Security Line Card


HW = Hardware
| SW = Software
H/S = Both
| ๐Ÿš€ Emerging Biz Group
๐Ÿ’Ž IM Exclusive
| โ˜๏ธ Cloud Marketplace
Cloud Options
| โš™๏ธ Service Offering
Cyber Risk Scorecards & Posture Assessments

Cybersecurity posture relates to the security status of an enterpriseโ€™s networks, information, and systems based on information security resources (e.g., people, hardware, software, policies) and capabilities in place to manage the defense of the enterprise and to react as the situation changes.

โš™๏ธ
Arctic Wolf


๐Ÿ“ง โžŸ Mira Morse
๐Ÿ“ž โžŸ x66843

Additional Arctic Wolf Resources
๐Ÿš€ Emerging Business Group (EBG)

Product:

Managed Risk

Complimentary Products or Technologies:

Firewalls, Endpoints, Email, Cloud

SW
Cymulate


๐Ÿ“ง โžŸ Jessica Cunningham
๐Ÿ“ž โžŸ x65003

Additional Cymulate Resources
๐Ÿš€ Emerging Business Group (EBG)

Product:

Cymulate Platform

Note:

Liensing Team: Cymulate-licensing@ingrammicro.com

Complimentary Products or Technologies:

-Penetration Assessments
- SIEM
- GRC

Strategic Partners:

- Tenable
- RSA
- Microsoft
- IBM
- Symantec

SW
Vicarius


๐Ÿ“ง โžŸ Nicole Milliron
๐Ÿ“ž โžŸ x67162

Additional Vicarius Resources
๐Ÿš€ Emerging Business Group (EBG)

Product:

Vicarius TOPIA

Note:

Client specific risk scoring


๐Ÿ“ง โžŸ

Additional Resources
๐Ÿ“ Contacts Overview

Vulnerability Management & Analytics

Vulnerability Management is the practice of identifying, classifying, remediating, and mitigating vulnerabilities. Vulnerability Analytics is a process that defines, identifies, and classifies the security holes (vulnerabilities) in a computer, network, or communications infrastructure.

Ingram Micro Professional Service:
Dev/Sec/Ops Services

โš™๏ธ
Arctic Wolf


๐Ÿ“ง โžŸ Mira Morse
๐Ÿ“ž โžŸ x66843

Additional Arctic Wolf Resources
๐Ÿš€ Emerging Business Group (EBG)

Product:

Arctic Wolf Managed Risk

โš™๏ธ
Binary Defense


๐Ÿ“ง โžŸ Alexandra Casillo
๐Ÿ“ž โžŸ x65187

Additional Binary Defense Resources
๐Ÿš€ Emerging Business Group (EBG)

Product:

Security Information & Event Management

SW
Vicarius


๐Ÿ“ง โžŸ Nicole Milliron
๐Ÿ“ž โžŸ x67162

Additional Vicarius Resources
๐Ÿš€ Emerging Business Group (EBG)

Product:

Vicarius TOPIA

Note:

-Risk based vulnerability remediation
- Custom binary analysis, Agent based approach for inventory and remediation


๐Ÿ“ง โžŸ

Additional Resources
๐Ÿ“ Contacts Overview

File Integrity Monitoring

File integrity monitoring (FIM) is an internal control or process that performs the act of validating the integrity of operating system and application software files using a verification method between the current file state and a known, good baseline.

โš™๏ธ
Arctic Wolf


๐Ÿ“ง โžŸ Mira Morse
๐Ÿ“ž โžŸ x66843

Additional Arctic Wolf Resources
๐Ÿš€ Emerging Business Group (EBG)

Product:

Arctic Wolf Managed Risk

H/S
BeyondTrust


๐Ÿ“ง โžŸ Alexandra Casillo
๐Ÿ“ž โžŸ x65187

Additional BeyondTrust Resources
๐Ÿš€ Emerging Business Group (EBG)

Product:

Privilege Management for Unix/Linux

โš™๏ธ
Binary Defense


๐Ÿ“ง โžŸ Alexandra Casillo
๐Ÿ“ž โžŸ x65187

Additional Binary Defense Resources
๐Ÿš€ Emerging Business Group (EBG)

