AI Solutions
AIOps
AIOps leverages AI and machine learning to enhance IT operations, including monitoring, automation, and service management. It aims to improve the efficiency, performance, and reliability of IT services.
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
✔
Juniper Networks
Contact(s):Juniper Networks Contacts Overview
Solution(s):
✔
Microsoft
Contact(s):Microsoft Contacts Overview
Solution(s):
✔
Palo Alto Networks
Contact(s):paloaltosolutions@ingrammicro.com
Solution(s):
Strata Cloud Manager powered by PrecisionAI
✔
UiPath
Contact(s):UiPath Contacts Overview
Solution(s):
UiPath Business Automation Platform
Code Assist
Code Assist refers to an AI-powered tool that assists developers by generating code and executing actions within their editor. It provides a natural language interface, allowing developers to interact with it like they would with a human, and it can implement entire features under a developer’s supervision.
✔
AWS
Contact(s):AWS Contacts Overview
Solution(s):
✔
F5
Contact(s):F5 Contacts Overview
Solution(s):
✔
Contact(s):Google Contacts Overview
Solution(s):
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
✔
Microsoft
Contact(s):Microsoft Contacts Overview
Solution(s):
✔
Nutanix
Contact(s):Nutanix Contacts Overview
Solution(s):
AI-ready Infrastructure Solutions
Application
AI/Analytics
One great feature of AI is it allows your organization to be Better, Smarter and Faster than your competition. We use predictive logic to sort through large amounts of data to identify hidden intentions
Why customers are purchasing from a competitor and how you can combat this behavior
- Making compelling cross and up sell recommendation
- Performing complex risk assessments without human intervention
- Determining is a transaction is fraudulent or a money laundering activity
✔
Aisera
Contact(s):Aisera Contacts Overview
Solution(s):
AI Service Desk for IT, HR & Business Services
✔
AMD
Solution(s):
✔
AWS
Solution(s):
✔
Axis Communications
Solution(s):
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
✔
Citrix
Contact(s):CitrixMD@ingrammicro.com
Solution(s):
Citrix DaaS (desktop as a service)
✔
Google Cloud Platform
Solution(s):
✔
HPE
Contact(s):HPE Contacts Overview
Solution(s):
HPE Aerospike Real-time Database Platform
HPE Machine Learning Development Environment
HPE Inference Solutions on ProLiant
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
Planning Analytics (Cognos Enterprise Planning, TM1)
✔
Juniper Networks
Solution(s):
Cloud-Native Contrail Networking
✔
Lenovo
Contact(s):Lenovo Contacts Overview
Solution(s):
Lenovo AI-Ready Infrastructure
✔
Lexmark
Contact(s):Imaging@ingrammicro.com
Solution(s):
Optra Network Monitoring Skill run on Optra Edge Devices- In partnership with Domotz
Optra Vehicle Monitoring Plus Skill run on Optra Edge Device
Optra Person Heatmapping Skill run on Optra Edge Devices
Optra Person Occupancy Plus Skill run on Optra Edge Devices
Optra Foot Traffic Skill run on Optra Edge Devices
✔
Microsoft Azure
Solution(s):
Conversational language understanding
✔
Nutanix
Solution(s):
✔
QNAP
Contact(s):QNAP Contacts Overview
Solution(s):
✔
UiPath
Contact(s):uipath-sd@ingrammicro.com
Solution(s):
Application Development & Modernization
Application development is the process of designing, building, and implementing software applications.
Application modernization is the practice of updating older software for newer computing approaches;  including newer languages, frameworks and infrastructure platforms.
✔
AWS
Solution(s):
Amazon Elastic Container Registry (ECR)
AWS Database Migration Service (DMS)
AWS Application Migration Service
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
✔
Dell
Contact(s):Dell Contacts Overview
Solution(s):
Cloud Native APPs and DevOps Services
✔
F5
Solution(s):
✔
Google Cloud Platform
Solution(s):
✔
HPE
Contact(s):HPE Contacts Overview
Solution(s):
HPE Aerospike Real-time Database Platform
HPE Machine Learning Development Environment
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
Cloud Pak for Business Automation
Red Hat OpenShift On IBM Cloud (ROKS)
✔
Juniper Networks
Solution(s):
Cloud-Native Contrail Networking
✔
Lenovo
Contact(s):Lenovo Contacts Overview
Solution(s):
Lenovo Solutions Services & Tools
✔
Microsoft Azure
Solution(s):
Azure Kubernetes Service (AKS)
Conversational language understanding
✔
Red Hat
Solution(s):
✔
SUSE
Solution(s):
✔
UiPath
Contact(s):uipath-sd@ingrammicro.com
Solution(s):
Automation
Applications that provide automation of routine processes and workflows —scheduling, monitoring, maintenance, application delivery, etc., that are managed and executed without human administration for increased agility and operational efficiency.
✔
Aisera
Contact(s):Aisera Contacts Overview
Solution(s):
AI Service Desk for IT, HR & Business Services
✔
AWS
Solution(s):
Amazon Elastic Container Registry (ECR)
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
Cisco Intersight Workload Optimizer
✔
HPE
Contact(s):HPE Contacts Overview
Solution(s):
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
✔
Juniper Networks
Solution(s):
Cloud-Native Contrail Networking
✔
Lenovo
Contact(s):Lenovo Contacts Overview
Solution(s):
Lenovo Open Cloud Automation (LOC-A)
✔
Microsoft Azure
Solution(s):
Conversational language understanding
✔
Nutanix
Solution(s):
✔
Red Hat
Solution(s):
✔
UiPath
Contact(s):uipath-sd@ingrammicro.com
Solution(s):
✔
Veeam
Contact(s):veeammd@ingrammicro.com
Ingram Micro Cloud Marketplace
Business Transformation Center Partner
Solution(s):
Veeam Data Platform – VeeamONE
Data Backup and Recovery
Data backup and recovery refers to the processes and practices involved in creating copies of data to protect it from loss or damage, and the subsequent retrieval and restoration of that data when needed. It is a critical aspect of data management and ensures the availability and integrity of information in the event of accidental deletion, hardware failure, system crashes, natural disasters, cyberattacks, or other unforeseen events.
✔
AWS
Solution(s):
✔
HPE
Contact(s):HPE Contacts Overview
Solution(s):
GreenLake for Backup and Recovery
✔
HYCU
Solution(s):
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
Data Management
Data management is the practice of collecting, keeping, and using data securely, efficiently, and cost-effectively. The criticality of Data management continues to grow as it is continued to be seen as a corporate asset to be used to make business decisions.
✔
AWS
Solution(s):
✔
Blancco
Contact(s):blancco-licensing@ingrammicro.com
Solution(s):
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
✔
Citrix
Contact(s):CitrixMD@ingrammicro.com
Solution(s):
✔
Dell
Contact(s):Dell Contacts Overview
Solution(s):
✔
HPE
Contact(s):HPE Contacts Overview
Solution(s):
HPE Machine Learning Development Environment
HPE Inference Solutions on ProLiant
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
✔
Lenovo
Contact(s):Lenovo Contacts Overview
Solution(s):
✔
Microsoft Azure
Solution(s):
✔
Nutanix
Solution(s):
✔
Quantum
Solution(s):
✔
Veeam
Contact(s):veeammd@ingrammicro.com
Ingram Micro Cloud Marketplace
Business Transformation Center Partner
Solution(s):
Veeam Backup for Microsoft 365
Veeam Data Platform – VeeamONE
Veeam Data Platform – Backup and Replication
Database
A Database is a collection of structured information that is stored in a computer system. It is set up for easy access, management and updating.
✔
AWS
Solution(s):
AWS Database Migration Service (DMS)
Amazon Relational Database Service (RDS)
Amazon Quantum Ledger Database (QLDB)
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
✔
Citrix
Contact(s):CitrixMD@ingrammicro.com
Solution(s):
✔
Google Cloud Platform
Solution(s):
✔
HPE
Contact(s):HPE Contacts Overview
Solution(s):
HPE Aerospike Real-time Database Platform
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
✔
Lenovo
Contact(s):Lenovo Contacts Overview
Solution(s):
✔
Microsoft Azure
Solution(s):
Azure Managed Instance for Apache Cassandra
Azure Database Migration Service
✔
Nutanix
Solution(s):
Nutanix Database Service (NDS)
Management & Automation Services
IT management & automation is the process of reducing manual intervention by creating software and systems to replace repeatable process.
✔
AWS
Solution(s):
AWS Application Migration Service
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
Cisco Intersight Workload Optimizer
✔
Dell
Contact(s):Dell Contacts Overview
Solution(s):
✔
F5
Solution(s):
✔
HPE
Contact(s):HPE Contacts Overview
Solution(s):
GreenLake Common Cloud Console
Integrated Lights Out (iLO) Software
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
✔
Juniper Networks
Solution(s):
Cloud-Native Contrail Networking
✔
Lenovo
Contact(s):Lenovo Contacts Overview
Solution(s):
✔
Microsoft Azure
Solution(s):
Azure Active Directory Domain Services (Azure AD DS)
✔
Nutanix
Solution(s):
✔
Red Hat
Solution(s):
✔
UiPath
Contact(s):uipath-sd@ingrammicro.com
Solution(s):
✔
VMware
Contact(s):vmware-licensing@ingrammicro.com
Solution(s):
Middleware
Middleware enables developers to build applications without the need to create a custom integration when needing to connect to a service/microservice, resources, data, or devices.
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
✔
HPE
Contact(s):HPE Contacts Overview
Solution(s):
HPE Aerospike Real-time Database Platform
HPE Machine Learning Development Environment
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
✔
UiPath
Contact(s):uipath-sd@ingrammicro.com
Solution(s):
Compute
Containers
Containers are a form of operating system virtualization in which a single container can run anything from a microservice to a robust application. Unlike server virtualization, containers do not contain operating system images.
✔
AWS
Solution(s):
Amazon Elastic Container Registry (ECR)
Amazon Elastic Kubernetes Services (EKS)
Amazon Elastic Container Service (ECS)
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
Cisco UCS S-Series Storage Servers
Cisco UCS C–Series Rack Servers
Cisco UCS B-Series Blade Server
Cisco UCS X-Series Modular System
✔
Dell
Contact(s):Dell Contacts Overview
Solution(s):
✔
Google Cloud Platform
Solution(s):
✔
HPE
Contact(s):HPE Contacts Overview
Solution(s):
HPE Inference Solutions on ProLiant
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
Red Hat OpenShift On IBM Cloud (ROKS)
✔
Juniper Networks
Solution(s):
Cloud-Native Contrail Networking
✔
Lenovo
Contact(s):Lenovo Contacts Overview
Solution(s):
✔
Lexmark
Contact(s):Imaging@ingrammicro.com
Solution(s):
Optra Network Monitoring Skill run on Optra Edge Devices- In partnership with Domotz
Optra Vehicle Monitoring Plus Skill run on Optra Edge Device
✔
Microsoft Azure
Solution(s):
Azure Kubernetes Service (AKS)
✔
Nutanix
Solution(s):
✔
Red Hat
Solution(s):
✔
SUSE
Solution(s):
✔
VMware
Contact(s):vmware-licensing@ingrammicro.com
Solution(s):
Converged Infrastructure (CI)
Converged Infrastructure (CI)Â is a convergence of compute, storage, and networking infrastructure in the data center by deploying the data center infrastructure as a complete system; Â simplifying and accelerating the deployment of resources.
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
Cisco UCS C–Series Rack Servers
Cisco UCS B-Series Blade Server
Cisco UCS X-Series Modular System
✔
Dell
Contact(s):Dell Contacts Overview
Solution(s):
✔
HPE
Contact(s):HPE Contacts Overview
Solution(s):
HPE ProLiant for Microsoft Azure Stack Hub
✔
Intel
Solution(s):
Intel® Xeon® Scalable Processors
✔
Lenovo
Contact(s):Lenovo Contacts Overview
Solution(s):
Lenovo ThinkSystem Flex System
✔
Nutanix
Solution(s):
Data Backup and Recovery
Backup Software
✔
AWS
Solution(s):
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
✔
Citrix
Contact(s):CitrixMD@ingrammicro.com
Solution(s):
✔
HPE
Contact(s):HPE Contacts Overview
Solution(s):
✔
Lenovo
Contact(s):Lenovo Contacts Overview
Solution(s):
Edge Computing
Edge Computing is the computational processing of sensor data away from the centralized nodes and close to the logical edge of the network, toward individual sources of data. It may be referred to as a distributed IT network architecture that enables mobile computing for data produced locally.
✔
AMD
Solution(s):
✔
AWS
Solution(s):
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
Cisco UCS S-Series Storage Servers
Cisco UCS C–Series Rack Servers
Cisco UCS B-Series Blade Server
Cisco UCS X-Series Modular System
✔
Dell
Contact(s):Dell Contacts Overview
Solution(s):
✔
HPE
Contact(s):HPE Contacts Overview
Solution(s):
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
Cloud Pak for Network Automation
✔
Igel
Solution(s):
✔
Intel
Solution(s):
Intel® Xeon® Scalable Processors
✔
Juniper Networks
Solution(s):
Cloud-Native Contrail Networking
✔
Lenovo
Contact(s):Lenovo Contacts Overview
Solution(s):
✔
Lexmark
Contact(s):Imaging@ingrammicro.com
Solution(s):
Optra Network Monitoring Skill run on Optra Edge Devices- In partnership with Domotz
Optra Vehicle Monitoring Plus Skill run on Optra Edge Device
Optra Person Heatmapping Skill run on Optra Edge Devices
Optra Person Occupancy Plus Skill run on Optra Edge Devices
Optra Foot Traffic Skill run on Optra Edge Devices
✔
Nutanix
Solution(s):
✔
Red Hat
Solution(s):
✔
SUSE
Solution(s):
Hybrid Cloud
Hybrid Cloud refers to a mixed computing, storage, and services environment made up of on-premises infrastructure, private cloud services, and a public cloud.
✔
AWS
Solution(s):
Amazon Elastic Container Registry (ECR)
Amazon Elastic Kubernetes Services (EKS)
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
Cisco UCS S-Series Storage Servers
Cisco UCS C–Series Rack Servers
Cisco UCS B-Series Blade Server
Cisco UCS X-Series Modular System
✔
Citrix
Contact(s):CitrixMD@ingrammicro.com
Solution(s):
Citrix DaaS (desktop as a service)
✔
Dell
Contact(s):Dell Contacts Overview
Solution(s):
✔
F5
Solution(s):
✔
Google Cloud Platform
Solution(s):
Google Cloud Hybrid Connectivity
✔
HPE
Contact(s):HPE Contacts Overview
Solution(s):
HPE ProLiant for Microsoft Azure Stack Hub
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
✔
Intel
Solution(s):
Intel® Xeon® Scalable Processors
✔
Juniper Networks
Solution(s):
Cloud-Native Contrail Networking
✔
Lenovo
Contact(s):Lenovo Contacts Overview
Solution(s):
✔
Lexmark
Contact(s):Imaging@ingrammicro.com
Solution(s):
Optra Network Monitoring Skill run on Optra Edge Devices- In partnership with Domotz
Optra Vehicle Monitoring Plus Skill run on Optra Edge Device
✔
Microsoft Azure
Solution(s):
Azure Kubernetes Service (AKS)
✔
Nutanix
Solution(s):
Nutanix Cloud Infrastructure (NCI)
✔
Red Hat
Solution(s):
✔
SUSE
Solution(s):
Hyperconverged (HCI)
HCI, also known as Hyperconverged Infrastructure, is the process of combining servers and storage with intelligent software to dynamically allocate resources to applications running in VMs or containers.
This process leverages virtualization which allows compute, storage and networking resources to be treated as pooled resources.
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
Cisco UCS S-Series Storage Servers
Cisco UCS C–Series Rack Servers
Cisco UCS B-Series Blade Server
Cisco UCS X-Series Modular System
✔
Citrix
Contact(s):CitrixMD@ingrammicro.com
Solution(s):
Citrix DaaS (desktop as a service)
✔
Dell
Contact(s):Dell Contacts Overview
Solution(s):
✔
HPE
Contact(s):HPE Contacts Overview
Solution(s):
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
✔
Intel
Solution(s):
Intel® Xeon® Scalable Processors
✔
Lenovo
Contact(s):Lenovo Contacts Overview
Solution(s):
✔
Nutanix
Solution(s):
Nutanix Cloud Infrastructure (NCI)
✔
Quantum
Solution(s):
Quantum Unified Surveillance Platform
Management & Automation Software
IT management & automation is the process of reducing manual intervention by creating software and systems to replace repeatable process.
✔
AWS
Solution(s):
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
Cisco UCS S-Series Storage Servers
Cisco UCS C–Series Rack Servers
Cisco UCS B-Series Blade Server
Cisco UCS X-Series Modular System
✔
Citrix
Contact(s):CitrixMD@ingrammicro.com
Solution(s):
Citrix DaaS (desktop as a service)
✔
Dell
Contact(s):Dell Contacts Overview
Solution(s):
✔
Google Cloud Platform
Solution(s):
✔
HPE
Contact(s):HPE Contacts Overview
Solution(s):
Integrated Lights Out (iLO) Software
HPE ProLiant for Microsoft Azure Stack Hub
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
✔
Intel
Solution(s):
Intel® Xeon® Scalable Processors
✔
Ivanti
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Juniper Networks
Solution(s):
Security Director and Security Director Cloud
Cloud-Native Contrail Networking
✔
Lenovo
Contact(s):Lenovo Contacts Overview
Solution(s):
Lenovo Open Cloud Automation (LOC-A)
✔
Lexmark
Contact(s):Imaging@ingrammicro.com
Solution(s):
Optra Network Monitoring Skill run on Optra Edge Devices- In partnership with Domotz
✔
Microsoft Azure
Solution(s):
Azure Active Directory Domain Services (Azure AD DS)
✔
Nutanix
Solution(s):
✔
Red Hat
Solution(s):
✔
UiPath
Contact(s):uipath-sd@ingrammicro.com
Solution(s):
✔
Veeam
Contact(s):veeammd@ingrammicro.com
Ingram Micro Cloud Marketplace
Business Transformation Center Partner
Solution(s):
Veeam Data Platform – VeeamONE
✔
VMware
Contact(s):vmware-licensing@ingrammicro.com
Solution(s):
Servers
Windows Server is a line of operating systems from Microsoft specifically created for use on a server.
Linux Server is a Linux operating system designed to handle more intense storage and operational needs of larger organizations. It is open-source software and provides a high level of stability, security and flexibility.
✔
AMD
Solution(s):
✔
AWS
Solution(s):
Amazon Elastic Cloud Compute (EC2)
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
Cisco UCS S-Series Storage Servers
Cisco UCS C–Series Rack Servers
Cisco UCS B-Series Blade Server
Cisco UCS X-Series Modular System
✔
Dell
Contact(s):Dell Contacts Overview
Solution(s):
✔
ENET
Solution(s):
✔
Google Cloud Platform
Solution(s):
✔
HPE
Contact(s):HPE Contacts Overview
Solution(s):
HPE ProLiant for Microsoft Azure Stack Hub
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
IBM Cloud Power Virtual Server (PowerVS)
IBM Cloud Virtual Server for Classic Infrastructure
IBM Cloud Virtual Server for VPC (Virtual Private Cloud) Infrastructure
✔
Intel
Solution(s):
Intel® Xeon® Scalable Processors
✔
Lenovo
Contact(s):Lenovo Contacts Overview
Solution(s):
✔
Microsoft Azure
Solution(s):
✔
Nutanix
Solution(s):
Nutanix Cloud Infrastructure (NCI)
✔
Red Hat
Solution(s):
✔
SUSE
Solution(s):
SUSE Linux Enterprise Server (SLES)
UNIX
UNIXÂ is an oprerating system that is a multi-user, multi-tasking system for servers, desktops and laptops. UNIX can be used for a multitude of different reasons such as:
– Datacenter Application Support
– Cloud support
– Enhanced Cloud Security
– Interoperability and  Ease of Use
A UNIX operating system is made up of three parts:
- Kernel
2. Shell
3. Programs
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
Cisco UCS S-Series Storage Servers
Cisco UCS C–Series Rack Servers
Cisco UCS B-Series Blade Server
Cisco UCS X-Series Modular System
✔
HPE
Contact(s):HPE Contacts Overview
Solution(s):
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
IBM Cloud Power Virtual Server (PowerVS)
✔
Microsoft Azure
Solution(s):
Virtualization
Server Virtualization is the process of dividing a physical server into multiple unique and isolated virtual servers by means of a software application. Each virtual server can run its own operating systems independently.
Key Benefits include:
– Higher server scalability
– Lower operating costs
– Eliminate server complexity
– Increased performance
– Faster deployments
✔
AWS
Solution(s):
Amazon Elastic Cloud Compute (EC2)
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
Cisco UCS S-Series Storage Servers
Cisco UCS C–Series Rack Servers
Cisco UCS B-Series Blade Server
Cisco UCS X-Series Modular System
✔
Citrix
Contact(s):CitrixMD@ingrammicro.com
Solution(s):
Citrix DaaS (desktop as a service)
Citrix Virtual Apps and Desktops On Prem
✔
Dell
Contact(s):Dell Contacts Overview
Solution(s):
✔
Google Cloud Platform
Solution(s):
✔
HPE
Contact(s):HPE Contacts Overview
Solution(s):
HPE ProLiant for Microsoft Azure Stack Hub
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
✔
Intel
Solution(s):
Intel® Xeon® Scalable Processors
✔
Lenovo
Contact(s):Lenovo Contacts Overview
Solution(s):
✔
Microsoft Azure
Solution(s):
Azure Kubernetes Service (AKS)
✔
Nutanix
Solution(s):
Nutanix Cloud Infrastructure (NCI)
✔
Red Hat
Solution(s):
✔
VMware
Contact(s):vmware-licensing@ingrammicro.com
Solution(s):
Delivery & Services
Application Performance Management (APM)
Application Performance Management (APM)Â is the monitoring and management of performance and availability of software applications.
✔
Allied Telesis
Solution(s):
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
✔
Citrix
Contact(s):CitrixMD@ingrammicro.com
Solution(s):
Citrix DaaS (desktop as a service)
✔
HPE
Contact(s):HPE Contacts Overview
Solution(s):
HPE IMC Application Performance Manager Software
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
✔
Lenovo
Contact(s):Lenovo Contacts Overview
Solution(s):
✔
UiPath
Contact(s):uipath-sd@ingrammicro.com
Solution(s):
Assessment, Compliance, Monitor & HealthCheck Services
IT compliance services are designed to aid businesses in ensuring their technology infrastructure meets regulatory standards, on both a national and industry-specific level.
IT monitoring comprises a broad class of products designed to determine whether IT equipment is online and performing to expected service levels, while resolving any detected problems.
An IT health check verifies the current state of the technology infrastructure to ensure the environment is stable, reliable, and secure.
