Cybersecurity posture relates to the security status of an enterprise’s networks, information, and systems based on information security resources (e.g., people, hardware, software, policies) and capabilities in place to manage the defense of the enterprise and to react as the situation changes.
📧 ➟ Mira Morse
📞 ➟ x66843
🚀 Emerging Business Group (EBG)
Firewalls, Endpoints, Email, Cloud
📧 ➟ Jessica Cunningham
📞 ➟ x65003
🚀 Emerging Business Group (EBG)
Liensing Team: [email protected]
Complimentary Products or Technologies: Strategic Partners:
📧 ➟ Wanda Lacey
📞 ➟ 240-280-8036
💾 Promark Technology Partner
- UpGuard BreachSight
- UpGuard Vendor Risk
- UpGuard CyberResearch
📧 ➟ Nicole Milliron
📞 ➟ x67162
🚀 Emerging Business Group (EBG)
Client specific risk scoring
Vulnerability Management is the practice of identifying, classifying, remediating, and mitigating vulnerabilities. Vulnerability Analytics is a process that defines, identifies, and classifies the security holes (vulnerabilities) in a computer, network, or communications infrastructure.
Ingram Micro Professional Service:
Dev/Sec/Ops Services
📧 ➟ Mira Morse
📞 ➟ x66843
🚀 Emerging Business Group (EBG)
📧 ➟ Alexandra Casillo
📞 ➟ x65187
🚀 Emerging Business Group (EBG)
☁️ Ingram Micro Cloud Marketplace
🛠️ Ingram Micro IoT Marketplace
🚀 Emerging Business Group (EBG)
📧 ➟ Nicole Milliron
📞 ➟ x67162
🚀 Emerging Business Group (EBG)
-Risk based vulnerability remediation
- Custom binary analysis, Agent based approach for inventory and remediation
File integrity monitoring (FIM) is an internal control or process that performs the act of validating the integrity of operating system and application software files using a verification method between the current file state and a known, good baseline.
📧 ➟ Mira Morse
📞 ➟ x66843
🚀 Emerging Business Group (EBG)
📧 ➟ Alexandra Casillo
📞 ➟ x65187
🚀 Emerging Business Group (EBG)
📧 ➟ Alexandra Casillo
📞 ➟ x65187
🚀 Emerging Business Group (EBG)
📧 ➟ Jessica Cunningham
📞 ➟ x65003
🚀 Emerging Business Group (EBG)
☁️ Cloud Harmonics Technology Partner
📧 ➟ Jessica Cunningham
📞 ➟ x65003
🚀 Emerging Business Group (EBG)
Regulatory compliance is an effort to ensure a company is aware of steps needed to comply with relevant laws, polices, and regulations. Security reflects a large portion of these compliancies.
Ingram Micro Professional Service:
Network Security Services
📧 ➟ Alexandra Casillo
📞 ➟ x65187
🚀 Emerging Business Group (EBG)
📧 ➟ Kristy Hakes
📞 ➟ x66229
🛒 Solutions Design & Services: x76102
👔 Technical Account Manager: ✔
☁️ Ingram Micro Cloud Marketplace
🏭 Business Transformation Center Partner
🚀 Emerging Business Group (EBG)
☁️ Ingram Micro Cloud Marketplace
🛠️ Ingram Micro IoT Marketplace
🚀 Emerging Business Group (EBG)
📧 ➟ Jessica Cunningham
📞 ➟ x65003
🚀 Emerging Business Group (EBG)
📧 ➟ Jessica Cunningham
📞 ➟ x65003
🚀 Emerging Business Group (EBG)
IGA systems merge identity administration, which addresses administering accounts and credentials, provisioning, and managing entitlements, with identity governance, which addresses the segregation of duties, role management, logging, and analytics and reporting.
IGA systems provide additional functionality beyond standard Identity and Access Management (IAM) systems. In particular, they help organizations meet compliance requirements and enable them to audit access for compliance reporting. They also automate workflows for tasks such as access approvals and provisioning/de-provisioning.
Elements of IGA Systems
- Password management
- Integrations
- Access request managemen
- Automated Provisioning
- Entitlement management
Manage and secure employees' mobile devices that are deployed across multiple mobile service providers and across multiple mobile operating systems being used in the organization.
Features typically include:
- Device Tracking
- Application Control
- Remote-wipe
- Anti-Malware
- Web Filtering
- Inventory Management
- Anti-theft
📧 ➟ Alexandra Casillo
📞 ➟ x65187
🚀 Emerging Business Group (EBG)
Secure remote access to iOS, Android or Rasp PI based devices.
📧 ➟ Kristy Hakes
📞 ➟ x66229
🛒 Solutions Design & Services: x76102
👔 Technical Account Manager: ✔
☁️ Ingram Micro Cloud Marketplace
🏭 Business Transformation Center Partner
🚀 Emerging Business Group (EBG)
A network vulnerability assessment is the process of reviewing and analyzing a computer network for possible security vulnerabilities and loopholes. It is used by network administrators to evaluate the security architecture and defense of a network against possible vulnerabilities and threats.
