Security Line Card
⭐Cyber Risk Scorecards & Posture Assessments

Cybersecurity posture relates to the security status of an enterprise’s networks, information, and systems based on information security resources (e.g., people, hardware, software, policies) and capabilities in place to manage the defense of the enterprise and to react as the situation changes.

Contacts:

Vulnerability Management & Analytics

Vulnerability Management is the practice of identifying, classifying, remediating, and mitigating vulnerabilities. Vulnerability Analytics is a process that defines, identifies, and classifies the security holes (vulnerabilities) in a computer, network, or communications infrastructure.

Ingram Micro Professional Service:
Dev/Sec/Ops Services

SW
Ivanti Contacts:

Primary Contact: Ivanti-Licensing@ingrammicro.com

H/S
Juniper Contacts:

Primary Contact: Juniper.Assist@ingrammicro.com
Solutions Design & Services: x77253
Technical Account Manager: ✔️

Products:

JSA, vJSA

Contacts:

File Integrity Monitoring

File integrity monitoring (FIM) is an internal control or process that performs the act of validating the integrity of operating system and application software files using a verification method between the current file state and a known, good baseline.

SW
Checkpoint Contacts:

Primary Contact: Emily.Kelley@ingrammicro.com
Technical Account Manager: ✔️

Products:

SandBlast Agent

SW
Forcepoint Contacts:

Primary Contact: Ashley.Widmer@ingrammicro.com
Technical Account Manager: ✔️

Products:

Forcepoint DLP

SW
Ivanti Contacts:

Primary Contact: Ivanti-Licensing@ingrammicro.com

Contacts:

Regulation & Compliance Management

Regulatory compliance is an effort to ensure a company is aware of steps needed to comply with relevant laws, polices, and regulations. Security reflects a large portion of these compliancies.

Ingram Micro Professional Service:
Network Security Services

H/S
Checkpoint Contacts:

Primary Contact: Emily.Kelley@ingrammicro.com
Technical Account Manager: ✔️

Products:

Compliance Software Blade

SW
SW
Ivanti Contacts:

Primary Contact: Ivanti-Licensing@ingrammicro.com

H/S
Juniper Contacts:

Primary Contact: Juniper.Assist@ingrammicro.com
Solutions Design & Services: x77253
Technical Account Manager: ✔️

Products:

JSA, vJSA

SonicWALL Contacts:

Primary Contact: Stefan.Buczak@IngramMicro.com
Solutions Design & Services: x76102

⚙️
Sophos Contacts:

Primary Contact: Thomas.Nasca@ingrammicro.com
Solutions Design & Services: x76102
Technical Account Manager: ✔️

Products:

Cloud Optix

Contacts:

Mobility Management and/or Security (MxM)

Manage and secure employees' mobile devices that are deployed across multiple mobile service providers and across multiple mobile operating systems being used in the organization.

Features typically include:
- Device Tracking
- Application Control
- Remote-wipe
- Anti-Malware
- Web Filtering
- Inventory Management
- Anti-theft

SW
Checkpoint Contacts:

Primary Contact: Emily.Kelley@ingrammicro.com
Technical Account Manager: ✔️

Products:

SandBlast Mobile

HW
FireEye Contacts:

Primary Contact: Vanessa.Strade@ingrammicro.com
Technology Consultant: ✔️

SW
Ivanti Contacts:

Primary Contact: Ivanti-Licensing@ingrammicro.com

Products:

Endpoint Management

SW
SW
Sophos Contacts:

Primary Contact: Thomas.Nasca@ingrammicro.com
Solutions Design & Services: x76102
Technical Account Manager: ✔️

Products:

Sophos Mobile

Contacts:

Network Vulnerability Assessment and/or Penetration Test

A network vulnerability assessment is the process of reviewing and analyzing a computer network for possible security vulnerabilities and loopholes. It is used by network administrators to evaluate the security architecture and defense of a network against possible vulnerabilities and threats.