✔
Allied Telesis
Solution(s):
Auger  IT monitoring services
✔
Axis Communications
Solution(s):
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
✔
Citrix
Contact(s):CitrixMD@ingrammicro.com
Solution(s):
Citrix DaaS (desktop as a service)
✔
Dell
Contact(s):Dell Contacts Overview
Solution(s):
✔
HPE
Contact(s):HPE Contacts Overview
Solution(s):
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
IBM Cloud Security Compliance Center (SCC)
✔
Ivanti
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Juniper Networks
Solution(s):
Juniper Network as a Service, NaaS
✔
Lenovo
Contact(s):Lenovo Contacts Overview
Solution(s):
✔
Lexmark
Contact(s):Imaging@ingrammicro.com
Solution(s):
Optra Network Monitoring Skill run on Optra Edge Devices- In partnership with Domotz
✔
UiPath
Contact(s):uipath-sd@ingrammicro.com
Solution(s):
✔
Veeam
Contact(s):veeammd@ingrammicro.com
Ingram Micro Cloud Marketplace
Business Transformation Center Partner
Solution(s):
Veeam Data Platform – VeeamONE
Client Management
Client Management is a process that involves coordinating and managing interactions between a client and the organization.
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
✔
Google Cloud Platform
Solution(s):
✔
Intel
Solution(s):
✔
Ivanti
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Lenovo
Contact(s):Lenovo Contacts Overview
Solution(s):
✔
Lexmark
Contact(s):Imaging@ingrammicro.com
Solution(s):
Optra Network Monitoring Skill run on Optra Edge Devices- In partnership with Domotz
Optra Vehicle Monitoring Plus Skill run on Optra Edge Device
✔
Microsoft Azure
Solution(s):
Azure Active Directory Domain Services (Azure AD DS)
Azure Active Directory (Azure AD)
Consultative Services
IT Consultative Services are advisory services that help clients assess different technology strategies and, in doing so, align their technology strategies with their business or process strategies.
✔
Allied Telesis
Solution(s):
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
✔
Dell
Contact(s):Dell Contacts Overview
Solution(s):
✔
HPE
Contact(s):HPE Contacts Overview
Solution(s):
✔
Juniper Networks
Solution(s):
✔
Lenovo
Contact(s):Lenovo Contacts Overview
Solution(s):
✔
Lexmark
Contact(s):Imaging@ingrammicro.com
Solution(s):
Optra Network Monitoring Skill run on Optra Edge Devices- In partnership with Domotz
Optra Vehicle Monitoring Plus Skill run on Optra Edge Device
Installation & Deployment Services
Deployment Services support the implementation and rollout of new applications or infrastructure.
✔
Allied Telesis
Solution(s):
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
✔
Dell
Contact(s):Dell Contacts Overview
Solution(s):
Dell IT Deployment Services & Technologies
✔
HPE
Contact(s):HPE Contacts Overview
Solution(s):
✔
Juniper Networks
Solution(s):
✔
Lenovo
Contact(s):Lenovo Contacts Overview
Solution(s):
✔
Lexmark
Contact(s):Imaging@ingrammicro.com
Solution(s):
Optra Network Monitoring Skill run on Optra Edge Devices- In partnership with Domotz
Optra Vehicle Monitoring Plus Skill run on Optra Edge Device
Integration & Configuration Services
Integration & Configuration Services assist with the arrangement of the hardware and software of IT system. Management of the components, settings and more ensures all IT systems can function smoothly and give  greater control over the devices on the network.
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
✔
Dell
Contact(s):Dell Contacts Overview
Solution(s):
✔
HPE
Contact(s):HPE Contacts Overview
Solution(s):
✔
Juniper Networks
Solution(s):
✔
Lenovo
Contact(s):Lenovo Contacts Overview
Solution(s):
✔
Lexmark
Contact(s):Imaging@ingrammicro.com
Solution(s):
Optra Network Monitoring Skill run on Optra Edge Devices- In partnership with Domotz
Optra Vehicle Monitoring Plus Skill run on Optra Edge Device
✔
Microsoft Azure
Solution(s):
Azure Database Migration Service
IT Asset Disposition (ITAD)
IT asset disposition (ITAD) is the disposing of IT hardware and other equipment that is no longer needed, but it goes beyond simply throwing away old gear.
ITAD also ensures that materials are properly wiped and that all regulatory standards for proper data security are followed throughout the disposal process.
✔
Blancco
Contact(s):blancco-licensing@ingrammicro.com
Solution(s):
Blancco Vritual Machine Eraser
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
✔
Dell
Contact(s):Dell Contacts Overview
Solution(s):
✔
HPE
Contact(s):HPE Contacts Overview
Solution(s):
✔
Lenovo
Contact(s):Lenovo Contacts Overview
Solution(s):
✔
Lexmark
Contact(s):Imaging@ingrammicro.com
Solution(s):
Optra Network Monitoring Skill run on Optra Edge Devices- In partnership with Domotz
IT Help Desk
An IT Help Desk is a software platform that helps users solve their problems through a single (or multiple) point of contact. IT help desks allow employees and IT team members to troubleshoot problems, track their issues, and get assistance regarding products, services, or processes.
✔
Aisera
Contact(s):Aisera Contacts Overview
Solution(s):
AI Service Desk for IT, HR & Business Services
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
✔
Dell
Contact(s):Dell Contacts Overview
Solution(s):
✔
Lenovo
Contact(s):Lenovo Contacts Overview
Solution(s):
IT Staffing Services
IT Staffing Services eliminate the burden many HR departments face in finding and vetting hundreds of applicants to fulfil IT-related roles.
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
✔
HPE
Contact(s):HPE Contacts Overview
Solution(s):
HPE GreenLake Management Services Remote Staff Augmentation Services
✔
Juniper Networks
Solution(s):
✔
Lenovo
Contact(s):Lenovo Contacts Overview
Solution(s):
Training
IT Training assists with ramping up employees to equip them with the skills necessary for performing information technology jobs.
It is often required to achieve vendor-level technical certifications.
✔
Allied Telesis
Solution(s):
Allied Telesis Certification Program
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
✔
Dell
Contact(s):Dell Contacts Overview
Solution(s):
✔
HPE
Contact(s):HPE Contacts Overview
Solution(s):
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
✔
Juniper Networks
Solution(s):
✔
Lenovo
Contact(s):Lenovo Contacts Overview
Solution(s):
End-Point
Client
A Client Endpoint is a remote computing device that communicates back and forth with a network to which it is connected.
Examples: Laptop, Tablet, Smart Phone, Desktop
✔
AMD
Solution(s):
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
✔
Dell
Contact(s):Dell Contacts Overview
Solution(s):
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
Dizzion Desktop as a Service (DaaS) on IBM Cloud
✔
Igel
Solution(s):
✔
Intel
Solution(s):
✔
Lenovo
Contact(s):Lenovo Contacts Overview
Solution(s):
✔
Microsoft Azure
Solution(s):
Digital Workspace
A Digital Workspace combines the force of current trends such as cloud, SaaS applications, social, enhanced analytics, work-from-anywhere, bring-your-own-device, and so forth, to meet the immediate and long-term needs of the business and its employees to drive a change in the user experience.  It simplifies the experience of employees accessing their apps and data in one central platform from any endpoint.
✔
Aisera
Contact(s):Aisera Contacts Overview
Solution(s):
AI Service Desk for IT, HR & Business Services
✔
AMD
Solution(s):
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
✔
Citrix
Contact(s):CitrixMD@ingrammicro.com
Solution(s):
Citrix DaaS (desktop as a service)
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
IBM Digital Workplace Services
Dizzion Desktop as a Service (DaaS) on IBM Cloud
✔
Intel
Solution(s):
✔
Lenovo
Contact(s):Lenovo Contacts Overview
Solution(s):
Lenovo Digital Workplace Solutions
✔
Nutanix
Solution(s):
Nutanix Desktop-as-a-Service (DaaS)
End-User Software
End-User Software is a program that is used by end-users – people who are not professional software developers.
Examples:
Cisco AnyConnect
Skype for Business
Microsoft Office
✔
Aisera
Contact(s):Aisera Contacts Overview
Solution(s):
AI Service Desk for IT, HR & Business Services
✔
Axis Communications
Solution(s):
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
✔
Igel
Solution(s):
✔
Lenovo
Contact(s):Lenovo Contacts Overview
Solution(s):
✔
Lexmark
Contact(s):Imaging@ingrammicro.com
Solution(s):
Optra Network Monitoring Skill run on Optra Edge Devices- In partnership with Domotz
Optra Vehicle Monitoring Plus Skill run on Optra Edge Device
✔
UiPath
Contact(s):uipath-sd@ingrammicro.com
Solution(s):
Management & Automation Software
IT Management & Automation is the process of reducing manual intervention by creating software and systems to replace repeatable process.
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
✔
Dell
Contact(s):Dell Contacts Overview
Solution(s):
Device Management with Microsoft Endpoint Manager
✔
Igel
Solution(s):
IGEL Cosmos Universal Management Suite 12 (UMS)
✔
Ivanti
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Lenovo
Contact(s):Lenovo Contacts Overview
Solution(s):
✔
Microsoft Azure
Solution(s):
✔
Nutanix
Solution(s):
Nutanix Desktop-as-a-Service (DaaS)
✔
Red Hat
Solution(s):
✔
UiPath
Contact(s):uipath-sd@ingrammicro.com
Solution(s):
Mobile Device Management (MDM)
Mobile Device Management (MDM)Â is the process of enhancing corporate data security by monitoring, managing and securing the mobile devices such as laptops, smartphones and tablets that are used in enterprises.
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
✔
Dell
Contact(s):Dell Contacts Overview
Solution(s):
Device Management with Microsoft Endpoint Manager
✔
HPE
Contact(s):HPE Contacts Overview
Solution(s):
HPE IMC Endpoint Admission Defense Software
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
Mobile Device Management (MDM)
✔
Igel
Solution(s):
IGEL Cosmos Universal Management Suite 12 (UMS)
✔
Ivanti
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Lenovo
Contact(s):Lenovo Contacts Overview
Solution(s):
Thin Client
A Thin Client is a low-performance computer that has been optimized to connect to a service running on a remote server such as a virtual desktop, server applications, or web application.
The benefits of thin clients include:
– Lower cost
– Increased security (greater control)
– Ease of management
– Scalability
✔
AMD
Solution(s):
✔
Dell
Contact(s):Dell Contacts Overview
Solution(s):
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
Dizzion Desktop as a Service (DaaS) on IBM Cloud
✔
Igel
Solution(s):
✔
Intel
Solution(s):
✔
Lenovo
Contact(s):Lenovo Contacts Overview
Solution(s):
✔
Microsoft Azure
Solution(s):
✔
VMware
Contact(s):vmware-licensing@ingrammicro.com
Solution(s):
Infrastructure
Cabling
Refers to the Cabling configuration in a datacenter.
✔
APC
Solution(s):
APC by Schneider Electric Cable Management
✔
ATEN
Contact(s):MIX-Operations@ingrammicro.com
Solution(s):
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
✔
ENET
Solution(s):
✔
HPE
Contact(s):HPE Contacts Overview
Solution(s):
✔
Juniper Networks
Solution(s):
✔
Lenovo
Contact(s):Lenovo Contacts Overview
Solution(s):
✔
NetAlly
Contact(s):NetAllyMD@ingrammicro.com
Solution(s):
✔
Vertiv
Solution(s):
Cooling
Traditional data center Cooling techniques used a combination of raised floors and computer room air conditioner or computer room air handler infrastructure.
Modern data centers use a variety of innovative data center cooling technologies; these technologies include basic fans to much more complex heat transfer technologies such as chilled water systems and liquid cooling.
✔
APC
Solution(s):
APC by Schneider Electric Data Center Cooling Solution
✔
Dell
Contact(s):Dell Contacts Overview
Solution(s):
Datta Center Power and Cooling Solutions
✔
HPE
Contact(s):HPE Contacts Overview
Solution(s):
✔
Lenovo
Contact(s):Lenovo Contacts Overview
Solution(s):
✔
Vertiv
Solution(s):
Location
Refers to the Location of the IT infrastructure, which is critical for considerations such as reliability, security, scalability and uptime.
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
✔
HPE
Contact(s):HPE Contacts Overview
Solution(s):
HPE Modular Data Centers (PODs)
✔
Juniper Networks
Solution(s):
Juniper Indoor Location Services
✔
Lenovo
Contact(s):Lenovo Contacts Overview
Solution(s):
Lenovo – ITIC Reliability Study
✔
Microsoft Azure
Solution(s):
✔
Nutanix
Solution(s):
Nutanix Cloud Infrastructure (NCI)
Management & Automation Software
IT Management & Automation is the process of reducing manual intervention by creating software and systems to replace repeatable process.
✔
APC
Solution(s):
APC by Schneider Electric EcoStruxure IT Expert – Infrastructure Management Solution
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
✔
Dell
Contact(s):Dell Contacts Overview
Solution(s):
✔
HPE
Contact(s):HPE Contacts Overview
Solution(s):
✔
Lenovo
Contact(s):Lenovo Contacts Overview
Solution(s):
✔
Nutanix
Solution(s):
✔
Red Hat
Solution(s):
✔
UiPath
Contact(s):uipath-sd@ingrammicro.com
Solution(s):
✔
Veeam
Contact(s):veeammd@ingrammicro.com
Ingram Micro Cloud Marketplace
Business Transformation Center Partner
Solution(s):
Veeam Data Platform – VeeamONE
✔
Vertiv
Solution(s):
Monitoring Control and Management Software
✔
VMware
Contact(s):vmware-licensing@ingrammicro.com
Solution(s):
Power
Data centers consume more than 416 terawatts of Power annually, which represents nearly 3% of the total electricity generated on a global scale.
It’s critical to understand Power Distribution, Power Efficiency Practices, and Power Sustainability in the data center to be cost effective and operationally efficient.
✔
APC
Solution(s):
APC by Schneider Electric Smart-UPS for Network and Server applicationsÂ
✔
ATEN
Contact(s):MIX-Operations@ingrammicro.com
Solution(s):
✔
CyberPower
Contact(s):cyberpowerteam@ingrammicro.com
Solution(s):
✔
Dell
Contact(s):Dell Contacts Overview
Solution(s):
Datta Center Power and Cooling Solutions
✔
Eaton
Solution(s):
Eaton UPS – Rackmount, Tower, Desktop. 500VA to 150kVA
Eaton PDUs (Power Distribution Units)
✔
HPE
Contact(s):HPE Contacts Overview
Solution(s):
✔
Lenovo
Contact(s):Lenovo Contacts Overview
Solution(s):
✔
Vertiv
Solution(s):
Uninterruptible Power Supplies (UPS)
Rack
A data center Rack is a type of physical steel and electronic framework that is designed to house servers, networking devices, cables and other data center computing equipment.
This physical structure provides equipment placement and orchestration within a data center facility.
✔
APC
Solution(s):
APC by Schneider Electric Racks and Enclosures
✔
ATEN
Contact(s):MIX-Operations@ingrammicro.com
Solution(s):
✔
CyberPower
Contact(s):cyberpowerteam@ingrammicro.com
Solution(s):
✔
Eaton
Solution(s):
Tripp Lite by Eaton Racks – Full enclosure, lockable, open frame, wall-mount, floor-standing
✔
HPE
Contact(s):HPE Contacts Overview
Solution(s):
✔
Lenovo
Contact(s):Lenovo Contacts Overview
Solution(s):
✔
Rackmount.IT
Solution(s):
✔
Vertiv
Solution(s):
Networking
LAN / WAN / SD-WAN
AÂ Local Area Network (LAN)Â is a network contained within a small geographic area, usually within the same building.
AÂ Wide Area Network (WAN)Â is a large computer network that connects groups of computers over large distances. WANs are often used by large businesses to connect their office network.
*Each office typically has its own local area network, or LAN, and these LANs connect via a WAN.
AÂ Software-Defined Wide Area Network (SD-WAN)Â is a virtual WAN architecture that allows enterprises to leverage any combination of transport services=.
✔
Allied Telesis
Solution(s):
Allied Telesis Routers and Firewalls
Allied Telesis Industrial Switches
Allied Telesis Small Business Switches
Allied Telesis Enterprise Campus SwitchesÂ
✔
AMD
Solution(s):
✔
Aruba Networks (HPE)
Contact(s):HPEAruba@ingrammicro.com
Solution(s):
✔
Buffalo Americas
Contact(s):Buffalo Americas Contacts Overview
Solution(s):
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
Cisco Nexus Data Center Switches
✔
Citrix
Contact(s):CitrixMD@ingrammicro.com
Solution(s):
✔
Cradlepoint
Solution(s):
✔
Dell
Contact(s):Dell Contacts Overview
Solution(s):
✔
ENET
Solution(s):
✔
F5
Solution(s):
✔
Google Cloud Platform
Solution(s):
Google Cloud Hybrid Connectivity
✔
HPE
Contact(s):HPE Contacts Overview
Solution(s):
HPE Mellanox InfiniBand Switches
HPE Mellanox Ethernet Switches
✔
Intel
Solution(s):
✔
Juniper Networks
Solution(s):
✔
Lenovo
Contact(s):Lenovo Contacts Overview
Solution(s):
✔
Nvidia
Solution(s):
Nvidia Quantum Infiniband Switches
✔
QNAP
Contact(s):QNAP Contacts Overview
Solution(s):
Load Balancing
Load Balancing is a core networking solution used to distribute traffic across multiple servers in a server farm. Load Balancers improve application availability and responsiveness and prevent server overload.
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
✔
Citrix
Contact(s):CitrixMD@ingrammicro.com
Solution(s):
✔
F5
Solution(s):
✔
Juniper Networks
Solution(s):
Cloud-Native Contrail Networking
Management & Automation Software
IT Management & Automation is the process of reducing manual intervention by creating software and systems to replace repeatable process.
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
Cisco Nexus Data Center Switches
✔
Citrix
Contact(s):CitrixMD@ingrammicro.com
Solution(s):
✔
Dell
Contact(s):Dell Contacts Overview
Solution(s):
✔
HPE
Contact(s):HPE Contacts Overview
Solution(s):
✔
Juniper Networks
Solution(s):
Security Director and Security Director Cloud
Cloud-Native Contrail Networking
✔
Lenovo
Contact(s):Lenovo Contacts Overview
Solution(s):
✔
Red Hat
Solution(s):
✔
UiPath
Contact(s):uipath-sd@ingrammicro.com
Solution(s):
Transport
In networking, the Transport layer is a conceptual division of methods in the layered architecture of protocols in the network stack in the Internet protocol suite and the OSI model.
The protocols of this layer provide end-to-end communication services for applications.
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
Cisco Nexus Data Center Switches
✔
Citrix
Contact(s):CitrixMD@ingrammicro.com
Solution(s):
✔
F5
Solution(s):
✔
Google Cloud Platform
Solution(s):
Google Cloud Hybrid Connectivity
Voice (VoIP / UCC)
Voice over Internet Protocol (VoIP), is a method and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks.
Unified Communications and Collaboration (UCC)Â is a combination of enterprise communication tools assembled into a single interface and integrated into a single management system.
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
✔
Citrix
Contact(s):CitrixMD@ingrammicro.com
Solution(s):
Storage
Backup Storage Hardware
Backup service for storage
✔
AWS
Solution(s):
✔
ExaGrid
Contact(s):MIX-Operations@ingrammicro.com
Solution(s):
✔
HPE
Contact(s):HPE Contacts Overview
Solution(s):
✔
Lenovo
Contact(s):Lenovo Contacts Overview
Solution(s):
✔
QNAP
Contact(s):QNAP Contacts Overview
Solution(s):
Block Storage
Block Storage is a technology that is used to store data files on Storage Area Networks or cloud-based storage environments. It breaks up data into blocks and then stores those blocks as separate pieces, each with a unique identifier.
✔
AWS
Solution(s):
Amazon Elastic Block Store (EBS)
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
Cisco UCS S-Series Storage Servers
✔
Dell
Contact(s):Dell Contacts Overview
Solution(s):
✔
Google Cloud Platform
Solution(s):
✔
HPE
Contact(s):HPE Contacts Overview
Solution(s):
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
✔
Lenovo
Contact(s):Lenovo Contacts Overview
Solution(s):
✔
Nutanix
Solution(s):
Direct-Attached Storage (DAS)
Direct-Attached Storage (DAS)Â refers to a digital storage system directly attached to a server or workstation, without a network in between. This is ideal for small business, departments, workgroups, etc., which do not share information across enterprises.
Examples: External Hard Drives (connected directly), internal server hard drive disks
✔
Dell
Contact(s):Dell Contacts Overview
Solution(s):
✔
Google Cloud Platform
Solution(s):
✔
HPE
Contact(s):HPE Contacts Overview
Solution(s):
✔
Lenovo
Contact(s):Lenovo Contacts Overview
Solution(s):
Lenovo Direct Attached Storage (DAS)
File Storage
File Storage, also called file-level or file-based storage, stores data in a hierarchical structure.
✔
AWS
Solution(s):
Amazon Elastic File System (EFS)
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
Cisco UCS S-Series Storage Servers
✔
Citrix
Contact(s):CitrixMD@ingrammicro.com
Solution(s):
✔
Dell
Contact(s):Dell Contacts Overview
Solution(s):
✔
Google Cloud Platform
Solution(s):
✔
HPE
Contact(s):HPE Contacts Overview
Solution(s):
HPE GreenLake for File Storage
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
✔
Lenovo
Contact(s):Lenovo Contacts Overview
Solution(s):
✔
Nutanix
Solution(s):
✔
QNAP
Contact(s):QNAP Contacts Overview
Solution(s):
✔
Quantum
Solution(s):
Management & Automation Software
IT Management & Automation is the process of reducing manual intervention by creating software and systems to replace repeatable process.
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
Cisco UCS S-Series Storage Servers
✔
Citrix
Contact(s):CitrixMD@ingrammicro.com
Solution(s):
✔
Dell
Contact(s):Dell Contacts Overview
Solution(s):
✔
HPE
Contact(s):HPE Contacts Overview
Solution(s):
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
✔
Lenovo
Contact(s):Lenovo Contacts Overview
Solution(s):
✔
Nutanix
Solution(s):
✔
Red Hat
Solution(s):
✔
UiPath
Contact(s):uipath-sd@ingrammicro.com
Solution(s):
✔
VMware
Contact(s):vmware-licensing@ingrammicro.com
Solution(s):
Network-Attached Storage (NAS)
Network-Attached Storage act as centralized network shares for use over a local network. Other machines on the network connect to a NAS to read and write data as if the drive were connected to their computer directly.