Ingram Micro Professional Service:
Penetration Test Assessment
📧 ➟ Mira Morse
📞 ➟ x66843
🚀 Emerging Business Group (EBG)
📧 ➟ Jessica Cunningham
📞 ➟ x65003
🚀 Emerging Business Group (EBG)
Liensing Team: [email protected]
Complimentary Products or Technologies: Strategic Partners:
☁️ Ingram Micro Cloud Marketplace
🛠️ Ingram Micro IoT Marketplace
🚀 Emerging Business Group (EBG)
📧 ➟ Christoper Maxick
📞 ➟ x66626
👔 Technical Account Manager: Shawn Stopa
🚀 Emerging Business Group (EBG)
- EtherScope nXG
- LinkRunner 10G
- AirCheck G2
Allows you to identify wireless network vulnerabilitties like rogue devices, Ad-Hoc devices,
Open SSID's, printers with Wi-Fi radio turned on, unsecured Ethernet ports, etc.
You can also spoof MAC addresses, or use third party apps for penetration testing.
📧 ➟ Nicole Milliron
📞 ➟ x67162
🚀 Emerging Business Group (EBG)
-Risk based vulnerability remediation
- Custom binary analysis, Agent based approach for inventory and remediation
CSMP solutions provide organizations with visibility into public cloud infrastructure. With the proliferation of cloud resources, many organizations are unaware of how many cloud resources are running and how they’re all configured. This lack of visibility can cause misconfigurations to go undetected for long periods of time, making it harder to secure the applications.
📧 ➟ Mira Morse
📞 ➟ x66843
🚀 Emerging Business Group (EBG)
📧 ➟ Wanda Lacey
📞 ➟ 240-280-8036
🚀 Emerging Business Group (EBG)
Public Key Infrastructure (PKI) is a technology for authenticating users and devices in the digital world. The basic idea is to have one or more trusted parties digitally sign documents certifying that a particular cryptographic key belongs to a particular user or device.
Certificate Management is the activity of monitoring, facilitating, and executing every certificate process necessary for uninterrupted network operations.
Dark Web Monitoring, also known as cyber monitoring, is an identity theft prevention product that enables you to monitor your identity information on the dark web, and receive notifications if your information is found online.
📧 ➟ Mira Morse
📞 ➟ x66843
🚀 Emerging Business Group (EBG)
📧 ➟ Alexandra Casillo
📞 ➟ x65187
🚀 Emerging Business Group (EBG)
Tools to improve employee knowledge of social engineering and cyberattack techniques. Products/Services can include training as well as phishing simulations.
Ingram Micro Professional Service:
Ingram Micro Training
📧 ➟ Mira Morse
📞 ➟ x66843
🚀 Emerging Business Group (EBG)
📧 ➟ Jessica Cunningham
📞 ➟ x65003
🚀 Emerging Business Group (EBG)
☁️ Ingram Micro Cloud Marketplace
🛠️ Ingram Micro IoT Marketplace
🚀 Emerging Business Group (EBG)
📧 ➟ Jessica Cunningham
📞 ➟ x65003
🚀 Emerging Business Group (EBG)
☁️ Cloud Harmonics Technology Partner
OPSWAT training- Premier certification in cyber security threats and solutions
This category includes:
- Next Generation Firewall (NGFW)
- Unified Threat Management (UTM) Firewall
- Web Application Firewall (WAF)
Features typically include:
- Web Content Management
- Anti-Virus
- Intrusion Prevention/Detection
- Data Loss Prevention
- VPN
- Web Application Control
- Cloud Sandboxing
- E-mail Anti-Spam
Ingram Micro Professional Service:
Virus & Intrusion Protection Services
📧 ➟ Aviram Cohen
💾 Promark Technology Partner
AppGate Software-Defined Perimeter (SDP)
Note:Understanding Sites & users traffic in the AppGate SDP system
📧 ➟ Jennifer Coric
📞 ➟ x67182
🚀 Emerging Business Group (EBG)
☁️ Ingram Micro Cloud Marketplace
🛠️ Ingram Micro IoT Marketplace
🚀 Emerging Business Group (EBG)
📧 ➟ Jonathan Jones
📞 ➟ x65351
🚀 Emerging Business Group (EBG)
Protection against an unauthorized person gaining access to a network undetected for a long period of time.
📧 ➟ Aviram Cohen
💾 Promark Technology Partner
📧 ➟ Jennifer Coric
📞 ➟ x67182
🚀 Emerging Business Group (EBG)
📧 ➟ Jessica Cunningham
📞 ➟ x65003
🚀 Emerging Business Group (EBG)
☁️ Cloud Harmonics Technology Partner
Advanced Threat Protection, including Deep CDR, Multscanning, proactive DLP. File based based vulnerability assessment
Monitor, control, and report on web applications
📧 ➟ Aviram Cohen
💾 Promark Technology Partner
A Sandbox is used to detect new and unknown malware threats. A sandbox is a security mechanism used to execute untested or untrusted programs or code without risking harm to the host machine or operating system. Advanced Threat Protection (ATP) is a feature that incorporates multiple security technologies to provide protection against targeted attacks.
