Sold by: Optiv
Deployment, configuration, and integration of Check Point Technologies into an existing environment. Quick-Start configuration for standard deployments, however, customization, optimization, and managed services are also available.
Overview
Optiv and Check Point help clients understand their security posture so they can design an architecture that prevents complex and zero-day cyberattacks. With a multilevel security architecture that defends enterprises’ cloud workloads, networks and endpoints, clients can be sure they are completely protected across all attack vectors. Check Point’s comprehensive and intuitive single point of control security management system increases operational efficiency and lowers the complexity of managing your security.
Highlights
- PROVEN METHODOLOGIES • Focus on Business Outcomes • Solve for Complex Security Challenges • Break Down Technology Silos • Optiv Best in Class Services
- EXTENSION OF RESOURCES Optiv MSS has multiple security operations centers running 24x7x365 and 200+ experts, analysts and security engineers responding to alerts to provide a wide range of continuous support that is best in class to clients.
- TECHNOLOGY RATIONALIZATION Not sure what’s needed? Optiv’s complimentary Security Program Foundation Assessment (SPFA) takes an inventory of existing solutions to determine gaps in security coverage and provides recommended course of action.
Details
Pricing
Custom pricing options
Pricing is based on your specific requirements and eligibility. To get a custom quote for your needs, request a private offer.
How can we make this page better?
We'd like to hear your feedback and ideas on how to improve this page.
Legal
Content disclaimer
Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.
Resources
Vendor resources
Support
Vendor support
Software associated with this service
CloudGuard Network Security with Threat Prevention & SandBlast BYOL
By Check Point Software Technologies
Advanced threat prevention security for AWS and hybrid cloud environments, with Threat Extraction and Threat Emulation.
**Please note: To ensure optimal operations, Check Point recommends a 4 vCores machine size. This provides balanced efficiency and smooth performance, which most customers find ideal for their needs.
CloudGuard Network Security Next-Gen Firewall with Threat Prevention
By Check Point Software Technologies
Advanced threat prevention security for AWS and hybrid cloud environments with GWLB (starting with R81.20)
Please note: To ensure optimal operations, Check Point recommends a 4 vCores machine size. This provides balanced efficiency and smooth performance, which most customers find ideal for their needs.
Check Point Security Management (BYOL)
By Check Point Software Technologies
A single security management console delivers consistent visibility, policy management, logging, reporting and control across all cloud environments and networks
Check Point Security Management
By Check Point Software Technologies
A single pane-of-glass security management console delivers consistent visibility, policy management, logging, reporting and control across all cloud environments and networks