TMroz.com


HW = Hardware
| SW = Software
H/S = Both
| 🚀 Emerging Biz Group
💎 IM Exclusive
| ☁️ Cloud Marketplace
Cloud Options
| ⚙️ Service Offering
Cyber Risk Scorecards & Posture Assessments

Cybersecurity posture relates to the security status of an enterprise’s networks, information, and systems based on information security resources (e.g., people, hardware, software, policies) and capabilities in place to manage the defense of the enterprise and to react as the situation changes.

H/S
Cisco (Duo) ☁️


Contact: [email protected]
Phone: x66092

Solutions Design & Services: x76695
Technical Account Manager:
Technology Consultant:
Business Transformation Engineer:

☁️ Ingram Micro Cloud Marketplace
🛠 Ingram Micro IoT Marketplace
🏗 Business Transformation Center Partner

Product:

- Identity Services Engine (ISE)
- Stealthwatch Cloud (SWC)
- Amp for Endpoint
- DUO

Note:

- ISE: https://www.cisco.com/c/en/us/products/collateral/security/identity-services-engine/data_sheet_c78-656174.html
- AMP: https://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise-networks/advanced-malware-protection/amp-endpoints-faq.pdf
- Duo: https://duo.com/docs/trusted-endpoints
- SWC: https://www.cisco.com/c/en/us/products/collateral/security/firesight-management-center/datasheet-c78-736775.html

- ISE uses Cisco AnyConnect for Posture: https://www.cisco.com/c/dam/en/us/products/collateral/security/anyconnect-secure-mobility-client/at_a_glance_c45-578609.pdf

Vulnerability Management & Analytics

Vulnerability Management is the practice of identifying, classifying, remediating, and mitigating vulnerabilities. Vulnerability Analytics is a process that defines, identifies, and classifies the security holes (vulnerabilities) in a computer, network, or communications infrastructure.

Ingram Micro Professional Service:
Dev/Sec/Ops Services

H/S
Alert Logic ☁️


Contact: [email protected]
Phone: 1-844-256-8346

☁️ Ingram Micro Cloud Marketplace

Product:

Vulnerability Scanning & Vulnerability Assessment

Note:

Included in:
- Essentials
- Professional
- Enterprise

H/S
Balbix ☁️


Contact: [email protected]
Phone: 1-844-256-8346

☁️ Ingram Micro Cloud Marketplace

Product:

Balbix BreachControl

Note:

Improve cybersecurity posture, Assess and report on enterprise breach risk,
Keep systems patched, Consolidate and optimize cybersecurity spend

H/S
Cisco (Duo) ☁️


Contact: [email protected]
Phone: x66092

Solutions Design & Services: x76695
Technical Account Manager:
Technology Consultant:
Business Transformation Engineer:

☁️ Ingram Micro Cloud Marketplace
🛠 Ingram Micro IoT Marketplace
🏗 Business Transformation Center Partner

Product:

Analytics:
- AMP for EndPoints
- Firepower Management Center (FMC)
- Stealthwatch Cloud (SWC)
- Tetration

Note:

- Vulnerability Analytics: https://www.cisco.com/c/en/us/products/collateral/security/fireamp-endpoints/datasheet-c78-733181.html?cachemode=refresh#Response
- FMC: https://www.cisco.com/c/en/us/products/collateral/security/firesight-management-center/datasheet-c78-736775.html
- SWC: https://www.cisco.com/c/en/us/products/collateral/security/firesight-management-center/datasheet-c78-736775.html
- Tetration: https://www.cisco.com/c/en/us/products/collateral/data-center-analytics/tetration-analytics/datasheet-c78-740328.html#KeycapabilitiesforCiscotetrationcloudworkloadprotectionfunctionality

SW
SyncDog ☁️


Contact: [email protected]
Phone: 1-844-256-8346

☁️ Ingram Micro Cloud Marketplace

Product:

Mobile threat Defense

Note:

SyncDog analyzes vulnerabilities on the device and provide mechanisms to respond to those vulnerabilities via policy through our MTD offering.

File Integrity Monitoring

File integrity monitoring (FIM) is an internal control or process that performs the act of validating the integrity of operating system and application software files using a verification method between the current file state and a known, good baseline.

