SlideShare a Scribd company logo
1 of 21
Взаимодействие с Check Point Technical Support

Антон Разумов
arazumov@checkpoint.com
Check Point Software Technologies
Консультант по безопасности

©2009 Check Point Software Technologies Ltd. All rights reserved.

[Unrestricted]—For everyone
Ottawa - Extended global coverage

OTTAWA
Network +75
IPSO experts

DALLAS
Network
Endpoint

©2009 Check Point Software Technologies Ltd. All rights reserved.

SUNDSVALL
Endpoint

TEL AVIV
Network
Endpoint

TOKYO
Network
Endpoint

[Unrestricted]—For everyone

4
Technical Services Organization
Ofer Wolf
VP
Technical
Services

Dallas
TAC

Richard
Brannoc
k

Int
TAC

Desks
Javier Cast.

Customer
Services

Adam
Mittler

Kevin
Charles

Mike
Anderson

(90)

(70)

(50)

(85)

Escalation/
Diamond
D. Moses

Ottawa
TAC

Desks
Hanan
Adika

Escalation
Shira
Bar Yosef

HW
Services
Danny
Tost.

©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Ottawa
Escalation
Jason
Ingram

Ottawa
Team
Leaders

Profession
al
Services
Yaron
Langer

Knowledge
Center
Gil
Sudai
(20)

P&C+
R&D Liaison
Gil Carmon

Training
Amy
Hughey

[Restricted]—designated individuals

Business
Offering
Barak D W
Organization Structure & Ticket Flow

General
support

International
Support
Group

Escalation
Group
―Co – Premium‖/ ―Co MSP‖/ ―Enterprise Premium‖
―Fast Path‖

Senior engineers

Backline
Engineering
Programmers,
R&D staff

Diamond Support
Team
Diamond Customers
Most experienced
engineers

©2009 Check Point Software Technologies Ltd. All rights reserved.

[Unrestricted]—For everyone

6
SR Severity Assignment


First setting of Severity is done when opening a ticket through the Web (SST) or
by phone – according to the following levels:
– Critical:

– High:
– Medium:
– Low:

A problem that results in a “Network Down” condition or critical
production system failure. Requires commitment for 24 * 7 work
A problem that substantially degrades product performance
A problem that causes a minor impact on product use
An anomaly that does not affect business functionality



Severity may change during the troubleshooting process. We encourage
customers & partners to work with us to adjust severity levels as necessary by
communicating directly with the TAC engineer assigned to the case – preferably
by phone.



We encourage customers & partners to discuss these issues with the TAC
Engineer’s manager who can reallocate resources as required.



In exceptional circumstances, customers & partners may approach their local
Check Point contact (Account Manager or SE) to request a change of priority,
who will then contact the TAC managers and decide together how to proceed.

©2009 Check Point Software Technologies Ltd. All rights reserved.

[Unrestricted]—For everyone

7
Escalation path
 Available on public site:
http://www.checkpoint.com/services/contact/escalation.html

TL’s contact
details in
engineer’s
signature

©2009 Check Point Software Technologies Ltd. All rights reserved.

[Unrestricted]—For everyone

8
TAC Performance Metrics
Automatic Customer Satisfaction Surveys

1

Customer
Satisfaction

(Measure averages + Follow up on low scores)

Periodic outbound management surveys

Quality & Frequency of communication

2

Communication
Wait time on the phone

Focus on providing solution within 1 day

3

Resolution
Time
15-20% reduction of average resolution time
©2009 Check Point Software Technologies Ltd. All rights reserved.

[Unrestricted]—For everyone

9
РАБОТА С SERVICE REQUESTS

©2009 Check Point Software Technologies Ltd. All rights reserved.

[Unrestricted]—For everyone

10
Save time – Use our CHAT!

When launching chat an SR will automatically
be issued!
If no resolution by chat, Support will continue
handling the issue as a ticket

©2009 Check Point Software Technologies Ltd. All rights reserved.

[Unrestricted]—For everyone

11
При открытии тикета






Product name and version
Operating system
A general description of the case
General architecture, according to the Check Point products within the
configuration
What triggered the case:
–
–
–
–
–
–



Following an upgrade
When there was high load traffic
After configuration or policy changes (using new feature, etc')
After network changes
After operating system or hardware changes
Other...

Relevant information available to the end user that can assist in resolving
the problem:
–
–
–
–

Relevant error message
Core dump
Panic dump
Symptoms related to the case

©2009 Check Point Software Technologies Ltd. All rights reserved.