✔
AWS
Solution(s):
Amazon Elastic File System (EFS)
✔
Buffalo Americas
Contact(s):Buffalo Americas Contacts Overview
Solution(s):
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
Cisco UCS S-Series Storage Servers
✔
Dell
Contact(s):Dell Contacts Overview
Solution(s):
✔
Google Cloud Platform
Solution(s):
✔
HPE
Contact(s):HPE Contacts Overview
Solution(s):
✔
Lenovo
Contact(s):Lenovo Contacts Overview
Solution(s):
✔
QNAP
Contact(s):QNAP Contacts Overview
Solution(s):
✔
Quantum
Solution(s):
Object Storage
Object Storage is a data storage architecture for large stores of unstructured data. It designates each piece of data as an object, keeps it in a separate storehouse, and bundles it with metadata and a unique identifier for easy access and retrieval.
✔
AWS
Solution(s):
Amazon Simple Storage Service (S3)
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
Cisco UCS S-Series Storage Servers
✔
Dell
Contact(s):Dell Contacts Overview
Solution(s):
✔
Google Cloud Platform
Solution(s):
✔
HPE
Contact(s):HPE Contacts Overview
Solution(s):
Scality ARTESCA and Scality RING
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
IBM Cloud Object Storage (COS)
✔
Lenovo
Contact(s):Lenovo Contacts Overview
Solution(s):
✔
Nutanix
Solution(s):
✔
QNAP
Contact(s):QNAP Contacts Overview
Solution(s):
✔
Quantum
Solution(s):
Storage Area Network (SAN)
Storage Area Networks (SANs) are the most common storage networking architecture used by enterprises for business-critical applications that need to deliver high throughput and low latency.
SANs make up about two-thirds of the total networked storage market. They are designed to remove single points of failure, making SANs highly available and resilient.
The most common SAN protocols are: FCP, iSCSI, FCoE, & FC-NVMe.
Common use cases include:
– Oracle Databases
– Microsoft SQL Server Databases
– Large Virtualization Deployments
– Virtual Desktop Deployments
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
✔
Citrix
Contact(s):CitrixMD@ingrammicro.com
Solution(s):
✔
Dell
Contact(s):Dell Contacts Overview
Solution(s):
✔
HPE
Contact(s):HPE Contacts Overview
Solution(s):
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
✔
Lenovo
Contact(s):Lenovo Contacts Overview
Solution(s):
✔
VMware
Contact(s):vmware-licensing@ingrammicro.com
Solution(s):
Tape
A Tape Drive is a data storage device that reads and writes data on a magnetic tape. Magnetic tape data storage is typically used for offline, archival data storage. Tape media generally has a favorable unit cost and a long archival stability.
A Tape Storage system generally consists of magnetic tape media, tape drives and tape automation.
✔
AWS
Solution(s):
✔
Dell
Contact(s):Dell Contacts Overview
Solution(s):
✔
HPE
Contact(s):HPE Contacts Overview
Solution(s):
✔
Lenovo
Contact(s):Lenovo Contacts Overview
Solution(s):
✔
Quantum
Solution(s):
MSP Basics
Asset Management & Network Discovery
Asset Management & Network Discovery is the automated process of identifying and inventorying all active endpoints, servers, devices, and virtual instances connected to an organization’s networks. This includes local area networks (LANs), wide area networks (WANs), wireless networks, and cloud-based networks. By providing a comprehensive view of all networked assets, Network Discovery enhances asset management, strengthens security by uncovering unauthorized devices, and supports efficient network monitoring and troubleshooting. It ensures that IT teams have complete visibility of their network environment.
✔
ActZero
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Adlumin
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Alien Vault (LevelBlue)
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Artic Wolf
Contact(s):ArcticWolfMD@ingrammicro.com
Solution(s):
✔
BeyondTrust
Contact(s):BeyondTrust@ingrammicro.com
Solution(s):
✔
Bitdefender
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Gravity Zone Cloud for MSP Security
✔
Juniper
Contact(s):Juniper Contacts Overview
Solution(s):
✔
Watchguard
Contact(s):Watchguard Contacts Overview
Solution(s):
Data Backup & Disaster Recovery & Continuity
MSPs offer data backup and disaster recovery services to ensure business continuity in case of data loss or system failures. Regular backups are performed to secure data, and disaster recovery plans are developed to restore operations quickly. These services include offsite storage, cloud backups, and testing recovery procedures.
✔
Acronis
Contact(s):Acronis-Cloud@ingrammicro.com
Solution(s):
✔
Avepoint
Contact(s):Avepoint Contacts Overview
Solution(s):
✔
Dropbox
Contact(s):dropbox@ingrammmicro.com
Solution(s):
IT Help Desk Support
MSPs commonly offer 9/5 or 24/7 technical help desk support services to address user issues and minimize downtime. Help desk services include troubleshooting hardware and software problems, providing guidance on IT-related queries, and resolving connectivity issues.
✔
BeyondTrust
Contact(s):BeyondTrust@ingrammicro.com
Solution(s):
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
Meraki MSPaaS Bundle Managed Services
✔
LiveVHD
Contact(s):LiveVHD Contacts Overview
Solution(s):
Patch / Vendor Management
Patch management involves the process of identifying, acquiring, testing, and installing software updates (patches) to fix vulnerabilities and improve functionality.  Effective patch management is essential to protect client systems from security threats, ensure compliance with industry standards, and maintain system performance.
✔
Acronis
Contact(s):Acronis-Cloud@ingrammicro.com
Solution(s):
✔
Artic Wolf
Contact(s):ArcticWolfMD@ingrammicro.com
Solution(s):
✔
Avepoint
Contact(s):Avepoint Contacts Overview
Solution(s):
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
Meraki MSPaaS Bundle Managed Services
✔
ESET
Contact(s):ESET Contacts Overview
Solution(s):
✔
Tenable
Contact(s):TenableTeam@ingrammicro.com
Solution(s):
✔
Watchguard
Contact(s):Watchguard Contacts Overview
Solution(s):
Patch Management and Data Security
Remote Monitoring & Management (RMM)
Remote Monitoring and Management (RMM)Â services enable MSPs to oversee and maintain client IT systems remotely. By installing software agents on client devices, MSPs can monitor performance, automate maintenance tasks, and address issues proactively. Key features include real-time monitoring, automated updates, alerting, remote troubleshooting, and comprehensive reporting.
✔
Acronis
Contact(s):Acronis-Cloud@ingrammicro.com
Solution(s):
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
Meraki MSPaaS Bundle Managed Services
✔
ConnectWise
Contact(s):ConnectWise Contacts Overview
Solution(s):
✔
GoTo
Contact(s):GoTo Contacts Overview
Solution(s):
✔
Juniper
Contact(s):Juniper Contacts Overview
Solution(s):
✔
Kaseya
Contact(s):Kaseya Contacts Overview
Solution(s):
✔
Sophos
Contact(s):sophos-licensing@ingrammicro.com
Solution(s):
✔
Watchguard
Contact(s):Watchguard Contacts Overview
Solution(s):
MSSP Essentials
Email Security
Email security involves protecting email communications from threats like phishing, malware, and unauthorized access. For Managed Service Providers (MSPs), robust email security measures are essential to safeguard client data, ensure compliance with regulations, and maintain trust. By implementing advanced email security solutions, MSPs can prevent data breaches, protect sensitive information, and enhance overall cybersecurity for their clients.
✔
Acronis
Contact(s):Acronis-Cloud@ingrammicro.com
Solution(s):
✔
Bitdefender
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
GravityZone security for Email
✔
Check Point
Contact(s):CheckpointMD@ingrammicro.com
Solution(s):
✔
ESET
Contact(s):ESET Contacts Overview
Solution(s):
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Solution(s):
✔
Mimecast
Contact(s):Mimecast-Licensing@ingrammicro.com
Solution(s):
✔
Proofpoint
Contact(s):Proofpoint-Licensing@ingrammicro.com
Solution(s):
✔
Sophos
Contact(s):sophos-licensing@ingrammicro.com
Solution(s):
✔
Trellix
Contact(s):Trellix Contacts Overview
Solution(s):
✔
Watchguard
Contact(s):Watchguard Contacts Overview
Solution(s):
Endpoint Detection & Response
✔
Acronis
Contact(s):Acronis-Cloud@ingrammicro.com
Solution(s):
✔
Alien Vault (LevelBlue)
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Bitdefender
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Gravity Zone Cloud for MSP Security
✔
Check Point
Contact(s):CheckpointMD@ingrammicro.com
Solution(s):
✔
ESET
Contact(s):ESET Contacts Overview
Solution(s):
✔
Palo Alto Networks
Contact(s):paloaltosolutions@ingrammicro.com
Solution(s):
✔
Sophos
Contact(s):sophos-licensing@ingrammicro.com
Solution(s):
File / Data Integrity
File and data integrity ensures that data remains accurate, consistent, and unaltered during storage and transmission. For Managed Service Providers (MSPs), maintaining file and data integrity is crucial to prevent data corruption, unauthorized modifications, and ensure reliable backups.
✔
Artic Wolf
Contact(s):ArcticWolfMD@ingrammicro.com
Solution(s):
✔
ESET
Contact(s):ESET Contacts Overview
Solution(s):
✔
Mimecast
Contact(s):Mimecast-Licensing@ingrammicro.com
Solution(s):
✔
Trellix
Contact(s):Trellix Contacts Overview
Solution(s):
Application and Change Control
✔
Watchguard
Contact(s):Watchguard Contacts Overview
Solution(s):
Firewall / Gateway Protection
Gateway Protection, often implemented through Firewall or Unified Threat Management (UTM) devices, safeguards networks by combining multiple security features into a single solution. This includes antivirus, intrusion detection and prevention, content filtering, and VPN support. Positioned at network entry points, these systems monitor and control incoming and outgoing traffic, blocking malicious activities and unauthorized access. By providing comprehensive protection, UTM and firewalls ensure network integrity, enhance security, and simplify management for IT administrators.
✔
Alien Vault (LevelBlue)
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Solution(s):
✔
Juniper
Contact(s):Juniper Contacts Overview
Solution(s):
✔
Watchguard
Contact(s):Watchguard Contacts Overview
Solution(s):
MFA / SSO
Multi-Factor Authentication (MFA)Â enhances security by requiring multiple verification methods before granting access to systems or data.
Single Sign-On (SSO)Â allows users to access multiple applications with one set of login credentials. For Managed Service Providers (MSPs), implementing SSO simplifies user management, enhances security by reducing password fatigue, and improves user experience.
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Solution(s):
✔
Watchguard
Contact(s):Watchguard Contacts Overview
Solution(s):
Mobile Device Security / MDM
Mobile device security involves protecting smartphones, tablets, and other portable devices from threats like malware, unauthorized access, and data breaches.  Mobile device security is crucial to safeguard client data, support remote work, and maintain compliance with security standards
✔
Bitdefender
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Gravity Zone Cloud for MSP Security
✔
Check Point
Contact(s):CheckpointMD@ingrammicro.com
Solution(s):
✔
ESET
Contact(s):ESET Contacts Overview
Solution(s):
✔
Trellix
Contact(s):Trellix Contacts Overview
Solution(s):
Security Awareness Training
Security Awareness Training educates employees about cybersecurity threats and best practices to mitigate risks.  It is crucial as it helps protect client data, reduces the likelihood of security breaches, and ensures compliance with regulations.
✔
Acronis
Contact(s):Acronis-Cloud@ingrammicro.com
Solution(s):
✔
Artic Wolf
Contact(s):ArcticWolfMD@ingrammicro.com
Solution(s):
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Solution(s):
✔
Mimecast
Contact(s):Mimecast-Licensing@ingrammicro.com
Solution(s):
Human Risk-Centric Security Awareness & Training
✔
Proofpoint
Contact(s):Proofpoint-Licensing@ingrammicro.com
Solution(s):
Web Content & DNS Filtering
DNS Filtering blocks access to entire domains by intercepting DNS queries and refusing to resolve those flagged as malicious or inappropriate. It’s a broad, first line of defense against harmful sites.
Web Content Filtering provides more granular control by blocking specific URLs or types of content within a website. This allows for more detailed management of what users can access online.
Both methods enhance security and enforce internet usage policies, but they operate at different levels of specificity.
✔
Bitdefender
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Gravity Zone Cloud for MSP Security
✔
Juniper
Contact(s):Juniper Contacts Overview
Solution(s):
✔
Proofpoint
Contact(s):Proofpoint-Licensing@ingrammicro.com
Solution(s):
✔
Watchguard
Contact(s):Watchguard Contacts Overview
Solution(s):
MSSP Advanced
Behavioral Analytics / Insider Threat Detection
Behavioral Analytics and Insider Threat Detection involve monitoring user activities to identify unusual patterns that may indicate security threats. For Managed Service Providers (MSPs), these tools are crucial in proactively detecting and mitigating risks posed by internal actors, ensuring client data security, and maintaining trust.
✔
ActZero
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Adlumin
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Artic Wolf
Contact(s):ArcticWolfMD@ingrammicro.com
Solution(s):
✔
Bitdefender
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Gravity Zone Cloud for MSP Security
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Solution(s):
✔
Watchguard
Contact(s):Watchguard Contacts Overview
Solution(s):
CASB
A Cloud Access Security Broker (CASB) acts as a gatekeeper between users and cloud service providers, enforcing security policies and ensuring compliance.  CASBs are essential in managing and securing clients’ cloud environments. They help MSPs monitor cloud usage, detect threats, and enforce data protection policies, thereby enhancing overall security and compliance for their clients.
✔
Alien Vault (LevelBlue)
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Check Point
Contact(s):CheckpointMD@ingrammicro.com
Solution(s):
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Solution(s):
✔
Juniper
Contact(s):Juniper Contacts Overview
Solution(s):
Cloud Security
Cloud Security and Compliance for a Managed Security Service Provider (MSSP) involves ensuring the protection and regulatory adherence of data and applications hosted in cloud environments
✔
Avepoint
Contact(s):Avepoint Contacts Overview
Solution(s):
Compliancy Audit Preparation
Compliance audit preparation involves organizing and reviewing processes, policies, and documentation to ensure adherence to regulatory standards. This is vital in helping clients meet industry-specific compliance requirements. By preparing for audits, MSPs can identify and address potential compliance gaps, mitigate risks, and ensure their clients avoid penalties, thereby enhancing trust and reliability in their services.
✔
ActZero
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Adlumin
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Artic Wolf
Contact(s):ArcticWolfMD@ingrammicro.com
Solution(s):
✔
Avepoint
Contact(s):Avepoint Contacts Overview
Solution(s):
✔
Tenable
Contact(s):TenableTeam@ingrammicro.com
Solution(s):
✔
Watchguard
Contact(s):Watchguard Contacts Overview
Solution(s):
Dark Web Monitoring
Dark web monitoring involves scanning hidden parts of the internet for stolen data, credentials, and other illicit activities. By monitoring the dark web, MSPs can proactively alert clients to compromised information, helping to prevent data breaches and mitigate risks, thereby enhancing their overall security posture.
✔
ActZero
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Adlumin
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Artic Wolf
Contact(s):ArcticWolfMD@ingrammicro.com
Solution(s):
✔
Watchguard
Contact(s):Watchguard Contacts Overview
Solution(s):
Identity Access Management
Identity Access Management refers to the unique identification and authentication of users and devices within a network. It is essential to ensure that only authorized individuals and devices can access sensitive data and systems. Effective security identity management helps MSPs protect client information, prevent unauthorized access, and comply with regulatory requirements.
✔
ActZero
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Adlumin
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
BeyondTrust
Contact(s):BeyondTrust@ingrammicro.com
Solution(s):
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Solution(s):
✔
Juniper
Contact(s):Juniper Contacts Overview
Solution(s):
✔
Watchguard
Contact(s):Watchguard Contacts Overview
Solution(s):
Incident Response
Incident Response involves identifying, analyzing, and resolving security incidents to minimize damage and restore normal operations.  This process is critical as it ensures the swift handling of security breaches, protecting client data and systems.
✔
ActZero
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Adlumin
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Artic Wolf
Contact(s):ArcticWolfMD@ingrammicro.com
Solution(s):
✔
Bitdefender
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Gravity Zone Cloud for MSP Security
Privileged Access Management (PAM)
Privileged Access Management (PAM)Â involves controlling and monitoring access to critical systems and sensitive information by privileged users. Â PAM is essential as it helps mitigate the risks associated with privileged accounts, such as unauthorized access and data breaches.
✔
Avepoint
Contact(s):Avepoint Contacts Overview
Solution(s):
✔
BeyondTrust
Contact(s):BeyondTrust@ingrammicro.com
Solution(s):
✔
Juniper
Contact(s):Juniper Contacts Overview
Solution(s):
SIEM
Security Information and Event Management (SIEM)Â systems collect, analyze, and correlate security data from various sources to detect and respond to threats in real-time. For Managed Service Providers (MSPs), SIEM is vital as it enhances their ability to monitor client environments, identify potential security incidents, and take proactive measures.
✔
ActZero
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Adlumin
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Artic Wolf
Contact(s):ArcticWolfMD@ingrammicro.com
Solution(s):
✔
ConnectWise
Contact(s):ConnectWise Contacts Overview
Solution(s):
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Solution(s):
✔
Juniper
Contact(s):Juniper Contacts Overview
Solution(s):
Security Information Event Manager (SIEM)
✔
Trellix
Contact(s):Trellix Contacts Overview
Solution(s):
Vulnerability Scanning
A Network Vulnerability Assessment is the process of reviewing and analyzing a computer network for possible security vulnerabilities and loopholes. It is used by network administrators to evaluate the security architecture and defense of a network against possible vulnerabilities and threats.
✔
Acronis
Contact(s):Acronis-Cloud@ingrammicro.com
Solution(s):
✔
ActZero
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Adlumin
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Artic Wolf
Contact(s):ArcticWolfMD@ingrammicro.com
Solution(s):
✔
Bitdefender
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Gravity Zone Cloud for MSP Security
✔
ESET
Contact(s):ESET Contacts Overview
Solution(s):
✔
Tenable
Contact(s):TenableTeam@ingrammicro.com
Solution(s):
✔
Watchguard
Contact(s):Watchguard Contacts Overview
Solution(s):
Tools & Other Considerations
Cloud Migrations
Cloud migration integrity refers to the assurance that data, applications, and services are accurately and securely transferred to the cloud without loss or corruption, maintaining this integrity is crucial as it ensures client trust, minimizes downtime, and enhances overall service reliability. It involves meticulous planning, robust security measures, and continuous monitoring to guarantee seamless transitions and optimal performance in the cloud environment.
✔
Avepoint
Contact(s):Avepoint Contacts Overview
Solution(s):
Aviator – FLY SaaS – FLY Server
✔
BitTitan
Contact(s):BitTitan Contacts Overview
Solution(s):
DDI (DNS, DHCP, IPAM)
✔
Juniper
Contact(s):Juniper Contacts Overview
Solution(s):
Managed NOC
Managed NOC (Network Operations Center) is a  service that monitors and manages network performance, respectively.  These services are essential as they ensure continuous surveillance, and network reliability. A  Managed NOC ensures optimal network performance and uptime. This enhance the overall IT infrastructure’s security and efficiency, providing clients with robust and reliable services.
✔
Artic Wolf
Contact(s):ArcticWolfMD@ingrammicro.com
Solution(s):
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
Meraki MSPaaS Bundle Managed Services
✔
LiveVHD
Contact(s):LiveVHD Contacts Overview
Solution(s):
Outsourced Network Operations Center (NOC)
✔
Palo Alto Networks
Contact(s):paloaltosolutions@ingrammicro.com
Solution(s):
Managed SOC
Managed Security Operations Center (SOC) is an outsourced service that provides continuous monitoring, threat detection, and incident response for an organization’s IT infrastructure. SOC is crucial as it enhances their cybersecurity offerings, allowing them to protect clients from sophisticated threats without the need for extensive in-house resources.
✔
Acronis
Contact(s):Acronis-Cloud@ingrammicro.com
Solution(s):
Managed Detection and Response(MDR)
✔
ActZero
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Adlumin
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Artic Wolf
Contact(s):ArcticWolfMD@ingrammicro.com
Solution(s):
✔
Bitdefender
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Gravity Zone Cloud for MSP Security
✔
Check Point
Contact(s):CheckpointMD@ingrammicro.com
Solution(s):
✔
ESET
Contact(s):ESET Contacts Overview
Solution(s):
✔
Juniper
Contact(s):Juniper Contacts Overview
Solution(s):
✔
LiveVHD
Contact(s):LiveVHD Contacts Overview
Solution(s):
Outsourced Security Operations Center (SOC)
✔
Palo Alto Networks
Contact(s):paloaltosolutions@ingrammicro.com
Solution(s):
✔
Trellix
Contact(s):Trellix Contacts Overview
Solution(s):
✔
Watchguard
Contact(s):Watchguard Contacts Overview
Solution(s):
Managed Security Services for MSPs
Professional Services Automation
Professional Services Automation (PSA)Â refers to software solutions that streamline and automate business processes for service organizations. PSA tools are vital as they enhance efficiency by integrating project management, time tracking, billing, and resource allocation. This automation helps MSPs deliver services more effectively, improve client satisfaction, and optimize operational workflows, ultimately driving profitability and growth.
✔
ConnectWise
Contact(s):ConnectWise Contacts Overview
Solution(s):
✔
Kaseya
Contact(s):Kaseya Contacts Overview
Solution(s):
✔
SonicWall
Contact(s):SonicWall-Renewals@ingrammicro.com
Solution(s):
Quote Management
Quote management involves the creation, tracking, and management of sales quotes for potential clients.  Effective quote management is crucial as it streamlines the sales process, ensures accurate pricing, and enhances client communication. By automating and organizing quotes, MSPs can respond to client inquiries more efficiently, reduce errors, and improve the overall sales cycle, leading to increased client satisfaction and business growth.
✔
ConnectWise
Contact(s):ConnectWise Contacts Overview
Solution(s):
Remote Console Management
Remote console management allows administrators to access and control IT systems and devices from a remote location.  This capability is crucial as it enables efficient troubleshooting, maintenance, and updates without needing physical presence. It enhances service delivery by reducing response times, minimizing downtime, and ensuring continuous monitoring and management of clients’ IT infrastructure, ultimately improving operational efficiency and client satisfaction.
✔
Samsung
Solution(s):
Digital Signage Console Management
✔
Watchguard
Contact(s):Watchguard Contacts Overview
Solution(s):
Security Retainers
Security retainers are pre-arranged agreements where clients pay a fee to ensure priority access to cybersecurity services when needed. Retainers are crucial as they provide a steady revenue stream and ensure readiness to respond to security incidents promptly. This arrangement enhances client trust and satisfaction by guaranteeing swift, expert intervention during cyber threats, thereby minimizing potential damage and downtime.