📧 ➟ Kristy Hakes
📞 ➟ x66229
🛒 Solutions Design & Services: x76102
👔 Technical Account Manager: ✔
☁️ Ingram Micro Cloud Marketplace
🏭 Business Transformation Center Partner
🚀 Emerging Business Group (EBG)
📧 ➟ Jennifer Coric
📞 ➟ x67182
🚀 Emerging Business Group (EBG)
📧 ➟ Jessica Cunningham
📞 ➟ x65003
🚀 Emerging Business Group (EBG)
☁️ Cloud Harmonics Technology Partner
📧 ➟ Jessica Cunningham
📞 ➟ x65003
🚀 Emerging Business Group (EBG)
📧 ➟ Jessica Cunningham
📞 ➟ x65003
🚀 Emerging Business Group (EBG)
📧 ➟ Alexandra Casillo
📞 ➟ x65187
🚀 Emerging Business Group (EBG)
Including Network Intrusion prevention System (NIPS) & Intrusion Detection System (IDS) signature/behavioral/protocol-based security.
📧 ➟ Aviram Cohen
💾 Promark Technology Partner
📧 ➟ Jennifer Coric
📞 ➟ x67182
🚀 Emerging Business Group (EBG)
Malware Defense and Data Loss Prevention Packages
Note:Real-time intrusion, malware, and virus protection.
Quickly and easily view event detail, including source and destination IP.
Automatic and included threat feed subscriptions.
Category-based malware rules.
Visual IPS rule creation and editing.
📧 ➟ Christoper Maxick
📞 ➟ x66626
👔 Technical Account Manager: Shawn Stopa
🚀 Emerging Business Group (EBG)
Can be used for portable wireless intrution detection on
both enteprise level networks or no wireless zones.
Endpoint Security protects computers and other devices on a network or in the cloud from cybersecurity threats. Endpoint security has evolved from traditional antivirus software to providing comprehensive protection from sophisticated malware and evolving zero-day threats.
This category includes:Features typically include:
- Anti-Malware
- Application Control
- Web filtering
- Host based IPS
- APT
- Firewall
- Data loss prevention
Mobile devices and security are covered by Mobility Management category above.
Ingram Micro Professional Service:
Endpoint Security Services
📧 ➟ Kristy Hakes
📞 ➟ x66229
🛒 Solutions Design & Services: x76102
👔 Technical Account Manager: ✔
☁️ Ingram Micro Cloud Marketplace
🏭 Business Transformation Center Partner
🚀 Emerging Business Group (EBG)
📧 ➟ Jennifer Coric
📞 ➟ x67172
🚀 Emerging Business Group (EBG)
Included in:
- MSSP Protect
- MSSP Defend
- MSSP Advanced Defend
(Annual Terms Only)
☁️ Ingram Micro Cloud Marketplace
🛠️ Ingram Micro IoT Marketplace
🚀 Emerging Business Group (EBG)
Monitor, control, and report on device-based applications and/or web applications
📧 ➟ Alexandra Casillo
📞 ➟ x65187
🚀 Emerging Business Group (EBG)
📧 ➟ Kristy Hakes
📞 ➟ x66229
🛒 Solutions Design & Services: x76102
👔 Technical Account Manager: ✔
☁️ Ingram Micro Cloud Marketplace
🏭 Business Transformation Center Partner
🚀 Emerging Business Group (EBG)
🛡️ New Category
Tools to detect, prevent, and remediate from ransomware attacks
📧 ➟ Kristy Hakes
📞 ➟ x66229
🛒 Solutions Design & Services: x76102
👔 Technical Account Manager: ✔
☁️ Ingram Micro Cloud Marketplace
🏭 Business Transformation Center Partner
🚀 Emerging Business Group (EBG)
📧 ➟ Jennifer Coric
📞 ➟ x67172
🚀 Emerging Business Group (EBG)
📧 ➟ Jessica Cunningham
📞 ➟ x65003
🚀 Emerging Business Group (EBG)
Email Protection describes different techniques for keeping sensitive information in email communication and accounts secure against unauthorized access, loss or compromise. Email is often used to spread malware, spam and phishing attacks. Attackers use deceptive messages to entice recipients to part with sensitive information, open attachments or click on hyperlinks that install malware on the victim’s device. Email is also a common entry point for attackers looking to gain a foothold in an enterprise network and obtain valuable company data.
Features typically include:
- Anti-Virus
- Anti-SPAM
- Phishing Protection
- URL Rewrites
- Email Data Loss Prevention (DLP)
📧 ➟ Kristy Hakes
📞 ➟ x66229
🛒 Solutions Design & Services: x76102
👔 Technical Account Manager: ✔
☁️ Ingram Micro Cloud Marketplace
🏭 Business Transformation Center Partner
🚀 Emerging Business Group (EBG)
Included in GravityZone Enterprise Security
Add on for other GravityZone products
📧 ➟ Jessica Cunningham
📞 ➟ x65003
🚀 Emerging Business Group (EBG)
☁️ Cloud Harmonics Technology Partner
Metadefender Email Gateway Security
Note:Disarm malicious e-mails, anti phishing & Spam
📧 ➟ Jessica Cunningham
📞 ➟ x65003
🚀 Emerging Business Group (EBG)
📧 ➟ Alexandra Casillo
📞 ➟ x65187
🚀 Emerging Business Group (EBG)
Email Encryption involves encrypting the content of email messages to protect potentially sensitive information from being read by anyone other than intended recipients.