Regulation & Compliance Management

Regulatory compliance is an effort to ensure a company is aware of steps needed to comply with relevant laws, polices, and regulations. Security reflects a large portion of these compliancies.

Ingram Micro Professional Service:
Network Security Services

Identity Governance and Administration (IGA)

IGA systems merge identity administration, which addresses administering accounts and credentials, provisioning, and managing entitlements, with identity governance, which addresses the segregation of duties, role management, logging, and analytics and reporting.

IGA systems provide additional functionality beyond standard Identity and Access Management (IAM) systems. In particular, they help organizations meet compliance requirements and enable them to audit access for compliance reporting. They also automate workflows for tasks such as access approvals and provisioning/de-provisioning.

Elements of IGA Systems
- Password management
- Integrations
- Access request managemen
- Automated Provisioning
- Entitlement management

Mobility Management and/or Security (MxM)

Manage and secure employees' mobile devices that are deployed across multiple mobile service providers and across multiple mobile operating systems being used in the organization.

Features typically include:
- Device Tracking
- Application Control
- Remote-wipe
- Anti-Malware
- Web Filtering
- Inventory Management
- Anti-theft

Network Vulnerability Assessments,
Penetration Tests

A network vulnerability assessment is the process of reviewing and analyzing a computer network for possible security vulnerabilities and loopholes. It is used by network administrators to evaluate the security architecture and defense of a network against possible vulnerabilities and threats.

Ingram Micro Professional Service:
Penetration Test Assessment

H/S
Balbix ☁️


Contact: [email protected]
Phone: 1-844-256-8346

☁️ Ingram Micro Cloud Marketplace

Product:

Balbix BreachControl

Note:

Improve cybersecurity posture, Assess and report on enterprise breach risk,
Keep systems patched, Consolidate and optimize cybersecurity spend

Cloud Security Posture Management (CSPM) NEW

CSMP solutions provide organizations with visibility into public cloud infrastructure. With the proliferation of cloud resources, many organizations are unaware of how many cloud resources are running and how they’re all configured. This lack of visibility can cause misconfigurations to go undetected for long periods of time, making it harder to secure the applications.

Dark Web Monitoring

Dark Web Monitoring, also known as cyber monitoring, is an identity theft prevention product that enables you to monitor your identity information on the dark web, and receive notifications if your information is found online.

Security Awareness Training

Tools to improve employee knowledge of social engineering and cyberattack techniques. Products/Services can include training as well as phishing simulations.

Ingram Micro Professional Service:
Ingram Micro Training

Gateway/Firewall

This category includes:
- Next Generation Firewall (NGFW)
- Unified Threat Management (UTM) Firewall
- Web Application Firewall (WAF)

Features typically include:
- Web Content Management
- Anti-Virus
- Intrusion Prevention/Detection
- Data Loss Prevention
- VPN
- Web Application Control
- Cloud Sandboxing
- E-mail Anti-Spam

Ingram Micro Professional Service:
Virus & Intrusion Protection Services

H/S
Cisco (Duo) ☁️


Contact: [email protected]
Phone: x66092

Solutions Design & Services: x76695
Technical Account Manager:
Technology Consultant:
Business Transformation Engineer:

☁️ Ingram Micro Cloud Marketplace
🛠 Ingram Micro IoT Marketplace
🏗 Business Transformation Center Partner

Product:

- ASA
- FirePower NGFW (FTD)
- Umbrella SIG
- Web Security Appliance (WSA)

Note:

- ASA,FTD: https://www.cisco.com/c/en/us/products/security/firewalls/index.html
- Umbrella SIG: https://learn-umbrella.cisco.com/datasheets/cisco-umbrella-secure-internet-gateway-sig-essentials
- ESA: https://www.cisco.com/c/en/us/products/collateral/security/cloud-email-security/datasheet-c78-742868.html
- WSA: https://www.cisco.com/c/en/us/products/collateral/security/content-security-management-appliance/datasheet-c78-729630.html

Gateway Advanced Persistent Threat Protection

Protection against an unauthorized person gaining access to a network undetected for a long period of time.