[Unrestricted]—For everyone

12
Collaborative Enterprise Support

Co-Basic

Co-Standard

Co-Premium
Fast–path escalation

Indirect 30 min for Severity #1

Direct 30 min for Severity #1

SecureKnowledge Advanced

SecureKnowledge Advanced

SecureKnowledge Advanced

12x5 CP backline channel support

24x7 CP backline channel support

24x7 CP backline channel support

Upgrades @ 25% of list price

Upgrades included

Upgrades included

Bug fixes

Bug fixes

Bug fixes

©2009 Check Point Software Technologies Ltd. All rights reserved.

[Unrestricted]—For everyone

13
Escalation Path –
“co-standard” Service Level

Specialized tools
Advanced
Access

Expert
Access

Severity 1
Issue

Escalates

By any CCSP
employee

30 min
By
phone
or via
web

24 x 7

Regular
Issue

Solves 75%
Escalates
25%

4 hrs

Customer
Status

Confirmation e-mail of
received Service Request
after opening

Solves or
passes on

Solves or
passes on

Solves

Only by a
CCSE

CCSP
Status

2nd line desk

Escalation desk

R&D

Status

Up-to-date status monitoring in SecureTrak

©2009 Check Point Software Technologies Ltd. All rights reserved.

[Unrestricted]—For everyone

14
Escalation Path –
“co-premium” Service Level

Specialized tools
Advanced
Access

Expert
Access

Severity 1
Issue

Information exchange
for directly escalated
issues

By any CCSP
employee or the
customer

30 min

By
phone
or via
web

24 x 7

Regular
Issue

Solves 75%
Escalates
25%

4 hrs

Customer
Status

Confirmation e-mail of
received Service Request
after opening

Solves or
passes on

Solves

Only by a
CCSE

CCSP
Status

2nd line desk

Escalation desk

R&D

Status

Up-to-date status monitoring in SecureTrak

©2009 Check Point Software Technologies Ltd. All rights reserved.

[Unrestricted]—For everyone

15
Sapphire & Diamond Programs
for better customer satisfaction

Secure knowledge expert

Sapphire

Designated Senior engineer
Yearly phone review
CP advance training session & yearly CP meet the expert for 2-4 people

Secure knowledge expert
Designated Senior engineer & Unique contact number

Diamond

Onsite Assistance of 4-10 days
Phone Consultation of 2 to 6 4-hour blocks
Monthly or Quarterly reviews
CP advance training session & yearly CP meet the expert for 3-6 people

©2009 Check Point Software Technologies Ltd. All rights reserved.

[Unrestricted]—For everyone

16
В процессе работы
 The debug process can be one or all of the following:
–
–
–
–
–
–

Cpinfo from relevant machines (management or modules)
Monitor or TCP dump
Relevant daemons debug output
Kernel debug output
Log files
O/S debug files (messages file, Event viewer output, etc.)

 Some cases are rarely reproduced and it may take several days to
duplicate them if at all.
 The desk engineer may request another set of debug information
because:
– The original debug information did not capture the phenomenon
– The original debug information, leads the desk engineer to a conclusion that is
different from his original conceptualization of the case. When this happens,
different debug flags are required.

©2009 Check Point Software Technologies Ltd. All rights reserved.

[Unrestricted]—For everyone

17
FAQs - Service Request Process
sk31615
– How Can I Speed Up the Resolution of My Ticket?
– After I Open a Service Request, How Soon Does the Technical
Assistance Center Respond?
– How Can I Determine the Severity of My Service Request?
– What Support Utilities Does Check Point Offer?
– What Is a CPinfo File?
– What Is fw monitor and How Can It Help Speed Up Resolution?
– How Do I Know Which Files to Send for My Configuration?
– What Is the Best Way to Report a High Severity Issue?
– How Do I Change the Company Contact for My Service Request?
– Can I add or change information on a request that was opened by
another person?
– How do I add an attachment?
– Can I View Closed Service Requests?
– How Do I Reopen a Closed Service Request?
– How Do I Escalate a Service Request?
©2009 Check Point Software Technologies Ltd. All rights reserved.