📧 ➟ Jessica Cunningham
📞 ➟ x65003
🚀 Emerging Business Group (EBG)
Domain-based Message Authentication, Reporting & Conformance (DMARC), is a protocol that uses Sender Policy Framework (SPF) and DomainKeys identified mail (DKIM) to determine the authenticity of an email message.
Most email security vendors support the DMARC protocol at a basic level, this category is for advanced management and analytics.
Data Loss Prevention (DLP) prevention to restrict end users sending sensitive or critical information outside the corporate network.
📧 ➟ Jessica Cunningham
📞 ➟ x65003
🚀 Emerging Business Group (EBG)
📧 ➟ Jennifer Coric
📞 ➟ x67182
🚀 Emerging Business Group (EBG)
Detect, alert, and stop the transfer of sensitive data to and from the cloud.
Provides protection against unauthorized cloud use.
📧 ➟ Jessica Cunningham
📞 ➟ x65003
🚀 Emerging Business Group (EBG)
☁️ Cloud Harmonics Technology Partner
📧 ➟ Jessica Cunningham
📞 ➟ x65003
🚀 Emerging Business Group (EBG)
Monitor, scan, mask, and discover vulnerabilities in databses and storage
📧 ➟ Jessica Cunningham
📞 ➟ x65003
🚀 Emerging Business Group (EBG)
☁️ Cloud Harmonics Technology Partner
MetaDefender Vault, MetaDefender Drive, MetaDefender for Secure Storage
Note:MetaDefender for Secure Storage lets you trust the data shared within your organization.
IT asset disposition (ITAD) is the business built around disposing of obsolete or unwanted equipment in a safe and ecologically-responsible manner.
☁️ Ingram Micro Cloud Marketplace
🛠️ Ingram Micro IoT Marketplace
🚀 Emerging Business Group (EBG)
Ingram Micro IT Asset Disposition (ITAD) is the leading provider of
enterprise ITAD, on-site data destruction and e-waste recycling.
Our services reduce the risk, cost and complexity of managing
IT assets and consumer electronics in compliance with
environmental and data security regulations.
Manage fraud and digital risk across multi-channel environments without impacting customers or transactions
MFA is access control in which a user is granted access only after successfully utilizing more than one authentication method.
SSO is an authentication process that allows a user to access multiple applications with one set of login credentials.
Ingram Micro Professional Service:
Identity & Access Management Services
📧 ➟ Alexandra Casillo
📞 ➟ x65187
🚀 Emerging Business Group (EBG)
- BeyondTrust Password Safe
- BeypndTrust DevOps Secrets Safe
MFA Tokens, Smart Cards, Wearables
Strategic Partners:Dell EMC: Infrastructure
RSA: SecurID (MFA)
VMware: Cloud & Virtualization Software
☁️ Ingram Micro Cloud Marketplace
🛠️ Ingram Micro IoT Marketplace
🚀 Emerging Business Group (EBG)
Network management and security that enforces security policy, compliance and management of access control to a network.
📧 ➟ Christoper Maxick
📞 ➟ x66626
👔 Technical Account Manager: Shawn Stopa
🚀 Emerging Business Group (EBG)
- EtherScope nXG
- LinkRunner 10G
- AirCheck G2
Verification of 802.1X and MAC-based NAC.
📧 ➟ Jessica Cunningham
📞 ➟ x65003
🚀 Emerging Business Group (EBG)
☁️ Cloud Harmonics Technology Partner
NAC Enterprise Network Access Control
Note:MetaAccess NAC delivers an industry-leading solution — with a streamlined implementation experience that addresses critical security challenges facing your network.
Monitor, report, and restrict access to file changes
Full Disk Encryption protects information by converting it into unreadable code that cannot be deciphered easily by unauthorized people.
📧 ➟ Kristy Hakes
📞 ➟ x66229
🛒 Solutions Design & Services: x76102
👔 Technical Account Manager: ✔
☁️ Ingram Micro Cloud Marketplace
🏭 Business Transformation Center Partner
🚀 Emerging Business Group (EBG)
📧 ➟ Jessica Cunningham
📞 ➟ x65003
🚀 Emerging Business Group (EBG)
☁️ Cloud Harmonics Technology Partner
File/Folder Encryption or Filesystem-level encryption, is a form of disk encryption where individual files or directories are encrypted by the file system itself.
📧 ➟ Jessica Cunningham
📞 ➟ x65003
🚀 Emerging Business Group (EBG)
☁️ Cloud Harmonics Technology Partner
Virtual Private Networks (VPN) allow users to connect their devices back to an office to access resources and files though an encrypted connection. This prevents anyone snooping from the outside from accessing plan text traffic that might be transmitted.
