Prevention
- Security Assessment
- Red Teaming
- Compliance Audit
- Pre-IR Assessment
- Compromise Assessment
- Cyber Education
- GIB Crypto
of hands-on experience
hours of incident response
top-tier cybersecurity experts
Incident Response Retainer is a pre-negotiated statement of work to provide a synergy of proactive and reactive services related to a security incident.
Group-IB designed Incident Response Retainer agreements in different ways to fit various budget and business needs, and to minimize downtime during a cyberattack.
of companies are dissatisfied with their current response time to a data breach in 2020
A variety of technical & strategic services to build a proactive approach to incident response
Signed SLAs to guarantee timely service and 24/7 emergency response
Flexible terms of the Retainer: discounted rate for additional consulting services
A variety of proactive, reactive and educational services for repurposing prepaid hours
Upfront costs, agreed terms, SLA for initial response
Upfront costs, SLA, 2‑days IR workshop
Upfront costs, SLA, repurpose of unused hours, Pre-IR
Feature | Lite | Standard | Premium |
---|---|---|---|
Brief Description | Upfront costs, agreed terms, SLA for initial response | Upfront costs, SLA, 2-days IR workshop | Upfront costs, SLA, repurpose of unused hours, Pre-IR |
Service duration | 1 year | 1 year | 1 year |
Pre-paid hours | Yes | Yes | Yes |
Access to 24/7 emergency response hotline | Yes | Yes | Yes |
SLA: Initial remote response | 7 hours | 5 hours | 3 hours |
SLA: Onsite response | Best effort | 48 hours | 30 hours |
Incident Response Educational Workshop | No | Yes | Yes |
Incident Response Readiness Assessment (Pre‑IR) | No | No | Yes |
Discounted rate for additional consulting hours | No | Yes | Yes |
Repurpose unused pre-paid hours for other services | No | Yes | Yes |
Incident Response – Group-IB Incident Response Retainer
Ransomware Protection - Group-IB Incident Response Retainer
The well-known complete guide to the latest tactics, techniques, and procedures of ransomware operators based on MITRE ATT&CK®