Dun & Bradstreet Credit A+ = 131553131
Free shipping on all U.S. orders
BBB = A+
Free Returns
Two day Delivery on most product


Aisera

AMD

AWS

Cisco

Dell

F5

Google

HPE

HPE Networking

IBM

Ingram Micro

Juniper Networks

Lenovo

Lexmark | Optra

Microsoft

Nutanix

NVIDIA

Palo Alto Networks

Quantum

Red Hat

UiPath

 

AI Solutions

 

AIOps

AIOps leverages AI and machine learning to enhance IT operations, including monitoring, automation, and service management. It aims to improve the efficiency, performance, and reliability of IT services.

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

IBM AIOps

 

✔

Juniper Networks

 

Contact(s):Juniper Networks Contacts Overview

Solution(s):

AI for IT Operations

 

✔

Microsoft

 

Contact(s):Microsoft Contacts Overview

Solution(s):

Azure Monitor

 

✔

Palo Alto Networks

 

Contact(s):paloaltosolutions@ingrammicro.com

Solution(s):

Strata Cloud Manager powered by PrecisionAI

 

✔

UiPath

 

Contact(s):UiPath Contacts Overview

Solution(s):

UiPath Business Automation Platform

 

Code Assist

Code Assist refers to an AI-powered tool that assists developers by generating code and executing actions within their editor. It provides a natural language interface, allowing developers to interact with it like they would with a human, and it can implement entire features under a developer’s supervision.

✔

AWS

 

Contact(s):AWS Contacts Overview

Solution(s):

AWS Q Developer

 

✔

F5

 

Contact(s):F5 Contacts Overview

Solution(s):

F5 Distributed Cloud Services

 

✔

Google

 

Contact(s):Google Contacts Overview

Solution(s):

Gemini Code Assist

 

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

IBM watsonx Code Assistant

 

✔

Microsoft

 

Contact(s):Microsoft Contacts Overview

Solution(s):

Copilot

 

✔

Nutanix

 

Contact(s):Nutanix Contacts Overview

Solution(s):

AI-ready Infrastructure Solutions

 

 


Aisera

Allied Telesis

AMD

APC

Aruba Networks (HPE)

ATEN

AWS

Axis Communications

Blancco

Buffalo Americas

ChannelWorks

Cisco

Citrix

Cradlepoint

CyberPower

Dell

Eaton

Ekahau

ENET

ExaGrid

F5

Google Cloud Platform

HPE

HYCU

IBM

Igel

Intel

Ivanti

Juniper Networks

Legrand

Lenovo

Lexmark

Microsoft Azure

NetAlly

Nutanix

Nvidia

QNAP

Quantum

Rackmount.IT

Red Hat

SUSE

UiPath

Veeam

Vertiv

VMware

Application

AI/Analytics

One great feature of AI is it allows your organization to be Better, Smarter and Faster than your competition.  We use predictive logic to sort through large amounts of data to identify hidden intentions

Why customers are purchasing from a competitor and how you can combat this behavior

  • Making compelling cross and up sell recommendation
  • Performing complex risk assessments without human intervention
  • Determining is a transaction is fraudulent or a money laundering activity

✔

Aisera

 

Contact(s):Aisera Contacts Overview

Solution(s):

AI Service Desk for IT, HR & Business Services

 

✔

AMD

 

Solution(s):

AMD Instinct

 

AMD Xilinx Alveo

 

✔

AWS

 

Solution(s):

AWS Batch

 

✔

Axis Communications

 

Solution(s):

AXIS Barcode Reader

 

AXIS People Counter

 

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco HyperFlex Systems

 

✔

Citrix

 

Contact(s):CitrixMD@ingrammicro.com

Solution(s):

Citrix DaaS (desktop as a service)

 

✔

Google Cloud Platform

 

Solution(s):

Looker

 

Vertex AI

 

✔

HPE

 

Contact(s):HPE Contacts Overview

Solution(s):

HPE Vertica

 

HPE Swarm Learning

 

HPE Blue Data

 

HPE Ezmeral

 

HPE Aerospike Real-time Database Platform

 

HPE Machine Learning Development Environment

 

HPE Inference Solutions on ProLiant

 

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

Cognos Analytics

 

Cognos Controller

 

Planning Analytics (Cognos Enterprise Planning, TM1)

 

SPSS

 

Watson Studio

 

Cloud Pak for Data

 

✔

Juniper Networks

 

Solution(s):

Cloud-Native Contrail Networking

 

✔

Lenovo

 

Contact(s):Lenovo Contacts Overview

Solution(s):