[Unrestricted]—For everyone

18
How can I speed up the resolution of my ticket?













Complete contact information, (name, title, company name, e-mail address, phone
number, pager number, fax number, onsite phone number, time zone) for all parties
involved in the issue.
Execute the $FWDIR/bin/fwinfo, cpinfo, or ipsoinfo command on all FireWall-1 modules
and the FireWall-1 management station in question, divert the output to a file, and attach
the file to a web request.
Describe the hardware platform(s) involved in this issue, including the amount of memory,
disk space, and NIC card types (manufacturer and model).
Describe the operating system(s) involved in this issue, including the version number and
patch level information. (Include which service pack and hotfixes for NT, which patches for
Solaris, etc.).
Provide a detailed description of the problem or issue, including any symptoms noted, any
patterns seen (time of day or only certain users affected, etc…) and any specific error
messages received.
Log file contains relevant log errors
Updated SVN Mapping of all the network related to the problem including
Hardware/Software detailed descriptions, Network Map, Connections types, bandwidth,
and IP addresses of all segment routers and transitional gateways.
General information about the network, including: approximate number of users,
approximate number of simultaneous sessions per user, types of applications in use,
network traffic passing through the software at the time of error, CPU utilization, memory
allocation and utilization.
An electronic topology diagram is preferred – Visio® or PowerPoint® are good
applications to use for this. If this is not feasible, a fax of hand drawn diagrams is an
acceptable alternative, provided the IP addresses or Host ID information is legible upon
receipt.
©2009 Check Point Software Technologies Ltd. All rights reserved.

[Unrestricted]—For everyone

19
How Do I Change the Company Contact
for My Service Request?
 In order to change a service request's (SR) assigned company contact that person who is working with Check Point on the SR issue - use one
of the following two options:
 The administrator of your account can request the contact to be
changed by calling one of the Worldwide Technical Assistance Centers
(TAC) at:

> Americas: +1-972-444-6600, options 1 and 1
> International: +972-3-611-5100
 The currently assigned company contact can send a web request, via
the existing SR, identifying the change in the company contact person.
Please provide name and email address of the new contact.
– Note: Company contacts must be designated, support contact personnel; the
administrator of your account makes these designations.
©2009 Check Point Software Technologies Ltd. All rights reserved.

[Unrestricted]—For everyone

20
How Do I Escalate a Service Request?

 If you need to escalate a service request (SR), contact
one of the Worldwide Technical Assistance Centers
(TAC) at:
 > Americas: +1-972-444-6600, options 1 and 1

 > International: +972-3-611-5100

©2009 Check Point Software Technologies Ltd. All rights reserved.

[Unrestricted]—For everyone

21
To do our best…

To do our best, what we need is:







Customer descr. – importance on Russian market
Total size of cust. CHKP installed base
Brief descr. of the problem
Definition of the timescale = by when it needs to be fixed
What is in risk if not fixed in time
Estimation of a future CHKP business if the fix is
successful
We need pure facts – not a novel

©2009 Check Point Software Technologies Ltd. All rights reserved.

[Unrestricted]—For everyone

22
Антон Разумов
arazumov@checkpoint.com
Check Point Software Technologies
Консультант по безопасности

©2009 Check Point Software Technologies Ltd. All rights reserved.

[Unrestricted]—For everyone

More Related Content

What's hot

Ayulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security products
Ayulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security productsAyulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security products
Ayulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security productsVertexMon VertexMon
 
Check point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentationCheck point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentationNattira Panbun
 
Check Point SandBlast and SandBlast Agent
Check Point SandBlast and SandBlast AgentCheck Point SandBlast and SandBlast Agent
Check Point SandBlast and SandBlast AgentMarketingArrowECS_CZ
 
VIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS SummitVIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS SummitShah Sheikh
 
S4xJapan Closing Keynote
S4xJapan Closing KeynoteS4xJapan Closing Keynote
S4xJapan Closing KeynoteDigital Bond
 
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7Rapid7
 
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...Kaspersky
 
Monitoring ICS Communications
Monitoring ICS CommunicationsMonitoring ICS Communications
Monitoring ICS CommunicationsDigital Bond
 
Patch your workplaces at home, in a meeting center or at the office
Patch your workplaces at home, in a meeting center or at the officePatch your workplaces at home, in a meeting center or at the office
Patch your workplaces at home, in a meeting center or at the officeIvanti
 
Security Culture from Concept to Maintenance: Secure Software Development Lif...
Security Culture from Concept to Maintenance: Secure Software Development Lif...Security Culture from Concept to Maintenance: Secure Software Development Lif...
Security Culture from Concept to Maintenance: Secure Software Development Lif...Dilum Bandara
 
