With Check Point’s Managed-Firewall-as-a-Service (MFaaS) for Colocation, organizations can simplify their data center workflow orchestration and scale up on demand, just as they can spin up new servers and compute resources in colo hosted private clouds.
Managed Firewall as a Service, provided by Check Point’s Infinity Global Services, protects both private and public network services from security threats. The service integrates with your existing security infrastructure with a network-based, cost-effective, scalable threat prevention solution.
Product capabilities:
On-demand, as a service, security solution provided by Check Point
Superior security gateways and highest-caliber threat prevention includes:
Vantaggi
Sicuri
After signing up for Check Point׳s service, their team will set up and configure the firewall to fit your security needs, integrating it with your existing infrastructure. The firewall is deployed remotely in your colocation data center for a quick setup. Check Point continuously monitors and manages the firewall, using advanced tools to track traffic and respond to threats in real-time. As your needs grow, you can request more resources, and Check Point will scale up the service. Regular updates and maintenance ensure the firewall stays up-to-date and performs optimally. The service includes:
Change execution schedule:
Type | Schedule |
---|---|
Scheduled change | 2 business days |
Emergency change | 2 hours |
Service Level Agreement SLA:
Severity | Descrizione | Response Time |
---|---|---|
Critical | Outage. Service is down | 2 hours |
High | Urgent. End-user impact | 4 hours |
Medium | Important. Potential for performance im-pact if not addressed | 24 hours |
Low | Monitor. Issue addressed but poten-tially impactful in the future | Best Effort |
Most relevant roles
CISO, CIO, CTO, Direttore della sicurezza, Direttore IT, Direttori SOC
Ideal number of participants
2-5 Professionisti
Check Point Infinity Global Services fornisce servizi di sicurezza end-to-end che ti consentono di accrescere le competenze del tuo team, progettare best practice e prevenire le minacce in tempo reale. Ovunque tu sia nel tuo percorso di sicurezza informatica, noi iniziamo da lì. I nostri esperti d'élite lavoreranno insieme al tuo team per portare la tua organizzazione al livello successivo di protezione e costruire il tuo piano di resilienza informatica.