Common types of VPNs Include:
📧 ➟ Aviram Cohen
💾 Promark Technology Partner
CASB is a solution that provides security for cloud applications and infrastructure
📧 ➟ Wanda Lacey
📞 ➟ 240-280-8036
🚀 Emerging Business Group (EBG)
📧 ➟ Jennifer Coric
📞 ➟ x67182
🚀 Emerging Business Group (EBG)
Core Package, Malware Defense, and DLP packages
(CASB Cloud Application Visibility & Controls)
☁️ Ingram Micro Cloud Marketplace
🛠️ Ingram Micro IoT Marketplace
🚀 Emerging Business Group (EBG)
SASE is a network architecture that combines WAN capabilities with cloud-native security functions like secure web gateways, cloud access security brokers, firewalls, and zero-trust network access
Ingram Micro Professional Service:
Cloud Security Services
📧 ➟ Wanda Lacey
📞 ➟ 240-280-8036
🚀 Emerging Business Group (EBG)
📧 ➟ Jennifer Coric
📞 ➟ x67182
🚀 Emerging Business Group (EBG)
DNS protection filters device queries to the internet, or from the internet, and blocks known bad websites or DDOS attempts from reaching the device.
A denial-of-service attack (DDOS) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.
A DDI solution provides a centralized platform to manage DNS and DHCP services and has an IP Address Management (IPAM) component.
📧 ➟ Jennifer Coric
📞 ➟ x67182
🚀 Emerging Business Group (EBG)
📧 ➟ Jennifer Coric
📞 ➟ x67182
🛒 Solutions Design & Services: x76295
🚀 Emerging Business Group (EBG)
📧 ➟ Danny Marmol
☁️ Ingram Micro Cloud Marketplace
🚀 Emerging Business Group (EBG)
💾 Promark Technology Partner
SD-WAN is a virtual WAN architecture that allows enterprises to leverage any combination of transport services – including MPLS, LTE and broadband internet service.
Ingram Micro Professional Service:
SD-WAN Network Optimization & Services
📧 ➟ Wanda Lacey
📞 ➟ 240-280-8036
🚀 Emerging Business Group (EBG)
☁️ Ingram Micro Cloud Marketplace
🛠️ Ingram Micro IoT Marketplace
🚀 Emerging Business Group (EBG)
📧 ➟ Jonathan Jones
📞 ➟ x65351
🚀 Emerging Business Group (EBG)
Certain Access Points have the ability to perform security checks on the accesspoint independent of a firewall or other security device.
Features typically include:
- Wireless Intrusion Prevention
- Web Content Filtering
- AV Scanning
- Guest/Device Tracking
Ingram Micro Professional Service:
Wireless Network Assessment
☁️ Ingram Micro Cloud Marketplace
🛠️ Ingram Micro IoT Marketplace
🚀 Emerging Business Group (EBG)
📧 ➟ Christoper Maxick
📞 ➟ x66626
👔 Technical Account Manager: Shawn Stopa
🚀 Emerging Business Group (EBG)
Wireless rogue detection, identification, and location.
Can also be used for 802.1X validation, access point
configuration verification, and wireless vulnerability
identification.
Solutions that may assist with COVID related issues:
- Remotely Deployable Firewalls
- Remotely Deployable APs
- Other Work From Home or Remote User Products
- Temperature kiosks
- Employee & Asset Tracking
📧 ➟ Alexandra Casillo
📞 ➟ x65187
🚀 Emerging Business Group (EBG)
📧 ➟ Wanda Lacey
📞 ➟ 240-280-8036
🚀 Emerging Business Group (EBG)
📧 ➟ Alexandra Casillo
📞 ➟ x65187
🚀 Emerging Business Group (EBG)
📧 ➟ Jennifer Coric
📞 ➟ x67182
🚀 Emerging Business Group (EBG)
☁️ Ingram Micro Cloud Marketplace
🛠️ Ingram Micro IoT Marketplace
🚀 Emerging Business Group (EBG)
Laptops, Desktops, POS Systems, Wireless Systems, Physical Security
📧 ➟ Christoper Maxick
📞 ➟ x66626
👔 Technical Account Manager: Shawn Stopa
🚀 Emerging Business Group (EBG)
EtherScope nXG and Reflector Software
Note:Performance test to/from remote users
working from home or other sites.
📧 ➟ Jessica Cunningham
📞 ➟ x65003
🚀 Emerging Business Group (EBG)
SIEM software products and services combine security information management (SIM) and security event management (SEM). They provide real-time analysis of security alerts generated by network hardware and applications.
📧 ➟ Mira Morse
📞 ➟ x66843
🚀 Emerging Business Group (EBG)
📧 ➟ Alexandra Casillo
📞 ➟ x65187
🚀 Emerging Business Group (EBG)
📧 ➟ Jessica Cunningham
📞 ➟ x65003
🚀 Emerging Business Group (EBG)
📧 ➟ Jessica Cunningham
📞 ➟ x65003
🚀 Emerging Business Group (EBG)
EDR solutions record and store endpoint-system-level behaviors, use various data analytics techniques to detect suspicious system behavior, provide contextual information, block malicious activity, and provide remediation suggestions to restore affected systems.