Threat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a BreachThreat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a BreachRahul Neel Mani
 
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...Erin Sweeney
 

What's hot (20)

Check Point sizing security
Check Point sizing securityCheck Point sizing security
Check Point sizing security
 
Ayulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security products
Ayulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security productsAyulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security products
Ayulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security products
 
Check Point Virtual Systems
Check Point Virtual SystemsCheck Point Virtual Systems
Check Point Virtual Systems
 
checkpoint
checkpointcheckpoint
checkpoint
 
Check point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentationCheck point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentation
 
Check Point SandBlast and SandBlast Agent
Check Point SandBlast and SandBlast AgentCheck Point SandBlast and SandBlast Agent
Check Point SandBlast and SandBlast Agent
 
How to expose shortcuts in competitive poc
How to expose shortcuts in competitive pocHow to expose shortcuts in competitive poc
How to expose shortcuts in competitive poc
 
How to Choose a SandBox - Gartner
How to Choose a SandBox - GartnerHow to Choose a SandBox - Gartner
How to Choose a SandBox - Gartner
 
CPX 2016 Moti Sagey Security Vendor Landscape
CPX 2016 Moti Sagey Security Vendor LandscapeCPX 2016 Moti Sagey Security Vendor Landscape
CPX 2016 Moti Sagey Security Vendor Landscape
 
Check Point mission statement
Check Point mission statementCheck Point mission statement
Check Point mission statement
 
VIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS SummitVIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS Summit
 
S4xJapan Closing Keynote
S4xJapan Closing KeynoteS4xJapan Closing Keynote
S4xJapan Closing Keynote
 
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
 
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
 
Monitoring ICS Communications
Monitoring ICS CommunicationsMonitoring ICS Communications
Monitoring ICS Communications
 
WannaCry: How to Protect Yourself
WannaCry: How to Protect YourselfWannaCry: How to Protect Yourself
WannaCry: How to Protect Yourself
 
Patch your workplaces at home, in a meeting center or at the office
Patch your workplaces at home, in a meeting center or at the officePatch your workplaces at home, in a meeting center or at the office
Patch your workplaces at home, in a meeting center or at the office
 
Security Culture from Concept to Maintenance: Secure Software Development Lif...
Security Culture from Concept to Maintenance: Secure Software Development Lif...Security Culture from Concept to Maintenance: Secure Software Development Lif...
Security Culture from Concept to Maintenance: Secure Software Development Lif...
 
Threat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a BreachThreat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a Breach
 
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
 

Similar to Check Point Technical Support Guide

N-able webinar:Build recurring revenue in 45 days
N-able webinar:Build recurring revenue in 45 daysN-able webinar:Build recurring revenue in 45 days
N-able webinar:Build recurring revenue in 45 daysSolarwinds N-able
 
Is On-Demand SPM Right For Your Company?
Is On-Demand SPM Right For Your Company?Is On-Demand SPM Right For Your Company?
Is On-Demand SPM Right For Your Company?Callidus Software
 
3 steps to hosted success
3 steps to hosted success3 steps to hosted success
3 steps to hosted successVXSuite
 
This is my test slideshare
This is my test slideshareThis is my test slideshare
This is my test slidesharepapdev
 
Exactpro: Non-functional testing approach
Exactpro: Non-functional testing approachExactpro: Non-functional testing approach
Exactpro: Non-functional testing approach Iosif Itkin
 
On-Demand: Is It Right For Your Company?
On-Demand: Is It Right For Your Company?On-Demand: Is It Right For Your Company?
On-Demand: Is It Right For Your Company?Callidus Software
 
Callidus Software On-Premise To On-Demand Migration
Callidus Software On-Premise To On-Demand MigrationCallidus Software On-Premise To On-Demand Migration
Callidus Software On-Premise To On-Demand MigrationCallidus Software
 
Citihub IDC Event 2009 Cloud Mark Ellis
Citihub IDC Event 2009 Cloud Mark EllisCitihub IDC Event 2009 Cloud Mark Ellis
Citihub IDC Event 2009 Cloud Mark Ellismarkellis
 
Enhanced Technical Support
Enhanced Technical SupportEnhanced Technical Support
Enhanced Technical SupportLeon Henry
 
DotComGuy MSP Presentation
DotComGuy MSP PresentationDotComGuy MSP Presentation
DotComGuy MSP PresentationDotComGuy
 