Lenovo AI-Ready Infrastructure

 

✔

Lexmark

 

Contact(s):Imaging@ingrammicro.com

Solution(s):

Optra Network Monitoring Skill run on Optra Edge Devices- In partnership with Domotz

 

Optra Vehicle Monitoring Plus Skill run on Optra Edge Device

 

Optra Person Heatmapping Skill run on Optra Edge Devices

 

Optra Person Occupancy Plus Skill run on Optra Edge Devices

 

Optra Foot Traffic Skill run on Optra Edge Devices

 

✔

Microsoft Azure

 

Solution(s):

Azure Databricks

 

Azure Data Lake Storage

 

Azure Analysis Services

 

Azure OpenAI Service

 

Azure Applied AI Services

 

Health Bot

 

Azure Metrics Advisor

 

Translator

 

Text to speech

 

Speech

 

Speech translation

 

Speech to text

 

Speaker recognition

 

QnA Maker

 

Project Bonsai

 

Personalizer

 

Microsoft Genomics

 

Conversational language understanding

 

Azure Kinect DK

 

Azure Immersive Reader

 

Azure Databricks

 

Azure Form Recognizer

 

Face API

 

Data Science Virtual Machines

 

Custom Vision

 

Azure AI Content Safety

 

Computer Vision

 

Azure Video Indexer

 

Azure Cognitive Services

 

Azure Open Datasets

 

Azure Machine Learning

 

Azure Cognitive Search

 

Azure Bot Service

 

Anomaly Detector

 

✔

Nutanix

 

Solution(s):

Nutanix Cloud Manager (NCM)

 

Nutanix Unified Storage (NUS)

 

✔

QNAP

 

Contact(s):QNAP Contacts Overview

Solution(s):

AI Storage

 

✔

UiPath

 

Contact(s):uipath-sd@ingrammicro.com

Solution(s):

AI Center

 

Application Development & Modernization

Application development is the process of designing, building, and implementing software applications.

Application modernization is the practice of updating older software for newer computing approaches;  including newer languages, frameworks and infrastructure platforms.

✔

AWS

 

Solution(s):

Amazon Elastic Container Registry (ECR)

 

AWS Database Migration Service (DMS)

 

Amazon API Gateway

 

AWS Application Migration Service

 

Amazon ElastiCache

 

AWS Lambda

 

AWS Fargate

 

AWS Elastic Beanstalk

 

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco HyperFlex Systems

 

✔

Dell

 

Contact(s):Dell Contacts Overview

Solution(s):

Cloud Native APPs and DevOps Services

 

✔

F5

 

Solution(s):

F5 Distributed Cloud Services

 

F5 NGINX

 

✔

Google Cloud Platform

 

Solution(s):

App Engine

 

Anthos

 

Cloud Bigtable

 

Apigee API Management

 

API Gateway

 

Google Kubernetes Engine

 

✔

HPE

 

Contact(s):HPE Contacts Overview

Solution(s):

HPE Ezmeral

 

HPE Aerospike Real-time Database Platform

 

HPE Machine Learning Development Environment

 

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

Cloud Pak for Business Automation

 

Red Hat OpenShift On IBM Cloud (ROKS)

 

✔

Juniper Networks

 

Solution(s):

Cloud-Native Contrail Networking

 

✔

Lenovo

 

Contact(s):Lenovo Contacts Overview

Solution(s):

Lenovo Solutions Services & Tools

 

✔

Microsoft Azure

 

Solution(s):

Event Grid

 

Azure Devops

 

App Service

 

API Management

 

Azure Database for MariaDB

 

Azure Data Factory

 

Azure Cosmos DB

 

Azure Cache for Redis

 

Azure Container Registry

 

Container Instances

 

Web App for Containers

 

Azure Service Fabric

 

Azure Functions

 

Azure Container Apps

 

Azure Red Hat OpenShift

 

Azure Kubernetes Service (AKS)

 

Azure OpenAI Service

 

Azure Applied AI Services

 

Health Bot

 

Azure Metrics Advisor

 

Translator

 

Text to speech

 

Speech

 

Speech translation

 

Speech to text

 

Speaker recognition

 

QnA Maker

 

Project Bonsai

 

Personalizer

 

Microsoft Genomics

 

Conversational language understanding

 

Azure Kinect DK

 

Azure Immersive Reader

 

Azure Databricks

 

Azure Form Recognizer

 

Face API

 

Data Science Virtual Machines

 

Custom Vision

 

Azure AI Content Safety

 

Computer Vision

 

Azure Video Indexer

 

Azure Cognitive Services

 

Azure Open Datasets

 

Azure Machine Learning

 

Azure Bot Service

 

✔

Red Hat

 

Solution(s):

Red Hat OpenShift

 

✔

SUSE

 

Solution(s):

Rancher

 

✔

UiPath

 

Contact(s):uipath-sd@ingrammicro.com

Solution(s):

UiPath Apps

 

Automation

Applications that provide automation of routine processes and workflows —scheduling, monitoring, maintenance, application delivery, etc., that are managed and executed without human administration for increased agility and operational efficiency.