H/S
Cisco (Duo) ☁️


Contact: [email protected]
Phone: x66092

Solutions Design & Services: x76695
Technical Account Manager:
Technology Consultant:
Business Transformation Engineer:

☁️ Ingram Micro Cloud Marketplace
🛠 Ingram Micro IoT Marketplace
🏗 Business Transformation Center Partner

Product:

Firepower NGFW (FTD) with AMP, Web Security Appliance (WSA)

Note:

- FTD: https://www.cisco.com/c/dam/en/us/products/collateral/security/firesight-management-center/at-a-glance-c45-736624.pdf?ccid=cc000155&dtid=odicdc000016&oid=aagsc015752
- WSA: https://www.cisco.com/c/en/us/products/collateral/security/content-security-management-appliance/datasheet-c78-729630.html+

Gateway Application Control

Monitor, control, and report on web applications

H/S
Cisco (Duo) ☁️


Contact: [email protected]
Phone: x66092

Solutions Design & Services: x76695
Technical Account Manager:
Technology Consultant:
Business Transformation Engineer:

☁️ Ingram Micro Cloud Marketplace
🛠 Ingram Micro IoT Marketplace
🏗 Business Transformation Center Partner

Product:

Firepower NGFW (FTD), Umbrella SIG, Web Security Appliance (WSA)

Note:

- FTD: https://www.cisco.com/c/dam/en/us/products/collateral/security/firesight-management-center/at-a-glance-c45-736624.pdf?ccid=cc000155&dtid=odicdc000016&oid=aagsc015752
- Meraki MX: https://meraki.cisco.com/products/security-sd-wan/
- Umbrella SIG: https://learn-umbrella.cisco.com/datasheets/cisco-umbrella-secure-internet-gateway-sig-essentials
- WSA: https://www.cisco.com/c/en/us/products/collateral/security/content-security-management-appliance/datasheet-c78-729630.html

Sandboxing or Advanced Threat Protection (ATP)

A Sandbox is used to detect new and unknown malware threats. A sandbox is a security mechanism used to execute untested or untrusted programs or code without risking harm to the host machine or operating system. Advanced Threat Protection (ATP) is a feature that incorporates multiple security technologies to provide protection against targeted attacks.

H/S
Cisco (Duo) ☁️


Contact: [email protected]
Phone: x66092

Solutions Design & Services: x76695
Technical Account Manager:
Technology Consultant:
Business Transformation Engineer:

☁️ Ingram Micro Cloud Marketplace
🛠 Ingram Micro IoT Marketplace
🏗 Business Transformation Center Partner

Product:

Threat Grid

Note:

- ATP: Amp Networks (Firepower)
- Web Security Appliance (WSA)
- Email Security Appliance (Email Security Appliance (Web Security Appliance (WSA))))
- AMP for End Points

Network Intrusion Prevention System

Including Network Intrusion prevention System (NIPS) & Intrusion Detection System (IDS) signature/behavioral/protocol-based security.

Endpoint Protection

Endpoint Security protects computers and other devices on a network or in the cloud from cybersecurity threats. Endpoint security has evolved from traditional antivirus software to providing comprehensive protection from sophisticated malware and evolving zero-day threats.

This category includes:
- Desktop
- Laptop
- Server

Features typically include:
- Anti-Malware
- Application Control
- Web filtering
- Host based IPS
- APT
- Firewall
- Data loss prevention

Mobile devices and security are covered by Mobility Management category above.

Ingram Micro Professional Service:
Endpoint Security Services

☁️
Endpoint Application Control

Monitor, control, and report on device-based applications and/or web applications

☁️
Email Protection and/or Anti-Spam

Email Protection describes different techniques for keeping sensitive information in email communication and accounts secure against unauthorized access, loss or compromise. Email is often used to spread malware, spam and phishing attacks. Attackers use deceptive messages to entice recipients to part with sensitive information, open attachments or click on hyperlinks that install malware on the victim’s device. Email is also a common entry point for attackers looking to gain a foothold in an enterprise network and obtain valuable company data.