Give ‘Em What They Want! Self-Service Middleware Monitoring in a Shared Servi...
Give ‘Em What They Want! Self-Service Middleware Monitoring in a Shared Servi...Give ‘Em What They Want! Self-Service Middleware Monitoring in a Shared Servi...
Give ‘Em What They Want! Self-Service Middleware Monitoring in a Shared Servi...SL Corporation
 
Calvin Diaz updated resume
Calvin Diaz updated resumeCalvin Diaz updated resume
Calvin Diaz updated resumeDiaz Calvin
 
Calvin Diaz updated resume
Calvin Diaz updated resumeCalvin Diaz updated resume
Calvin Diaz updated resumeDiaz Calvin
 
Building Operational Intelligence in Telecom with IBM ODM @Claro
Building Operational Intelligence in Telecom with IBM ODM @ClaroBuilding Operational Intelligence in Telecom with IBM ODM @Claro
Building Operational Intelligence in Telecom with IBM ODM @ClaroIcaro Tech
 
Protecting Your Investment with Polycom Global Services and ScanSource Commun...
Protecting Your Investment with Polycom Global Services and ScanSource Commun...Protecting Your Investment with Polycom Global Services and ScanSource Commun...
Protecting Your Investment with Polycom Global Services and ScanSource Commun...ScanSource, Inc.
 

Similar to Check Point Technical Support Guide (20)

N-able webinar:Build recurring revenue in 45 days
N-able webinar:Build recurring revenue in 45 daysN-able webinar:Build recurring revenue in 45 days
N-able webinar:Build recurring revenue in 45 days
 
Murari kumar
Murari kumarMurari kumar
Murari kumar
 
Is On-Demand SPM Right For Your Company?
Is On-Demand SPM Right For Your Company?Is On-Demand SPM Right For Your Company?
Is On-Demand SPM Right For Your Company?
 
3 steps to hosted success
3 steps to hosted success3 steps to hosted success
3 steps to hosted success
 
This is my test slideshare
This is my test slideshareThis is my test slideshare
This is my test slideshare
 
Exactpro: Non-functional testing approach
Exactpro: Non-functional testing approachExactpro: Non-functional testing approach
Exactpro: Non-functional testing approach
 
CV_ramy-elsayed
CV_ramy-elsayedCV_ramy-elsayed
CV_ramy-elsayed
 
On-Demand: Is It Right For Your Company?
On-Demand: Is It Right For Your Company?On-Demand: Is It Right For Your Company?
On-Demand: Is It Right For Your Company?
 
Callidus Software On-Premise To On-Demand Migration
Callidus Software On-Premise To On-Demand MigrationCallidus Software On-Premise To On-Demand Migration
Callidus Software On-Premise To On-Demand Migration
 
Citihub IDC Event 2009 Cloud Mark Ellis
Citihub IDC Event 2009 Cloud Mark EllisCitihub IDC Event 2009 Cloud Mark Ellis
Citihub IDC Event 2009 Cloud Mark Ellis
 
Enhanced Technical Support
Enhanced Technical SupportEnhanced Technical Support
Enhanced Technical Support
 
soc
socsoc
soc
 
DotComGuy MSP Presentation
DotComGuy MSP PresentationDotComGuy MSP Presentation
DotComGuy MSP Presentation
 
Give ‘Em What They Want! Self-Service Middleware Monitoring in a Shared Servi...
Give ‘Em What They Want! Self-Service Middleware Monitoring in a Shared Servi...Give ‘Em What They Want! Self-Service Middleware Monitoring in a Shared Servi...
Give ‘Em What They Want! Self-Service Middleware Monitoring in a Shared Servi...
 
SHABAB`S RESUME
SHABAB`S RESUMESHABAB`S RESUME
SHABAB`S RESUME
 
Calvin Diaz updated resume
Calvin Diaz updated resumeCalvin Diaz updated resume
Calvin Diaz updated resume
 
Calvin Diaz updated resume
Calvin Diaz updated resumeCalvin Diaz updated resume
Calvin Diaz updated resume
 
Building Operational Intelligence in Telecom with IBM ODM @Claro
Building Operational Intelligence in Telecom with IBM ODM @ClaroBuilding Operational Intelligence in Telecom with IBM ODM @Claro
Building Operational Intelligence in Telecom with IBM ODM @Claro
 
Mayank CV_dub
Mayank CV_dubMayank CV_dub
Mayank CV_dub
 
Protecting Your Investment with Polycom Global Services and ScanSource Commun...
Protecting Your Investment with Polycom Global Services and ScanSource Commun...Protecting Your Investment with Polycom Global Services and ScanSource Commun...
Protecting Your Investment with Polycom Global Services and ScanSource Commun...
 