XDR provides cross-layered threat detection and response. XDR collects and correlates detections and deep activity data across multiple security layers – email, endpoint, server, cloud workloads, and network.
📧 ➟ Mira Morse
📞 ➟ x66843
🚀 Emerging Business Group (EBG)
📧 ➟ Alexandra Casillo
📞 ➟ x65187
🚀 Emerging Business Group (EBG)
📧 ➟ Kristy Hakes
📞 ➟ x66229
🛒 Solutions Design & Services: x76102
👔 Technical Account Manager: ✔
☁️ Ingram Micro Cloud Marketplace
🏭 Business Transformation Center Partner
🚀 Emerging Business Group (EBG)
📧 ➟ Jennifer Coric
📞 ➟ x67172
🚀 Emerging Business Group (EBG)
Included in:
- MSSP Defend
- MSSP Advanced Defend
(Annual Terms Only)
📧 ➟ Jessica Cunningham
📞 ➟ x65003
🚀 Emerging Business Group (EBG)
📧 ➟ Alexandra Casillo
📞 ➟ x65187
🚀 Emerging Business Group (EBG)
SOCaaS is a subscription or software-based service that manages and monitors your logs, devices, clouds, network and assets for internal IT teams.
MDR is an advanced managed security service that provides threat intelligence, threat hunting, security monitoring, incident analysis, and incident response. This is unlike traditional MSSPs who only provide alerts from security monitoring.
Ingram Micro Professional Service:
Security Operating Center (SOC) Services
📧 ➟ Emerging Business Group
📞 ➟ x65003
🚀 Emerging Business Group (EBG)
ActZero Managed Detection & Response (MDR) Service
Complimentary Products or Technologies:Firewalls, Security Awareness Training, Email Security,
Data Security, Patch Management, Backup & Disaster Recovery, CSPM
📧 ➟ Mira Morse
📞 ➟ x66843
🚀 Emerging Business Group (EBG)
📧 ➟ Alexandra Casillo
📞 ➟ x65187
🚀 Emerging Business Group (EBG)
📧 ➟ Kristy Hakes
📞 ➟ x66229
🛒 Solutions Design & Services: x76102
👔 Technical Account Manager: ✔
☁️ Ingram Micro Cloud Marketplace
🏭 Business Transformation Center Partner
🚀 Emerging Business Group (EBG)
Bitdefender Managed Detection and Response (MDR)
Note:Bitdefender’s Managed Detection and Response (MDR) Service is 24/7/365 operations
designed to identify and remove cyber threats from your environment. Staffed by
our experienced security analysts and using an award-winning suite of technology,
the MDR service monitors detailed telemetry to quickly and effectively respond to
malicious activities, actively removing the threat to reduce dwell time and limit any damage.
📧 ➟ Alexandra Casillo
📞 ➟ x65187
🚀 Emerging Business Group (EBG)
Managed Security and MDR Services
Complimentary Products or Technologies:SIEM, Endpoint Protection, Email Protection, Firewalls
Strategic Partners:Fortinet
☁️ Ingram Micro Cloud Marketplace
🛠️ Ingram Micro IoT Marketplace
🚀 Emerging Business Group (EBG)
UEBA solutions use analytics to build the standard profiles and behaviors of users and entities (hosts, applications, network traffic and data repositories) across time and peer group horizons. Activity that is anomalous to these standard baselines is presented as suspicious, and packaged analytics applied on these anomalies can help discover threats and potential incidents. The most common use cases sought by enterprises are detecting malicious insiders and external attackers infiltrating their organizations (compromised insiders)
📧 ➟ Jessica Cunningham
📞 ➟ x65003
🚀 Emerging Business Group (EBG)
- Jumio Transaction Monitoring
- Jumio Screening
- Jumio Case Management
📧 ➟ Jessica Cunningham
📞 ➟ x65003
🚀 Emerging Business Group (EBG)
📧 ➟ Jessica Cunningham
📞 ➟ x65003
🚀 Emerging Business Group (EBG)
A network vulnerability assessment is the process of reviewing and analyzing a computer network for possible security vulnerabilities and loopholes. It is used by network administrators to evaluate the security architecture and defense of a network against possible vulnerabilities and threats.
Ingram Micro Professional Service:
Penetration Test Assessment
📧 ➟ Mira Morse
📞 ➟ x66843
🚀 Emerging Business Group (EBG)
📧 ➟ Jessica Cunningham
📞 ➟ x65003
🚀 Emerging Business Group (EBG)
Liensing Team: [email protected]
Complimentary Products or Technologies: Strategic Partners:
☁️ Ingram Micro Cloud Marketplace
🛠️ Ingram Micro IoT Marketplace
🚀 Emerging Business Group (EBG)
📧 ➟ Christoper Maxick
📞 ➟ x66626
👔 Technical Account Manager: Shawn Stopa
🚀 Emerging Business Group (EBG)
- EtherScope nXG
- LinkRunner 10G
- AirCheck G2
Allows you to identify wireless network vulnerabilitties like rogue devices, Ad-Hoc devices,
Open SSID's, printers with Wi-Fi radio turned on, unsecured Ethernet ports, etc.