Features typically include:
- Anti-Virus
- Anti-SPAM
- Phishing Protection
- URL Rewrites
- Email Data Loss Prevention (DLP)

H/S
Cisco (Duo) ☁️


Contact: [email protected]
Phone: x66092

Solutions Design & Services: x76695
Technical Account Manager:
Technology Consultant:
Business Transformation Engineer:

☁️ Ingram Micro Cloud Marketplace
🛠 Ingram Micro IoT Marketplace
🏗 Business Transformation Center Partner

Product:

- Email Security Appliance (Web Security Appliance (WSA))
- Cloud Email Security (CES)
- Cloud Mailbox Defense (CMD)

Note:

- ESA: https://www.cisco.com/c/en/us/products/collateral/security/cloud-email-security/datasheet-c78-742868.html
- CMD: https://www.cisco.com/c/en/us/products/collateral/security/cloud-email-security/datasheet-c78-743547.html

CES is a cloud version of the ESA

Email Encryption

Email Encryption involves encrypting the content of email messages to protect potentially sensitive information from being read by anyone other than intended recipients.

☁️
SyncDog ☁️


Contact: [email protected]
Phone: 1-844-256-8346

☁️ Ingram Micro Cloud Marketplace

Product:

Secure.Systems™

Note:

SyncDog’s core competency is encrypting data, email, files & disks while At Rest, In Use and In Transit.

For iOS & Android

DMARC Email Authentication Protocol

Domain-based Message Authentication, Reporting & Conformance (DMARC), is a protocol that uses Sender Policy Framework (SPF) and DomainKeys identified mail (DKIM) to determine the authenticity of an email message.

Most email security vendors support the DMARC protocol at a basic level, this category is for advanced management and analytics.

SW
Proofpoint 💎 ☁️


Contact: [email protected]
Phone: x76496

Technology Consultant:

☁️ Ingram Micro Cloud Marketplace

Product:

Email Fraud Defense (efd360)

Note:

Must be an enterprise level partner

Data Loss Prevention (DLP)

Data Loss Prevention (DLP) prevention to restrict end users sending sensitive or critical information outside the corporate network.

H/S
Cisco (Duo) ☁️


Contact: [email protected]
Phone: x66092

Solutions Design & Services: x76695
Technical Account Manager:
Technology Consultant:
Business Transformation Engineer:

☁️ Ingram Micro Cloud Marketplace
🛠 Ingram Micro IoT Marketplace
🏗 Business Transformation Center Partner

Product:

- Email Security Appliance (Web Security Appliance (WSA))
- Cloud Email Security (CES)
- Cloud Lock

Note:

- ESA: https://www.cisco.com/c/en/us/products/collateral/security/cloud-email-security/datasheet-c78-742868.html
- Cloudlock: https://www.cisco.com/c/en/us/products/security/cloudlock/index.html

☁️
SyncDog ☁️


Contact: [email protected]
Phone: 1-844-256-8346

☁️ Ingram Micro Cloud Marketplace

Product:

Secure.Systems™

Note:

SyncDog’s advanced encryption combined with it's real-time syncing of data make it a top DLP solution.

For iOS & Android

Data Security and Protection

Monitor, scan, mask, and discover vulnerabilities in databses and storage

☁️
SyncDog ☁️


Contact: [email protected]
Phone: 1-844-256-8346

☁️ Ingram Micro Cloud Marketplace

Product:

Secure.Systems™

Note:

SyncDog’s core competency is encrypting data, email, files & disks while At Rest, In Use and In Transit.

For iOS & Android

IT Asset Disposition (ITAD)

IT asset disposition (ITAD) is the business built around disposing of obsolete or unwanted equipment in a safe and ecologically-responsible manner.

⚙️
Ingram Micro Services ☁️


Contact: [email protected]
Phone: x76094

☁️ Ingram Micro Cloud Marketplace
🛠 Ingram Micro IoT Marketplace
🚀 Emerging Business Group Partner (EBG)

Product:

IT Asset Disposition (ITAD)

Note:

Ingram Micro IT Asset Disposition (ITAD) is the leading provider of
enterprise ITAD, on-site data destruction and e-waste recycling.

Our services reduce the risk, cost and complexity of managing
IT assets and consumer electronics in compliance with
environmental and data security regulations.