✔
Artic Wolf
Contact(s):ArcticWolfMD@ingrammicro.com
Solution(s):
Staffing
Technology staffing services involve recruiting and providing skilled IT professionals to meet an organization’s specific needs. Staffing services are essential as they ensure access to a pool of qualified talent for various projects and client demands. By leveraging technology staffing, MSPs can quickly scale their workforce, fill skill gaps, and deliver high-quality services, enhancing their ability to meet client expectations and drive business growth.
✔
ActZero
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Adlumin
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Artic Wolf
Contact(s):ArcticWolfMD@ingrammicro.com
Solution(s):
Training and Upskilling
Technology training and upskilling involve educating and enhancing the skills of IT professionals to keep pace with evolving technologies. Training initiatives are vital as they ensure their teams remain proficient in the latest tools and practices. This continuous learning enhances service quality, boosts employee performance, and enables MSPs to offer cutting-edge solutions to clients, thereby maintaining a competitive edge in the market.
✔
Avepoint
Contact(s):Avepoint Contacts Overview
Solution(s):
✔
Pluralsight
Contact(s):Pluralsight Contacts Overview
Solution(s):
✔
SPECTRA
Contact(s):SPECTRA Contacts Overview
Solution(s):
✔
Watchguard
Contact(s):Watchguard Contacts Overview
Solution(s):
Warranties & Insurance & Legal Documents
Cybersecurity insurance provides financial protection against losses resulting from cyber incidents, such as data breaches or ransomware attacks.  It is crucial as it mitigates the financial risks associated with managing clients’ IT infrastructure. This insurance helps cover costs related to incident response, legal fees, and recovery efforts, ensuring MSPs can maintain business continuity and client trust even in the face of cyber threats.
Legal documents for Managed Service Providers (MSPs) are essential for defining the scope of services, responsibilities, and protections for both the MSP and their clients.
✔
DocuSign
Contact(s):DocuSign Contacts Overview
Solution(s):
DocuSign for Legal Departments
✔
ITagree
Contact(s):MSPTools@IngramMicro.com
Solution(s):
✔
SPECTRA
Contact(s):SPECTRA Contacts Overview
Solution(s):
Identify
The Identify category of the NIST Cybersecurity Framework focuses on developing an organizational understanding to manage cybersecurity risk to systems, people, assets, data, and capabilities. This function is foundational, as it helps organizations gain a clear picture of their cybersecurity posture and the resources that need protection.
Attack Surface Management (ASM)
Attack Surface Management (ASM) is the process of the continuously identifying, inventorying, prioritizing, and monitoring both internal and external IT assets, known as the “Attack Surface”.
✔
Balbix
Contact(s):USCloud@ingrammicro.com
Solution(s):
Balbix Attack Surface Management
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com
Solution(s):
✔
Mandiant
Contact(s):Mandiant-Licensing@IngramMicro.com
Solution(s):
Mandiant Advantage Attack Surface Management
✔
Palo Alto Networks
Contact(s):paloaltosolutions@ingrammicro.com
Solution(s):
✔
Tenable
Contact(s):TenableTeam@ingrammicro.com
Solution(s):
Tenable Attack Surface Management
Cloud Security Posture Management (CSPM)
CSMP solutions provide organizations with visibility into public cloud infrastructure. With the proliferation of cloud resources, many organizations are unaware of how many cloud resources are running and how they’re all configured. This lack of visibility can cause misconfigurations to go undetected for long periods of time, making it harder to secure the applications.
✔
ActZero
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
ActZero Managed Detection & Response (MDR) Service
✔
Adlumin
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Arctic Wolf
Contact(s):ArcticWolfMD@ingrammicro.com
Solution(s):
Arctic Wolf® Managed Cloud Monitoring
✔
Bitdefender
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Check Point
Contact(s):checkpoint-licensing@ingrammicro.com
Solution(s):
CloudGuard Cloud Security Posture Management
✔
Mandiant
Contact(s):Mandiant-Licensing@IngramMicro.com
Solution(s):
✔
Palo Alto Networks
Contact(s):paloaltosolutions@ingrammicro.com
Solution(s):
Cloud Security Posture Management
✔
SkyhighSecurity
Contact(s):Skyhigh-Licensing@ingrammicro.com
Solution(s):
✔
Sophos
Contact(s):sophos-licensing@ingrammicro.com
Solution(s):
✔
Tenable
Contact(s):TenableTeam@ingrammicro.com
Solution(s):
✔
Trend Micro
Contact(s):Trend-Licensing@ingrammicro.com
Solution(s):
Cyber Risk Scorecards & Posture Assessments
Cybersecurity posture relates to the security status of an enterprise’s networks, information, and systems based on information security resources (e.g., people, hardware, software, policies) and capabilities in place to manage the defense of the enterprise and to react as the situation changes.
✔
Adlumin
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Alert Logic
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Security Posture Report Included in:
– Essentials
– Professional
– Enterprise
Security Posture Review Included in:
– Enterprise
✔
Arctic Wolf
Contact(s):ArcticWolfMD@ingrammicro.com
Solution(s):
✔
AvePoint
Contact(s):Avepoint@ingrammicro.com
Solution(s):
Policies & Insights for Microsoft Office 365
✔
Balbix
Contact(s):USCloud@ingrammicro.com
Solution(s):
Balbix Cyber Risk Quantification
✔
Bitdefender
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
Cisco Identity Services Engine
Cisco Secure Network Analytics (Enterprise)
Cisco Secure Network Analytics (Cloud)
✔
Dell Technologies
Contact(s):Dell Technologies Contacts Overview
Solution(s):
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com
Solution(s):
FortiGuard Attack Surface Security Service
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
IBM Security Services & Risk Compliance
✔
Ivanti
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
QS Solutions
Contact(s):USCloud@ingrammicro.com
Solution(s):
Cyber Security Assessment Tool (CSAT)
✔
Tenable
Contact(s):TenableTeam@ingrammicro.com
Solution(s):
✔
Vicarius
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Dark Web Monitoring
Dark Web Monitoring, also known as cyber monitoring, is an identity theft prevention product that enables you to monitor your identity information on the dark web, and receive notifications if your information is found online.
✔
ActZero
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
ActZero Managed Detection and Response for Mobile
✔
Adlumin
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Adlumin DarkNet Exposure Module
✔
Alert Logic
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Included in Enterprise
✔
Alien Vault (AT&T)
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Included in:
– Standard
– Premium
✔
Arctic Wolf
Contact(s):ArcticWolfMD@ingrammicro.com
Solution(s):
✔
Binary Defense
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Dell Technologies
Contact(s):Dell Technologies Contacts Overview
Solution(s):
✔
Foresite
Contact(s):USServices@ingrammicro.com
Solution(s):
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com
Solution(s):
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
IBM’s X-Force Incident ResponseÂ
✔
Mandiant
Contact(s):Mandiant-Licensing@IngramMicro.com
Solution(s):
Mandiant Advantage Digital Threat Monitoring
Data Security Posture Management (DSPM)
Data security posture management (DSPM) provides visibility as to where sensitive data is, who has access to that data, how it has been used, and what the security posture of the data stored or application is. It does that by assessing the current state of data security, identifying and classifying potential risks and vulnerabilities, implementing security controls to mitigate these risks, and regularly monitoring and updating the security posture to ensure it remains effective. As a result, it enables businesses in maintaining the confidentiality, integrity, and availability of sensitive data. The typical users of DSPM include Information Technology (IT) departments, security teams, compliance teams, and executive leadership.
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
✔
Palo Alto Networks
Contact(s):paloaltosolutions@ingrammicro.com
Solution(s):
✔
PKWARE
Contact(s):PKWare@ingrammicro.com
Solution(s):
✔
Rubrik
Contact(s):rubrik-licensing-us@ingrammicro.com
Solution(s):
✔
Tenable
Contact(s):TenableTeam@ingrammicro.com
Solution(s):
File Integrity Monitoring
File Integrity Monitoring (FIM) is an internal control or process that performs the act of validating the integrity of operating system and application software files using a verification method between the current file state and a known, good baseline.
✔
Adlumin
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Alien Vault (AT&T)
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Arctic Wolf
Contact(s):ArcticWolfMD@ingrammicro.com
Solution(s):
✔
Axcient
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Barracuda
Contact(s):Barracuda Contacts Overview
Solution(s):
✔
BeyondTrust
Contact(s):BeyondTrust@ingrammicro.com
Solution(s):
BeyondTrust Privilege Management for Unix & Linux
✔
Binary Defense
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Security Information & Event Management
✔
Bitdefender
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
GravityZone Integrity MonitoringÂ
✔
Check Point
Contact(s):checkpoint-licensing@ingrammicro.com
Solution(s):
✔
Forcepoint
Contact(s):Forcepoint-Licensing@ingrammicro.com
Solution(s):
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
✔
OPSWAT
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Rubrik
Contact(s):rubrik-licensing-us@ingrammicro.com
Solution(s):
Rubrik Ransomware Investigation
✔
Sophos
Contact(s):sophos-licensing@ingrammicro.com
Solution(s):
✔
Stellar Cyber
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Trellix
Contact(s):trellix-licensing@ingrammicro.com
Solution(s):
✔
Trend Micro
Contact(s):Trend-Licensing@ingrammicro.com
Solution(s):
Deep Security: System Security Module
Identity Governance and Administration (IGA)
IGAÂ systems merge identity administration, which addresses administering accounts and credentials, provisioning, and managing entitlements, with identity governance, which addresses the segregation of duties, role management, logging, and analytics and reporting.
IGA systems provide additional functionality beyond standard Identity and Access Management (IAM) systems. In particular, they help organizations meet compliance requirements and enable them to audit access for compliance reporting. They also automate workflows for tasks such as access approvals and provisioning/de-provisioning.
Elements of IGA Systems
– Password management
– Integrations
– Access request managemen
– Automated Provisioning
– Entitlement management
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com
Solution(s):
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
IBM Security Verify Governance
✔
Okta
Contact(s):Okta-Licensing@ingrammicro.com
Solution(s):
✔
RSA
Contact(s):RSA-Licensing@ingrammicro.com
Solution(s):
RSA Identity Governance & Lifecycle
✔
Tenable
Contact(s):TenableTeam@ingrammicro.com
Solution(s):
Mobile Device Management (MDM/MxM)
Manage and secure employees’ mobile devices that are deployed across multiple mobile service providers and across multiple mobile operating systems being used in the organization.
Features typically include:
– Device Tracking
– Application Control
– Remote-wipe
– Anti-Malware
– Web Filtering
– Inventory Management
– Anti-theft
✔
ActZero
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
ActZero Managed Detection and Response for Mobile
✔
Avast
Contact(s):sporders@avast.com
Solution(s):
✔
BeyondTrust
Contact(s):BeyondTrust@ingrammicro.com
Solution(s):
✔
Bitdefender
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Check Point
Contact(s):checkpoint-licensing@ingrammicro.com
Solution(s):
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
Cisco Security Connector (iOS)
✔
Citrix
Contact(s):CitrixMD@ingrammicro.com
Solution(s):
✔
Dell Technologies
Contact(s):Dell Technologies Contacts Overview
Solution(s):
Device Management with Microsoft Endpoint Manager
✔
ESET
Contact(s):ESET Contacts Overview
NSX-Sales@ingrammicro.com
Solution(s):
✔
Forcepoint
Contact(s):Forcepoint-Licensing@ingrammicro.com
Solution(s):
Forcepoint Web Security, Forcepoint Cloud Web Security
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com
Solution(s):
✔
HCLSoftware
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
✔
Interguard Software
Contact(s):USCloud@ingrammicro.com
Solution(s):
InterGuard Computer Monitoring Software
✔
Ivanti
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Lookout
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Lookout Mobile Endpoint Security
✔
Meraki (Cisco)
Contact(s):Meraki (Cisco) Contacts Overview
Solution(s):
✔
Microsoft
Contact(s):Microsoft Contacts Overview
Solution(s):
Enterprise Mobility + Security (EM+S)
✔
Proofpoint
Contact(s):Proofpoint-Licensing@ingrammicro.com
Solution(s):
✔
SentinelOne
Contact(s):SentinelOne-Licensing@ingrammicro.com
Solution(s):
✔
Sophos
Contact(s):sophos-licensing@ingrammicro.com
Solution(s):
✔
SyncDog
Contact(s):USCloud@IngramMicro.com
Solution(s):
SyncDog’s Secure Mobile Trust Platform
✔
Trellix
Contact(s):trellix-licensing@ingrammicro.com
Solution(s):
✔
Trend Micro
Contact(s):Trend-Licensing@ingrammicro.com
Solution(s):
Mobile Security for Enterprises
Network Vulnerability Assessments, Penetration Tests
A network vulnerability assessment is the process of reviewing and analyzing a computer network for possible security vulnerabilities and loopholes. It is used by network administrators to evaluate the security architecture and defense of a network against possible vulnerabilities and threats.
Ingram Micro Professional Service:
Penetration Test Assessment
✔
Adlumin
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Arctic Wolf
Contact(s):ArcticWolfMD@ingrammicro.com
Solution(s):
✔
Binary Defense
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Dell Technologies
Contact(s):Dell Technologies Contacts Overview
Solution(s):
Proactive Security / Pen TestingÂ
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com
Solution(s):
FortiGuard Penetration Testing Service
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
IBM’s X-Force Red Offensive Testing Services
✔
Ingram Micro Services
Contact(s):USServices@ingrammicro.com
Solution(s):
✔
Mandiant
Contact(s):Mandiant-Licensing@IngramMicro.com
Solution(s):
✔
NetAlly
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Tenable
Contact(s):TenableTeam@ingrammicro.com
Solution(s):
Regulation & Compliance Management
Regulatory compliance is an effort to ensure a company is aware of steps needed to comply with relevant laws, polices, and regulations. Security reflects a large portion of these compliancies.
Ingram Micro Professional Service:
Network Security Services
✔
ActZero
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
ActZero Managed Detection & Response (MDR) Service
✔
Adlumin
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Alert Logic
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Included in:
– Essentials
– Professional
– Enterprise
✔
Alien Vault (AT&T)
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Arctic Wolf
Contact(s):ArcticWolfMD@ingrammicro.com
Solution(s):
Arctic Wolf Managed Detection & Response
✔
Binary Defense
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Security Information & Event Management
✔
Bitdefender
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Check Point
Contact(s):checkpoint-licensing@ingrammicro.com
Solution(s):
✔
Dell Technologies
Contact(s):Dell Technologies Contacts Overview
Solution(s):
✔
Forcepoint
Contact(s):Forcepoint-Licensing@ingrammicro.com
Solution(s):
Forcepoint NGFW, Forcepoint DLP
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com
Solution(s):
✔
HCLSoftware
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
✔
Ingram Micro Services
Contact(s):USServices@ingrammicro.com
Solution(s):
✔
Juniper
Contact(s):Juniper Contacts Overview
Juniper.Assist@ingrammicro.com
Solution(s):
✔
Microsoft
Contact(s):Microsoft Contacts Overview
Solution(s):
✔
PKWARE
Contact(s):PKWare@ingrammicro.com
Solution(s):
✔
Proofpoint
Contact(s):Proofpoint-Licensing@ingrammicro.com
Solution(s):
Proofpoint Intelligent Supervision & E-Discovery or via Proofpoint Essentials Pro
✔
Sophos
Contact(s):sophos-licensing@ingrammicro.com
Solution(s):
✔
Tenable
Contact(s):TenableTeam@ingrammicro.com
Solution(s):
✔
Trellix
Contact(s):trellix-licensing@ingrammicro.com
Solution(s):
✔
Trend Micro
Contact(s):Trend-Licensing@ingrammicro.com
Solution(s):
✔
Veritas
Contact(s):veritas-licensing@ingrammicro.com
Solution(s):
SSH Key, PKI, or Certificate Managementand/or Machine Identity Management
Public Key Infrastructure (PKI)Â is a technology for authenticating users and devices in the digital world. The basic idea is to have one or more trusted parties digitally sign documents certifying that a particular cryptographic key belongs to a particular user or device.
Certificate Management is the activity of monitoring, facilitating, and executing every certificate process necessary for uninterrupted network operations.
✔
Adlumin
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
AppViewX
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Axiad IDS
Contact(s):pshelpdesk@ingrammicro.com
Solution(s):
✔
HCLSoftware
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Vulnerability Management & Analytics
Vulnerability Management is the practice of identifying, classifying, remediating, and mitigating vulnerabilities. Vulnerability Analytics is a process that defines, identifies, and classifies the security holes (vulnerabilities) in a computer, network, or communications infrastructure.
Ingram Micro Professional Service:
Dev/Sec/Ops Services
✔
ActZero
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
ActZero Managed Detection & Response (MDR) Service
✔
Adlumin
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Alert Logic
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Vulnerability Scanning & Vulnerability Assessment
✔
Alien Vault (AT&T)
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Arctic Wolf
Contact(s):ArcticWolfMD@ingrammicro.com
Solution(s):
✔
Avast
Contact(s):sporders@avast.com
Solution(s):
✔
Balbix
Contact(s):USCloud@ingrammicro.com
Solution(s):
Balbix Risk-Based Vulnerability Management
✔
Barracuda
Contact(s):Barracuda Contacts Overview
Solution(s):
✔
Binary Defense
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Security Information & Event Management
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
Cisco Secure Network Analytics (Enterprise)
Cisco Secure Network Analytics (Cloud)
Cisco Secure Firewall Management Center
✔
Dell Technologies
Contact(s):Dell Technologies Contacts Overview
Solution(s):
Cyber Advisory and Vulnerability ManagementÂ
✔
Foresite
Contact(s):USServices@ingrammicro.com
Solution(s):
Managed security monitoring and alerting
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com
Solution(s):
FortiManager and FortiAnalyzer
✔
HCLSoftware
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
Qradar Vulnerability Manager, Qradar Watson Advisor
IBM’s X-Force Red Offensive Testing Services
✔
Infoblox
Contact(s):Infoblox-Licensing@ingrammicro.com
Solution(s):
Infoblox Reporting and Analytics
✔
Ingram Micro Services
Contact(s):USServices@ingrammicro.com
Solution(s):
✔
Juniper
Contact(s):Juniper Contacts Overview
Juniper.Assist@ingrammicro.com
Solution(s):
✔
Mandiant
Contact(s):Mandiant-Licensing@IngramMicro.com
Solution(s):
Mandiant Advantage Threat Intelligence: Vulnerability Management
✔
Microsoft
Contact(s):Microsoft Contacts Overview
Solution(s):
✔
SyncDog
Contact(s):USCloud@IngramMicro.com
Solution(s):
✔
Tenable
Contact(s):TenableTeam@ingrammicro.com
Solution(s):
Tenable Vulnerability Management
Tenable One Exposure Management Platform
✔
Vicarius
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Zyxel
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
– CNM Secumanager
– CNM SecuReporter
Protect
The Protect category of the NIST Cybersecurity Framework focuses on implementing safeguards to ensure the delivery of critical services and limit the impact of cybersecurity events. It includes Identity Management, Awareness and Training, Data Security, Information Protection Processes, Maintenance, and Protective Technology. These areas collectively help organizations safeguard their systems and data, ensuring business continuity and resilience against cyber threats.
Change Control
Monitor, report, and restrict access to file changes.
✔
Adlumin
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Microsoft
Contact(s):Microsoft Contacts Overview
Solution(s):
✔
Trellix
Contact(s):trellix-licensing@ingrammicro.com
Solution(s):
Cloud & Container Security
Cloud Security involves the procedures and technology that secure cloud computing environments against both external and insider cybersecurity threats.
Container Security is the process of implementing security tools and policies to assure that all in your container is running as intended, including protection of infrastructure, software supply chain, runtime, and everything between.
✔
Adlumin
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Arctic Wolf
Contact(s):ArcticWolfMD@ingrammicro.com
Solution(s):
Arctic Wolf Cloud Detection and Response
✔
Binary Defense
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Bitdefender
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
GravityZone Security for ContainersÂ
✔
Check Point
Contact(s):checkpoint-licensing@ingrammicro.com
Solution(s):
✔
Dell Technologies
Contact(s):Dell Technologies Contacts Overview
Solution(s):
✔
F5
Contact(s):F5-Team@ingrammicro.com
Solution(s):
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com
Solution(s):
✔
HCLSoftware
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
✔
Mandiant
Contact(s):Mandiant-Licensing@IngramMicro.com
Solution(s):
Mandiant Consulting Services: Cloud Security Assessment
✔
Microsoft
Contact(s):Microsoft Contacts Overview
Solution(s):
✔
Palo Alto Networks
Contact(s):paloaltosolutions@ingrammicro.com
Solution(s):
✔
SkyhighSecurity
Contact(s):Skyhigh-Licensing@ingrammicro.com
Solution(s):
Skyhigh Security Cloud Security Posture Management (CSPM)
✔
Tenable
Contact(s):TenableTeam@ingrammicro.com
Solution(s):
✔
Trend Micro
Contact(s):Trend-Licensing@ingrammicro.com
Solution(s):
Trend Micro Cloud One Security Services Platform
Cloud Access Security Broker (CASB)
CASBÂ is a solution that provides security for cloud applications and infrastructure
✔
Check Point
Contact(s):checkpoint-licensing@ingrammicro.com
Solution(s):
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
✔
Forcepoint
Contact(s):Forcepoint-Licensing@ingrammicro.com
Solution(s):
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com
Solution(s):
✔
HPE (Aruba Networks)
Contact(s):HPEAruba@ingrammicro.com
Solution(s):
✔
iboss
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Core Package, Malware Defense, and DLP packages
(CASB Cloud Application Visibility & Controls)
✔
Ingram Micro Services
Contact(s):USServices@ingrammicro.com
Solution(s):
✔
Microsoft
Contact(s):Microsoft Contacts Overview
Solution(s):
✔
Palo Alto Networks
Contact(s):paloaltosolutions@ingrammicro.com
Solution(s):
✔
Proofpoint
Contact(s):Proofpoint-Licensing@ingrammicro.com
Solution(s):
Proofpoint Cloud App Security Broker
✔
SkyhighSecurity
Contact(s):Skyhigh-Licensing@ingrammicro.com
Solution(s):
✔
SonicWall
Contact(s):SonicWall-Renewals@ingrammicro.com
Solution(s):
✔
Trend Micro
Contact(s):Trend-Licensing@ingrammicro.com
Solution(s):
Cloud Workload Protection (Kubernetes)
Solutions that monitor for and remove threats from cloud workloads and containers to ensure the security of workloads as they move across cloud environments.