You can also spoof MAC addresses, or use third party apps for penetration testing.
📧 ➟ Nicole Milliron
📞 ➟ x67162
🚀 Emerging Business Group (EBG)
-Risk based vulnerability remediation
- Custom binary analysis, Agent based approach for inventory and remediation
Dark Web Monitoring, also known as cyber monitoring, is an identity theft prevention product that enables you to monitor your identity information on the dark web, and receive notifications if your information is found online.
📧 ➟ Alexandra Casillo
📞 ➟ x65187
🚀 Emerging Business Group (EBG)
SOAR is a method of integrating and streamlining workflows across disparate tools in order to improve both security analyst efficiency and threat detection and response. Security automation is used to execute security operations tasks without human intervention.
📧 ➟ Alexandra Casillo
📞 ➟ x65187
🚀 Emerging Business Group (EBG)
📧 ➟ Jessica Cunningham
📞 ➟ x65003
🚀 Emerging Business Group (EBG)
📧 ➟ Jessica Cunningham
📞 ➟ x65003
🚀 Emerging Business Group (EBG)
📧 ➟ Alexandra Casillo
📞 ➟ x65187
🚀 Emerging Business Group (EBG)
MSActivator Automation Platform
Note:MSActivator-2.0 - Quickstart Demo
Complimentary Products or Technologies:Automates management of any IT infrastructure vendor or product.
📧 ➟ Nicole Milliron
📞 ➟ x67162
🚀 Emerging Business Group (EBG)
Automation engine for vulnerability remediation
Incident Response is an organized approach to addressing and managing the aftermath of a security breach or attack. The goal is to handle the situation in a way that limits damage and reduces recovery time and costs.
📧 ➟ Mira Morse
📞 ➟ x66843
🚀 Emerging Business Group (EBG)
📧 ➟ Alexandra Casillo
📞 ➟ x65187
🚀 Emerging Business Group (EBG)
📧 ➟ Kristy Hakes
📞 ➟ x66229
🛒 Solutions Design & Services: x76102
👔 Technical Account Manager: ✔
☁️ Ingram Micro Cloud Marketplace
🏭 Business Transformation Center Partner
🚀 Emerging Business Group (EBG)
📧 ➟ Alexandra Casillo
📞 ➟ x65187
🚀 Emerging Business Group (EBG)
📧 ➟ Jennifer Coric
📞 ➟ x67182
🚀 Emerging Business Group (EBG)
📧 ➟ Jessica Cunningham
📞 ➟ x65003
🚀 Emerging Business Group (EBG)
📧 ➟ Alexandra Casillo
📞 ➟ x65187
🚀 Emerging Business Group (EBG)
It examines structured data with regard to incidents. The aim is to discover and analyze patterns of fraudulent activities.
📧 ➟ Mira Morse
📞 ➟ x66843
🚀 Emerging Business Group (EBG)
📧 ➟ Alexandra Casillo
📞 ➟ x65187
🚀 Emerging Business Group (EBG)
📧 ➟ Jessica Cunningham
📞 ➟ x65003
🚀 Emerging Business Group (EBG)
📧 ➟ Jessica Cunningham
📞 ➟ x65003
🚀 Emerging Business Group (EBG)
📧 ➟ Alexandra Casillo
📞 ➟ x65187
🚀 Emerging Business Group (EBG)
Managing patches or upgrades for software applications and technologies.
📧 ➟ Kristy Hakes
📞 ➟ x66229
🛒 Solutions Design & Services: x76102
👔 Technical Account Manager: ✔
☁️ Ingram Micro Cloud Marketplace
🏭 Business Transformation Center Partner
🚀 Emerging Business Group (EBG)
📧 ➟ Nicole Milliron
📞 ➟ x67162
🚀 Emerging Business Group (EBG)
Embedded patch and update management for OS and 3rd party apps
The process of backing up data in case of a loss. This is a more advanced form of system copies that include processing capabilities.
Ingram Micro Professional Service:
Backup and Disaster Recovery Services
☁️ Ingram Micro Cloud Marketplace
🛠️ Ingram Micro IoT Marketplace
🚀 Emerging Business Group (EBG)
🛡️ New Category
Deployment and Imaging solutions allow for faster recovery and deployemnt time to get back up and running if a disaster such as ransomware were to occur.
Data Archiving is the process of moving data that is no longer actively used to a separate storage device for long-term retention.
Email Archiving is the process of archiving cloud or on-premise email soltuions for recovery due to outtage, legal hold, and/or malicious attacks.
This refers to solutions dedicated to high availability and business continuity.
Some features may include:
- Replication (Periodic, Multi-Stream, etc.)
- Compression
- Offline synchronization
- Email Continuity
OOBM provides access and control of IT assets outside of the production network
📧 ➟ Jonathan Jones
📞 ➟ x65351
🚀 Emerging Business Group (EBG)
Includes Netowkring Switches, Industial Switches, and other core networking equiptment
📧 ➟ Christoper Maxick
📞 ➟ x66626
👔 Technical Account Manager: Shawn Stopa
🚀 Emerging Business Group (EBG)
- EtherScope nXG and LinkRunner 10G
Note:Validate switch port configuration, measure interface statistics,
validate PoE configuration and output, measure network performance, and more.