✔

Aisera

 

Contact(s):Aisera Contacts Overview

Solution(s):

AI Service Desk for IT, HR & Business Services

 

✔

AWS

 

Solution(s):

Amazon Elastic Container Registry (ECR)

 

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco Intersight Workload Optimizer

 

Cisco HyperFlex Systems

 

Cisco Nexus Dashboard

 

✔

HPE

 

Contact(s):HPE Contacts Overview

Solution(s):

HPE Bright Cluster Manager

 

HPE Swarm Learning

 

HPE OneView Software

 

HPE Serviceguard for Linux

 

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

IBM Turbonomic

 

✔

Juniper Networks

 

Solution(s):

Juniper Paragon 

 

Juniper Apstra

 

Cloud-Native Contrail Networking

 

✔

Lenovo

 

Contact(s):Lenovo Contacts Overview

Solution(s):

Lenovo Open Cloud Automation (LOC-A)

 

✔

Microsoft Azure

 

Solution(s):

Event Grid

 

Azure Devops

 

Azure Data Factory

 

Azure Cosmos DB

 

Azure Container Registry

 

Container Instances

 

Web App for Containers

 

Azure Service Fabric

 

Azure Functions

 

Azure Container Apps

 

App Configuration

 

Azure OpenAI Service

 

Azure Applied AI Services

 

Health Bot

 

Azure Metrics Advisor

 

Translator

 

Text to speech

 

Speech

 

Speech translation

 

Speech to text

 

Speaker recognition

 

QnA Maker

 

Project Bonsai

 

Personalizer

 

Microsoft Genomics

 

Conversational language understanding

 

Azure Kinect DK

 

Azure Immersive Reader

 

Azure Form Recognizer

 

Face API

 

Data Science Virtual Machines

 

Custom Vision

 

Azure AI Content Safety

 

Computer Vision

 

Azure Video Indexer

 

Azure Cognitive Services

 

Azure Machine Learning

 

✔

Nutanix

 

Solution(s):

Nutanix Cloud Manager (NCM)

 

Nutanix Unified Storage (NUS)

 

✔

Red Hat

 

Solution(s):

Red Hat Automation Platform

 

✔

UiPath

 

Contact(s):uipath-sd@ingrammicro.com

Solution(s):

Attended or Unattended Robots

 

✔

Veeam

 

Contact(s):veeammd@ingrammicro.com

Ingram Micro Cloud Marketplace
Business Transformation Center Partner

Solution(s):

Veeam Data Platform – VeeamONE

 

Data Backup and Recovery

Data backup and recovery refers to the processes and practices involved in creating copies of data to protect it from loss or damage, and the subsequent retrieval and restoration of that data when needed. It is a critical aspect of data management and ensures the availability and integrity of information in the event of accidental deletion, hardware failure, system crashes, natural disasters, cyberattacks, or other unforeseen events.

✔

AWS

 

Solution(s):

AWS Snowball

 

AWS DataSync

 

AWS Transfer Family

 

AWS Backup

 

✔

HPE

 

Contact(s):HPE Contacts Overview

Solution(s):

GreenLake for Backup and Recovery

 

Zerto

 

✔

HYCU

 

Solution(s):

HYCU Protégé

 

 

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

IBM Cloud Cyber Recovery

 

Data Management

Data management is the practice of collecting, keeping, and using data securely, efficiently, and cost-effectively. The criticality of Data management continues to grow as it is continued to be seen as a corporate asset to be used to make business decisions.