Product:

Security Information & Event Management

H/S
Stellar Cyber


๐Ÿ“ง โžŸ Jessica Cunningham
๐Ÿ“ž โžŸ x65003

Additional Stellar Cyber Resources
๐Ÿš€ Emerging Business Group (EBG)

Product:

Stellar Cyber Central


๐Ÿ“ง โžŸ

Additional Resources
๐Ÿ“ Contacts Overview

Regulation & Compliance Management

Regulatory compliance is an effort to ensure a company is aware of steps needed to comply with relevant laws, polices, and regulations. Security reflects a large portion of these compliancies.

Ingram Micro Professional Service:
Network Security Services

โš™๏ธ
Binary Defense


๐Ÿ“ง โžŸ Alexandra Casillo
๐Ÿ“ž โžŸ x65187

Additional Binary Defense Resources
๐Ÿš€ Emerging Business Group (EBG)

Product:

Security Information & Event Management

SW
Bitdefender


๐Ÿ“ง โžŸ Kristy Hakes
๐Ÿ“ž โžŸ x66229

Additional Bitdefender Resources
๐Ÿ›’ Solutions Design & Services: x76102
๐Ÿ‘” Technical Account Manager: โœ”
โ˜๏ธ Ingram Micro Cloud Marketplace
๐Ÿญ Business Transformation Center Partner
๐Ÿš€ Emerging Business Group (EBG)

Product:

GravityZone

SW
Trustifi


๐Ÿ“ง โžŸ Jessica Cunningham
๐Ÿ“ž โžŸ x65003

Additional Trustifi Resources
๐Ÿš€ Emerging Business Group (EBG)

Product:

Trustifi Advanced Email Security

SW
Truyo


๐Ÿ“ง โžŸ Jessica Cunningham
๐Ÿ“ž โžŸ x65003

Additional Truyo Resources
๐Ÿš€ Emerging Business Group (EBG)

Product:

Truyo Privacy Platform


๐Ÿ“ง โžŸ

Additional Resources
๐Ÿ“ Contacts Overview

Identity Governance and Administration (IGA)

IGA systems merge identity administration, which addresses administering accounts and credentials, provisioning, and managing entitlements, with identity governance, which addresses the segregation of duties, role management, logging, and analytics and reporting.

IGA systems provide additional functionality beyond standard Identity and Access Management (IAM) systems. In particular, they help organizations meet compliance requirements and enable them to audit access for compliance reporting. They also automate workflows for tasks such as access approvals and provisioning/de-provisioning.

Elements of IGA Systems
- Password management
- Integrations
- Access request managemen
- Automated Provisioning
- Entitlement management


๐Ÿ“ง โžŸ

Additional Resources
๐Ÿ“ Contacts Overview

Mobility Management and/or Security (MxM)

Manage and secure employees' mobile devices that are deployed across multiple mobile service providers and across multiple mobile operating systems being used in the organization.

Features typically include:
- Device Tracking
- Application Control
- Remote-wipe
- Anti-Malware
- Web Filtering
- Inventory Management
- Anti-theft

H/S
BeyondTrust


๐Ÿ“ง โžŸ Alexandra Casillo
๐Ÿ“ž โžŸ x65187

Additional BeyondTrust Resources
๐Ÿš€ Emerging Business Group (EBG)

Product:

BeyondTrust Remote Support

Note:

Secure remote access to iOS, Android or Rasp PI based devices.

SW
Bitdefender


๐Ÿ“ง โžŸ Kristy Hakes
๐Ÿ“ž โžŸ x66229

Additional Bitdefender Resources
๐Ÿ›’ Solutions Design & Services: x76102
๐Ÿ‘” Technical Account Manager: โœ”
โ˜๏ธ Ingram Micro Cloud Marketplace
๐Ÿญ Business Transformation Center Partner
๐Ÿš€ Emerging Business Group (EBG)

Product:

Gravity Zone Mobile Security

SW
Lookout


๐Ÿ“ง โžŸ Emerging Business Group

Additional Lookout Resources
๐Ÿš€ Emerging Business Group (EBG)

Product:

Lookout Mobile Endpoint Security


๐Ÿ“ง โžŸ

Additional Resources
๐Ÿ“ Contacts Overview

Network Vulnerability Assessments,
Penetration Tests

A network vulnerability assessment is the process of reviewing and analyzing a computer network for possible security vulnerabilities and loopholes. It is used by network administrators to evaluate the security architecture and defense of a network against possible vulnerabilities and threats.