Ingram Micro Professional Service:
Penetration Test Assessment

⚙️
SW
FireEye Contacts:

Primary Contact: Vanessa.Strade@ingrammicro.com
Technology Consultant: ✔️

Products:

Penetration Testing

SW
Forcepoint Contacts:

Primary Contact: Ashley.Widmer@ingrammicro.com
Technical Account Manager: ✔️

Products:

Evader by Forcepoint

Contacts:

⭐Dark Web Monitoring

Dark Web Monitoring, also known as cyber monitoring, is an identity theft prevention product that enables you to monitor your identity information on the dark web, and receive notifications if your information is found online.

Contacts:

Security Awareness Training

Tools to identify and increase employee security awareness and knowledge

Ingram Micro Professional Service:
Ingram Micro Training

SW
Sophos Contacts:

Primary Contact: Thomas.Nasca@ingrammicro.com
Solutions Design & Services: x76102
Technical Account Manager: ✔️

Products:

Phish Threat

Contacts:

Gateway/Firewall

This category includes:
- Next Generation Firewall (NGFW)
- Unified Threat Management (UTM) Firewall
- Web Application Firewall (WAF)

Features typically include:
- Web Content Management
- Anti-Virus
- Intrusion Prevention/Detection
- Data Loss Prevention
- VPN
- Web Application Control
- Cloud Sandboxing
- E-mail Anti-Spam

Ingram Micro Professional Service:
Virus & Intrusion Protection Services

H/S
Checkpoint Contacts:

Primary Contact: Emily.Kelley@ingrammicro.com
Technical Account Manager: ✔️

Products:

Security Gateways and vSec

H/S
H/S
SW
Ivanti Contacts:

Primary Contact: Ivanti-Licensing@ingrammicro.com

H/S
Juniper Contacts:

Primary Contact: Juniper.Assist@ingrammicro.com
Solutions Design & Services: x77253
Technical Account Manager: ✔️

Products:

SRX, vSRX

HW
Meraki (Cisco) Contacts:

Primary Contact: PSTS x76695
Solutions Design & Services: x76695
Technical Account Manager: ✔️
Technology Consultant: ✔️
Business Transformation Engineer: ✔️

Products:

Meraki MX Firewalls

H/S
Palo Alto Networks Contacts:

Primary Contact: Chris.Kisselburgh@cloudharmonics.com

Products:

PA Series and VM Series Next Gen Firewalls

H/S
Sophos Contacts:

Primary Contact: Thomas.Nasca@ingrammicro.com
Solutions Design & Services: x76102
Technical Account Manager: ✔️

Products:

XG Firewalls

Contacts:

Gateway Advanced Persistent Threat Protection

Protection against an unauthorized person gaining access to a network undetected for a long period of time.

H/S
Checkpoint Contacts:

Primary Contact: Emily.Kelley@ingrammicro.com
Technical Account Manager: ✔️

Products:

Security Gateways and vSec

H/S
H/S
Fortinet Contacts:

Primary Contact: Tyler.Senay@ingrammicro.com
Solutions Design & Services: x76124
Technical Account Manager: ✔️

Ingram Micro IoT Marketplace

Products:

FortiGate

SW
Ivanti Contacts:

Primary Contact: Ivanti-Licensing@ingrammicro.com

H/S
Juniper Contacts:

Primary Contact: Juniper.Assist@ingrammicro.com
Solutions Design & Services: x77253
Technical Account Manager: ✔️

Products:

SRX, vSRX

SW
H/S
Palo Alto Networks Contacts:

Primary Contact: Chris.Kisselburgh@cloudharmonics.com

Products:

APT Prevention

H/S
Sophos Contacts:

Primary Contact: Thomas.Nasca@ingrammicro.com
Solutions Design & Services: x76102
Technical Account Manager: ✔️

Products:

XG Firewalls

Contacts:

Gateway Application Control

Monitor, control, and report on web applications

H/S
Checkpoint Contacts:

Primary Contact: Emily.Kelley@ingrammicro.com
Technical Account Manager: ✔️

Products:

Security Gateways and vSec

H/S
Forcepoint Contacts:

Primary Contact: Ashley.Widmer@ingrammicro.com
Technical Account Manager: ✔️

SW
Ivanti Contacts:

Primary Contact: Ivanti-Licensing@ingrammicro.com

H/S
Juniper Contacts:

Primary Contact: Juniper.Assist@ingrammicro.com
Solutions Design & Services: x77253
Technical Account Manager: ✔️

Products:

SRX, vSRX

HW
Meraki (Cisco) Contacts:

Primary Contact: PSTS x76695
Solutions Design & Services: x76695
Technical Account Manager: ✔️
Technology Consultant: ✔️
Business Transformation Engineer: ✔️

Products:

Meraki MX Firewall

H/S
Palo Alto Networks Contacts:

Primary Contact: Chris.Kisselburgh@cloudharmonics.com

Products:

PA Series and VM Series Next Gen Firewalls

H/S
Sophos Contacts:

Primary Contact: Thomas.Nasca@ingrammicro.com
Solutions Design & Services: x76102
Technical Account Manager: ✔️

Products:

XG Firewalls

Contacts:

Sandboxing or Advanced Threat Protection (ATP)

A Sandbox is used to detect new and unknown malware threats. A sandbox is a security mechanism used to execute untested or untrusted programs or code without risking harm to the host machine or operating system. Advanced Threat Protection (ATP) is a feature that incorporates multiple security technologies to provide protection against targeted attacks.

H/S
SW
Mimecast Contacts:

Primary Contact: Gayle.Colpoys@ingrammicro.com
Technical Account Manager: ✔️
Technology Consultant: ✔️

Products:

Attachment Protect

H/S
Palo Alto Networks Contacts:

Primary Contact: Chris.Kisselburgh@cloudharmonics.com

Products:

WildFire Malware Analysis

Contacts:

Network Intrusion Prevention System

Including Network Intrusion prevention System (NIPS) & Intrusion Detection System (IDS) signature/behavioral/protocol-based security.

H/S
Checkpoint Contacts:

Primary Contact: Emily.Kelley@ingrammicro.com
Technical Account Manager: ✔️

Products:

Security Gateways and vSec

H/S
SW
Ivanti Contacts:

Primary Contact: Ivanti-Licensing@ingrammicro.com

H/S
Juniper Contacts:

Primary Contact: Juniper.Assist@ingrammicro.com
Solutions Design & Services: x77253
Technical Account Manager: ✔️

Products:

SRX, vSRX

Kaspersky Contacts:

Primary Contact: Andrew.Gottler@ingrammicro.com

HW
Meraki (Cisco) Contacts:

Primary Contact: PSTS x76695
Solutions Design & Services: x76695
Technical Account Manager: ✔️
Technology Consultant: ✔️
Business Transformation Engineer: ✔️

Products:

Meraki MX Firewalls

H/S
Palo Alto Networks Contacts:

Primary Contact: Chris.Kisselburgh@cloudharmonics.com

Products:

NGIPS

H/S
Sophos Contacts:

Primary Contact: Thomas.Nasca@ingrammicro.com
Solutions Design & Services: x76102
Technical Account Manager: ✔️

Products:

XG Firewalls

Contacts:

Endpoint Protection

This category includes:
- Desktop
- Laptop
- Server

Features typically include:
- Anti-Malware
- Application Control
- Web filtering
- Host based IPS
- APT
- Firewall
- Data loss prevention

Mobile devices and security are covered by Mobility Management category above.

Ingram Micro Professional Service:
Endpoint Security Services

SW
Checkpoint Contacts:

Primary Contact: Emily.Kelley@ingrammicro.com
Technical Account Manager: ✔️

Products:

Endpoint Anti-Malware

SW
FireEye Contacts:

Primary Contact: Vanessa.Strade@ingrammicro.com
Technology Consultant: ✔️

Products:

Endpoint Security

SW
Forcepoint Contacts:

Primary Contact: Ashley.Widmer@ingrammicro.com
Technical Account Manager: ✔️

Products:

Multiple endpoint products

SW
Ivanti Contacts:

Primary Contact: Ivanti-Licensing@ingrammicro.com

Products:

Ivanti Security Controls Patch

SW
Palo Alto Networks Contacts:

Primary Contact: Chris.Kisselburgh@cloudharmonics.com

Products:

Traps Advanced Endpoint Protection

SW
SonicWALL Contacts:

Primary Contact: Stefan.Buczak@IngramMicro.com
Solutions Design & Services: x76102

Products:

Capture Client

Contacts:

Endpoint Application Control

Monitor, control, and report on device-based applications and/or web applications

SW
Checkpoint Contacts:

Primary Contact: Emily.Kelley@ingrammicro.com
Technical Account Manager: ✔️

Products:

Endpoint Policy Management

SW
FireEye Contacts:

Primary Contact: Vanessa.Strade@ingrammicro.com
Technology Consultant: ✔️

Products:

Endpoint Security

Forcepoint Contacts:

Primary Contact: Ashley.Widmer@ingrammicro.com
Technical Account Manager: ✔️

SW
SonicWALL Contacts:

Primary Contact: Stefan.Buczak@IngramMicro.com
Solutions Design & Services: x76102

Products:

Capture Client

Contacts:

Email Protection and/or Anti-Spam

Protection from a viruses, phishing attemps, and malictios links that come within an e-mail message

Features typically include:
- Anti-Virus
- Anti-SPAM
- Phishing
- URL Rewrites

SW
FireEye Contacts:

Primary Contact: Vanessa.Strade@ingrammicro.com
Technology Consultant: ✔️

Products:

Email Security

SW
Forcepoint Contacts:

Primary Contact: Ashley.Widmer@ingrammicro.com
Technical Account Manager: ✔️

Products:

Forcepoint Email Security

H/S
Juniper Contacts:

Primary Contact: Juniper.Assist@ingrammicro.com
Solutions Design & Services: x77253
Technical Account Manager: ✔️

Products:

SRX, vSRX

SW
Kaspersky Contacts:

Primary Contact: Andrew.Gottler@ingrammicro.com

Products:

Kaspersky Secure Mail Gateway

SW
Mimecast Contacts:

Primary Contact: Gayle.Colpoys@ingrammicro.com
Technical Account Manager: ✔️
Technology Consultant: ✔️

Products:

Secure Email Gateway

H/S
Sophos Contacts:

Primary Contact: Thomas.Nasca@ingrammicro.com
Solutions Design & Services: x76102
Technical Account Manager: ✔️

Products:

Sophos Email

Contacts:

Email Encryption

Email Encryption involves encrypting the content of email messages to protect potentially sensitive information from being read by anyone other than intended recipients.

SW
Forcepoint Contacts:

Primary Contact: Ashley.Widmer@ingrammicro.com
Technical Account Manager: ✔️

Products:

Forcepoint Email Encryption

SW
Mimecast Contacts:

Primary Contact: Gayle.Colpoys@ingrammicro.com
Technical Account Manager: ✔️
Technology Consultant: ✔️

Products:

Email Encryption

H/S
Sophos Contacts:

Primary Contact: Thomas.Nasca@ingrammicro.com
Solutions Design & Services: x76102
Technical Account Manager: ✔️

Products:

Sophos Email

Contacts:

Data Loss Prevention (DLP)

Data Loss Prevention (DLP) prevention to restrict end users sending sensitive or critical information outside the corporate network.

FireEye Contacts:

Primary Contact: Vanessa.Strade@ingrammicro.com
Technology Consultant: ✔️

SW
Forcepoint Contacts:

Primary Contact: Ashley.Widmer@ingrammicro.com
Technical Account Manager: ✔️

Products:

Forcepoint DLP

SW
Ivanti Contacts:

Primary Contact: Ivanti-Licensing@ingrammicro.com

SW
Kaspersky Contacts:

Primary Contact: Andrew.Gottler@ingrammicro.com

Products:

Kaspersky Security for Exchange

SW
Mimecast Contacts:

Primary Contact: Gayle.Colpoys@ingrammicro.com
Technical Account Manager: ✔️
Technology Consultant: ✔️

Products:

Content Control & DLP

Contacts:

Data Security and Protection

Monitor, scan, mask, and discover vulnerabilities in databses and storage

Contacts:

Fraud and Risk Management/Protection

Manage fraud and digital risk across multi-channel environments without impacting customers or transactions

Contacts:

Multi-Factor Authentication (MFA) and/or Single Sign-On (SSO)

MFA is access control in which a user is granted access only after successfully utilizing more than one authentication method. SSO is an authentication process that allows a user to access multiple applications with one set of login credentials.