Fraud and Risk Management/Protection

Manage fraud and digital risk across multi-channel environments without impacting customers or transactions

Identity & Access Management (IAM), Multi-Factor Authentication (MFA), Single Sign-On (SSO)

MFA is access control in which a user is granted access only after successfully utilizing more than one authentication method.
SSO is an authentication process that allows a user to access multiple applications with one set of login credentials.

Ingram Micro Professional Service:
Identity & Access Management Services

SW
Cisco (Duo) ☁️


Contact: [email protected]
Phone: x66092

Solutions Design & Services: x76695
Technical Account Manager:
Technology Consultant:
Business Transformation Engineer:

☁️ Ingram Micro Cloud Marketplace
🛠 Ingram Micro IoT Marketplace
🏗 Business Transformation Center Partner

Product:

- DUO
- Identity Services Engine (ISE)

Note:

- ISE: https://www.cisco.com/c/en/us/products/collateral/security/identity-services-engine/data_sheet_c78-656174.html
- Duo: https://www.cisco.com/c/en/us/products/security/adaptive-multi-factor-authentication.html#%7Eoverview

Network Access Control (NAC)

Network management and security that enforces security policy, compliance and management of access control to a network.

Disk Encryption

Full Disk Encryption protects information by converting it into unreadable code that cannot be deciphered easily by unauthorized people.

☁️
SyncDog ☁️


Contact: [email protected]
Phone: 1-844-256-8346

☁️ Ingram Micro Cloud Marketplace

Product:

Secure.Systems™

Note:

SyncDog’s core competency is encrypting data, email, files & disks while At Rest, In Use and In Transit.

For iOS & Android

File/Folder Encryption

File/Folder Encryption or Filesystem-level encryption, is a form of disk encryption where individual files or directories are encrypted by the file system itself.

☁️
SyncDog ☁️


Contact: [email protected]
Phone: 1-844-256-8346

☁️ Ingram Micro Cloud Marketplace

Product:

Secure.Systems™

Note:

SyncDog’s core competency is encrypting data, email, files & disks while At Rest, In Use and In Transit.

For iOS & Android

Virtual Private Network (VPN)

Virtual Private Networks (VPN) allow users to connect their devices back to an office to access resources and files though an encrypted connection. This prevents anyone snooping from the outside from accessing plan text traffic that might be transmitted.

Common types of VPNs Include:
- IPsec (Internet Protocol Security), Software client based
- SSL (Secure Sockets Layer), clientless

☁️
Perimeter 81 ☁️


Contact: [email protected]
Phone: 1-844-256-8346

☁️ Ingram Micro Cloud Marketplace

Product:

Next Gen Business VPN

Note:

Onboarding Process instructions

Complimentary Products or Technologies:

Firewalls, Cloud APPs, RDP/VDI

☁️
SyncDog ☁️


Contact: [email protected]
Phone: 1-844-256-8346

☁️ Ingram Micro Cloud Marketplace

Product:

Secure.Systems™

Note:

Support MFA for ActiveSync/Office 365, and also has the ability to support some SSO protocols

For iOS & Android

Cloud Access Security Broker (CASB)

CASB is a solution that provides security for cloud applications and infrastructure

Secure Access Service Edge (SASE) NEW

SASE is a network architecture that combines WAN capabilities with cloud-native security functions like secure web gateways, cloud access security brokers, firewalls, and zero-trust network access

Ingram Micro Professional Service:
Cloud Security Services

DNS and DDOS Protection,
DHCP & IP Management (DDI)

DNS protection filters device queries to the internet, or from the internet, and blocks known bad websites or DDOS attempts from reaching the device.

A denial-of-service attack (DDOS) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.

A DDI solution provides a centralized platform to manage DNS and DHCP services and has an IP Address Management (IPAM) component.