Ingram Micro Professional Service:
Penetration Test Assessment

โš™๏ธ
Arctic Wolf


๐Ÿ“ง โžŸ Mira Morse
๐Ÿ“ž โžŸ x66843

Additional Arctic Wolf Resources
๐Ÿš€ Emerging Business Group (EBG)

Product:

Arctic Wolf Managed Risk

SW
Cymulate


๐Ÿ“ง โžŸ Jessica Cunningham
๐Ÿ“ž โžŸ x65003

Additional Cymulate Resources
๐Ÿš€ Emerging Business Group (EBG)

Product:

Cymulate Platform

Note:

Liensing Team: Cymulate-licensing@ingrammicro.com

Complimentary Products or Technologies:

-Penetration Assessments
- SIEM
- GRC

Strategic Partners:

- Tenable
- RSA
- Microsoft
- IBM
- Symantec

HW
NetAlly


๐Ÿ“ง โžŸ Christoper Maxick
๐Ÿ“ž โžŸ x66626

Additional NetAlly Resources
๐Ÿ‘” Technical Account Manager: Shawn Stopa
๐Ÿš€ Emerging Business Group (EBG)

Product:

- EtherScope nXG
- LinkRunner 10G
- AirCheck G2

Note:

Allows you to identify wireless network vulnerabilitties like rogue devices, Ad-Hoc devices,
Open SSID's, printers with Wi-Fi radio turned on, unsecured Ethernet ports, etc.
You can also spoof MAC addresses, or use third party apps for penetration testing.

SW
Vicarius


๐Ÿ“ง โžŸ Nicole Milliron
๐Ÿ“ž โžŸ x67162

Additional Vicarius Resources
๐Ÿš€ Emerging Business Group (EBG)

Product:

Vicarius TOPIA

Note:

-Risk based vulnerability remediation
- Custom binary analysis, Agent based approach for inventory and remediation


๐Ÿ“ง โžŸ

Additional Resources
๐Ÿ“ Contacts Overview

Cloud Security Posture Management (CSPM)

CSMP solutions provide organizations with visibility into public cloud infrastructure. With the proliferation of cloud resources, many organizations are unaware of how many cloud resources are running and how theyโ€™re all configured. This lack of visibility can cause misconfigurations to go undetected for long periods of time, making it harder to secure the applications.

โš™๏ธ
Arctic Wolf


๐Ÿ“ง โžŸ Mira Morse
๐Ÿ“ž โžŸ x66843

Additional Arctic Wolf Resources
๐Ÿš€ Emerging Business Group (EBG)

Product:

Arctic Wolfยฎ Managed Cloud Monitoring

SW
Bitglass


๐Ÿ“ง โžŸ Wanda Lacey
๐Ÿ“ž โžŸ 240-280-8036

Additional Bitglass Resources
๐Ÿš€ Emerging Business Group (EBG)

Product:

Bitglass Cloud Security Posture Management (CSPM)


๐Ÿ“ง โžŸ

Additional Resources
๐Ÿ“ Contacts Overview

SSH Key, PKI, or Certificate Management
and/or Machine Identity Management

Public Key Infrastructure (PKI) is a technology for authenticating users and devices in the digital world. The basic idea is to have one or more trusted parties digitally sign documents certifying that a particular cryptographic key belongs to a particular user or device.

Certificate Management is the activity of monitoring, facilitating, and executing every certificate process necessary for uninterrupted network operations.