✔
Bitdefender
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
GravityZone Security for ContainersÂ
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com
Solution(s):
✔
Palo Alto Networks
Contact(s):paloaltosolutions@ingrammicro.com
Solution(s):
✔
Tenable
Contact(s):TenableTeam@ingrammicro.com
Solution(s):
COVID & WFH Related Solutions
Solutions that may assist with COVID related issues:
– Remotely Deployable Firewalls
– Remotely Deployable APs
– Other Work From Home or Remote User Products
– Temperature kiosks
– Employee & Asset Tracking
✔
Acronis
Contact(s):Acronis-Cloud@ingrammicro.com
Solution(s):
✔
Adlumin
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Arcserve
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
BeyondTrust
Contact(s):BeyondTrust@ingrammicro.com
Solution(s):
BeyondTrust Privileged Remote Access
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
✔
CrashPlan
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Dell Technologies
Contact(s):Dell Technologies Contacts Overview
Solution(s):
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com
Solution(s):
✔
HCLSoftware
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
HPE (Aruba Networks)
Contact(s):HPEAruba@ingrammicro.com
Solution(s):
✔
iboss
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Core Package, Malware Defense, and DLP Packages
✔
Infoblox
Contact(s):Infoblox-Licensing@ingrammicro.com
Solution(s):
✔
Ingram Micro Services
Contact(s):USServices@ingrammicro.com
Solution(s):
✔
Interguard Software
Contact(s):USCloud@ingrammicro.com
Solution(s):
InterGuard Employee Monitoring Software
✔
Mandiant
Contact(s):Mandiant-Licensing@IngramMicro.com
Solution(s):
Mandiant Advantage Security Validation
✔
Meraki (Cisco)
Contact(s):Meraki (Cisco) Contacts Overview
Solution(s):
✔
NetAlly
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Palo Alto Networks
Contact(s):paloaltosolutions@ingrammicro.com
Solution(s):
✔
RSA
Contact(s):RSA-Licensing@ingrammicro.com
Solution(s):
✔
Sophos
Contact(s):sophos-licensing@ingrammicro.com
Solution(s):
Sophos Remote Ethernet Devices (RED)
✔
SyncDog
Contact(s):USCloud@IngramMicro.com
Solution(s):
✔
Tenable
Contact(s):TenableTeam@ingrammicro.com
Solution(s):
✔
Trellix
Contact(s):trellix-licensing@ingrammicro.com
Solution(s):
Trellix Device to Cloud Suites
Customer Identity & Access Management (CIAM)
CIAMÂ enables organizations to securely capture and manage customer identity and profile data, as well as control customer access to applications and services.
✔
Dell Technologies
Contact(s):Dell Technologies Contacts Overview
Solution(s):
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com
Solution(s):
✔
Microsoft
Contact(s):Microsoft Contacts Overview
Solution(s):
✔
Okta
Contact(s):Okta-Licensing@ingrammicro.com
Solution(s):
✔
RSA
Contact(s):RSA-Licensing@ingrammicro.com
Solution(s):
Data Loss Prevention (DLP)
Data Loss Prevention (DLP)Â solutions restrict end users from sending sensitive or critical information outside of the corporate network.
✔
Bitdefender
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Blancco
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Check Point
Contact(s):checkpoint-licensing@ingrammicro.com
Solution(s):
DLP Blade running on Security Gateways and vSec
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
✔
Citrix
Contact(s):CitrixMD@ingrammicro.com
Solution(s):
✔
ESET
Contact(s):ESET Contacts Overview
NSX-Sales@ingrammicro.com
Solution(s):
✔
Forcepoint
Contact(s):Forcepoint-Licensing@ingrammicro.com
Solution(s):
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com
Solution(s):
✔
HPE (Aruba Networks)
Contact(s):HPEAruba@ingrammicro.com
Solution(s):
✔
iboss
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Interguard Software
Contact(s):USCloud@ingrammicro.com
Solution(s):
InterGuard Data Loss Prevention Software
✔
ITsMine
Contact(s):USCloud@ingrammicro.com
Solution(s):
✔
Mandiant
Contact(s):Mandiant-Licensing@IngramMicro.com
Solution(s):
Mandiant Advantage Security Validation
✔
Mimecast
Contact(s):Mimecast-Licensing@ingrammicro.com
Solution(s):
✔
OPSWAT
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Palo Alto Networks
Contact(s):paloaltosolutions@ingrammicro.com
Solution(s):
✔
PKWARE
Contact(s):PKWare@ingrammicro.com
Solution(s):
✔
Proofpoint
Contact(s):Proofpoint-Licensing@ingrammicro.com
Solution(s):
– Proofpoint E-Mail Data Loss Prevention
– Proofpoint Essentials
✔
SkyhighSecurity
Contact(s):Skyhigh-Licensing@ingrammicro.com
Solution(s):
✔
SonicWall
Contact(s):SonicWall-Renewals@ingrammicro.com
Solution(s):
– Next-Generation Firewalls
– Enauk Security
– SMA Appliances
✔
Sophos
Contact(s):sophos-licensing@ingrammicro.com
Solution(s):
– XG Firewall
– Sophos Email
– Intercept X Endpoint
✔
SyncDog
Contact(s):USCloud@IngramMicro.com
Solution(s):
✔
Trellix
Contact(s):trellix-licensing@ingrammicro.com
Solution(s):
✔
Trend Micro
Contact(s):Trend-Licensing@ingrammicro.com
Solution(s):
integrated in Worry-Free Svcs, Smart Protection, Cloud App Sec, TMEMS
✔
WatchGuard
Contact(s):WatchguardMD@ingrammicro.com
Solution(s):
Data Security and Protection
Monitor, scan, mask, and discover vulnerabilities in databases and storage.
✔
Arcserve
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Atakama
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
CrashPlan
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Dell Technologies
Contact(s):Dell Technologies Contacts Overview
Solution(s):
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
✔
OPSWAT
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
MetaDefender Vault, MetaDefender Drive, MetaDefender for Secure Storage
✔
PKWARE
Contact(s):PKWare@ingrammicro.com
Solution(s):
PKProtect Data StoreManager, PKWProtect Endpoint Manager
✔
SkyhighSecurity
Contact(s):Skyhigh-Licensing@ingrammicro.com
Solution(s):
✔
SyncDog
Contact(s):USCloud@IngramMicro.com
Solution(s):
✔
Tenable
Contact(s):TenableTeam@ingrammicro.com
Solution(s):
✔
Trellix
Contact(s):trellix-licensing@ingrammicro.com
Solution(s):
✔
V-Key
Contact(s):USCloud@ingrammicro.com
Solution(s):
Disk Encryption
Full Disk Encryption protects information by converting it into unreadable code that cannot be deciphered easily by unauthorized people.
✔
Axcient
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Bitdefender
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Check Point
Contact(s):checkpoint-licensing@ingrammicro.com
Solution(s):
Endpoint Full Disk Encryption Software
✔
Dell Technologies
Contact(s):Dell Technologies Contacts Overview
Solution(s):
Dell Unity XT Unified Storage Solution
Dell EMC Isilon and ECS Storage for Media and Entertainment
Dell ECS Enterprise Object Storage
Dell VxRail Hyperconverged Infrastructure
VxBlock Converged Infrastructure
Integrated Data Protection Appliance
PowerProtect DD Series Appliances
✔
ESET
Contact(s):ESET Contacts Overview
NSX-Sales@ingrammicro.com
Solution(s):
ESET Full Disk Protection/ESET Endpoint Encryption PRO
✔
HCLSoftware
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
HPE (Aruba Networks)
Contact(s):HPEAruba@ingrammicro.com
Solution(s):
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
IBM Multi-Cloud Data Encryption
✔
Microsoft
Contact(s):Microsoft Contacts Overview
Solution(s):
✔
OPSWAT
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Sophos
Contact(s):sophos-licensing@ingrammicro.com
Solution(s):
SafeGuard Encryption, Central Encryption
✔
SyncDog
Contact(s):USCloud@IngramMicro.com
Solution(s):
✔
Trellix
Contact(s):trellix-licensing@ingrammicro.com
Solution(s):
✔
Trend Micro
Contact(s):Trend-Licensing@ingrammicro.com
Solution(s):
Trend Micro Endpoint Encryption
DMARC Email Authentication Protocol
Domain-based Message Authentication, Reporting & Conformance (DMARC), is a protocol that uses Sender Policy Framework (SPF) and DomainKeys identified mail (DKIM) to determine the authenticity of an email message.
Most email security vendors support the DMARC protocol at a basic level, this category is for advanced management and analytics.
✔
Adlumin
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Arctic Wolf
Contact(s):ArcticWolfMD@ingrammicro.com
Solution(s):
Arctic Wolf MDR Integrations for Email Gateway
✔
Barracuda
Contact(s):Barracuda Contacts Overview
Solution(s):
✔
Mimecast
Contact(s):Mimecast-Licensing@ingrammicro.com
Solution(s):
✔
Proofpoint
Contact(s):Proofpoint-Licensing@ingrammicro.com
Solution(s):
✔
Trend Micro
Contact(s):Trend-Licensing@ingrammicro.com
Solution(s):
Included in TM Email Security, Messaging Security
DNS and DDOS Protection, DHCP & IP Management (DDI)
DNS protection filters device queries to the internet, or from the internet, and blocks known bad websites or DDOS attempts from reaching the device.
AÂ denial-of-service attack (DDOS)Â is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.
AÂ DDIÂ solution provides a centralized platform to manage DNS and DHCP services and has an IP Address Management (IPAM) component.
✔
Adlumin
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Arctic Wolf
Contact(s):ArcticWolfMD@ingrammicro.com
Solution(s):
Arctic Wolf Managed Detection and Response
✔
Barracuda
Contact(s):Barracuda Contacts Overview
Solution(s):
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com
Solution(s):
✔
HPE (Aruba Networks)
Contact(s):HPEAruba@ingrammicro.com
Solution(s):
✔
Palo Alto Networks
Contact(s):paloaltosolutions@ingrammicro.com
Solution(s):
Email Encryption
Email Encryption involves encrypting the content of email messages to protect potentially sensitive information from being read by anyone other than intended recipients.
✔
Adlumin
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Barracuda
Contact(s):Barracuda Contacts Overview
Solution(s):
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
Cisco Secure Email Encryption Service
✔
ESET
Contact(s):ESET Contacts Overview
NSX-Sales@ingrammicro.com
Solution(s):
✔
Forcepoint
Contact(s):Forcepoint-Licensing@ingrammicro.com
Solution(s):
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com
Solution(s):
✔
Intermedia
Contact(s):USCloud@IngramMicro.com
Solution(s):
✔
Mimecast
Contact(s):Mimecast-Licensing@ingrammicro.com
Solution(s):
✔
PKWARE
Contact(s):PKWare@ingrammicro.com
Solution(s):
✔
Proofpoint
Contact(s):Proofpoint-Licensing@ingrammicro.com
Solution(s):
– Proofpoint E-Mail Encryption
– Proofpoint Essentials Advanced & Pro
✔
RMail
Contact(s):USCloud@ingrammicro.com
Solution(s):
Multiple RMail Encryption Offerings Availabe
✔
SonicWall
Contact(s):SonicWall-Renewals@ingrammicro.com
Solution(s):
– Email Security Appliances
– Hosted Email Security
✔
Sophos
Contact(s):sophos-licensing@ingrammicro.com
Solution(s):
✔
SyncDog
Contact(s):USCloud@IngramMicro.com
Solution(s):
✔
Trend Micro
Contact(s):Trend-Licensing@ingrammicro.com
Solution(s):
Included in TM Email Security, Cloud App Security, Messaging Security
Email Protection and/or Anti-Spam
Email Protection describes different techniques for keeping sensitive information in email communication and accounts secure against unauthorized access, loss or compromise. Email is often used to spread malware, spam and phishing attacks. Attackers use deceptive messages to entice recipients to part with sensitive information, open attachments or click on hyperlinks that install malware on the victim’s device. Email is also a common entry point for attackers looking to gain a foothold in an enterprise network and obtain valuable company data.
Features typically include:
– Anti-Virus
– Anti-SPAM
– Phishing Protection
– URL Rewrites
– Email Data Loss Prevention (DLP)
✔
Adlumin
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Arctic Wolf
Contact(s):ArcticWolfMD@ingrammicro.com
Solution(s):
Arctic Wolf MDR Integrations for Email Gateway
✔
Avast
Contact(s):sporders@avast.com
Solution(s):
Business Antivirus, CloudCare Antispam
✔
Barracuda
Contact(s):Barracuda Contacts Overview
Solution(s):
✔
Binary Defense
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Bitdefender
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Check Point
Contact(s):checkpoint-licensing@ingrammicro.com
Solution(s):
Anti-Spam & Email Security on Security Gateways and vSec
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
Cisco Secure Cloud Mailbox Defense
✔
CrashPlan
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Dell Technologies
Contact(s):Dell Technologies Contacts Overview
Solution(s):
✔
ESET
Contact(s):ESET Contacts Overview
NSX-Sales@ingrammicro.com
Solution(s):
✔
Forcepoint
Contact(s):Forcepoint-Licensing@ingrammicro.com
Solution(s):
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com
Solution(s):
✔
Juniper
Contact(s):Juniper Contacts Overview
Juniper.Assist@ingrammicro.com
Solution(s):
✔
Lookout
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Lookout Phishing and Content Protection
✔
Microsoft
Contact(s):Microsoft Contacts Overview
Solution(s):
✔
Mimecast
Contact(s):Mimecast-Licensing@ingrammicro.com
Solution(s):
✔
OPSWAT
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Metadefender Email Gateway Security
✔
Proofpoint
Contact(s):Proofpoint-Licensing@ingrammicro.com
Solution(s):
– Proofpoint E-Mail Protection (PPS)
– Proofpoint Essentials
✔
RMail
Contact(s):USCloud@ingrammicro.com
Solution(s):
Multiple RMail Protection Offerings Availabe
✔
SonicWall
Contact(s):SonicWall-Renewals@ingrammicro.com
Solution(s):
✔
Sophos
Contact(s):sophos-licensing@ingrammicro.com
Solution(s):
✔
Trellix
Contact(s):trellix-licensing@ingrammicro.com
Solution(s):
Trellix Security for Email Servers
✔
Trend Micro
Contact(s):Trend-Licensing@ingrammicro.com
Solution(s):
✔
VMRay
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
VMRay Email Threat Defender (ETD)
✔
WatchGuard
Contact(s):WatchguardMD@ingrammicro.com
Solution(s):
✔
Zerospam
Contact(s):USCloud@IngramMicro.com
Solution(s):
✔
Zyxel
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Endpoint Application Control
Monitor, control, and report on device-based applications and/or web applications
✔
Adlumin
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
BeyondTrust
Contact(s):BeyondTrust@ingrammicro.com
Solution(s):
Privilege Management for Win/Mac
✔
Check Point
Contact(s):checkpoint-licensing@ingrammicro.com
Solution(s):
✔
Citrix
Contact(s):CitrixMD@ingrammicro.com
Solution(s):
Citrix Endpoint Management (formerly XenMobile)
✔
F5
Contact(s):F5-Team@ingrammicro.com
Solution(s):
Access Policy Manager (APM) (BIG-IP Edge Client)
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com
Solution(s):
✔
HCLSoftware
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
SonicWall
Contact(s):SonicWall-Renewals@ingrammicro.com
Solution(s):
✔
Sophos
Contact(s):sophos-licensing@ingrammicro.com
Solution(s):
✔
SyncDog
Contact(s):USCloud@IngramMicro.com
Solution(s):
✔
Trellix
Contact(s):trellix-licensing@ingrammicro.com
Solution(s):
✔
Trend Micro
Contact(s):Trend-Licensing@ingrammicro.com
Solution(s):
TM Application Control (included in Smart Protection & Worry-Free Svcs)
✔
VMware (Carbon Black)
Contact(s):VMware_MD_Team@ingrammicro.com
Solution(s):
Application Security Software – AppDefense
Endpoint Protection
Endpoint Security protects computers and other devices on a network or in the cloud from cybersecurity threats. Endpoint security has evolved from traditional antivirus software to providing comprehensive protection from sophisticated malware and evolving zero-day threats.
This category includes:
– Desktop
– Laptop
– Server
Features typically include:
– Anti-Malware
– Application Control
– Web filtering
– Host based IPS
– APT
– Firewall
– Data loss prevention
Mobile devices and security are covered by Mobility Management category above.
Ingram Micro Professional Service:
Endpoint Security Services
✔
Acronis
Contact(s):Acronis-Cloud@ingrammicro.com
Solution(s):
✔
ActZero
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
ActZero Managed Detection & Response (MDR) Service
✔
Adlumin
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Alert Logic
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Included in:
– Essentials
– Professional
– Enterprise
✔
Arctic Wolf
Contact(s):ArcticWolfMD@ingrammicro.com
Solution(s):
Arctic Wolf MDR Integrations for Endpoint
✔
Avast
Contact(s):sporders@avast.com
Solution(s):
– Business Antivirus
– CloudCare
– Managed Workplace
✔
Binary Defense
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Bitdefender
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Check Point
Contact(s):checkpoint-licensing@ingrammicro.com
Solution(s):
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
✔
CrashPlan
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Dell Technologies
Contact(s):Dell Technologies Contacts Overview
Solution(s):
Dell Managed Detection & ResponseÂ
✔
ESET
Contact(s):ESET Contacts Overview
NSX-Sales@ingrammicro.com
Solution(s):
✔
Forcepoint
Contact(s):Forcepoint-Licensing@ingrammicro.com
Solution(s):
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com
Solution(s):
✔
Ingram Micro Services
Contact(s):USServices@ingrammicro.com
Solution(s):
✔
Interguard Software
Contact(s):USCloud@ingrammicro.com
Solution(s):
InterGuard Web Filtering & Internet Activity Monitoring
✔
Ivanti
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Microsoft
Contact(s):Microsoft Contacts Overview
Solution(s):
System Center Endpoint Protection
✔
Palo Alto Networks
Contact(s):paloaltosolutions@ingrammicro.com
Solution(s):
Traps Advanced Endpoint Protection
✔
PKWARE
Contact(s):PKWare@ingrammicro.com
Solution(s):
✔
SentinelOne
Contact(s):SentinelOne-Licensing@ingrammicro.com
Solution(s):
✔
SonicWall
Contact(s):SonicWall-Renewals@ingrammicro.com
Solution(s):
✔
Sophos
Contact(s):sophos-licensing@ingrammicro.com
Solution(s):
✔
SyncDog
Contact(s):USCloud@IngramMicro.com
Solution(s):
✔
Trellix
Contact(s):trellix-licensing@ingrammicro.com
Solution(s):
✔
Trend Micro
Contact(s):Trend-Licensing@ingrammicro.com
Solution(s):
– Worry-Free Business Security
– Apex One
– Deep Security
✔
VMware (Carbon Black)
Contact(s):VMware_MD_Team@ingrammicro.com
Solution(s):
✔
WatchGuard
Contact(s):WatchguardMD@ingrammicro.com
Solution(s):
File/Folder Encryption
File/Folder Encryption or Filesystem-level encryption, is a form of disk encryption where individual files or directories are encrypted by the file system itself.
✔
Atakama
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Axcient
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Check Point
Contact(s):checkpoint-licensing@ingrammicro.com
Solution(s):
Check Point Endpoint Media encryption and Port Protection
(part of Data Protection Package)
✔
Dell Technologies
Contact(s):Dell Technologies Contacts Overview
Solution(s):
Dell Unity XT Unified Storage Solution
Dell EMC Isilon and ECS Storage for Media and Entertainment
Dell ECS Enterprise Object Storage
VxBlock Converged Infrastructure
✔
ESET
Contact(s):ESET Contacts Overview
NSX-Sales@ingrammicro.com
Solution(s):
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
Guardium for File and Database Encryption
✔
OPSWAT
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
PKWARE
Contact(s):PKWare@ingrammicro.com
Solution(s):
✔
Sophos
Contact(s):sophos-licensing@ingrammicro.com
Solution(s):
– Safeguard File Encryption
– Safeguard Enterprise Encryption
✔
SyncDog
Contact(s):USCloud@IngramMicro.com
Solution(s):
✔
Trellix
Contact(s):trellix-licensing@ingrammicro.com
Solution(s):
Trellix File and Removable Media Protection
✔
Trend Micro
Contact(s):Trend-Licensing@ingrammicro.com
Solution(s):
Trend Micro Endpoint Encryption
Firewall / Gateway
This category includes:
– Next Generation Firewall (NGFW)
– Unified Threat Management (UTM) Firewall
– Web Application Firewall (WAF)
Features typically include:
– Web Content Management
– Anti-Virus
– Intrusion Prevention/Detection
– Data Loss Prevention
– VPN
– Web Application Control
– Cloud Sandboxing
– E-mail Anti-Spam
Ingram Micro Professional Service:
Virus & Intrusion Protection Services
✔
Adlumin
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Alert Logic
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Managed Web Application Firewall
Optional add-on for Enterprise
✔
Allied Telesis
Contact(s):AlliedTelesis@ingrammicro.com
Solution(s):
✔
Appgate
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
AppGate Software-Defined Perimeter (SDP)
✔
Arctic Wolf
Contact(s):ArcticWolfMD@ingrammicro.com
Solution(s):
Arctic Wolf MDR Integrations for Firewall
✔
Barracuda
Contact(s):Barracuda Contacts Overview
Solution(s):
✔
Binary Defense
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Check Point
Contact(s):checkpoint-licensing@ingrammicro.com
Solution(s):
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
✔
Citrix
Contact(s):CitrixMD@ingrammicro.com
Solution(s):
Citrix ADC (formerly NetScaler ADC)
✔
ESET
Contact(s):ESET Contacts Overview
NSX-Sales@ingrammicro.com
Solution(s):
✔
F5
Contact(s):F5-Team@ingrammicro.com
Solution(s):
Secure Web Gateway, Web Application Firewall
✔
Forcepoint
Contact(s):Forcepoint-Licensing@ingrammicro.com
Solution(s):
Forcepoint Trusted Gateway System
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com
Solution(s):
FortiGate & FortiGate Hybrid Cloud (On Cloud)
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
IBM Managed Security Services (MSS)
✔
iboss
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Core Package, Malware Defense, and DLP package
✔
Ingram Micro Services
Contact(s):USServices@ingrammicro.com
Solution(s):
Virus & Intrusion Protection Services
✔
Juniper
Contact(s):Juniper Contacts Overview
Juniper.Assist@ingrammicro.com
Solution(s):
✔
Lantronix
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Meraki (Cisco)
Contact(s):Meraki (Cisco) Contacts Overview
Solution(s):
✔
Opengear
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Palo Alto Networks
Contact(s):paloaltosolutions@ingrammicro.com
Solution(s):
PA Series and VM Series Next Gen Firewalls
✔
SonicWall
Contact(s):SonicWall-Renewals@ingrammicro.com
Solution(s):
Next-Generation Firewalls
– Hardware
– Virtual
– AWS/Azure
✔
Sophos
Contact(s):sophos-licensing@ingrammicro.com
Solution(s):
✔
Trellix
Contact(s):trellix-licensing@ingrammicro.com
Solution(s):
✔
Trend Micro
Contact(s):Trend-Licensing@ingrammicro.com
Solution(s):
✔
VMware (Carbon Black)
Contact(s):VMware_MD_Team@ingrammicro.com
Solution(s):
✔
WatchGuard
Contact(s):WatchguardMD@ingrammicro.com
Solution(s):
✔
Zyxel
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Fraud and Risk Management/Protection
Manage fraud and digital risk across multi-channel environments without impacting customers or transactions.