Includes IoT devices, location beacons, IoT type sensors, and various analytics
🚀 Emerging Business Group (EBG)
PKI Management for IoT
📧 ➟ Christoper Maxick
📞 ➟ x66626
👔 Technical Account Manager: Shawn Stopa
🚀 Emerging Business Group (EBG)
- EtherScope nXG
- LinkRunner 10G
-AirCheck G2
Network analysis, troubleshooting, and validation.
Use of third party apps allow you to configure
or troubleshoot IoT devices and sensors.
Industrial control systems (ICS) are often a sitting target for cybercriminals. The majority of these systems monitor complex industrial processes and critical infrastructures that deliver power, water, transport, manufacturing and other essential services.
Includes Physical Security Cameras and/or Network Video Recorders, as well as other physcial security devices
UCC includes Phones, systems, and other UCC Realted Items
If there's a requirement such as signing a contact, or being in a partner program to resell this vendor, the box will be checked.
📧 ➟ Mira Morse
📞 ➟ x66843
🚀 Emerging Business Group (EBG)
Vendor resell approval
📧 ➟ Alexandra Casillo
📞 ➟ x65187
🚀 Emerging Business Group (EBG)
Service Provider offerings available. May include multi-tenancy, monthly billing, or a combination of both
📧 ➟ Mira Morse
📞 ➟ x66843
🚀 Emerging Business Group (EBG)
MSSP Program Coming Soon
📧 ➟ Alexandra Casillo
📞 ➟ x65187
🚀 Emerging Business Group (EBG)
📧 ➟ Kristy Hakes
📞 ➟ x66229
🛒 Solutions Design & Services: x76102
👔 Technical Account Manager: ✔
☁️ Ingram Micro Cloud Marketplace
🏭 Business Transformation Center Partner
🚀 Emerging Business Group (EBG)
📧 ➟ Jessica Cunningham
📞 ➟ x65003
🚀 Emerging Business Group (EBG)
📧 ➟ Jennifer Coric
📞 ➟ x67172
🚀 Emerging Business Group (EBG)
CrowdStrike MSP Program
Note:All sales are annual contacts and for MSSP's only
Onboarding:
Solution Development Lead: [email protected]
📧 ➟ Jennifer Coric
📞 ➟ x67182
🚀 Emerging Business Group (EBG)
Supports Multitenancy
📧 ➟ Jessica Cunningham
📞 ➟ x65003
🚀 Emerging Business Group (EBG)
This vendor or partner is exclusively sold through Ingram Micro
📧 ➟ Mira Morse
📞 ➟ x66843
🚀 Emerging Business Group (EBG)
Ingram Mirco Exclusive
📧 ➟ Alexandra Casillo
📞 ➟ x65187
🚀 Emerging Business Group (EBG)
📧 ➟ Alexandra Casillo
📞 ➟ x65187
🚀 Emerging Business Group (EBG)
Ingram Mirco Exclusive
📧 ➟ Jessica Cunningham
📞 ➟ x65003
🚀 Emerging Business Group (EBG)
Ingram Mirco Exclusive
📧 ➟ Jessica Cunningham
📞 ➟ x65003
🚀 Emerging Business Group (EBG)
☁️ Ingram Micro Cloud Marketplace
🛠️ Ingram Micro IoT Marketplace
🚀 Emerging Business Group (EBG)
Ingram Mirco Exclusive
📧 ➟ Jennifer Coric
📞 ➟ x67182
🛒 Solutions Design & Services: x76295
🚀 Emerging Business Group (EBG)
📧 ➟ Danny Marmol
☁️ Ingram Micro Cloud Marketplace
🚀 Emerging Business Group (EBG)
💾 Promark Technology Partner
📧 ➟ Jessica Cunningham
📞 ➟ x65003
🚀 Emerging Business Group (EBG)
📧 ➟ Jessica Cunningham
📞 ➟ x65003
🚀 Emerging Business Group (EBG)
Ingram Mirco Exclusive
Partnerships may include APIs, strong channel relationships, or strategic relationships though the vendors directly
🚀 Emerging Business Group (EBG)
📧 ➟ Mira Morse
📞 ➟ x66843
🚀 Emerging Business Group (EBG)
Cisco, Amazon, Box, Cylance, Google, Microsoft, Okta, Salesforce, Webroot
📧 ➟ Alexandra Casillo
📞 ➟ x65187
🚀 Emerging Business Group (EBG)
McAfee, RSA, IBM, Fireeye, Palo Alto, Tenable, DUO, Onelogin, Okta, Microsoft, AWS, Google
📧 ➟ Jennifer Coric
📞 ➟ x67182
🚀 Emerging Business Group (EBG)
Partnerships include:
- MIcrosoft
- FireEye
- IBM
- Bitdefender
- Citrix
- ANd many others though APIs