SW
AppViewX


๐Ÿ“ง โžŸ Emerging Business Group

Additional AppViewX Resources
๐Ÿš€ Emerging Business Group (EBG)

Product:

Cert+

Note:

Cert+ Datasheet


๐Ÿ“ง โžŸ

Additional Resources
๐Ÿ“ Contacts Overview

Dark Web Monitoring

Dark Web Monitoring, also known as cyber monitoring, is an identity theft prevention product that enables you to monitor your identity information on the dark web, and receive notifications if your information is found online.

โš™๏ธ
Arctic Wolf


๐Ÿ“ง โžŸ Mira Morse
๐Ÿ“ž โžŸ x66843

Additional Arctic Wolf Resources
๐Ÿš€ Emerging Business Group (EBG)

Product:

Arctic Wolfยฎ Managed Risk

โš™๏ธ
Binary Defense


๐Ÿ“ง โžŸ Alexandra Casillo
๐Ÿ“ž โžŸ x65187

Additional Binary Defense Resources
๐Ÿš€ Emerging Business Group (EBG)

Product:

Counterintelligence


๐Ÿ“ง โžŸ

Additional Resources
๐Ÿ“ Contacts Overview

Security Awareness Training

Tools to improve employee knowledge of social engineering and cyberattack techniques. Products/Services can include training as well as phishing simulations.

Ingram Micro Professional Service:
Ingram Micro Training

โš™๏ธ
Arctic Wolf


๐Ÿ“ง โžŸ Mira Morse
๐Ÿ“ž โžŸ x66843

Additional Arctic Wolf Resources
๐Ÿš€ Emerging Business Group (EBG)

Product:

Managed Security Awarenessยฎ

SW
Cymulate


๐Ÿ“ง โžŸ Jessica Cunningham
๐Ÿ“ž โžŸ x65003

Additional Cymulate Resources
๐Ÿš€ Emerging Business Group (EBG)

Product:

Phishing Awareness Vector

Note:

Free Trial Available

SW
OPSWAT


๐Ÿ“ง โžŸ Jessica Cunningham
๐Ÿ“ž โžŸ x65003

Additional OPSWAT Resources
๐Ÿš€ Emerging Business Group (EBG)
โ˜๏ธ Cloud Harmonics Technology Partner

Product:

OPSWAT Academy

Note:

OPSWAT training- Premier certification in cyber security threats and solutions


๐Ÿ“ง โžŸ

Additional Resources
๐Ÿ“ Contacts Overview

Gateway/Firewall

This category includes:
- Next Generation Firewall (NGFW)
- Unified Threat Management (UTM) Firewall
- Web Application Firewall (WAF)

Features typically include:
- Web Content Management
- Anti-Virus
- Intrusion Prevention/Detection
- Data Loss Prevention
- VPN
- Web Application Control
- Cloud Sandboxing
- E-mail Anti-Spam

Ingram Micro Professional Service:
Virus & Intrusion Protection Services

SW
iboss


๐Ÿ“ง โžŸ Jennifer Coric
๐Ÿ“ž โžŸ x67182

Additional iboss Resources
๐Ÿš€ Emerging Business Group (EBG)

Product:

Core Package, Malware Defense, and DLP package

Note:

Pricing

HW
Opengear


๐Ÿ“ง โžŸ Jonathan Jones
๐Ÿ“ž โžŸ x65351

Additional Opengear Resources
๐Ÿš€ Emerging Business Group (EBG)

Product:

IoT Gateways


๐Ÿ“ง โžŸ

Additional Resources
๐Ÿ“ Contacts Overview

Gateway Advanced Persistent Threat Protection

Protection against an unauthorized person gaining access to a network undetected for a long period of time.