✔
Adlumin
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Arctic Wolf
Contact(s):ArcticWolfMD@ingrammicro.com
Solution(s):
✔
Binary Defense
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Mandiant
Contact(s):Mandiant-Licensing@IngramMicro.com
Solution(s):
Mandiant Consulting Services + Mandiant Advantage (Validation and Intel)
✔
NS8
Contact(s):USCloud@IngramMicro.com
Solution(s):
Gateway Advanced Persistent Threat Protection
Protection against an unauthorized person gaining access to a network undetected for a long period of time.
Solution(s):
✔
Appgate
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
AppGate Software-Defined Perimeter (SDP)
✔
Arctic Wolf
Contact(s):ArcticWolfMD@ingrammicro.com
Solution(s):
Arctic Wolf MDR Integrations for Firewall
✔
Binary Defense
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Check Point
Contact(s):checkpoint-licensing@ingrammicro.com
Solution(s):
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
Cisco Secure Firewall with Malware Defense
Cisco Secure Web with Malware Defense
Cisco Umbrella with Malware Defense
✔
ESET
Contact(s):ESET Contacts Overview
NSX-Sales@ingrammicro.com
Solution(s):
✔
Forcepoint
Contact(s):Forcepoint-Licensing@ingrammicro.com
Solution(s):
Forcepoint Advanced Persistent Threat (APT) Protection
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com
Solution(s):
FortiGate
✔
iboss
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Core Package, Malware Defense, and DLP Packages
✔
Juniper
Contact(s):Juniper Contacts Overview
Juniper.Assist@ingrammicro.com
Solution(s):
✔
Mandiant
Contact(s):Mandiant-Licensing@IngramMicro.com
Solution(s):
Mandiant Advantage Threat Intelligence
✔
Meraki (Cisco)
Contact(s):Meraki (Cisco) Contacts Overview
Solution(s):
Meraki MX with Advanced Security with AMP enabled
✔
Mimecast
Contact(s):Mimecast-Licensing@ingrammicro.com
Solution(s):
✔
OPSWAT
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Palo Alto Networks
Contact(s):paloaltosolutions@ingrammicro.com
Solution(s):
✔
Proofpoint
Contact(s):Proofpoint-Licensing@ingrammicro.com
Solution(s):
✔
SonicWall
Contact(s):SonicWall-Renewals@ingrammicro.com
Solution(s):
Next-Generation Firewalls
– Hardware
– Virtual
– AWS/Azure
✔
Sophos
Contact(s):sophos-licensing@ingrammicro.com
Solution(s):
✔
Trend Micro
Contact(s):Trend-Licensing@ingrammicro.com
Solution(s):
– Deep Discovery Analyzer
– Cloud Sandbox addon for Apex One as a Service
✔
WatchGuard
Contact(s):WatchguardMD@ingrammicro.com
Solution(s):
✔
Zyxel
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Gateway Application Control
Monitor, control, and report on web applications.
✔
Appgate
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
AppGate Software-Defined Perimeter (SDP)
✔
Check Point
Contact(s):checkpoint-licensing@ingrammicro.com
Solution(s):
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
Cisco Secure Firewall with AVC
Cisco Umbrella with App Discovery and Blocking
✔
F5
Contact(s):F5-Team@ingrammicro.com
Solution(s):
Access Policy Manager (APM), Silverline – As a Service Product
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com
Solution(s):
✔
HPE (Aruba Networks)
Contact(s):HPEAruba@ingrammicro.com
Solution(s):
✔
Juniper
Contact(s):Juniper Contacts Overview
Juniper.Assist@ingrammicro.com
Solution(s):
✔
Meraki (Cisco)
Contact(s):Meraki (Cisco) Contacts Overview
Solution(s):
✔
Palo Alto Networks
Contact(s):paloaltosolutions@ingrammicro.com
Solution(s):
PA Series and VM Series Next Gen Firewalls
✔
SonicWall
Contact(s):SonicWall-Renewals@ingrammicro.com
Solution(s):
Next-Generation Firewalls
– Hardware
– Virtual
– AWS/Azure
✔
Sophos
Contact(s):sophos-licensing@ingrammicro.com
Solution(s):
✔
WatchGuard
Contact(s):WatchguardMD@ingrammicro.com
Solution(s):
✔
Zyxel
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Identity & Access Management (IAM), Multi-Factor Authentication (MFA), Single Sign-On (SSO)
MFAÂ is access control in which a user is granted access only after successfully utilizing more than one authentication method.
SSOÂ is an authentication process that allows a user to access multiple applications with one set of login credentials.
Ingram Micro Professional Service:
Identity & Access Management Services
✔
Arctic Wolf
Contact(s):ArcticWolfMD@ingrammicro.com
Solution(s):
Arctic Wolf MDR Integrations for Authentication
✔
Axiad IDS
Contact(s):pshelpdesk@ingrammicro.com
Solution(s):
✔
BeyondTrust
Contact(s):BeyondTrust@ingrammicro.com
Solution(s):
– BeyondTrust Password Safe
– BeypndTrust DevOps Secrets Safe
✔
Binary Defense
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
Cisco Identity Services Engine
✔
Citrix
Contact(s):CitrixMD@ingrammicro.com
Solution(s):
✔
Dell Technologies
Contact(s):Dell Technologies Contacts Overview
Solution(s):
✔
ESET
Contact(s):ESET Contacts Overview
NSX-Sales@ingrammicro.com
Solution(s):
✔
Evidian (Atos)
Contact(s):Evidian-Licensing@ingrammicro.com
Solution(s):
✔
F5
Contact(s):F5-Team@ingrammicro.com
Solution(s):
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com
Solution(s):
FortiToken, FortiAuthenticator
✔
HPE (Aruba Networks)
Contact(s):HPEAruba@ingrammicro.com
Solution(s):
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
✔
Ingram Micro Services
Contact(s):USServices@ingrammicro.com
Solution(s):
Identity & Access Management Services
✔
Microsoft
Contact(s):Microsoft Contacts Overview
Solution(s):
✔
Okta
Contact(s):Okta-Licensing@ingrammicro.com
Solution(s):
– Okta Single Sign-On
– Adaptive Multi-Factor Authentication
✔
RSA
Contact(s):RSA-Licensing@ingrammicro.com
Solution(s):
✔
VMware (Carbon Black)
Contact(s):VMware_MD_Team@ingrammicro.com
Solution(s):
✔
WatchGuard
Contact(s):WatchguardMD@ingrammicro.com
Solution(s):
✔
Yubico
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
IT Asset Disposition (ITAD)
IT Asset Disposition (ITAD)Â is the business built around disposing of obsolete or unwanted equipment in a safe and ecologically-responsible manner.
✔
Ingram Micro Services
Contact(s):USServices@ingrammicro.com
Solution(s):
Network Access Control (NAC)
Network management and security that enforces security policy, compliance and management of access control to a network.
✔
Barracuda
Contact(s):Barracuda Contacts Overview
Solution(s):
Zero Trust Access for Microsoft 365
✔
Check Point
Contact(s):checkpoint-licensing@ingrammicro.com
Solution(s):
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
Identity Services Engine (ISE)
Cisco Identity Services Engine
✔
F5
Contact(s):F5-Team@ingrammicro.com
Solution(s):
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com
Solution(s):
– FortiNAC
– FortiAuthenticator
✔
HPE (Aruba Networks)
Contact(s):HPEAruba@ingrammicro.com
Solution(s):
✔
OPSWAT
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
NAC Enterprise Network Access Control
Network Intrusion Prevention System
Including Network Intrusion prevention System (NIPS) & Intrusion Detection System (IDS) signature/behavioral/protocol-based security.
✔
Adlumin
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Appgate
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
AppGate Software-Defined Perimeter (SDP)
✔
Arctic Wolf
Contact(s):ArcticWolfMD@ingrammicro.com
Solution(s):
Arctic Wolf MDR Integrations for Firewall
✔
Binary Defense
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Check Point
Contact(s):checkpoint-licensing@ingrammicro.com
Solution(s):
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
Cisco Secure Firewall with NGIPS
✔
Dell Technologies
Contact(s):Dell Technologies Contacts Overview
Solution(s):
Dell Managed Detection & ResponseÂ
✔
ESET
Contact(s):ESET Contacts Overview
NSX-Sales@ingrammicro.com
Solution(s):
✔
F5
Contact(s):F5-Team@ingrammicro.com
Solution(s):
F5 BIG-IP AFM Intrusion Prevention System (IPS)
✔
Forcepoint
Contact(s):Forcepoint-Licensing@ingrammicro.com
Solution(s):
FORCEPOINT Intrusion Prevention System
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com
Solution(s):
✔
HPE (Aruba Networks)
Contact(s):HPEAruba@ingrammicro.com
Solution(s):
HPE Aruba EdgeConnect (SilverPeak)
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
IBM Managed Security Services (MSS)
✔
iboss
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Malware Defense and Data Loss Prevention Packages
✔
Juniper
Contact(s):Juniper Contacts Overview
Juniper.Assist@ingrammicro.com
Solution(s):
✔
Meraki (Cisco)
Contact(s):Meraki (Cisco) Contacts Overview
Solution(s):
✔
Palo Alto Networks
Contact(s):paloaltosolutions@ingrammicro.com
Solution(s):
✔
SonicWall
Contact(s):SonicWall-Renewals@ingrammicro.com
Solution(s):
Next-Generation Firewalls
– Hardware
– Virtual
– AWS/Azure
✔
Sophos
Contact(s):sophos-licensing@ingrammicro.com
Solution(s):
✔
Trellix
Contact(s):trellix-licensing@ingrammicro.com
Solution(s):
Trellix Network Security Platform
✔
Trend Micro
Contact(s):Trend-Licensing@ingrammicro.com
Solution(s):
– Tipping Point
– Cloud One Network Security
✔
WatchGuard
Contact(s):WatchguardMD@ingrammicro.com
Solution(s):
✔
Zyxel
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Ransomware Protection & Mitigation
Tools to detect, prevent, and remediate from ransomware attacks
✔
Acronis
Contact(s):Acronis-Cloud@ingrammicro.com
Solution(s):
✔
ActZero
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
ActZero Managed Detection & Response (MDR) Service
✔
Adlumin
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Alien Vault (AT&T)
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
AlienVault Unified Security Management (USM)
✔
Arctic Wolf
Contact(s):ArcticWolfMD@ingrammicro.com
Solution(s):
Arctic Wolf Managed Detection & Response
✔
Atakama
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Binary Defense
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Bitdefender
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Check Point
Contact(s):checkpoint-licensing@ingrammicro.com
Solution(s):
Harmony Endpoint (All Versions)
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
Cisco Identity Services Engine
✔
Cofense
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Cofense Ransomware Intelligence
✔
CrashPlan
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
CyberFortress
Contact(s):OffsiteDataSync-Licensing@ingrammicro.com
Solution(s):
✔
Dell Technologies
Contact(s):Dell Technologies Contacts Overview
Solution(s):
Proactive Security / Pen TestingÂ
✔
ESET
Contact(s):ESET Contacts Overview
NSX-Sales@ingrammicro.com
Solution(s):
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com
Solution(s):
Stop Ransomware and Phishing with the Fortinet Security Fabric
✔
HPE (Aruba Networks)
Contact(s):HPEAruba@ingrammicro.com
Solution(s):
✔
Intermedia
Contact(s):USCloud@IngramMicro.com
Solution(s):
✔
Juniper
Contact(s):Juniper Contacts Overview
Juniper.Assist@ingrammicro.com
Solution(s):
Juniper Next-Generation Firewalls
✔
Mandiant
Contact(s):Mandiant-Licensing@IngramMicro.com
Solution(s):
Mandiant Ransomware Defense Assessment
✔
Microsoft
Contact(s):Microsoft Contacts Overview
Solution(s):
Microsoft 365 advanced protection
✔
Mimecast
Contact(s):Mimecast-Licensing@ingrammicro.com
Solution(s):
✔
Palo Alto Networks
Contact(s):paloaltosolutions@ingrammicro.com
Solution(s):
✔
Proofpoint
Contact(s):Proofpoint-Licensing@ingrammicro.com
Solution(s):
Proofpoint Targeted Attack Protection
✔
RSA
Contact(s):RSA-Licensing@ingrammicro.com
Solution(s):
✔
Rubrik
Contact(s):rubrik-licensing-us@ingrammicro.com
Solution(s):
Rubrik Ransomware Investigation
✔
SentinelOne
Contact(s):SentinelOne-Licensing@ingrammicro.com
Solution(s):
✔
SonicWall
Contact(s):SonicWall-Renewals@ingrammicro.com
Solution(s):
SonicWALL Next-Gen Firewalls, Capture Endpoint Client
✔
Sophos
Contact(s):sophos-licensing@ingrammicro.com
Solution(s):
Sophos Next-Gen Firewalls, Intercept X Endpoint Client
✔
Trellix
Contact(s):trellix-licensing@ingrammicro.com
Solution(s):
✔
Trend Micro
Contact(s):Trend-Licensing@ingrammicro.com
Solution(s):
Endpoint, Email & Web, Network & Server
✔
Veeam
Contact(s):VeeamMD@ingrammicro.com
Solution(s):
✔
Veritas
Contact(s):veritas-licensing@ingrammicro.com
Solution(s):
✔
VMware (Carbon Black)
Contact(s):VMware_MD_Team@ingrammicro.com
Solution(s):
✔
WatchGuard
Contact(s):WatchguardMD@ingrammicro.com
Solution(s):
Sandboxing or Advanced Threat Protection (ATP)
A sandbox is used to detect new and unknown malware threats. A sandbox is a security mechanism used to execute untested or untrusted programs or code without risking harm to the host machine or operating system. Advanced Threat Protection (ATP) is a feature that incorporates multiple security technologies to provide protection against targeted attacks.
✔
Bitdefender
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Bitdefender Hypervisor Introspection (HVI)
✔
Check Point
Contact(s):checkpoint-licensing@ingrammicro.com
Solution(s):
SandBlast on Security Gateways and vSec
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
Cisco Secure Firewall with Malware Defense
Cisco Secure Malware Analytics
Cisco Secure Web with Malware Defense
Cisco Umbrella with Malware Defense
✔
ESET
Contact(s):ESET Contacts Overview
NSX-Sales@ingrammicro.com
Solution(s):
ESET LiveGuard Advanced (ESET Protect Advanced)
✔
Forcepoint
Contact(s):Forcepoint-Licensing@ingrammicro.com
Solution(s):
Forcepoint Advanced Malware Detection (AMD),
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com
Solution(s):
✔
HPE (Aruba Networks)
Contact(s):HPEAruba@ingrammicro.com
Solution(s):
✔
iboss
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Malware Defense and Data Loss Prevention Packages
✔
Juniper
Contact(s):Juniper Contacts Overview
Juniper.Assist@ingrammicro.com
Solution(s):
✔
Mandiant
Contact(s):Mandiant-Licensing@IngramMicro.com
Solution(s):
Mandiant Advantage Threat Intelligence
✔
Microsoft
Contact(s):Microsoft Contacts Overview
Solution(s):
Office 365 Advanced Threat Protection
✔
Mimecast
Contact(s):Mimecast-Licensing@ingrammicro.com
Solution(s):
✔
OPSWAT
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Palo Alto Networks
Contact(s):paloaltosolutions@ingrammicro.com
Solution(s):
✔
SentinelOne
Contact(s):SentinelOne-Licensing@ingrammicro.com
Solution(s):
✔
SonicWall
Contact(s):SonicWall-Renewals@ingrammicro.com
Solution(s):
Capture ATP on Next-Generation Firewalls
✔
Sophos
Contact(s):sophos-licensing@ingrammicro.com
Solution(s):
✔
Stellar Cyber
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Trellix
Contact(s):trellix-licensing@ingrammicro.com
Solution(s):
Trellix Advanced Threat Detection
✔
Trend Micro
Contact(s):Trend-Licensing@ingrammicro.com
Solution(s):
– Deep Discovery
– Apex One Cloud Sandbox as a Service Add-on
✔
VMRay
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
WatchGuard
Contact(s):WatchguardMD@ingrammicro.com
Solution(s):
✔
Zyxel
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
ATP Firewalls
(ATP200, ATP500, ATP800)
Secure Access Service Edge (SASE)
SASEÂ is a network architecture that combines WAN capabilities with cloud-native security functions like secure web gateways, cloud access security brokers, firewalls, and zero-trust network access
Ingram Micro Professional Service:
Cloud Security Services
✔
Appgate
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Barracuda
Contact(s):Barracuda Contacts Overview
Solution(s):
✔
Check Point
Contact(s):checkpoint-licensing@ingrammicro.com
Solution(s):
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
✔
Forcepoint
Contact(s):Forcepoint-Licensing@ingrammicro.com
Solution(s):
Forcepoint Dynamic Edge Protection
✔
HPE (Aruba Networks)
Contact(s):HPEAruba@ingrammicro.com
Solution(s):
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
IBM Managed Security Services (MSS)
✔
iboss
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Core Package, Malware Defense, and DLP packages
✔
Infoblox
Contact(s):Infoblox-Licensing@ingrammicro.com
Solution(s):
✔
Palo Alto Networks
Contact(s):paloaltosolutions@ingrammicro.com
Solution(s):
✔
SkyhighSecurity
Contact(s):Skyhigh-Licensing@ingrammicro.com
Solution(s):
Secure Wireless
Certain Access Points have the ability to perform security checks on the accesspoint independent of a firewall or other security device.
Features typically include:
– Wireless Intrusion Prevention
– Web Content Filtering
– AV Scanning
– Guest/Device Tracking
Ingram Micro Professional Service:
Wireless Network Assessment
✔
Adlumin
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
Catalyst Wireless, Identity Services Engine (ISE)
Cisco Identity Services Engine
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com
Solution(s):
✔
HPE (Aruba Networks)
Contact(s):HPEAruba@ingrammicro.com
Solution(s):
Enterprise-Grade Wi-Fi Access Points
✔
Ingram Micro Services
Contact(s):USServices@ingrammicro.com
Solution(s):
✔
Juniper
Contact(s):Juniper Contacts Overview
Juniper.Assist@ingrammicro.com
Solution(s):
✔
Meraki (Cisco)
Contact(s):Meraki (Cisco) Contacts Overview
Solution(s):
✔
NetAlly
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
SonicWall
Contact(s):SonicWall-Renewals@ingrammicro.com
Solution(s):
✔
Sophos
Contact(s):sophos-licensing@ingrammicro.com
Solution(s):
✔
WatchGuard
Contact(s):WatchguardMD@ingrammicro.com
Solution(s):
Security Awareness Training
Tools to improve employee knowledge of social engineering and cyberattack techniques. Products/Services can include training as well as phishing simulations.
Ingram Micro Professional Service:
Ingram Micro Training
✔
Arctic Wolf
Contact(s):ArcticWolfMD@ingrammicro.com
Solution(s):
✔
Barracuda
Contact(s):Barracuda Contacts Overview
Solution(s):
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
Cisco Secure Email Security Awareness Training
✔
Cofense
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Dell Technologies
Contact(s):Dell Technologies Contacts Overview
Solution(s):
Employee Training / Anti PhishingÂ
✔
ESET
Contact(s):ESET Contacts Overview
NSX-Sales@ingrammicro.com
Solution(s):
ESET Cybersecurity Awareness Training
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com
Solution(s):
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
✔
Ingram Micro Services
Contact(s):USServices@ingrammicro.com
Solution(s):
✔
Mandiant
Contact(s):Mandiant-Licensing@IngramMicro.com
Solution(s):
✔
Mimecast
Contact(s):Mimecast-Licensing@ingrammicro.com
Solution(s):
✔
OPSWAT
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Pluralsight
Contact(s):USServices@ingrammicro.com
Solution(s):
Pluralsight Cybersecurity Training
✔
Proofpoint
Contact(s):Proofpoint-Licensing@ingrammicro.com
Solution(s):
Proofpoint Security Awareness Training (PSAT)
✔
Sophos
Contact(s):sophos-licensing@ingrammicro.com
Solution(s):
✔
ThriveDX
Contact(s):NXS-Sales@ingrammicro.com
Solution(s):
Cyber Academy / Digital Skills Training
✔
Trend Micro
Contact(s):Trend-Licensing@ingrammicro.com
Solution(s):
Software-Defined WAN (SD-WAN)
SD-WAN is a virtual WAN architecture that allows enterprises to leverage any combination of transport services – including MPLS, LTE and broadband internet service.
Ingram Micro Professional Service:
SD-WAN Network Optimization & Services
✔
Allied Telesis
Contact(s):AlliedTelesis@ingrammicro.com
Solution(s):
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
✔
Citrix
Contact(s):CitrixMD@ingrammicro.com
Solution(s):
Citrix SD-WAN (formerly NetScaler SD-WAN)
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com
Solution(s):
✔
HPE (Aruba Networks)
Contact(s):HPEAruba@ingrammicro.com
Solution(s):
HPE Aruba EdgeConnect (Silver Peak)
✔
Ingram Micro Services
Contact(s):USServices@ingrammicro.com
Solution(s):
SD-WAN Network Optimization & Services
✔
Juniper
Contact(s):Juniper Contacts Overview
Juniper.Assist@ingrammicro.com
Solution(s):
✔
Masergy
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Meraki (Cisco)
Contact(s):Meraki (Cisco) Contacts Overview
Solution(s):
Meraki SD-WAN for MX Firewalls
✔
Opengear
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Palo Alto Networks
Contact(s):paloaltosolutions@ingrammicro.com
Solution(s):
✔
SkyhighSecurity
Contact(s):Skyhigh-Licensing@ingrammicro.com
Solution(s):
✔
SonicWall
Contact(s):SonicWall-Renewals@ingrammicro.com
Solution(s):
Secure SD-WAN on Next-Generation Firewalls
✔
VMware (Carbon Black)
Contact(s):VMware_MD_Team@ingrammicro.com
Solution(s):
✔
WatchGuard
Contact(s):WatchguardMD@ingrammicro.com
Solution(s):
✔
Zyxel
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
SD-WAN
(VPN50, VPN100, VPN300)
Virtual Private Network (VPN)
Virtual Private Networks (VPN)Â allow users to connect their devices back to an office to access resources and files though an encrypted connection. This prevents anyone snooping from the outside from accessing plain text traffic that might be transmitted.