Ingram Micro Professional Service:
Identity & Access Management Services

SW
Contacts:

Network Access Control (NAC)

Network management and security that enforces security policy, compliance and management of access control to a network.

H/S
Checkpoint Contacts:

Primary Contact: Emily.Kelley@ingrammicro.com
Technical Account Manager: ✔️

Products:

Security Gateways and vSec

FireEye Contacts:

Primary Contact: Vanessa.Strade@ingrammicro.com
Technology Consultant: ✔️

H/S
Forcepoint Contacts:

Primary Contact: Ashley.Widmer@ingrammicro.com
Technical Account Manager: ✔️

Products:

Forcepoint NGFW

SW
Ivanti Contacts:

Primary Contact: Ivanti-Licensing@ingrammicro.com

Contacts:

Disk Encryption

Full Disk Encryption protects information by converting it into unreadable code that cannot be deciphered easily by unauthorized people.

Juniper Contacts:

Primary Contact: Juniper.Assist@ingrammicro.com
Solutions Design & Services: x77253
Technical Account Manager: ✔️

Contacts:

File/Folder Encryption

File/Folder Encryption or Filesystem-level encryption, is a form of disk encryption where individual files or directories are encrypted by the file system itself.

Contacts:

Virtual Private Network (VPN)

Virtual Private Network (VPN) Includes:
- IPSEC (client based)
- SSL (clientless)

H/S
Checkpoint Contacts:

Primary Contact: Emily.Kelley@ingrammicro.com
Technical Account Manager: ✔️

Products:

Security Gateways and vSec

H/S
Juniper Contacts:

Primary Contact: Juniper.Assist@ingrammicro.com
Solutions Design & Services: x77253
Technical Account Manager: ✔️

Products:

SRX, vSRX

HW
Meraki (Cisco) Contacts:

Primary Contact: PSTS x76695
Solutions Design & Services: x76695
Technical Account Manager: ✔️
Technology Consultant: ✔️
Business Transformation Engineer: ✔️

Products:

Meraki MX Firewall

H/S
Palo Alto Networks Contacts:

Primary Contact: Chris.Kisselburgh@cloudharmonics.com

Products:

NGFW VPN

H/S
Sophos Contacts:

Primary Contact: Thomas.Nasca@ingrammicro.com
Solutions Design & Services: x76102
Technical Account Manager: ✔️

Products:

XG Firewalls

Contacts:

Cloud Access Security Broker (CASB)

CASB is a solution that provides security for cloud applications and infrastructure

Ingram Micro Professional Service:
Cloud Security Services

⚙️
Checkpoint Contacts:

Primary Contact: Emily.Kelley@ingrammicro.com
Technical Account Manager: ✔️

Products:

CloudGuard SaaS

⚙️
Forcepoint Contacts:

Primary Contact: Ashley.Widmer@ingrammicro.com
Technical Account Manager: ✔️

Products:

Forcepoint CASB

⚙️
Palo Alto Networks Contacts:

Primary Contact: Chris.Kisselburgh@cloudharmonics.com

Products:

Aperture

⚙️
SonicWALL Contacts:

Primary Contact: Stefan.Buczak@IngramMicro.com
Solutions Design & Services: x76102

Products:

Cloud App Security

⚙️
Contacts:

DNS and DDOS Protection and/or DHCP & IP Management (DDI)

DNS protection filters device queries to the internet, or from the internet, and blocks known bad websites or DDOS attempts from reaching the device.

A denial-of-service attack (DDOS) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.

A DDI solution provides a centralized platform to manage DNS and DHCP services and has an IP Address Management (IPAM) component.