☁️
Cisco (Duo) ☁️


Contact: [email protected]
Phone: x66092

Solutions Design & Services: x76695
Technical Account Manager:
Technology Consultant:
Business Transformation Engineer:

☁️ Ingram Micro Cloud Marketplace
🛠 Ingram Micro IoT Marketplace
🏗 Business Transformation Center Partner

Product:

- DNS Protection: Umbrella
- DDOS: NGFW
- NGIPS
- Radware (NGFW 4100 & 9300 ONLY)

Note:

- Umbrella: https://umbrella.cisco.com/products/dns-layer-network-security
- NGIPS: https://www.cisco.com/c/en/us/products/security/ngips/index.html
- Radware: https://www.radware.com/partners/cisco/resources/?type=Video

Radware is a Cisco Partner

☁️
Perimeter 81 ☁️


Contact: [email protected]
Phone: 1-844-256-8346

☁️ Ingram Micro Cloud Marketplace

Product:

Next Gen Business VPN

Note:

Included in Premium and Enterprise

Software-Defined WAN (SD-WAN)

SD-WAN is a virtual WAN architecture that allows enterprises to leverage any combination of transport services – including MPLS, LTE and broadband internet service.

Ingram Micro Professional Service:
SD-WAN Network Optimization & Services

Secure Wireless

Certain Access Points have the ability to perform security checks on the accesspoint independent of a firewall or other security device.

Features typically include:
- Wireless Intrusion Prevention
- Web Content Filtering
- AV Scanning
- Guest/Device Tracking

Ingram Micro Professional Service:
Wireless Network Assessment

HW
Cisco (Duo) ☁️


Contact: [email protected]
Phone: x66092

Solutions Design & Services: x76695
Technical Account Manager:
Technology Consultant:
Business Transformation Engineer:

☁️ Ingram Micro Cloud Marketplace
🛠 Ingram Micro IoT Marketplace
🏗 Business Transformation Center Partner

Product:

Catalyst Wireless, Identity Services Engine (ISE)

Note:

- Catalyst: https://www.cisco.com/c/en/us/products/collateral/wireless/wireless-solution-overview.html?oid=aagen016595
- ISE: https://www.cisco.com/c/dam/en/us/products/collateral/security/network-visibility-segmentation/ise-use-case-guest-wireless-aag.pdf

COVID & WFH Related Solutions

Solutions that may assist with COVID related issues:
- Remotely Deployable Firewalls
- Remotely Deployable APs
- Other Work From Home or Remote User Products
- Temperature kiosks
- Employee & Asset Tracking

SW
Acronis ☁️


Contact: [email protected]; [email protected]
Phone: x67580

☁️ Ingram Micro Cloud Marketplace

Product:

Cyber Protect

Note:

Remote agent installation, Remote Desktop

SW
Cisco (Duo) ☁️


Contact: [email protected]
Phone: x66092

Solutions Design & Services: x76695
Technical Account Manager:
Technology Consultant:
Business Transformation Engineer:

☁️ Ingram Micro Cloud Marketplace
🛠 Ingram Micro IoT Marketplace
🏗 Business Transformation Center Partner

Product:

Secure Remote Worker:
AnyConnect, Umbrella, Duo, AMP for Endpoints

Note:

- WFH: https://www.cisco.com/c/en/us/products/security/secure-remote-worker-solution.html
- COVID: https://www.cisco.com/c/m/en_sg/covid19.html

AnyConnect requires a Cisco firewall for headend ASA or Firepower NGFW

⚙️
Ingram Micro Services ☁️


Contact: [email protected]
Phone: x76094

☁️ Ingram Micro Cloud Marketplace
🛠 Ingram Micro IoT Marketplace
🚀 Emerging Business Group Partner (EBG)

Product:

Remote Deployment Services

Complimentary Products or Technologies:

Laptops, Desktops, POS Systems, Wireless Systems, Physical Security

☁️
Perimeter 81 ☁️


Contact: [email protected]
Phone: 1-844-256-8346

☁️ Ingram Micro Cloud Marketplace

Product:

Secure Access for Remote Workers

Complimentary Products or Technologies:

MFA, Email Security

HW
Sophos ☁️


Contact: [email protected]
Phone: x67079

Solutions Design & Services: x76102
Technical Account Manager:

☁️ Ingram Micro Cloud Marketplace

Product:

Sophos Remote Ethernet Devices (RED)

Complimentary Products or Technologies:

MFA, Email Security

☁️
SyncDog ☁️


Contact: [email protected]
Phone: 1-844-256-8346

☁️ Ingram Micro Cloud Marketplace

Product:

Secure.Systems™

Note:

COVID: SyncDog is purpose built to better enable employees to securely access their work related files, data, email etc. even when a mobile device is their only access. The “New Normal” that has come about due to COVID makes this more critical than ever

WFH: SyncDog is purpose built to better enable employees to securely access their work related files, data, email etc. even when a mobile device is their only access. The “New Normal” that has come about due to COVID makes this more critical than ever

Security information and event management (SIEM) and/or Log Management

SIEM software products and services combine security information management (SIM) and security event management (SEM). They provide real-time analysis of security alerts generated by network hardware and applications.

Endpoint Detection and Response (EDR, XDR)

EDR solutions record and store endpoint-system-level behaviors, use various data analytics techniques to detect suspicious system behavior, provide contextual information, block malicious activity, and provide remediation suggestions to restore affected systems.

XDR provides cross-layered threat detection and response. XDR collects and correlates detections and deep activity data across multiple security layers – email, endpoint, server, cloud workloads, and network.

Security Operations Center as a Service (SOCaaS) and/or Managed Detection and Responce (MDR)

SOCaaS is a subscription or software-based service that manages and monitors your logs, devices, clouds, network and assets for internal IT teams.

MDR is an advanced managed security service that provides threat intelligence, threat hunting, security monitoring, incident analysis, and incident response. This is unlike traditional MSSPs who only provide alerts from security monitoring.

Ingram Micro Professional Service:
Security Operating Center (SOC) Services

⚙️
Bitdefender ☁️ 🚀


Contact: [email protected]; [email protected]
Phone: x66229

Solutions Design & Services: x76102
Technical Account Manager:

☁️ Ingram Micro Cloud Marketplace
🏗 Business Transformation Center Partner
🚀 Emerging Business Group Partner (EBG)

Product:

Bitdefender Managed Detection and Response (MDR)

Note:

Bitdefender’s Managed Detection and Response (MDR) Service is 24/7/365 operations
designed to identify and remove cyber threats from your environment. Staffed by
our experienced security analysts and using an award-winning suite of technology,
the MDR service monitors detailed telemetry to quickly and effectively respond to
malicious activities, actively removing the threat to reduce dwell time and limit any damage.

☁️
ConnectWise (Perch) ☁️


Contact: [email protected]

☁️ Ingram Micro Cloud Marketplace

Product:

Co-managed threat detection and response

Strategic Partners:

Cisco, Duo, Microsoft, Palo Alto, Fortinet, Sophos, Slack, Microsoft Teams,
AWS, ConnectWise, Carbon Black, Bitdefender, Okta, G Suite, Salesforce

User and Entity Behavior Analytics (UEBA)

UEBA solutions use analytics to build the standard profiles and behaviors of users and entities (hosts, applications, network traffic and data repositories) across time and peer group horizons. Activity that is anomalous to these standard baselines is presented as suspicious, and packaged analytics applied on these anomalies can help discover threats and potential incidents. The most common use cases sought by enterprises are detecting malicious insiders and external attackers infiltrating their organizations (compromised insiders)

H/W
Cisco (Duo) ☁️


Contact: [email protected]
Phone: x66092

Solutions Design & Services: x76695
Technical Account Manager:
Technology Consultant:
Business Transformation Engineer:

☁️ Ingram Micro Cloud Marketplace
🛠 Ingram Micro IoT Marketplace
🏗 Business Transformation Center Partner

Product:

- Cloudlock
- Stealthwatch Ent and Cloud

Note:

- Cloudlock: https://www.cisco.com/c/dam/en/us/products/collateral/security/cloudlock/cisco-cloudlock-user-security-datasheet.pdf
- Stealthwatch Ent: https://www.cisco.com/c/dam/en/us/products/collateral/security/stealthwatch/at-a-glance-c45-736510.pdf

Network Vulnerability Assessments,
Penetration Tests

A network vulnerability assessment is the process of reviewing and analyzing a computer network for possible security vulnerabilities and loopholes. It is used by network administrators to evaluate the security architecture and defense of a network against possible vulnerabilities and threats.