Common types of VPNs Include:
– IPsec (Internet Protocol Security), Software client based
– SSL (Secure Sockets Layer), clientless
✔
Allied Telesis
Contact(s):AlliedTelesis@ingrammicro.com
Solution(s):
Allied Telesis Secure VPN Routers
✔
Appgate
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
AppGate Software-Defined Perimeter (SDP)
✔
Arctic Wolf
Contact(s):ArcticWolfMD@ingrammicro.com
Solution(s):
Arctic Wolf MDR Integrations for Firewall
✔
Check Point
Contact(s):checkpoint-licensing@ingrammicro.com
Solution(s):
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
✔
Citrix
Contact(s):CitrixMD@ingrammicro.com
Solution(s):
✔
F5
Contact(s):F5-Team@ingrammicro.com
Solution(s):
✔
Forcepoint
Contact(s):Forcepoint-Licensing@ingrammicro.com
Solution(s):
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com
Solution(s):
✔
HPE (Aruba Networks)
Contact(s):HPEAruba@ingrammicro.com
Solution(s):
SD-Branch & Wireless Controllers
✔
Juniper
Contact(s):Juniper Contacts Overview
Juniper.Assist@ingrammicro.com
Solution(s):
✔
Meraki (Cisco)
Contact(s):Meraki (Cisco) Contacts Overview
Solution(s):
✔
Palo Alto Networks
Contact(s):paloaltosolutions@ingrammicro.com
Solution(s):
✔
SkyhighSecurity
Contact(s):Skyhigh-Licensing@ingrammicro.com
Solution(s):
Skyhigh Security Private Access
✔
SonicWall
Contact(s):SonicWall-Renewals@ingrammicro.com
Solution(s):
– Next-Generation Firewalls
– SMA Appliances
✔
Sophos
Contact(s):sophos-licensing@ingrammicro.com
Solution(s):
✔
SyncDog
Contact(s):USCloud@IngramMicro.com
Solution(s):
✔
Trend Micro
Contact(s):Trend-Licensing@ingrammicro.com
Solution(s):
✔
VMware (Carbon Black)
Contact(s):VMware_MD_Team@ingrammicro.com
Solution(s):
✔
WatchGuard
Contact(s):WatchguardMD@ingrammicro.com
Solution(s):
✔
Zyxel
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
USG Firewalls, Cloud Managed NSG Firewalls
Detect
The Detect category of the NIST Cybersecurity Framework focuses on identifying the occurrence of cybersecurity events in a timely manner. It includes Anomalies and Events, Security Continuous Monitoring, and Detection Processes. These areas ensure that organizations can detect and understand potential cybersecurity incidents quickly, enabling prompt response and mitigation efforts.
Dark Web Monitoring
Dark Web Monitoring, also known as cyber monitoring, is an identity theft prevention product that enables you to monitor your identity information on the dark web, and receive notifications if your information is found online.
✔
ActZero
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
ActZero Managed Detection & Response (MDR) Service
✔
Arctic Wolf
Contact(s):ArcticWolfMD@ingrammicro.com
Solution(s):
✔
Dell Technologies
Contact(s):Dell Technologies Contacts Overview
Solution(s):
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
IBM’s X-Force Incident ResponseÂ
✔
Mandiant
Contact(s):Mandiant-Licensing@IngramMicro.com
Solution(s):
Mandiant Advantage Threat Intelligence: Digital Threat Monitoring
Endpoint Detection and Response (EDR, XDR)
EDRÂ solutions record and store endpoint-system-level behaviors, use various data analytics techniques to detect suspicious system behavior, provide contextual information, block malicious activity, and provide remediation suggestions to restore affected systems.
XDR provides cross-layered threat detection and response. XDR collects and correlates detections and deep activity data across multiple security layers – email, endpoint, server, cloud workloads, and network.
✔
ActZero
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
ActZero Managed Detection & Response (MDR) Service
✔
Adlumin
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Arctic Wolf
Contact(s):ArcticWolfMD@ingrammicro.com
Solution(s):
Arctic Wolf Managed Detection and Response
✔
Binary Defense
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Bitdefender
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Check Point
Contact(s):checkpoint-licensing@ingrammicro.com
Solution(s):
Advanced Endpoint Protection and Threat Prevention
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
✔
Dell Technologies
Contact(s):Dell Technologies Contacts Overview
Solution(s):
Dell Managed Detection & ResponseÂ
✔
ESET
Contact(s):ESET Contacts Overview
NSX-Sales@ingrammicro.com
Solution(s):
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com
Solution(s):
FortiClient Security Fabric telemetry
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
✔
Mandiant
Contact(s):Mandiant-Licensing@IngramMicro.com
Solution(s):
Mandiant Advantage Automated Defense
✔
Microsoft
Contact(s):Microsoft Contacts Overview
Solution(s):
Windows Defender Advanced Threat Protection
✔
Palo Alto Networks
Contact(s):paloaltosolutions@ingrammicro.com
Solution(s):
Traps Advanced Endpoint Protection
✔
SentinelOne
Contact(s):SentinelOne-Licensing@ingrammicro.com
Solution(s):
✔
Sophos
Contact(s):sophos-licensing@ingrammicro.com
Solution(s):
✔
Stellar Cyber
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Trellix
Contact(s):trellix-licensing@ingrammicro.com
Solution(s):
✔
Trend Micro
Contact(s):Trend-Licensing@ingrammicro.com
Solution(s):
✔
VMRay
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
VMware (Carbon Black)
Contact(s):VMware_MD_Team@ingrammicro.com
Solution(s):
VMware Carbon Black Enterprise EDR
✔
WatchGuard
Contact(s):WatchguardMD@ingrammicro.com
Solution(s):
Network Vulnerability Assessments, Penetration Tests
A network vulnerability assessment is the process of reviewing and analyzing a computer network for possible security vulnerabilities and loopholes. It is used by network administrators to evaluate the security architecture and defense of a network against possible vulnerabilities and threats.
Ingram Micro Professional Service:
Penetration Test Assessment
✔
Adlumin
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Arctic Wolf
Contact(s):ArcticWolfMD@ingrammicro.com
Solution(s):
✔
Binary Defense
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Dell Technologies
Contact(s):Dell Technologies Contacts Overview
Solution(s):
Proactive Security / Pen TestingÂ
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
IBM’s X-Force Red Offensive Testing Services
✔
Ingram Micro Services
Contact(s):USServices@ingrammicro.com
Solution(s):
✔
Mandiant
Contact(s):Mandiant-Licensing@IngramMicro.com
Solution(s):
✔
NetAlly
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Tenable
Contact(s):TenableTeam@ingrammicro.com
Solution(s):
Tenable Vulnerability Management
Security Information and Event Management (SIEM) and/or Log Management
SIEM software products and services combine Security Information Management (SIM) and Security Event Management (SEM). They provide real-time analysis of security alerts generated by network hardware and applications.
✔
ActZero
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
ActZero Managed Detection & Response (MDR) Service
✔
Adlumin
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Alert Logic
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Part of Alert Logic Professional & Alert Logic Enterprise offerings
✔
Alien Vault (AT&T)
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
AppViewX
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Arctic Wolf
Contact(s):ArcticWolfMD@ingrammicro.com
Solution(s):
Arctic Wolf Managed Detection and Response
✔
Binary Defense
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Security Information & Event Management
✔
Check Point
Contact(s):checkpoint-licensing@ingrammicro.com
Solution(s):
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
Cisco Security Analytics and Logging (SAL)
Cisco Security Analytics and Logging
✔
Dell Technologies
Contact(s):Dell Technologies Contacts Overview
Solution(s):
Dell Managed Detection & ResponseÂ
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com
Solution(s):
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
✔
Juniper
Contact(s):Juniper Contacts Overview
Juniper.Assist@ingrammicro.com
Solution(s):
✔
Mandiant
Contact(s):Mandiant-Licensing@IngramMicro.com
Solution(s):
Mandiant Advantage Security Validation: SIEM Optimization Use Case
✔
Microsoft
Contact(s):Microsoft Contacts Overview
Solution(s):
✔
Palo Alto Networks
Contact(s):paloaltosolutions@ingrammicro.com
Solution(s):
✔
SentinelOne
Contact(s):SentinelOne-Licensing@ingrammicro.com
Solution(s):
✔
Stellar Cyber
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Trellix
Contact(s):trellix-licensing@ingrammicro.com
Solution(s):
Trellix Enterprise Security Manager
✔
Viavi
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
VMware (Carbon Black)
Contact(s):VMware_MD_Team@ingrammicro.com
Solution(s):
Security Operations Center as a Service (SOCaaS) and/or Managed Detection and Responce (MDR)
SOCaaSÂ is a subscription or software-based service that manages and monitors your logs, devices, clouds, network and assets for internal IT teams.
MDRÂ is an advanced managed security service that provides threat intelligence, threat hunting, security monitoring, incident analysis, and incident response. This is unlike traditional MSSPs who only provide alerts from security monitoring.
Ingram Micro Professional Service:
Security Operating Center (SOC) Services
✔
ActZero
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
ActZero Managed Detection & Response (MDR) Service
✔
Adlumin
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Alert Logic
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Included in:
– Professional
– Enterprise
✔
Arctic Wolf
Contact(s):ArcticWolfMD@ingrammicro.com
Solution(s):
Arctic Wolf Managed Detection and Response
✔
Barracuda
Contact(s):Barracuda Contacts Overview
Solution(s):
✔
Binary Defense
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Bitdefender
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Bitdefender Managed Detection and Response (MDR)
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
Cisco MDR for:
AMP for Endpoints, Umbrella, Steathwatch Cloud and Threat Grid
Cisco Managed Detection and Response
✔
ConnectWise
Contact(s):usservices@ingrammicro.com
Solution(s):
Perch – Co-managed threat detection and response
✔
Dell Technologies
Contact(s):Dell Technologies Contacts Overview
Solution(s):
Dell Managed Detection & ResponseÂ
✔
ESET
Contact(s):ESET Contacts Overview
NSX-Sales@ingrammicro.com
Solution(s):
✔
F5
Contact(s):F5-Team@ingrammicro.com
Solution(s):
Silverline Managed Security Services
✔
Foresite
Contact(s):USServices@ingrammicro.com
Solution(s):
Security Monitoring & Alerting
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com
Solution(s):
✔
Ingram Micro Services
Contact(s):USServices@ingrammicro.com
Solution(s):
Security Operating Center (SOC) Services
✔
Mandiant
Contact(s):Mandiant-Licensing@IngramMicro.com
Solution(s):
✔
Palo Alto Networks
Contact(s):paloaltosolutions@ingrammicro.com
Solution(s):
✔
SentinelOne
Contact(s):SentinelOne-Licensing@ingrammicro.com
Solution(s):
✔
Sophos
Contact(s):sophos-licensing@ingrammicro.com
Solution(s):
Sophos Managed Threat Response
✔
Trellix
Contact(s):trellix-licensing@ingrammicro.com
Solution(s):
✔
Trend Micro
Contact(s):Trend-Licensing@ingrammicro.com
Solution(s):
Trend Micro Managed Detection and Response
✔
VMware (Carbon Black)
Contact(s):VMware_MD_Team@ingrammicro.com
Solution(s):
Carbon Black Cloud Managed Detection
User and Entity Behavior Analytics (UEBA)
UEBAÂ solutions use analytics to build the standard profiles and behaviors of users and entities (hosts, applications, network traffic and data repositories) across time and peer group horizons. Activity that is anomalous to these standard baselines is presented as suspicious, and packaged analytics applied on these anomalies can help discover threats and potential incidents. The most common use cases sought by enterprises are detecting malicious insiders and external attackers infiltrating their organizations (compromised insiders)
✔
Adlumin
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Alert Logic
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
User behavior anomaly detection
Included in:
– Professional
– Enterprise
✔
Binary Defense
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
Cisco Secure Network Analytics (Enterprise)
Cisco Secure Network Analytics (Cloud)
✔
ESET
Contact(s):ESET Contacts Overview
NSX-Sales@ingrammicro.com
Solution(s):
✔
Forcepoint
Contact(s):Forcepoint-Licensing@ingrammicro.com
Solution(s):
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com
Solution(s):
✔
HPE (Aruba Networks)
Contact(s):HPEAruba@ingrammicro.com
Solution(s):
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
User Behavior Analytics (Qradar App that is available once you install Qradar)
✔
Microsoft
Contact(s):Microsoft Contacts Overview
Solution(s):
User Behavior Analytics Tools for Application Insights
✔
Palo Alto Networks
Contact(s):paloaltosolutions@ingrammicro.com
Solution(s):
✔
Stellar Cyber
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Viavi
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
VMware (Carbon Black)
Contact(s):VMware_MD_Team@ingrammicro.com
Solution(s):
Respond
The Respond category of the NIST Cybersecurity Framework focuses on developing and implementing activities to take action regarding detected cybersecurity incidents. It includes Response Planning, Communications, Analysis, Mitigation, and Improvements. These areas ensure that organizations can effectively contain the impact of cybersecurity incidents, coordinate response efforts, analyze incidents to support recovery, and implement improvements to prevent future incidents.
Forensic Analysis
Forensic analysis is the examination of structured data with regard to incidents with the aim of discovering and analyzing patterns of fraudulent activities.
✔
Acronis
Contact(s):Acronis-Cloud@ingrammicro.com
Solution(s):
✔
Adlumin
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Alien Vault (AT&T)
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Security Log Analysis & Management
✔
Arctic Wolf
Contact(s):ArcticWolfMD@ingrammicro.com
Solution(s):
✔
Binary Defense
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
Cisco Secure Network Analytics (Enterprise)
Cisco Secure Network Analytics (Cloud)
✔
Cofense
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Dell Technologies
Contact(s):Dell Technologies Contacts Overview
Solution(s):
Incident Response Retainer and Emergency IRÂ
✔
ESET
Contact(s):ESET Contacts Overview
NSX-Sales@ingrammicro.com
Solution(s):
✔
Forcepoint
Contact(s):Forcepoint-Licensing@ingrammicro.com
Solution(s):
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com
Solution(s):
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
✔
Juniper
Contact(s):Juniper Contacts Overview
Juniper.Assist@ingrammicro.com
Solution(s):
✔
Mandiant
Contact(s):Mandiant-Licensing@IngramMicro.com
Solution(s):
Mandiant Advantage Threat Intelligence
✔
NetAlly
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Palo Alto Networks
Contact(s):paloaltosolutions@ingrammicro.com
Solution(s):
✔
SentinelOne
Contact(s):SentinelOne-Licensing@ingrammicro.com
Solution(s):
✔
Stellar Cyber
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Trellix
Contact(s):trellix-licensing@ingrammicro.com
Solution(s):
✔
Trend Micro
Contact(s):Trend-Licensing@ingrammicro.com
Solution(s):
Trend Micro Managed Detection and Response
✔
Veritas
Contact(s):veritas-licensing@ingrammicro.com
Solution(s):
✔
Viavi
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
VMRay
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Incident Response
Incident Response is an organized approach to addressing and managing the aftermath of a security breach or attack. The goal is to handle the situation in a way that limits damage and reduces recovery time and costs.
✔
ActZero
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
ActZero Managed Detection & Response (MDR) Service
✔
Adlumin
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Alien Vault (AT&T)
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Arctic Wolf
Contact(s):ArcticWolfMD@ingrammicro.com
Solution(s):
✔
Binary Defense
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Bitdefender
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Managed Endpoint Detection and Response Service (MEDR)
✔
Check Point
Contact(s):checkpoint-licensing@ingrammicro.com
Solution(s):
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
✔
Cofense
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Dell Technologies
Contact(s):Dell Technologies Contacts Overview
Solution(s):
Incident Response Retainer and Emergency IRÂ
✔
ESET
Contact(s):ESET Contacts Overview
NSX-Sales@ingrammicro.com
Solution(s):
✔
F5
Contact(s):F5-Team@ingrammicro.com
Solution(s):
Silverline Managed Security Services
✔
Forcepoint
Contact(s):Forcepoint-Licensing@ingrammicro.com
Solution(s):
✔
Foresite
Contact(s):USServices@ingrammicro.com
Solution(s):
Foresite’s managed incident response
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com
Solution(s):
FortiGuard Incident Response Service
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
IBM’s X-Force Incident ResponseÂ
✔
Juniper
Contact(s):Juniper Contacts Overview
Juniper.Assist@ingrammicro.com
Solution(s):
✔
Mandiant
Contact(s):Mandiant-Licensing@IngramMicro.com
Solution(s):
✔
Palo Alto Networks
Contact(s):paloaltosolutions@ingrammicro.com
Solution(s):
✔
SentinelOne
Contact(s):SentinelOne-Licensing@ingrammicro.com
Solution(s):
✔
Sophos
Contact(s):sophos-licensing@ingrammicro.com
Solution(s):
✔
Trellix
Contact(s):trellix-licensing@ingrammicro.com
Solution(s):
✔
Trend Micro
Contact(s):Trend-Licensing@ingrammicro.com
Solution(s):
Trend Micro Managed Detection and Response
✔
Viavi
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
VMRay
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
VMware (Carbon Black)
Contact(s):VMware_MD_Team@ingrammicro.com
Solution(s):
VMware Carbon Black Audit and Remediation
Orchestration, Automation and Response (SOAR) and/or Automation Components
SOARÂ is a method of integrating and streamlining workflows across disparate tools in order to improve both security analyst efficiency and threat detection and response. Security automation is used to execute security operations tasks without human intervention.
✔
ActZero
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
ActZero Managed Detection & Response (MDR) Service
✔
Adlumin
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Alien Vault (AT&T)
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
USM Anywhere
(Security Automation & Orchestration)
✔
AppViewX
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Arctic Wolf
Contact(s):ArcticWolfMD@ingrammicro.com
Solution(s):
✔
Binary Defense
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Security Information & Event Management
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com
Solution(s):
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
✔
Palo Alto Networks
Contact(s):paloaltosolutions@ingrammicro.com
Solution(s):
✔
Stellar Cyber
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Vicarius
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Patch Management
Managing patches or upgrades for software applications and technologies.
✔
Acronis
Contact(s):Acronis-Cloud@ingrammicro.com
Solution(s):
✔
Adlumin
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
AppViewX
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Avast
Contact(s):sporders@avast.com
Solution(s):
✔
Bitdefender
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
add on for GravityZone Endpoint
✔
ConnectWise
Contact(s):usservices@ingrammicro.com
Solution(s):
✔
Dell Technologies
Contact(s):Dell Technologies Contacts Overview
Solution(s):
✔
Foresite
Contact(s):USServices@ingrammicro.com
Solution(s):
Foresite’s Vulnerability and Patch Management
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com
Solution(s):
✔
HCLSoftware
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Ivanti
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Ivanti Neurons for Patch Management
✔
Mandiant
Contact(s):Mandiant-Licensing@IngramMicro.com
Solution(s):
Mandiant Advantage Threat Intelligence: Vulnerability Management
✔
Microsoft
Contact(s):Microsoft Contacts Overview
Solution(s):
System Center Configuration Manager
✔
Trend Micro
Contact(s):Trend-Licensing@ingrammicro.com
Solution(s):
✔
Vicarius
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Remote Monitoring and Management (RMM)
RMM technology gives IT service providers the ability to manage more clients than traditional break/fix IT providers, and to do so more efficiently. Through RMM, technicians can remotely install software and updates, administer patches, and more – and this can often all be done from a single, unified dashboard. Technicians can administer tasks simultaneously to many computers at once, and no longer have to travel from office to office to handle routine maintenance.
✔
Adlumin
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
ConnectWise
Contact(s):usservices@ingrammicro.com
Solution(s):
✔
Dell Technologies
Contact(s):Dell Technologies Contacts Overview
Solution(s):
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com
Solution(s):
✔
HCLSoftware
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Mandiant
Contact(s):Mandiant-Licensing@IngramMicro.com
Solution(s):
✔
TeamViewer
Contact(s):USCloud@IngramMicro.com
Solution(s):
Recover
The Recover category of the NIST Cybersecurity Framework focuses on maintaining plans for resilience and restoring capabilities or services impaired by cybersecurity incidents. It includes Recovery Planning, Improvements, and Communications. These areas ensure that organizations can quickly return to normal operations, reduce the impact of incidents, and implement lessons learned to enhance future resilience.
Backup, Recovery (DR) & Data Protection
Backups are copies of data that are made in order to restore in case of a loss. This is a more advanced form of system copies, and modern solutions often include processing capabilities and extra features such as:
- Immutability – to prevent threat actors from encrypting data and locking you out of your backups
- Unified management – to access and manage your backups across multiple environments with ease
- The ability to backup to physical storage or the cloud
Disaster Recovery refers to the process of returning to standard operation after an event or loss of data. DR solutions often include ways to quickly stage recent backups and methods by which to orchestrate recovery plans in order to restore mission critical data and functions as efficiently as possible.
Ingram Micro Professional Service:
Backup and Disaster Recovery Services
✔
Acronis
Contact(s):Acronis-Cloud@ingrammicro.com
Solution(s):
Acronis Cloud Disaster Recovery Service for Service Providers
✔
Arcserve
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Avast
Contact(s):sporders@avast.com
Solution(s):
✔
Axcient
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Barracuda
Contact(s):Barracuda Contacts Overview
Solution(s):
Cloud to Cloud Backup for Microsoft 365
✔
Citrix
Contact(s):CitrixMD@ingrammicro.com
Solution(s):
✔
CrashPlan
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
CyberFortress
Contact(s):OffsiteDataSync-Licensing@ingrammicro.com
Solution(s):
Veam Cloud Connect: Backup & Replication with Disaster Recovery
✔
Dell Technologies
Contact(s):Dell Technologies Contacts Overview
Solution(s):
Integrated Data Protection Appliance
PowerProtect DD Series Appliances
✔
F5
Contact(s):F5-Team@ingrammicro.com
Solution(s):
BIG-IP DNS, BIG-IP Local Traffic Manager
✔
HPE (Aruba Networks)
Contact(s):HPEAruba@ingrammicro.com
Solution(s):
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
✔
Ingram Micro Services
Contact(s):USServices@ingrammicro.com
Solution(s):
Backup and Disaster Recovery Services
✔
KeepIt
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Keepit Dedicated Cloud / SaaS Data Protection
✔
Microsoft
Contact(s):Microsoft Contacts Overview
Solution(s):
Azure Backup, Azure Site Recovery
✔
Mimecast
Contact(s):Mimecast-Licensing@ingrammicro.com
Solution(s):
✔
Rubrik
Contact(s):rubrik-licensing-us@ingrammicro.com
Solution(s):
Rubrik Data Backup & Recovery Software
✔
Veeam
Contact(s):VeeamMD@ingrammicro.com
Solution(s):
Backup & Replication, Cloud Connect, Backup Essentials, Availability Suite
✔
Veritas
Contact(s):veritas-licensing@ingrammicro.com
Solution(s):
Netbackup – Enterprise, Backup Exec – SMB, System Recovery – Home Office
✔
VMware (Carbon Black)
Contact(s):VMware_MD_Team@ingrammicro.com
Solution(s):
Data Archiving
Data Archiving is the process of moving data that is no longer actively used to a separate storage device for long-term retention.
