Incident Response Retainer
Minimize the damage and reduce your incident response time with UnderDefense Incident Response Retainer (IRR)
- Response Time
Get service level agreement (SLA) for onsite and remote consulting
- Budget
Agree on the number of prepaid hours and the hourly rate for additional hours
- Terms & Unused hours
Agree on the length of retainer and payment terms, such as if you need to pay up-front and what happens if you have unused prepaid hours
- Cyber insurance
Consider how your cyber insurance policy reimburses for incident response (IR) expenses and lower premiums by showing a proactive approach
Have UnderDefense IR experts on standby to help when you need it
Improve your readiness for data breach and define IR plan
Get expert response within hours, not days or week
Get ready and
Save at least
4 days when
Breach happens
Have a dedicated anti-malware team on-call
Ensure your first call focuses
on action
Eliminate paperwork-related response delays when every minute matters
Choice and Flexibility:
What Incident Response Retainer is right for you?
We provide tree options for Incident Response Retainer that are designed to suit different needs and budgets.
Basic
No upfront costs
- Establish terms and conditions for Incident Response (IR) services
- Define hourly rates for all incident response-related services and technologies
- Our experts available for you up to 12-hour SLA remotely
- Make no minimum financial commitment or pay no annual cost
- Pay only when Data Breach investigation starts
- Get support based on best effort and current availability
Standart
Incident response plan and SLA
- Establish terms and conditions for Incident Response (IR) services
- Define hourly rates for all incident response-related services and technologies
- Our experts available for you up to 4-hour SLA remotely
- Consultancy on how to improve your current incident readiness and response capabilities
- Access to Incident Response Readiness Service
- Our experts will help you compile Incident Response Plan tailored for your organization
Premium
Prepaid hours and SLA
- Establish terms and conditions for Incident Response (IR) services
- Our experts available for you up to 2-hour SLA remotely
- Our experts onsite for you by request
- Flexibility to repurpose unused hours on a variety of technical and strategic services
- Evaluate and improve your current incident readiness and response capabilities
- Our experts will help you compile Incident Response Plan tailored for your organization
FAQ
What included in Initial Response?
- Triage security issue and preliminary analysis to scope the nature of an incident
- Provide initial assessment based on Threat Intelligence and SOC/IR experience
- Evaluate the damage: assess what part of your network was infected
What is covered under Service-level agreement?
- 24/7 incident response team availability 2, 4, or 12 hour SLA available
- Contact with UnderDefense incident responder who can immediately help with triaging the incident
- The case is accepted once UnderDefense and client deem that incident response services are needed
What included in Incident Response Readiness Service?
- Review of logging, monitoring and detection technologies you own
- Review of the current network and host architecture
- Ensure incident is identified quickly
- Collaborative planning for Incident Response Plan
- Recommendations for improvement
Expertise and Services
Security Monitoring
24x7x365 UD will watch your network & protect you from Malicious Actors and Advanced Persistent Threats
Compliance & Audit
Get compliant fast and easy. SOC2, ISO 27001, PCI DSS, GDPR we know them inside out
Penetration Testing
Find your weaknesses before hackers do. Regular health check is a must for a successful company
Related resources
Free ISO 27001 Policy Templates: Your Ultimate Guide to Get Audit-Ready Faster
Critical aspects of ISO 27001 The list of ISO 27001 Policies Information Security Policy Information Security Policy in Project Management Information transfer policy Data Classification and Handling Policy Data Leakage Prevention Policy Risk Management Policy...
ISO 27001 Internal Audit Checklist: Your 10 Step to Compliance
What is an ISO 27001 internal audit? The difference between ISO 27001 internal and external audits Who can perform an ISO 27001 internal audit? ISO 27001 internal audit stages How often to conduct an internal audit? Access UnderDefense ISO 27001 Policy Templates to...
Top 10 Must-Have Cybersecurity Solutions for the Small and Medium Business
The growing number of cybercrime reports and surveys proves that hackers are slowly shifting their focus. Let's face it, large enterprises, healthcare institutions, and financial organizations are not their only target anymore. They are switching their attention to,...
Ready to get started?
We are here for you, ready to prepare you to respond to data breach or answer questions about how you can improve your incident readiness and compliance today