Security Line Card
  • Security Line Card
  • Vendor Landscape
  • Key Trends
    • Security Frameworks
    • Zero Trust
    • Secure Access Service Edge
    • Secure & Protect The Cloud
    • Identity & Access Management (IAM)
    • Managed Security Services
    • Vulnerability Management
    • Security Awareness Training
    • Email & Endpoint Protection
    • Business Continuity
    • Ransomware Protection
  • Webinars
  • Line Cards...
    • Cloud Security Line Card
    • Consumer Technology
    • DC/POS Line Card ↗
    • Emerging Business Group
    • IoT Line Card ↗
    • Security Services (DXS)
    • Smart Surveillance and Security Line Card ↗
    • UCC Line Card ↗
  • Resources...
    • DClinecard
    • Business Transformation Center (BTC)
    • Digital Transformation Playbooks ↗
    • Financial Solutions ↗
    • Imagine Next... >
      • Imagine Next Data Center ↗
      • Imagine Next Emerging Business Group ↗
      • Imagine Next Security ↗
      • Imagine Next Training ↗
    • Ingram Webinars & Events ↗
    • NIST Cybersecurity Framework
    • ONE Sales Tool ↗
    • Professional & Training Security Services
    • Security Business Unit
    • ​Solution Design and Services

Security Practice Development
​Program Self-Assessment

Please note the assessment covers several topics
and takes approximately 20 minutes to complete

    Contact Information


    Business Readiness


    Team Readiness

    Higher associate technical and sales skills help drive sales and create higher project margins and higher client satisfaction, resulting in more retained clients and references.

    Financial Acumen


    Identify

    The IDENTIFY Function assists in developing an organizational understanding to managing cybersecurity risk to systems, people, assets, data, and capabilities. Understanding the business context, the resources that support critical functions, and the related cybersecurity risks enables an organization to focus and prioritize its efforts, consistent with its risk management strategy and business needs.
    ​Click HERE for examples


    Protect

    ​The PROTECT Function outlines appropriate safeguards to ensure delivery of critical infrastructure services. The Protect Function supports the ability to limit or contain the impact of a potential cyber security event.
    ​
    Click HERE for examples​

    Detect

    ​The DETECT Function defines the appropriate activities to identify the occurrence of a cybersecurity event. The Detect Function enables timely discovery of cybersecurity events.
    ​
    Click HERE for examples​

    Respond

    ​The RESPOND Function includes appropriate activities to take action regarding a detected cybersecurity incident. The Respond Function supports the ability to contain the impact of a potential cybersecurity incident.
    Click HERE for examples​​

    Recover

    The Recover function identifies appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity incident. The Recover Function supports timely recovery to normal operations to reduce the impact from a cybersecurity incident.
    ​
    Click HERE for examples​
Submit

​Vendor Landscape

Security Services

Webinars
2021 Key Trends
​Copyright © 2021 Ingram Micro.  All rights reserved.
  • Security Line Card
  • Vendor Landscape
  • Key Trends
    • Security Frameworks
    • Zero Trust
    • Secure Access Service Edge
    • Secure & Protect The Cloud
    • Identity & Access Management (IAM)
    • Managed Security Services
    • Vulnerability Management
    • Security Awareness Training
    • Email & Endpoint Protection
    • Business Continuity
    • Ransomware Protection
  • Webinars
  • Line Cards...
    • Cloud Security Line Card
    • Consumer Technology
    • DC/POS Line Card ↗
    • Emerging Business Group
    • IoT Line Card ↗
    • Security Services (DXS)
    • Smart Surveillance and Security Line Card ↗
    • UCC Line Card ↗
  • Resources...
    • DClinecard
    • Business Transformation Center (BTC)
    • Digital Transformation Playbooks ↗
    • Financial Solutions ↗
    • Imagine Next... >
      • Imagine Next Data Center ↗
      • Imagine Next Emerging Business Group ↗
      • Imagine Next Security ↗
      • Imagine Next Training ↗
    • Ingram Webinars & Events ↗
    • NIST Cybersecurity Framework
    • ONE Sales Tool ↗
    • Professional & Training Security Services
    • Security Business Unit
    • ​Solution Design and Services