SW
iboss


๐Ÿ“ง โžŸ Jennifer Coric
๐Ÿ“ž โžŸ x67182

Additional iboss Resources
๐Ÿš€ Emerging Business Group (EBG)

Product:

Core Package, Malware Defense, and DLP Packages

Note:

Pricing

SW
OPSWAT


๐Ÿ“ง โžŸ Jessica Cunningham
๐Ÿ“ž โžŸ x65003

Additional OPSWAT Resources
๐Ÿš€ Emerging Business Group (EBG)
โ˜๏ธ Cloud Harmonics Technology Partner

Product:

Metadefender Core

Note:

Advanced Threat Protection, including Deep CDR, Multscanning, proactive DLP. File based based vulnerability assessment


๐Ÿ“ง โžŸ

Additional Resources
๐Ÿ“ Contacts Overview

Gateway Application Control

Monitor, control, and report on web applications


๐Ÿ“ง โžŸ

Additional Resources
๐Ÿ“ Contacts Overview

Sandboxing or Advanced Threat Protection (ATP)

A Sandbox is used to detect new and unknown malware threats. A sandbox is a security mechanism used to execute untested or untrusted programs or code without risking harm to the host machine or operating system. Advanced Threat Protection (ATP) is a feature that incorporates multiple security technologies to provide protection against targeted attacks.

SW
Bitdefender


๐Ÿ“ง โžŸ Kristy Hakes
๐Ÿ“ž โžŸ x66229

Additional Bitdefender Resources
๐Ÿ›’ Solutions Design & Services: x76102
๐Ÿ‘” Technical Account Manager: โœ”
โ˜๏ธ Ingram Micro Cloud Marketplace
๐Ÿญ Business Transformation Center Partner
๐Ÿš€ Emerging Business Group (EBG)

Product:

Bitdefender Hypervisor Introspection (HVI)

SW
iboss


๐Ÿ“ง โžŸ Jennifer Coric
๐Ÿ“ž โžŸ x67182

Additional iboss Resources
๐Ÿš€ Emerging Business Group (EBG)

Product:

Malware Defense and Data Loss Prevention Packages

Complimentary Products or Technologies:

iboss & FireEye Cloud Network Security

H/S
Stellar Cyber


๐Ÿ“ง โžŸ Jessica Cunningham
๐Ÿ“ž โžŸ x65003

Additional Stellar Cyber Resources
๐Ÿš€ Emerging Business Group (EBG)

Product:

Stellar Cyber Central

SW
Trustifi


๐Ÿ“ง โžŸ Jessica Cunningham
๐Ÿ“ž โžŸ x65003

Additional Trustifi Resources
๐Ÿš€ Emerging Business Group (EBG)

Product:

Trustifi Advanced Email Security

SW
VMRay


๐Ÿ“ง โžŸ Alexandra Casillo
๐Ÿ“ž โžŸ x65187

Additional VMRay Resources
๐Ÿš€ Emerging Business Group (EBG)

Product:

VMRay Analyzer

Note:

Datasheet


๐Ÿ“ง โžŸ

Additional Resources
๐Ÿ“ Contacts Overview

Network Intrusion Prevention System

Including Network Intrusion prevention System (NIPS) & Intrusion Detection System (IDS) signature/behavioral/protocol-based security.

SW
iboss


๐Ÿ“ง โžŸ Jennifer Coric
๐Ÿ“ž โžŸ x67182

Additional iboss Resources
๐Ÿš€ Emerging Business Group (EBG)

Product:

Malware Defense and Data Loss Prevention Packages

Note:

Real-time intrusion, malware, and virus protection.
Quickly and easily view event detail, including source and destination IP.
Automatic and included threat feed subscriptions.
Category-based malware rules.
Visual IPS rule creation and editing.

HW
NetAlly


๐Ÿ“ง โžŸ Christoper Maxick
๐Ÿ“ž โžŸ x66626

Additional NetAlly Resources
๐Ÿ‘” Technical Account Manager: Shawn Stopa
๐Ÿš€ Emerging Business Group (EBG)

Product:

- EtherScope nXG
- AirCheck G2

Note:

Can be used for portable wireless intrution detection on
both enteprise level networks or no wireless zones.


๐Ÿ“ง โžŸ

Additional Resources
๐Ÿ“ Contacts Overview

Endpoint Protection

Endpoint Security protects computers and other devices on a network or in the cloud from cybersecurity threats. Endpoint security has evolved from traditional antivirus software to providing comprehensive protection from sophisticated malware and evolving zero-day threats.

This category includes:
- Desktop
- Laptop
- Server

Features typically include:
- Anti-Malware
- Application Control
- Web filtering
- Host based IPS
- APT
- Firewall
- Data loss prevention

Mobile devices and security are covered by Mobility Management category above.