More from Group of company MUK

More from Group of company MUK (13)

Check Point Products RU
Check Point Products RUCheck Point Products RU
Check Point Products RU
 
Check Point: Securing Web 2.0
Check Point: Securing Web 2.0 Check Point: Securing Web 2.0
Check Point: Securing Web 2.0
 
Check Point SMB Proposition
Check Point SMB PropositionCheck Point SMB Proposition
Check Point SMB Proposition
 
Check Point Mobile Security
Check Point Mobile SecurityCheck Point Mobile Security
Check Point Mobile Security
 
Check Point Ddos protector
Check Point Ddos protectorCheck Point Ddos protector
Check Point Ddos protector
 
Check Point: Compliance Blade
Check Point: Compliance BladeCheck Point: Compliance Blade
Check Point: Compliance Blade
 
CheckPoint: Anatomy of an evolving bot
CheckPoint: Anatomy of an evolving botCheckPoint: Anatomy of an evolving bot
CheckPoint: Anatomy of an evolving bot
 
Perfect Foundation for 2013 Security Blueprint
Perfect Foundation for 2013 Security BlueprintPerfect Foundation for 2013 Security Blueprint
Perfect Foundation for 2013 Security Blueprint
 
Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint
 
Check Point 2013
Check Point 2013Check Point 2013
Check Point 2013
 
Check Point appliances brochure 2012
Check Point appliances brochure 2012Check Point appliances brochure 2012
Check Point appliances brochure 2012
 
Check Point Report 2013 RU
Check Point Report 2013 RUCheck Point Report 2013 RU
Check Point Report 2013 RU
 
3D Security Report
3D Security Report3D Security Report
3D Security Report
 

Recently uploaded

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Recently uploaded (20)