SW
Mimecast Contacts:

Primary Contact: Gayle.Colpoys@ingrammicro.com
Technical Account Manager: ✔️
Technology Consultant: ✔️

Products:

Mimecast Web Security

Contacts:

Software-Defined WAN (SD-WAN)

SD-WAN is a virtual WAN architecture that allows enterprises to leverage any combination of transport services – including MPLS, LTE and broadband internet service.

Ingram Micro Professional Service:
SD-WAN Network Optimization & Services

H/S
Juniper Contacts:

Primary Contact: Juniper.Assist@ingrammicro.com
Solutions Design & Services: x77253
Technical Account Manager: ✔️

Products:

SD-WAN

Contacts:

Secure Wireless

Certain Access Points have the ability to perform security checks on the accesspoint independent of a firewall or other security device.

Features typically include:
- Wireless Intrusion Prevention
- Web Content Filtering
- AV Scanning
- Guest/Device Tracking

Ingram Micro Professional Service:
Wireless Network Assessment

HW
Juniper Contacts:

Primary Contact: Juniper.Assist@ingrammicro.com
Solutions Design & Services: x77253
Technical Account Manager: ✔️

Products:

Mist Wireless

HW
HW
SonicWALL Contacts:

Primary Contact: Stefan.Buczak@IngramMicro.com
Solutions Design & Services: x76102

Products:

Sophos Wireless

HW
Contacts:

Security information and event management (SIEM) and/or Log Management

SIEM software products and services combine security information management (SIM) and security event management (SEM). They provide real-time analysis of security alerts generated by network hardware and applications.

SW
Checkpoint Contacts:

Primary Contact: Emily.Kelley@ingrammicro.com
Technical Account Manager: ✔️

Products:

Security Management

H/S
Juniper Contacts:

Primary Contact: Juniper.Assist@ingrammicro.com
Solutions Design & Services: x77253
Technical Account Manager: ✔️

Products:

JSA, vJSA

Contacts:

Endpoint Detection and Response (EDR)

EDR solutions record and store endpoint-system-level behaviors, use various data analytics techniques to detect suspicious system behavior, provide contextual information, block malicious activity, and provide remediation suggestions to restore affected systems.

SW
FireEye Contacts:

Primary Contact: Vanessa.Strade@ingrammicro.com
Technology Consultant: ✔️

Products:

Endpoint Security

SW
Palo Alto Networks Contacts:

Primary Contact: Chris.Kisselburgh@cloudharmonics.com

Products:

Traps Advanced Endpoint Protection

Contacts:

Security Operations Center as a Service (SOCaaS) and/or Managed Detection and Responce (MDR)

SOCaaS is a subscription or software-based service that manages and monitors your logs, devices, clouds, network and assets for internal IT teams.

MDR is an advanced managed security service that provides threat intelligence, threat hunting, security monitoring, incident analysis, and incident response. This is unlike traditional MSSPs who only provide alerts from security monitoring.

Ingram Micro Professional Service:
Security Operating Center (SOC) Services

Contacts:

User and Entity Behavior Analytics (UEBA)

UEBA solutions use analytics to build the standard profiles and behaviors of users and entities (hosts, applications, network traffic and data repositories) across time and peer group horizons. Activity that is anomalous to these standard baselines is presented as suspicious, and packaged analytics applied on these anomalies can help discover threats and potential incidents. The most common use cases sought by enterprises are detecting malicious insiders and external attackers infiltrating their organizations (compromised insiders)

SW
Forcepoint Contacts:

Primary Contact: Ashley.Widmer@ingrammicro.com
Technical Account Manager: ✔️

Products:

UEBA Behavioral Analytics

SW
Palo Alto Networks Contacts:

Primary Contact: Chris.Kisselburgh@cloudharmonics.com

Products:

Cortex XDR

Contacts:

Network Vulnerability Assessment and/or Penetration Test

A network vulnerability assessment is the process of reviewing and analyzing a computer network for possible security vulnerabilities and loopholes. It is used by network administrators to evaluate the security architecture and defense of a network against possible vulnerabilities and threats.