Ingram Micro Professional Service:
Endpoint Security Services

SW
Bitdefender


๐Ÿ“ง โžŸ Kristy Hakes
๐Ÿ“ž โžŸ x66229

Additional Bitdefender Resources
๐Ÿ›’ Solutions Design & Services: x76102
๐Ÿ‘” Technical Account Manager: โœ”
โ˜๏ธ Ingram Micro Cloud Marketplace
๐Ÿญ Business Transformation Center Partner
๐Ÿš€ Emerging Business Group (EBG)

Product:

GravityZone

โš™๏ธ
Skout


๐Ÿ“ง โžŸ Emerging Business Group

Additional Skout Resources
๐Ÿš€ Emerging Business Group (EBG)

Product:

SKOUT Endpoint Protection


๐Ÿ“ง โžŸ

Additional Resources
๐Ÿ“ Contacts Overview

Endpoint Application Control

Monitor, control, and report on device-based applications and/or web applications

H/S
BeyondTrust


๐Ÿ“ง โžŸ Alexandra Casillo
๐Ÿ“ž โžŸ x65187

Additional BeyondTrust Resources
๐Ÿš€ Emerging Business Group (EBG)

Product:

Privilege Management for Win/Mac

SW
Bitdefender


๐Ÿ“ง โžŸ Kristy Hakes
๐Ÿ“ž โžŸ x66229

Additional Bitdefender Resources
๐Ÿ›’ Solutions Design & Services: x76102
๐Ÿ‘” Technical Account Manager: โœ”
โ˜๏ธ Ingram Micro Cloud Marketplace
๐Ÿญ Business Transformation Center Partner
๐Ÿš€ Emerging Business Group (EBG)

Product:

GravityZone


๐Ÿ“ง โžŸ

Additional Resources
๐Ÿ“ Contacts Overview

๐Ÿ›ก๏ธ Ransomware Protection & Mitigation

๐Ÿ›ก๏ธ New Category

Tools to detect, prevent, and remediate from ransomware attacks

SW
Bitdefender


๐Ÿ“ง โžŸ Kristy Hakes
๐Ÿ“ž โžŸ x66229

Additional Bitdefender Resources
๐Ÿ›’ Solutions Design & Services: x76102
๐Ÿ‘” Technical Account Manager: โœ”
โ˜๏ธ Ingram Micro Cloud Marketplace
๐Ÿญ Business Transformation Center Partner
๐Ÿš€ Emerging Business Group (EBG)

Product:

GravityZone Elite

SW
CrowdStrike


๐Ÿ“ง โžŸ Jennifer Coric
๐Ÿ“ž โžŸ x67172

Additional CrowdStrike Resources
๐Ÿš€ Emerging Business Group (EBG)

Product:

Falcon Endpoint Protection (All Versions)

SW
Cymulate


๐Ÿ“ง โžŸ Jessica Cunningham
๐Ÿ“ž โžŸ x65003

Additional Cymulate Resources
๐Ÿš€ Emerging Business Group (EBG)

Product:

Endpoint Security Testing Vector


๐Ÿ“ง โžŸ

Additional Resources
๐Ÿ“ Contacts Overview

Email Protection and/or Anti-Spam

Email Protection describes different techniques for keeping sensitive information in email communication and accounts secure against unauthorized access, loss or compromise. Email is often used to spread malware, spam and phishing attacks. Attackers use deceptive messages to entice recipients to part with sensitive information, open attachments or click on hyperlinks that install malware on the victimโ€™s device. Email is also a common entry point for attackers looking to gain a foothold in an enterprise network and obtain valuable company data.

