ThreatCloud Incident Response

Threat Cloud Incident Response Service |
Datasheet
Incident Hotline: +1(866) 923-0907
Email: [email protected]
INCIDENT RESPONSE SERVICE
INCIDENT RESPONSE SERVICE
Service helps you prepare for and
OVERVIEW
Always Available To Help
respond to any security breach with 24/7
Operating 24/7 around the world, our Incident Response Service includes:
dedicated expert help to speed your
 Real-time assistance from hands-on security veterans with firsthand experience on some
of the largest, most publicized cyber-attacks and breaches
The Check Point Incident Response
recovery and return to business as usual.
 Rule-base and protection activation recommendations
 Traffic and attack analysis
Key Features
 ThreatCloud real-time security intelligence
identifies emerging outbreaks and threat
trends
 24/7 guidance and recovery support for a
wide-range of security events, including:
- Malware and virus analysis
- Botnet identification and counteraction
- Data loss incident analysis
- Denial of Service (DoS) incident
response and mitigation
- Security control recommendations to
counter threats and attacks
- Attack profiling that supports future
event planning efforts
- Custom signatures
Key Benefits
 Immediate expert-level incident response
 Reduced downtime
 Documented event reports
 Incident response best practices
 Improved internal and external resource
coordination
 Custom protection development
 Configuration recommendations for third-party systems and service providers
 Incident reports
 Post-event data collection and analysis
 Obtain the service today through an annual retainer contract
Extending Internal Incident Response Teams
Our Incident Response Service is an extension of established internal incident
response teams. Providing advanced product expertise with direct access to
developers and threat specialists, our experts augment internal capabilities, either on site or remotely, whenever needed.
In the ThreatCloud™—the Right Guidance and the Right Time
The first collaborative network to fight cybercrime, ThreatCloud gives Check Point
engineers real-time access to general attack trends, intelligence, and customer
specific event data to pinpoint attack methodologies and source information.
How does it work?
A security incident occurs –you call our Incident Response Hotline. We immediately
open a conference call line, assessing and triaging the event. Analyzing your system
and network resources, we establish a baseline pattern. We then provide you with an
Incident Report with log and malware analysis, letting you know what to do, and how
to prevent future attacks.
©2015 Check Point Software Technologies Ltd. All rights reserved. [Protected] Non -confidential content
April 3, 2015
1
Threat Cloud Incident Response Service |
Datasheet
CUSTOM SECURITY CONTROLS
In addition to real-time attack remediation assistance,
receive expert recommendations, including:
 Custom signatures
 Traffic and attack analysis
 Rule-base protection activations
 Custom protection development
 3rd party systems and service providers protection how-to
guides
THREATCLOUD™ INTELLIGENCE FEEDS
MULTI-THREAT ANALYSIS
We are the only company offering insight and solutions for
multiple threats including:
 Firewall
 IPS
 Applications
 Data Loss
 Malware
 Botnets
 Unauthorized Access
 Denial of Service
This real-time security intelligence database uses a
worldwide network of threat sensors, constantly updating and
collaborating the analysis of over 250 million addresses, 4.5
million malware signatures, and 300,000 malware-infested
websites.
THE INCIDENT RESPONSE PROCESS
REAL-TIME REMEDIATION
DoS attacks and active cyber-intrusions are dynamic events.
Check Point incident responders have the knowledge and
experience to adapt to changing attack conditions in realtime with expert advice, thereby minimizing the exposure and
damage to your computing environment.
DOCUMENTATION AND GUIDANCE
Improve processes, speed response time, and meet
compliance and reporting requirements with:
 Incident response analysis and recommended remediation
 Incident response best practices guidelines
 State of preparedness report
 Annual summary of event activity vs. Check Point
community
 Attack profiling
CONTACT US
ADDITIONAL SERVICE OPTIONS
 On-demand device installation for short-term use of
security technology as preparation for upcoming events
 Managed Service continuously monitors IPS logs for
proactive mitigation and rule timing.
 Security Program Review delivers comprehensive analysis
of IT security program and technology architecture.
Headquarters | 5 Ha’Solelim Street, Tel Aviv 67897, Israel | Tel: 972-3-753-4555 | Fax: 972-3-624-1100 | Email: [email protected]
U.S. Headquarters | 959 Skyway Road, Suite 300, San Carlos, CA 94070 | Tel: 800-429-4391; 650-628-2000 | Fax: 650-654-4233 | www.checkpoint.com
©2015 Check Point Software Technologies Ltd. All rights reserved. [Protected] Non -confidential content
April 3, 2015
2