Ingram Micro Professional Service:
Penetration Test Assessment

⚙️
SW
FireEye Contacts:

Primary Contact: Vanessa.Strade@ingrammicro.com
Technology Consultant: ✔️

Products:

Penetration Testing

SW
Forcepoint Contacts:

Primary Contact: Ashley.Widmer@ingrammicro.com
Technical Account Manager: ✔️

Products:

Evader by Forcepoint

Contacts:

⭐Dark Web Monitoring

Dark Web Monitoring, also known as cyber monitoring, is an identity theft prevention product that enables you to monitor your identity information on the dark web, and receive notifications if your information is found online.

Contacts:

⭐Orchestration, Automation and Response (SOAR) and/or SOAR Components

SOAR is a method of integrating and streamlining workflows across disparate tools in order to improve both security analyst efficiency and threat detection and response. Security automation is used to execute security operations tasks without human intervention.

SW
FireEye Contacts:

Primary Contact: Vanessa.Strade@ingrammicro.com
Technology Consultant: ✔️

Products:

Security Orchestrator

Contacts:

Incident Response

Incident Response is an organized approach to addressing and managing the aftermath of a security breach or attack. The goal is to handle the situation in a way that limits damage and reduces recovery time and costs.

SW
Forcepoint Contacts:

Primary Contact: Ashley.Widmer@ingrammicro.com
Technical Account Manager: ✔️

Products:

Forcepoint DLP

H/S
Juniper Contacts:

Primary Contact: Juniper.Assist@ingrammicro.com
Solutions Design & Services: x77253
Technical Account Manager: ✔️

Products:

JSA, vJSA

⚙️
Kaspersky Contacts:

Primary Contact: Andrew.Gottler@ingrammicro.com

Products:

Kaspersky Cyber Security Services

SonicWALL Contacts:

Primary Contact: Stefan.Buczak@IngramMicro.com
Solutions Design & Services: x76102

Sophos Contacts:

Primary Contact: Thomas.Nasca@ingrammicro.com
Solutions Design & Services: x76102
Technical Account Manager: ✔️

Contacts:

Forensic Analysis

It examines structured data with regard to incidents. The aim is to discover and analyze patterns of fraudulent activities.

Checkpoint Contacts:

Primary Contact: Emily.Kelley@ingrammicro.com
Technical Account Manager: ✔️

SW
Forcepoint Contacts:

Primary Contact: Ashley.Widmer@ingrammicro.com
Technical Account Manager: ✔️

Products:

Forcepoint UEBA

⚙️
Kaspersky Contacts:

Primary Contact: Andrew.Gottler@ingrammicro.com

Products:

Kaspersky Cyber Security Services

Sophos Contacts:

Primary Contact: Thomas.Nasca@ingrammicro.com
Solutions Design & Services: x76102
Technical Account Manager: ✔️

Contacts:

Patch Management

Managing patches or upgrades for software applications and technologies.

SW
Ivanti Contacts:

Primary Contact: Ivanti-Licensing@ingrammicro.com

Products:

Security Controls Patch

Juniper Contacts:

Primary Contact: Juniper.Assist@ingrammicro.com
Solutions Design & Services: x77253
Technical Account Manager: ✔️

Contacts:

Backup and Disaster Recovery

The process of backing up data in case of a loss. This is a more advanced form of system copies that include processing capabilities.

Ingram Micro Professional Service:
Backup and Disaster Recovery Services

SW
Contacts:

Data Archiving

Data Archiving is the process of moving data that is no longer actively used to a separate storage device for long-term retention.

Contacts:

Email Archiving

Email Archiving is the process of archiving cloud or on-premise email soltuions for recovery due to outtage, legal hold, and/or malicious attacks.

Contacts:

High Availability and/or Continuity

This refers to solutions dedicated to high availability and business continuity.