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 

Check Point Technical Support Guide

  • 1. Взаимодействие с Check Point Technical Support Антон Разумов arazumov@checkpoint.com Check Point Software Technologies Консультант по безопасности ©2009 Check Point Software Technologies Ltd. All rights reserved. [Unrestricted]—For everyone
  • 2. Ottawa - Extended global coverage OTTAWA Network +75 IPSO experts DALLAS Network Endpoint ©2009 Check Point Software Technologies Ltd. All rights reserved. SUNDSVALL Endpoint TEL AVIV Network Endpoint TOKYO Network Endpoint [Unrestricted]—For everyone 4
  • 3. Technical Services Organization Ofer Wolf VP Technical Services Dallas TAC Richard Brannoc k Int TAC Desks Javier Cast. Customer Services Adam Mittler Kevin Charles Mike Anderson (90) (70) (50) (85) Escalation/ Diamond D. Moses Ottawa TAC Desks Hanan Adika Escalation Shira Bar Yosef HW Services Danny Tost. ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Ottawa Escalation Jason Ingram Ottawa Team Leaders Profession al Services Yaron Langer Knowledge Center Gil Sudai (20) P&C+ R&D Liaison Gil Carmon Training Amy Hughey [Restricted]—designated individuals Business Offering Barak D W
  • 4. Organization Structure & Ticket Flow General support International Support Group Escalation Group ―Co – Premium‖/ ―Co MSP‖/ ―Enterprise Premium‖ ―Fast Path‖ Senior engineers Backline Engineering Programmers, R&D staff Diamond Support Team Diamond Customers Most experienced engineers ©2009 Check Point Software Technologies Ltd. All rights reserved. [Unrestricted]—For everyone 6
  • 5. SR Severity Assignment  First setting of Severity is done when opening a ticket through the Web (SST) or by phone – according to the following levels: – Critical: – High: – Medium: – Low: A problem that results in a “Network Down” condition or critical production system failure. Requires commitment for 24 * 7 work A problem that substantially degrades product performance A problem that causes a minor impact on product use An anomaly that does not affect business functionality  Severity may change during the troubleshooting process. We encourage customers & partners to work with us to adjust severity levels as necessary by communicating directly with the TAC engineer assigned to the case – preferably by phone.  We encourage customers & partners to discuss these issues with the TAC Engineer’s manager who can reallocate resources as required.  In exceptional circumstances, customers & partners may approach their local Check Point contact (Account Manager or SE) to request a change of priority, who will then contact the TAC managers and decide together how to proceed. ©2009 Check Point Software Technologies Ltd. All rights reserved. [Unrestricted]—For everyone 7
  • 6. Escalation path  Available on public site: http://www.checkpoint.com/services/contact/escalation.html TL’s contact details in engineer’s signature ©2009 Check Point Software Technologies Ltd. All rights reserved. [Unrestricted]—For everyone 8
  • 7. TAC Performance Metrics Automatic Customer Satisfaction Surveys 1 Customer Satisfaction (Measure averages + Follow up on low scores) Periodic outbound management surveys Quality & Frequency of communication 2 Communication Wait time on the phone Focus on providing solution within 1 day 3 Resolution Time 15-20% reduction of average resolution time ©2009 Check Point Software Technologies Ltd. All rights reserved. [Unrestricted]—For everyone 9
  • 8. РАБОТА С SERVICE REQUESTS ©2009 Check Point Software Technologies Ltd. All rights reserved. [Unrestricted]—For everyone 10
  • 9. Save time – Use our CHAT! When launching chat an SR will automatically be issued! If no resolution by chat, Support will continue handling the issue as a ticket ©2009 Check Point Software Technologies Ltd. All rights reserved. [Unrestricted]—For everyone 11
  • 10. При открытии тикета      Product name and version Operating system A general description of the case General architecture, according to the Check Point products within the configuration What triggered the case: – – – – – –  Following an upgrade When there was high load traffic After configuration or policy changes (using new feature, etc') After network changes After operating system or hardware changes Other... Relevant information available to the end user that can assist in resolving the problem: – – – – Relevant error message Core dump Panic dump Symptoms related to the case ©2009 Check Point Software Technologies Ltd. All rights reserved. [Unrestricted]—For everyone 12
  • 11. Collaborative Enterprise Support Co-Basic Co-Standard Co-Premium Fast–path escalation Indirect 30 min for Severity #1 Direct 30 min for Severity #1 SecureKnowledge Advanced SecureKnowledge Advanced SecureKnowledge Advanced 12x5 CP backline channel support 24x7 CP backline channel support 24x7 CP backline channel support Upgrades @ 25% of list price Upgrades included Upgrades included Bug fixes Bug fixes Bug fixes ©2009 Check Point Software Technologies Ltd. All rights reserved. [Unrestricted]—For everyone 13
  • 12. Escalation Path – “co-standard” Service Level Specialized tools Advanced Access Expert Access Severity 1 Issue Escalates By any CCSP employee 30 min By phone or via web 24 x 7 Regular Issue Solves 75% Escalates 25% 4 hrs Customer Status Confirmation e-mail of received Service Request after opening Solves or passes on Solves or passes on Solves Only by a CCSE CCSP Status 2nd line desk Escalation desk R&D Status Up-to-date status monitoring in SecureTrak ©2009 Check Point Software Technologies Ltd. All rights reserved. [Unrestricted]—For everyone 14
  • 13. Escalation Path – “co-premium” Service Level Specialized tools Advanced Access Expert Access Severity 1 Issue Information exchange for directly escalated issues By any CCSP employee or the customer 30 min By phone or via web 24 x 7 Regular Issue Solves 75% Escalates 25% 4 hrs Customer Status Confirmation e-mail of received Service Request after opening Solves or passes on Solves Only by a CCSE CCSP Status 2nd line desk Escalation desk R&D Status Up-to-date status monitoring in SecureTrak ©2009 Check Point Software Technologies Ltd. All rights reserved. [Unrestricted]—For everyone 15