Features typically include:
- Anti-Virus
- Anti-SPAM
- Phishing Protection
- URL Rewrites
- Email Data Loss Prevention (DLP)

SW
OPSWAT


๐Ÿ“ง โžŸ Jessica Cunningham
๐Ÿ“ž โžŸ x65003

Additional OPSWAT Resources
๐Ÿš€ Emerging Business Group (EBG)
โ˜๏ธ Cloud Harmonics Technology Partner

Product:

Metadefender Email Gateway Security

Note:

Disarm malicious e-mails, anti phishing & Spam

โš™๏ธ
Skout


๐Ÿ“ง โžŸ Emerging Business Group

Additional Skout Resources
๐Ÿš€ Emerging Business Group (EBG)

Product:

SKOUT Email Protection

SW
Trustifi


๐Ÿ“ง โžŸ Jessica Cunningham
๐Ÿ“ž โžŸ x65003

Additional Trustifi Resources
๐Ÿš€ Emerging Business Group (EBG)

Product:

Trustifi Advanced Email Security

SW
VMRay


๐Ÿ“ง โžŸ Alexandra Casillo
๐Ÿ“ž โžŸ x65187

Additional VMRay Resources
๐Ÿš€ Emerging Business Group (EBG)

Product:

VMRay Email Threat Defender (ETD)

Note:

Datasheet


๐Ÿ“ง โžŸ

Additional Resources
๐Ÿ“ Contacts Overview

Email Encryption

Email Encryption involves encrypting the content of email messages to protect potentially sensitive information from being read by anyone other than intended recipients.

SW
Trustifi


๐Ÿ“ง โžŸ Jessica Cunningham
๐Ÿ“ž โžŸ x65003

Additional Trustifi Resources
๐Ÿš€ Emerging Business Group (EBG)

Product:

Trustifi Advanced Email Security


๐Ÿ“ง โžŸ

Additional Resources
๐Ÿ“ Contacts Overview

DMARC Email Authentication Protocol

Domain-based Message Authentication, Reporting & Conformance (DMARC), is a protocol that uses Sender Policy Framework (SPF) and DomainKeys identified mail (DKIM) to determine the authenticity of an email message.

Most email security vendors support the DMARC protocol at a basic level, this category is for advanced management and analytics.


๐Ÿ“ง โžŸ

Additional Resources
๐Ÿ“ Contacts Overview

Data Loss Prevention (DLP)

Data Loss Prevention (DLP) prevention to restrict end users sending sensitive or critical information outside the corporate network.

H/S
Blancco


๐Ÿ“ง โžŸ Jessica Cunningham
๐Ÿ“ž โžŸ x65003

Additional Blancco Resources
๐Ÿš€ Emerging Business Group (EBG)

Product:

Drive Eraser

SW
iboss


๐Ÿ“ง โžŸ Jennifer Coric
๐Ÿ“ž โžŸ x67182

Additional iboss Resources
๐Ÿš€ Emerging Business Group (EBG)

Product:

Data Loss Prevention package

Note:

Detect, alert, and stop the transfer of sensitive data to and from the cloud.
Provides protection against unauthorized cloud use.

SW
Trustifi


๐Ÿ“ง โžŸ Jessica Cunningham
๐Ÿ“ž โžŸ x65003

Additional Trustifi Resources
๐Ÿš€ Emerging Business Group (EBG)

Product:

Trustifi Advanced Email Security


๐Ÿ“ง โžŸ

Additional Resources
๐Ÿ“ Contacts Overview

Data Security and Protection

Monitor, scan, mask, and discover vulnerabilities in databses and storage


๐Ÿ“ง โžŸ

Additional Resources
๐Ÿ“ Contacts Overview

IT Asset Disposition (ITAD)

IT asset disposition (ITAD) is the business built around disposing of obsolete or unwanted equipment in a safe and ecologically-responsible manner.

โš™๏ธ
IngramMicro


๐Ÿ“ง โžŸ DXS Team
๐Ÿ“ž โžŸ x76094

Additional IngramMicro Resources
โ˜๏ธ Ingram Micro Cloud Marketplace
๐Ÿ› ๏ธ Ingram Micro IoT Marketplace
๐Ÿš€ Emerging Business Group (EBG)

Product:

IT Asset Disposition (ITAD)

Note:

Ingram Micro IT Asset Disposition (ITAD) is the leading provider of
enterprise ITAD, on-site data destruction and e-waste recycling.

