The General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679) is a regulation by which the European Parliament, the European Council and the European Commission intend to strengthen and unify data protection for individuals within the European Union (EU).
ANALYSE & REPORT
The first step in our proactive approach to security is to understand the unique vulnerabilities of our customer’s business. Identifying the greatest risks and vulnerabilities to their business enables us to implement preventative protection. Our specialist audit and assessment team works with their business to understand the risks and assess its security posture. Once the issues are known, we can implement a business protection strategy to defend their critical assets and optimise their security spend in line with risk. With the comprehensive risk report in hand, our dedicated account managers consult with the customer to deliver the best security solutions to solve their security issue and proactively protect the business.
DETECT & LOCATE
Early detection of security threats is vital to prevent business downtime and revenue losses. We provide an early warning system for our customers, detecting threats and proactively managing them before they negatively impact business operations. Our 24/7 proactive monitoring platform, identifies issues in real-time from our Security Operations Centre (SOC), enabling faster resolution, fewer security incidents and better business continuity for our customers. Our platform enables highly vigilant, contextual monitoring of security threats, with the option to customise parameters to monitor everything within the business environment, not just the security devices.
PROTECT & RESPOND
We implement the optimum technologies to meet our customers’ security needs with the right mix of people, platform and process to ensure assets are as secure as they can be. Our account managers focus on your desired business outcome to proactively provide advice on the latest industry-leading security technologies. Meanwhile, our highly trained technical team works to implement solutions sympathetically within our customers’ existing IT environment. Through effective business protection, we aim to minimise service disruption and enable our customers’ IT assets to focus on their core role - supporting the business.
We offer comprehensive technical training and certifications for IT security professionals who deploy and manage Check Point Security solutions.
Core Security Administrator Training 3-day course covers everything you need to start-up, configure and manage daily operations of Check Point Security Gateway and Management Software Blades systems on the GAiA operating system
Core Security Expert Training Advanced 3-day course teaches how to build, modify, deploy and troubleshoot Check Point Security Systems on the GAiA operating system. Hands-on lab exercises teach how to debug firewall processes, optimize VPN performance and upgrade Management Servers.
Download Course Outline
Check Point Certifications mean expertise with the technology that secures the internet for all Fortune and Global 100 companies. The benefits of becoming Check Point certified include the skills to support and sell Check Point products, 2-year expert access to our SecureKnowledge database and advanced product documentation.
Getting Started: A Check Point UserCenter or PartnerMap account is required to receive certification benefits. You can create a new account at the User Center. If you are not sure about your account, please contact Account Services for verification. You also need a Pearson VUE account, and the email address should be the same as your UserCenter account.