Some features may include:
- Replication (Periodic, Multi-Stream, etc.)
- Compression
- Offline synchronization
- Email Continuity

Checkpoint Contacts:

Primary Contact: Emily.Kelley@ingrammicro.com
Technical Account Manager: ✔️

FireEye Contacts:

Primary Contact: Vanessa.Strade@ingrammicro.com
Technology Consultant: ✔️

H/S
Forcepoint Contacts:

Primary Contact: Ashley.Widmer@ingrammicro.com
Technical Account Manager: ✔️

Products:

Multiple

SW
Mimecast Contacts:

Primary Contact: Gayle.Colpoys@ingrammicro.com
Technical Account Manager: ✔️
Technology Consultant: ✔️

Products:

Email Continuity

H/S
SonicWALL Contacts:

Primary Contact: Stefan.Buczak@IngramMicro.com
Solutions Design & Services: x76102

Products:

Email Continuity

H/S
Sophos Contacts:

Primary Contact: Thomas.Nasca@ingrammicro.com
Solutions Design & Services: x76102
Technical Account Manager: ✔️

Products:

Email Security

Contacts:

⭐Out-of-Band Management (OOBM)

OOBM provides access and control of IT assets outside of the production network

Contacts:

⭐ IoT & Other
Network Switching

Includes Netowkring Switches, Industial Switches, and other core networking equiptment

Contacts:

IoT, Sensors, Beacons, and Analytics

Includes IoT devices, location beacons, IoT type sensors, and various analytics

Contacts:

Industrial Control Systems Security

Industrial control systems (ICS) are often a sitting target for cybercriminals. The majority of these systems monitor complex industrial processes and critical infrastructures that deliver power, water, transport, manufacturing and other essential services.

H/S
Checkpoint Contacts:

Primary Contact: Emily.Kelley@ingrammicro.com
Technical Account Manager: ✔️

Products:

Checkpoint ICS Solutions

H/S
Forcepoint Contacts:

Primary Contact: Ashley.Widmer@ingrammicro.com
Technical Account Manager: ✔️

Products:

Next Generation Firewall

Contacts:

Physical Security Cameras

Includes Physical Security Camreas and/or Network Recorders

Contacts:

Unified Communications and Collaboration (UCC)

UCC includes Phones, systems, and other UCC Realted Items

Contacts:

Info
Reseller Partner Requirement

Requirement needed to resell products

✔️
FireEye Contacts:

Primary Contact: Vanessa.Strade@ingrammicro.com
Technology Consultant: ✔️

✔️
✔️
✔️
SonicWALL Contacts:

Primary Contact: Stefan.Buczak@IngramMicro.com
Solutions Design & Services: x76102

Products:

SecureFirst Partner Program

Contacts:

Managed Service Provider Program (MSSP)

Service Provider offering available

Checkpoint Contacts:

Primary Contact: Emily.Kelley@ingrammicro.com
Technical Account Manager: ✔️

FireEye Contacts:

Primary Contact: Vanessa.Strade@ingrammicro.com
Technology Consultant: ✔️

✔️
Forcepoint Contacts:

Primary Contact: Ashley.Widmer@ingrammicro.com
Technical Account Manager: ✔️

Juniper Contacts:

Primary Contact: Juniper.Assist@ingrammicro.com
Solutions Design & Services: x77253
Technical Account Manager: ✔️

✔️
Kaspersky Contacts:

Primary Contact: Andrew.Gottler@ingrammicro.com

Products:

MANAGED SERVICE PROVIDER PARTNERSHIP

✔️
✔️
✔️
✔️
Contacts:

Ingram Micro Exclusive

Exclusively sold through Ingram Micro

Checkpoint Contacts:

Primary Contact: Emily.Kelley@ingrammicro.com
Technical Account Manager: ✔️

✔️
Mimecast Contacts:

Primary Contact: Gayle.Colpoys@ingrammicro.com
Technical Account Manager: ✔️
Technology Consultant: ✔️

Products:

Ingram Mirco Exclusive

Contacts:

Business Transformation Center
Ingram Micro Cloud Marketplace
Ingram Micro IoT Marketplace
Ingram Micro Solutions Design & Services
Ingram Micro Security Practice Builder
Physical Security Line Card
~ Export as PDF ~
~ Go Stealth~
All Validation is Subject to Change
Tool Maintained by Thomas Mroz
Property of Ingram Micro inc.
Security Line Card