATIONALIZATION Not sure what’s needed? Optiv’s complimentary Security Program Foundation Assessment (SPFA) takes an inventory of existing solutions to determine gaps in security coverage and provides recommended course of action.
Details
Pricing
Custom pricing options
Pricing is based on your specific requirements and eligibility. To get a custom quote for your needs, request a private offer.
How can we make this page better?
We'd like to hear your feedback and ideas on how to improve this page.
Legal
Content disclaimer
Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.
Resources
Vendor resources
Support
Vendor support
Software associated with this service
CloudGuard Network Security Next-Gen Firewall with Threat Prevention
By Check Point Software Technologies
Advanced threat prevention security for AWS and hybrid cloud environments with GWLB (starting with R81.20)
Please note: To ensure optimal operations, Check Point recommends a 4 vCores machine size. This provides balanced efficiency and smooth performance, which most customers find ideal for their needs.
CloudGuard Network Security with Threat Prevention and SandBlast
By Check Point Software Technologies
Advanced threat prevention security for AWS and hybrid cloud environments, with Threat Extraction and Threat Emulation, and with GWLB (starting with R81.20)
**Please note: To ensure optimal operations, Check Point recommends a 4 vCores machine size. This provides balanced efficiency and smooth performance, which most customers find ideal for their needs.
CloudGuard Network Security with Threat Prevention & SandBlast BYOL
By Check Point Software Technologies
Advanced threat prevention security for AWS and hybrid cloud environments, with Threat Extraction and Threat Emulation.
**Please note: To ensure optimal operations, Check Point recommends a 4 vCores machine size. This provides balanced efficiency and smooth performance, which most customers find ideal for their needs.