Ingram Micro Professional Service:
Penetration Test Assessment

Dark Web Monitoring

Dark Web Monitoring, also known as cyber monitoring, is an identity theft prevention product that enables you to monitor your identity information on the dark web, and receive notifications if your information is found online.

Orchestration, Automation and Response (SOAR) and/or SOAR Components

SOAR is a method of integrating and streamlining workflows across disparate tools in order to improve both security analyst efficiency and threat detection and response. Security automation is used to execute security operations tasks without human intervention.

Incident Response

Incident Response is an organized approach to addressing and managing the aftermath of a security breach or attack. The goal is to handle the situation in a way that limits damage and reduces recovery time and costs.

Forensic Analysis

It examines structured data with regard to incidents. The aim is to discover and analyze patterns of fraudulent activities.

H/S
Cisco (Duo) ☁️


Contact: [email protected]
Phone: x66092

Solutions Design & Services: x76695
Technical Account Manager:
Technology Consultant:
Business Transformation Engineer:

☁️ Ingram Micro Cloud Marketplace
🛠 Ingram Micro IoT Marketplace
🏗 Business Transformation Center Partner

Product:

- Umbrella Investigate
- Stealthwatch Ent and Cloud
- SecureX Threat Response

Note:

- Umbrella Investigate: https://umbrella.cisco.com/solutions/fast-incident-response
- Stealthwatch: https://www.cisco.com/c/dam/en/us/products/collateral/security/stealthwatch/at-a-glance-c45-736510.pdf
- SecureX Threat Response: https://www.cisco.com/c/en/us/products/security/threat-response.html#~benefits

Patch Management

Managing patches or upgrades for software applications and technologies.

☁️
ConnectWise (Perch) ☁️


Contact: [email protected]

☁️ Ingram Micro Cloud Marketplace

Product:

Automate

Backup and Disaster Recovery

The process of backing up data in case of a loss. This is a more advanced form of system copies that include processing capabilities.

Ingram Micro Professional Service:
Backup and Disaster Recovery Services

Device Deployment and Imaging NEW

Deployment and Imaging solutions allow for faster recovery and deployemnt time to get back up and running if a disaster such as ransomware were to occur.

Data Archiving

Data Archiving is the process of moving data that is no longer actively used to a separate storage device for long-term retention.

Email Archiving

Email Archiving is the process of archiving cloud or on-premise email soltuions for recovery due to outtage, legal hold, and/or malicious attacks.

High Availability and/or Continuity

This refers to solutions dedicated to high availability and business continuity.

Some features may include:
- Replication (Periodic, Multi-Stream, etc.)
- Compression
- Offline synchronization
- Email Continuity

IoT & Other
Network Switching

Includes Netowkring Switches, Industial Switches, and other core networking equiptment

IoT, Sensors, Beacons, and Analytics

Includes IoT devices, location beacons, IoT type sensors, and various analytics

Industrial Control Systems Security

Industrial control systems (ICS) are often a sitting target for cybercriminals. The majority of these systems monitor complex industrial processes and critical infrastructures that deliver power, water, transport, manufacturing and other essential services.

Smart Surveillance & Security

Includes Physical Security Cameras and/or Network Video Recorders, as well as other physcial security devices

Info
Reseller Partner Requirement

If there's a requirement such as signing a contact, or being in a partner program to resell this vendor, the box will be checked.

Managed Service Provider Offerings

Service Provider offerings available. May include multi-tenancy, monthly billing, or a combination of both

Ingram Micro Exclusive

This vendor or partner is exclusively sold through Ingram Micro

💎
Mimecast 💎 ☁️


Contact: [email protected]; [email protected]
Phone: x67759

☁️ Ingram Micro Cloud Marketplace

Note:

Ingram Mirco Exclusive

💎
Proofpoint 💎 ☁️


Contact: [email protected]
Phone: x76496

Technology Consultant:

☁️ Ingram Micro Cloud Marketplace

Note:

Ingram Mirco Exclusive

Strategic Partnerships

Partnerships may include APIs, strong channel relationships, or strategic relationships though the vendors directly