document.getElementById('templateProduct_57').innerHTML = '

Incident ResponseSIEM and Compliance

We isolate the host, kill the processes, logoff and block users or IPs and much more. You see an alert and confirm that a server has been compromised. You or the SOC team decide to isolate the host from the network and lock down the computer for forensic analysis. Time is key and this should be accomplished ASAP before the Cryptoware spreads through the network.
';