✔
Arcserve
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Axcient
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
CrashPlan
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Dell Technologies
Contact(s):Dell Technologies Contacts Overview
Solution(s):
Integrated Data Protection Appliance
PowerProtect DD Series Appliances
✔
HPE (Aruba Networks)
Contact(s):HPEAruba@ingrammicro.com
Solution(s):
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
IBM Content Collector for File Systems
✔
Intermedia
Contact(s):USCloud@IngramMicro.com
Solution(s):
✔
Mimecast
Contact(s):Mimecast-Licensing@ingrammicro.com
Solution(s):
Enterprise Information Archive
✔
Proofpoint
Contact(s):Proofpoint-Licensing@ingrammicro.com
Solution(s):
✔
Veeam
Contact(s):VeeamMD@ingrammicro.com
Solution(s):
✔
Veritas
Contact(s):veritas-licensing@ingrammicro.com
Solution(s):
Netbackup, Backup Exec, Enterprise Vault
Device Deployment and Imaging
Deployment and Imaging solutions allow for faster recovery and deployemnt time to get back up and running if a disaster such as ransomware were to occur.
✔
Acronis
Contact(s):Acronis-Cloud@ingrammicro.com
Solution(s):
✔
CrashPlan
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
HCLSoftware
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Veeam
Contact(s):VeeamMD@ingrammicro.com
Solution(s):
Email Archiving
Email Archiving is the process of archiving cloud or on-premise email soltuions for recovery due to outtage, legal hold, and/or malicious attacks.
✔
Acronis
Contact(s):Acronis-Cloud@ingrammicro.com
Solution(s):
✔
Arcserve
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Unified Data Protection (UDP) Archiving
✔
Axcient
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Citrix
Contact(s):CitrixMD@ingrammicro.com
Solution(s):
✔
CrashPlan
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
CyberFortress
Contact(s):OffsiteDataSync-Licensing@ingrammicro.com
Solution(s):
Backup for Office 365 – Cloud to Cloud
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com
Solution(s):
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
IBM Content Collector for Email
✔
Intermedia
Contact(s):USCloud@IngramMicro.com
Solution(s):
✔
Microsoft
Contact(s):Microsoft Contacts Overview
Solution(s):
Exchange Online Archiving, Azure Information Protection
✔
Mimecast
Contact(s):Mimecast-Licensing@ingrammicro.com
Solution(s):
Enterprise Information Archive
✔
Proofpoint
Contact(s):Proofpoint-Licensing@ingrammicro.com
Solution(s):
– Proofpoint Enterprise Archive
– Proofpoint Essentials Pro
✔
Veritas
Contact(s):veritas-licensing@ingrammicro.com
Solution(s):
High Availability and/or Continuity
This refers to solutions dedicated to high availability and business continuity.
Some features may include:
– Replication (Periodic, Multi-Stream, etc.)
– Compression
– Offline synchronization
– Email Continuity
✔
Arcserve
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Axcient
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Citrix
Contact(s):CitrixMD@ingrammicro.com
Solution(s):
✔
CrashPlan
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Dell Technologies
Contact(s):Dell Technologies Contacts Overview
Solution(s):
Dell Unity XT Unified Storage Solution
Dell EMC Isilon and ECS Storage for Media and Entertainment
Dell ECS Enterprise Object Storage
Dell VxRail Hyperconverged Infrastructure
VxBlock Converged Infrastructure
✔
F5
Contact(s):F5-Team@ingrammicro.com
Solution(s):
BIG-IP DNS, BIG-IP Local Traffic Manager
✔
Forcepoint
Contact(s):Forcepoint-Licensing@ingrammicro.com
Solution(s):
✔
HPE (Aruba Networks)
Contact(s):HPEAruba@ingrammicro.com
Solution(s):
✔
KeepIt
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Keepit Dedicated Cloud / SaaS Data Protection
✔
Mimecast
Contact(s):Mimecast-Licensing@ingrammicro.com
Solution(s):
✔
Proofpoint
Contact(s):Proofpoint-Licensing@ingrammicro.com
Solution(s):
– Proofpoint E-Mail Protection (PPS)
– Proofpoint Essentials
✔
SonicWall
Contact(s):SonicWall-Renewals@ingrammicro.com
Solution(s):
✔
Sophos
Contact(s):sophos-licensing@ingrammicro.com
Solution(s):
✔
Trend Micro
Contact(s):Trend-Licensing@ingrammicro.com
Solution(s):
✔
Veeam
Contact(s):VeeamMD@ingrammicro.com
Solution(s):
✔
Veritas
Contact(s):veritas-licensing@ingrammicro.com
Solution(s):
Backup Exec with CASO license, Netbackup
✔
VMware (Carbon Black)
Contact(s):VMware_MD_Team@ingrammicro.com
Solution(s):
Out-of-Band Management (OOBM)
OOBMÂ provides access and control of IT assets outside of the production network.
✔
AppViewX
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com
Solution(s):
FortiExtender
(Intended for use with FortiGate Firewalls)
✔
Lantronix
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
– Branch Office Managers
– Console Managers
✔
Opengear
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
– Data center OOB
– Remote Site OOB
Other
GenAI – Integrated & Generative AI
Integrated AIÂ refers to Artificial Intelligence technology that is embedded and leveraged within existing security solutions, to improve or enhance the solution using this new, emerging technology. This includes machine learning, deep learning, artificial intelligence, and generative AI technologies.
Generative AIÂ (GenAI) are deep-learning models capable of generating new content in a variety of mediums, such as images and text. These capabilities have enabled new use cases for AI technology integrated into vendor products and portfolios such as querying data in natural language, providing explanations, making suggestions, and providing guided workflows to accomplish tasks.
✔
Balbix
Contact(s):USCloud@ingrammicro.com
Solution(s):
✔
F5
Contact(s):F5-Team@ingrammicro.com
Solution(s):
Distribute, Optimize and Secure Your AI Workloads with F5
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com
Solution(s):
✔
HCLSoftware
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Juniper
Contact(s):Juniper Contacts Overview
Juniper.Assist@ingrammicro.com
Solution(s):
Marvis Virtual Network Assistant
✔
Microsoft
Contact(s):Microsoft Contacts Overview
Solution(s):
✔
Rubrik
Contact(s):rubrik-licensing-us@ingrammicro.com
Solution(s):
✔
SentinelOne
Contact(s):SentinelOne-Licensing@ingrammicro.com
Solution(s):
✔
Tenable
Contact(s):TenableTeam@ingrammicro.com
Solution(s):
✔
Trellix
Contact(s):trellix-licensing@ingrammicro.com
Solution(s):
✔
Trend Micro
Contact(s):Trend-Licensing@ingrammicro.com
Solution(s):
Trend Vision One™ – Companion
Help Desk & Ticketing Software
Help desk software refers to a computer program that enables customer-care operators to keep track of user requests and deal with other customer-care-related issues. It is what makes customer-care service efficient and enterprising.
A ticketing system is a software program that a customer support team uses to create, manage, and maintain a list (or lists) of customer problems.
✔
ConnectWise
Contact(s):usservices@ingrammicro.com
Solution(s):
✔
Dell Technologies
Contact(s):Dell Technologies Contacts Overview
Solution(s):
✔
HCLSoftware
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Ivanti
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
IoT, Sensors, Beacons, and Analytics
Includes IoT devices, location beacons, IoT type sensors, and various analytics
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
Cisco DNA Spaces IoT, Cisco Kinetic
Cisco IoT Operations Dashboard
✔
Dell Technologies
Contact(s):Dell Technologies Contacts Overview
Solution(s):
✔
Halo Detect (Motorola)
Contact(s):sba-operations@ingrammicro.com
Solution(s):
✔
HPE (Aruba Networks)
Contact(s):HPEAruba@ingrammicro.com
Solution(s):
Aruba Bluetooth Beacons & Tags
✔
Mandiant
Contact(s):Mandiant-Licensing@IngramMicro.com
Solution(s):
Mandiant Consulting Services (ICS)
✔
NetAlly
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Palo Alto Networks
Contact(s):paloaltosolutions@ingrammicro.com
Solution(s):
✔
Rhombus
Contact(s):sba-operations@ingrammicro.com
Solution(s):
✔
SentinelOne
Contact(s):SentinelOne-Licensing@ingrammicro.com
Solution(s):
✔
Trellix
Contact(s):trellix-licensing@ingrammicro.com
Solution(s):
✔
Trend Micro
Contact(s):Trend-Licensing@ingrammicro.com
Solution(s):
✔
Ubiquiti
Contact(s):Ubiquiti@ingrammicro.com
Solution(s):
Network Switching and POE Systems
Includes Networking Switches, Industial Switches, other core networking equipment, and POE systems.
✔
Allied Telesis
Contact(s):AlliedTelesis@ingrammicro.com
Solution(s):
-Enterprise
– SMB
– Industrial
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
✔
Dell Technologies
Contact(s):Dell Technologies Contacts Overview
Solution(s):
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com
Solution(s):
✔
HPE (Aruba Networks)
Contact(s):HPEAruba@ingrammicro.com
Solution(s):
✔
Juniper
Contact(s):Juniper Contacts Overview
Juniper.Assist@ingrammicro.com
Solution(s):
✔
Meraki (Cisco)
Contact(s):Meraki (Cisco) Contacts Overview
Solution(s):
✔
SonicWall
Contact(s):SonicWall-Renewals@ingrammicro.com
Solution(s):
✔
Ubiquiti
Contact(s):Ubiquiti@ingrammicro.com
Solution(s):
✔
Zyxel
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
OT – Operational Technology Security
Operational Technology (OT) & Industrial control systems (ICS)Â often present a sitting target for cybercriminals. The majority of these systems monitor complex industrial processes and critical infrastructures that deliver power, water, transport, manufacturing and other essential services.
✔
Check Point
Contact(s):checkpoint-licensing@ingrammicro.com
Solution(s):
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
Cisco Secure Firewall ISA 3000
✔
Forcepoint
Contact(s):Forcepoint-Licensing@ingrammicro.com
Solution(s):
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com
Solution(s):
Securing Critical Infrastructure with Fortinet
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
Operational Technology Security
✔
Mandiant
Contact(s):Mandiant-Licensing@IngramMicro.com
Solution(s):
✔
Palo Alto Networks
Contact(s):paloaltosolutions@ingrammicro.com
Solution(s):
✔
Tenable
Contact(s):TenableTeam@ingrammicro.com
Solution(s):
✔
Trellix
Contact(s):trellix-licensing@ingrammicro.com
Solution(s):
✔
Trend Micro
Contact(s):Trend-Licensing@ingrammicro.com
Solution(s):
PSA – Professional Services Automation
A PSA, or professional services automation tool, is a solution that is commonly used to assist in running a services-led company. By design, these tools implement an automated workflow, which connects every area of your business and prevents disarray. By utilizing a PSA tool, you’ll have total visibility into every aspect of your business, reduce redundant tasks, and boost efficiency.
✔
CloudBlue
Contact(s):USServices@ingrammicro.com
Solution(s):
✔
ConnectWise
Contact(s):usservices@ingrammicro.com
Solution(s):
Info
ARR / MRR – Recurring Revenue Offering(s)
This vendor or partner offers products, services, or solutions leveraging a recurring revenue (i.e., software subscription) model.
✔
Acronis
Contact(s):Acronis-Cloud@ingrammicro.com
Solution(s):
✔
Alert Logic
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Arcserve
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Arctic Wolf
Contact(s):ArcticWolfMD@ingrammicro.com
Solution(s):
✔
Avast
Contact(s):sporders@avast.com
Solution(s):
✔
AvePoint
Contact(s):Avepoint@ingrammicro.com
Solution(s):
✔
Axcient
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Balbix
Contact(s):USCloud@ingrammicro.com
Solution(s):
✔
Bitdefender
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Check Point
Contact(s):checkpoint-licensing@ingrammicro.com
Solution(s):
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
✔
CloudBlue
Contact(s):USServices@ingrammicro.com
Solution(s):
✔
ConnectWise
Contact(s):usservices@ingrammicro.com
Solution(s):
✔
CrashPlan
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
DigiCert
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
ESET
Contact(s):ESET Contacts Overview
NSX-Sales@ingrammicro.com
Solution(s):
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com
Solution(s):
✔
HCLSoftware
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
✔
Ingram Micro Services
Contact(s):USServices@ingrammicro.com
Solution(s):
Ingram Micro Services Cloud Marketplace
✔
Interguard Software
Contact(s):USCloud@ingrammicro.com
Solution(s):
Interguard Software Cloudmarketplace
✔
Intermedia
Contact(s):USCloud@IngramMicro.com
Solution(s):
✔
ITsMine
Contact(s):USCloud@ingrammicro.com
Solution(s):
✔
Microsoft
Contact(s):Microsoft Contacts Overview
Solution(s):
✔
Mimecast
Contact(s):Mimecast-Licensing@ingrammicro.com
Solution(s):
✔
NS8
Contact(s):USCloud@IngramMicro.com
Solution(s):
✔
PKWARE
Contact(s):PKWare@ingrammicro.com
Solution(s):
✔
Proofpoint
Contact(s):Proofpoint-Licensing@ingrammicro.com
Solution(s):
✔
QS Solutions
Contact(s):USCloud@ingrammicro.com
Solution(s):
QS Solutions Cloud Marketplace
✔
RMail
Contact(s):USCloud@ingrammicro.com
Solution(s):
✔
Sophos
Contact(s):sophos-licensing@ingrammicro.com
Solution(s):
✔
SyncDog
Contact(s):USCloud@IngramMicro.com
Solution(s):
✔
TeamViewer
Contact(s):USCloud@IngramMicro.com
Solution(s):
✔
Trellix
Contact(s):trellix-licensing@ingrammicro.com
Solution(s):
✔
Trend Micro
Contact(s):Trend-Licensing@ingrammicro.com
Solution(s):
✔
V-Key
Contact(s):USCloud@ingrammicro.com
Solution(s):
✔
Veeam
Contact(s):VeeamMD@ingrammicro.com
Solution(s):
✔
Veritas
Contact(s):veritas-licensing@ingrammicro.com
Solution(s):
✔
VMware (Carbon Black)
Contact(s):VMware_MD_Team@ingrammicro.com
Solution(s):
VMware (Carbon Black) Cloud Marketplace
✔
Zerospam
Contact(s):USCloud@IngramMicro.com
Solution(s):
Emerging Vendor
To qualify as an emerging vendor, a software, hardware or solution provider must meet the following criteria:
- New—It could be a startup company or just new to the channel or IT distribution.
- Complementary—The vendor must offer complementary features to the products and services our partners are already offering.
- Value—Ingram Micro selected these vendors because of the exceptional value they provide to your customers in solving their business challenges.
✔
ActZero
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Adlumin
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
AppViewX
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Arctic Wolf
Contact(s):ArcticWolfMD@ingrammicro.com
Solution(s):
✔
Atakama
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
BeyondTrust
Contact(s):BeyondTrust@ingrammicro.com
Solution(s):
✔
Binary Defense
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Bitdefender
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Blancco
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
CrashPlan
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Evidian (Atos)
Contact(s):Evidian-Licensing@ingrammicro.com
Solution(s):
✔
HCLSoftware
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
iboss
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Lookout
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Mandiant
Contact(s):Mandiant-Licensing@IngramMicro.com
Solution(s):
✔
NETSCOUT
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Opengear
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
OPSWAT
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
PKWARE
Contact(s):PKWare@ingrammicro.com
Solution(s):
✔
SkyhighSecurity
Contact(s):Skyhigh-Licensing@ingrammicro.com
Solution(s):
✔
Stellar Cyber
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Stellar Cyber Ingram Exclusive
✔
Viavi
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Vicarius
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
VMRay
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Yubico
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Ingram Micro Exclusive
This vendor or partner is exclusively sold through Ingram Micro.
✔
Adlumin
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Appgate
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
AppViewX
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Arctic Wolf
Contact(s):ArcticWolfMD@ingrammicro.com
Solution(s):
✔
Atakama
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
BeyondTrust
Contact(s):BeyondTrust@ingrammicro.com
Solution(s):
✔
Binary Defense
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Blancco
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Evidian (Atos)
Contact(s):Evidian-Licensing@ingrammicro.com
Solution(s):
✔
Halo Detect (Motorola)
Contact(s):sba-operations@ingrammicro.com
Solution(s):
Motorola / IPVideo / Halo Detect
✔
HCLSoftware
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
iboss
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Ingram Micro Services
Contact(s):USServices@ingrammicro.com
Solution(s):
✔
Lookout
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Mandiant
Contact(s):Mandiant-Licensing@IngramMicro.com
Solution(s):
✔
Mimecast
Contact(s):Mimecast-Licensing@ingrammicro.com
Solution(s):
✔
NETSCOUT
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Rhombus
Contact(s):sba-operations@ingrammicro.com
Solution(s):
✔
Tenable
Contact(s):TenableTeam@ingrammicro.com
Solution(s):
✔
Vicarius
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
VMRay
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Managed Service Provider Offerings (MSP/MSSP)
Service Provider offerings available. May include multi-tenancy, monthly billing, or a combination of both.
✔
ActZero
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Adlumin
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Adlumin Advantage Partner Program
✔
Alert Logic
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Alert Logic Managed Security Services for Ingram Micro
✔
Alien Vault (AT&T)
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Arcserve
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Arctic Wolf
Contact(s):ArcticWolfMD@ingrammicro.com
Solution(s):
Vendor authorization and agreement required
✔
Avast
Contact(s):sporders@avast.com
Solution(s):
✔
Axcient
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Binary Defense
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Bitdefender
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Bitdefender Cloud Security for MSPs
✔
Blancco
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Service Provider Partner Program
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
Security Solutions for MSSPs and MSP, Cisco Managed Detection and Response (MDR)
✔
Cofense
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
MSSP Program Coming Soon
✔
CrashPlan
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Dell Technologies
Contact(s):Dell Technologies Contacts Overview
Solution(s):
Dell Managed Detection & ResponseÂ
✔
ESET
Contact(s):ESET Contacts Overview
NSX-Sales@ingrammicro.com
Solution(s):
Availabe through Ingram Micro’s Cloud Marketplace
✔
Forcepoint
Contact(s):Forcepoint-Licensing@ingrammicro.com
Solution(s):
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com
Solution(s):
✔
HCLSoftware
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
IBM
Contact(s):IBM Contacts Overview
Solution(s):
Embedded Solutions Agreement (ESA)
✔
iboss
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Meraki (Cisco)
Contact(s):Meraki (Cisco) Contacts Overview
Solution(s):
✔
Mimecast
Contact(s):Mimecast-Licensing@ingrammicro.com
Solution(s):
✔
Palo Alto Networks
Contact(s):paloaltosolutions@ingrammicro.com
Solution(s):
NextWave Managed Security Service Provider Specialization
✔
Proofpoint
Contact(s):Proofpoint-Licensing@ingrammicro.com
Solution(s):
Proofpoint Essentials Partner Program
✔
SonicWall
Contact(s):SonicWall-Renewals@ingrammicro.com
Solution(s):
SonicWall MSP Advantage Program
✔
Sophos
Contact(s):sophos-licensing@ingrammicro.com
Solution(s):
✔
Tenable
Contact(s):TenableTeam@ingrammicro.com
Solution(s):
✔
Trend Micro
Contact(s):Trend-Licensing@ingrammicro.com
Solution(s):
✔
VMware (Carbon Black)
Contact(s):VMware_MD_Team@ingrammicro.com
Solution(s):
Reseller Partner Requirement
If there’s a requirement such as signing a contact, or being in a partner program to resell this vendor, the box will be checked.
✔
Adlumin
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Adlumin Advantage Partner Program
✔
Arctic Wolf
Contact(s):ArcticWolfMD@ingrammicro.com
Solution(s):
Vendor resell approval
✔
Binary Defense
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
Simple registration and short demo
✔
Check Point
Contact(s):checkpoint-licensing@ingrammicro.com
Solution(s):
✔
Cisco
Contact(s):Cisco Contacts Overview
Solution(s):
✔
Cofense
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
CrashPlan
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Dell Technologies
Contact(s):Dell Technologies Contacts Overview
Solution(s):
✔
Evidian (Atos)
Contact(s):Evidian-Licensing@ingrammicro.com
Solution(s):
✔
F5
Contact(s):F5-Team@ingrammicro.com
Solution(s):
✔
Fortinet
Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com
Solution(s):
Fortinet Engage Partner Program
✔
HCLSoftware
Contact(s):NSX-Sales@ingrammicro.com
Solution(s):
✔
Juniper
Contact(s):Juniper Contacts Overview
Juniper.Assist@ingrammicro.com
Solution(s):
✔
Meraki (Cisco)
Contact(s):Meraki (Cisco) Contacts Overview
Solution(s):
✔
Palo Alto Networks
Contact(s):paloaltosolutions@ingrammicro.com
Solution(s):
✔
Proofpoint
Contact(s):Proofpoint-Licensing@ingrammicro.com
Solution(s):
✔
SkyhighSecurity
Contact(s):Skyhigh-Licensing@ingrammicro.com
Solution(s):
Skyhigh Security Partner Portal
✔
SonicWall
Contact(s):SonicWall-Renewals@ingrammicro.com
Solution(s):
Cloud Discovery
Cloud Enablement
Cloud Migrations
Cloud Optimization
Cloud Placement
Cloud Security
Cloud Strategy
Cloud Transformation
Critical Security Controls
Deployments & Rollouts
Depot Services
Express Warehousing
Financial Services
Firewall Rules Audit
Firewall-as-a-Service
Fortinet
Infrastructure Solutions
Integration & Configs
IT Staffing
ITAD / Asset Disposition
Marketing Services
Palo Alto Networks
Penetration Testing
Reverse Logistics
Social Engineering
Training
Vulnerability Scanning
Wireless Networking
Security
Assessments
Our red teaming services focused on ensuring your network is protected and complaint.
Click to See Services of This Type:
✔
Critical Security Controls
Contact(s):usservices@ingrammicro.com
Solution(s):
Critical Security Controls Assessment
✔
Firewall Rules Audit
Contact(s):usservices@ingrammicro.com
Solution(s):
✔
Penetration Testing
Contact(s):usservices@ingrammicro.com
Solution(s):
✔
Social Engineering
Contact(s):usservices@ingrammicro.com
Solution(s):
✔
Vulnerability Scanning
Contact(s):usservices@ingrammicro.com
Solution(s):
External Vulnerability Scan Assessment
Web Application Vulnerability Assessment
✔
Wireless Networking
Contact(s):usservices@ingrammicro.com
Solution(s):
Consultative
Our services focused on expanding your cybersecurity practice  and project management.
Click to See Services of This Type:
✔
Cloud Security