Our services reduce the risk, cost and complexity of managing
IT assets and consumer electronics in compliance with
environmental and data security regulations.


๐Ÿ“ง โžŸ

Additional Resources
๐Ÿ“ Contacts Overview

Fraud and Risk Management/Protection

Manage fraud and digital risk across multi-channel environments without impacting customers or transactions


๐Ÿ“ง โžŸ

Additional Resources
๐Ÿ“ Contacts Overview

Identity & Access Management (IAM), Multi-Factor Authentication (MFA), Single Sign-On (SSO)

MFA is access control in which a user is granted access only after successfully utilizing more than one authentication method.
SSO is an authentication process that allows a user to access multiple applications with one set of login credentials.

Ingram Micro Professional Service:
Identity & Access Management Services

H/S
BeyondTrust


๐Ÿ“ง โžŸ Alexandra Casillo
๐Ÿ“ž โžŸ x65187

Additional BeyondTrust Resources
๐Ÿš€ Emerging Business Group (EBG)

Product:

- BeyondTrust Password Safe
- BeypndTrust DevOps Secrets Safe

SW
Evidian


๐Ÿ“ง โžŸ Evidian Licensing Team

Product:

- Evidian SSO
- Cloud SSO

Complimentary Products or Technologies:

MFA Tokens, Smart Cards, Wearables

Strategic Partners:

Dell EMC: Infrastructure
RSA: SecurID (MFA)
VMware: Cloud & Virtualization Software


๐Ÿ“ง โžŸ

Additional Resources
๐Ÿ“ Contacts Overview

Network Access Control (NAC)

Network management and security that enforces security policy, compliance and management of access control to a network.

HW
NetAlly


๐Ÿ“ง โžŸ Christoper Maxick
๐Ÿ“ž โžŸ x66626

Additional NetAlly Resources
๐Ÿ‘” Technical Account Manager: Shawn Stopa
๐Ÿš€ Emerging Business Group (EBG)

Product:

- EtherScope nXG
- LinkRunner 10G
- AirCheck G2

Note:

Verification of 802.1X and MAC-based NAC.

SW
OPSWAT


๐Ÿ“ง โžŸ Jessica Cunningham
๐Ÿ“ž โžŸ x65003

Additional OPSWAT Resources
๐Ÿš€ Emerging Business Group (EBG)
โ˜๏ธ Cloud Harmonics Technology Partner

Product:

NAC Enterprise Network Access Control

Note:

MetaAccess NAC delivers an industry-leading solution โ€” with a streamlined implementation experience that addresses critical security challenges facing your network.


๐Ÿ“ง โžŸ

Additional Resources
๐Ÿ“ Contacts Overview

Change Control

Monitor, report, and restrict access to file changes


๐Ÿ“ง โžŸ

Additional Resources
๐Ÿ“ Contacts Overview

Disk Encryption

Full Disk Encryption protects information by converting it into unreadable code that cannot be deciphered easily by unauthorized people.

SW
Bitdefender


๐Ÿ“ง โžŸ Kristy Hakes
๐Ÿ“ž โžŸ x66229

Additional Bitdefender Resources
๐Ÿ›’ Solutions Design & Services: x76102
๐Ÿ‘” Technical Account Manager: โœ”
โ˜๏ธ Ingram Micro Cloud Marketplace
๐Ÿญ Business Transformation Center Partner
๐Ÿš€ Emerging Business Group (EBG)

Product:

GravityZone


๐Ÿ“ง โžŸ

Additional Resources
๐Ÿ“ Contacts Overview

File/Folder Encryption

File/Folder Encryption or Filesystem-level encryption, is a form of disk encryption where individual files or directories are encrypted by the file system itself.

SW


๐Ÿ“ง โžŸ

Additional Resources
๐Ÿ“ Contacts Overview

Virtual Private Network (VPN)

Virtual Private Networks (VPN) allow users to connect their devices back to an office to access resources and files though an encrypted connection. This prevents anyone snooping from the outside from accessing plan text traffic that might be transmitted.

Common types of VPNs Include:
- IPsec (Internet Protocol Security), Software client based
- SSL (Secure Sockets Layer), clientless