  • 14. Sapphire & Diamond Programs for better customer satisfaction Secure knowledge expert Sapphire Designated Senior engineer Yearly phone review CP advance training session & yearly CP meet the expert for 2-4 people Secure knowledge expert Designated Senior engineer & Unique contact number Diamond Onsite Assistance of 4-10 days Phone Consultation of 2 to 6 4-hour blocks Monthly or Quarterly reviews CP advance training session & yearly CP meet the expert for 3-6 people ©2009 Check Point Software Technologies Ltd. All rights reserved. [Unrestricted]—For everyone 16
  • 15. В процессе работы  The debug process can be one or all of the following: – – – – – – Cpinfo from relevant machines (management or modules) Monitor or TCP dump Relevant daemons debug output Kernel debug output Log files O/S debug files (messages file, Event viewer output, etc.)  Some cases are rarely reproduced and it may take several days to duplicate them if at all.  The desk engineer may request another set of debug information because: – The original debug information did not capture the phenomenon – The original debug information, leads the desk engineer to a conclusion that is different from his original conceptualization of the case. When this happens, different debug flags are required. ©2009 Check Point Software Technologies Ltd. All rights reserved. [Unrestricted]—For everyone 17
  • 16. FAQs - Service Request Process sk31615 – How Can I Speed Up the Resolution of My Ticket? – After I Open a Service Request, How Soon Does the Technical Assistance Center Respond? – How Can I Determine the Severity of My Service Request? – What Support Utilities Does Check Point Offer? – What Is a CPinfo File? – What Is fw monitor and How Can It Help Speed Up Resolution? – How Do I Know Which Files to Send for My Configuration? – What Is the Best Way to Report a High Severity Issue? – How Do I Change the Company Contact for My Service Request? – Can I add or change information on a request that was opened by another person? – How do I add an attachment? – Can I View Closed Service Requests? – How Do I Reopen a Closed Service Request? – How Do I Escalate a Service Request? ©2009 Check Point Software Technologies Ltd. All rights reserved. [Unrestricted]—For everyone 18
  • 17. How can I speed up the resolution of my ticket?          Complete contact information, (name, title, company name, e-mail address, phone number, pager number, fax number, onsite phone number, time zone) for all parties involved in the issue. Execute the $FWDIR/bin/fwinfo, cpinfo, or ipsoinfo command on all FireWall-1 modules and the FireWall-1 management station in question, divert the output to a file, and attach the file to a web request. Describe the hardware platform(s) involved in this issue, including the amount of memory, disk space, and NIC card types (manufacturer and model). Describe the operating system(s) involved in this issue, including the version number and patch level information. (Include which service pack and hotfixes for NT, which patches for Solaris, etc.). Provide a detailed description of the problem or issue, including any symptoms noted, any patterns seen (time of day or only certain users affected, etc…) and any specific error messages received. Log file contains relevant log errors Updated SVN Mapping of all the network related to the problem including Hardware/Software detailed descriptions, Network Map, Connections types, bandwidth, and IP addresses of all segment routers and transitional gateways. General information about the network, including: approximate number of users, approximate number of simultaneous sessions per user, types of applications in use, network traffic passing through the software at the time of error, CPU utilization, memory allocation and utilization. An electronic topology diagram is preferred – Visio® or PowerPoint® are good applications to use for this. If this is not feasible, a fax of hand drawn diagrams is an acceptable alternative, provided the IP addresses or Host ID information is legible upon receipt. ©2009 Check Point Software Technologies Ltd. All rights reserved. [Unrestricted]—For everyone 19
  • 18. How Do I Change the Company Contact for My Service Request?  In order to change a service request's (SR) assigned company contact that person who is working with Check Point on the SR issue - use one of the following two options:  The administrator of your account can request the contact to be changed by calling one of the Worldwide Technical Assistance Centers (TAC) at: > Americas: +1-972-444-6600, options 1 and 1 > International: +972-3-611-5100  The currently assigned company contact can send a web request, via the existing SR, identifying the change in the company contact person. Please provide name and email address of the new contact. – Note: Company contacts must be designated, support contact personnel; the administrator of your account makes these designations. ©2009 Check Point Software Technologies Ltd. All rights reserved. [Unrestricted]—For everyone 20
  • 19. How Do I Escalate a Service Request?  If you need to escalate a service request (SR), contact one of the Worldwide Technical Assistance Centers (TAC) at:  > Americas: +1-972-444-6600, options 1 and 1  > International: +972-3-611-5100 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Unrestricted]—For everyone 21
  • 20. To do our best… To do our best, what we need is:       Customer descr. – importance on Russian market Total size of cust. CHKP installed base Brief descr. of the problem Definition of the timescale = by when it needs to be fixed What is in risk if not fixed in time Estimation of a future CHKP business if the fix is successful We need pure facts – not a novel ©2009 Check Point Software Technologies Ltd. All rights reserved. [Unrestricted]—For everyone 22
  • 21. Антон Разумов arazumov@checkpoint.com Check Point Software Technologies Консультант по безопасности ©2009 Check Point Software Technologies Ltd. All rights reserved. [Unrestricted]—For everyone