✔

AWS

 

Solution(s):

Amazon API Gateway

 

AWS DataSync

 

Amazon ElastiCache

 

AWS Transfer Family

 

✔

Blancco

 

Contact(s):blancco-licensing@ingrammicro.com

Solution(s):

Blancco Management Portal

 

Blancco Drive Eraser

 

Blancco LUN Eraser

 

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco HyperFlex Systems

 

Cisco Nexus Dashboard

 

✔

Citrix

 

Contact(s):CitrixMD@ingrammicro.com

Solution(s):

Sharefile

 

Netscaler SDX

 

Netscaler VPX

 

NetScaler MPX

 

✔

Dell

 

Contact(s):Dell Contacts Overview

Solution(s):

Data Protection

 

✔

HPE

 

Contact(s):HPE Contacts Overview

Solution(s):

HPE Bright Cluster Manager

 

HPE Vertica

 

HPE Swarm Learning

 

HPE Ezmeral

 

HPE Serviceguard for Linux

 

HPE Machine Learning Development Environment

 

HPE Data Management Framework

 

HPE Inference Solutions on ProLiant

 

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

Aspera

 

✔

Lenovo

 

Contact(s):Lenovo Contacts Overview

Solution(s):

Lenovo Storage Solutions

 

✔

Microsoft Azure

 

Solution(s):

Event Grid

 

Azure Backup

 

Azure Databricks

 

Azure Data Lake Storage

 

Azure Health Data Services

 

API Management

 

Azure confidential ledger

 

Azure Database for MariaDB

 

Azure Cosmos DB

 

Azure Cache for Redis

 

Azure Container Registry

 

Container Instances

 

Web App for Containers

 

Azure Service Fabric

 

Azure Functions

 

Azure Container Apps

 

Azure Red Hat OpenShift

 

Azure Databricks

 

Azure Open Datasets

 

✔

Nutanix

 

Solution(s):

Nutanix Unified Storage (NUS)

 

Nutanix Cloud Manager (NCM)

 

✔

Quantum

 

Solution(s):

Quantum CatDV

 

✔

Veeam

 

Contact(s):veeammd@ingrammicro.com

Ingram Micro Cloud Marketplace
Business Transformation Center Partner

Solution(s):

Veeam Backup for Microsoft 365

 

Veeam Backup for Salesforce

 

Veeam Data Platform – VeeamONE

 

Kasten K10 by Veeam

 

Veeam Data Platform – Backup and Replication

 

Database

A Database is a collection of structured information that is stored in a computer system. It is set up for easy access, management and updating.

✔

AWS

 

Solution(s):

AWS Database Migration Service (DMS)

 

Amazon Redshift

 

Amazon Relational Database Service (RDS)

 

Amazon Quantum Ledger Database (QLDB)

 

Amazon Neptune

 

Amazon DynamoDB

 

Amazon DocumentDB

 

Amazon Aurora

 

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco HyperFlex Systems

 

✔

Citrix

 

Contact(s):CitrixMD@ingrammicro.com

Solution(s):

Sharefile

 

✔

Google Cloud Platform

 

Solution(s):

Cloud Spanner

 

Cloud Bigtable

 

BigQuery

 

Cloud SQL

 

✔

HPE

 

Contact(s):HPE Contacts Overview

Solution(s):

HPE Vertica

 

HPE Aerospike Real-time Database Platform

 

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

IBM DB2

 

✔

Lenovo

 

Contact(s):Lenovo Contacts Overview

Solution(s):

Lenovo Database Solutions

 

✔

Microsoft Azure

 

Solution(s):

Azure Data Lake Storage

 

Azure Managed Instance for Apache Cassandra

 

Table storage

 

Azure SQL

 

Azure Database Migration Service

 

Azure Database for PostgreSQL

 

Azure Database for MySQL

 

Azure Database for MariaDB

 

Azure Cosmos DB

 

Azure Red Hat OpenShift

 

✔

Nutanix

 

Solution(s):

Nutanix Database Service (NDS)

 

Management & Automation Services

IT management & automation is the process of reducing manual intervention by creating software and systems to replace repeatable process.

✔

AWS

 

Solution(s):

AWS Application Migration Service

 

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco Intersight Workload Optimizer

 

Cisco HyperFlex Systems

 

Cisco Nexus Dashboard

 

✔

Dell

 

Contact(s):Dell Contacts Overview

Solution(s):

Dell EMC AppSync

 

✔

F5

 

Solution(s):

F5 Distributed Cloud Services

 

✔

HPE

 

Contact(s):HPE Contacts Overview

Solution(s):

HPE InfoSight

 

GreenLake Common Cloud Console

 

HPE OneView

 

HPE Bright Cluster Manager

 

HPE Swarm Learning

 

HPE Blue Data

 

HPE Ezmeral

 

HPE OneView Software

 

Integrated Lights Out (iLO) Software

 

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

IBM Instana

 

IBM Turbonomic

 

✔

Juniper Networks

 

Solution(s):

Cloud-Native Contrail Networking

 

✔

Lenovo

 

Contact(s):Lenovo Contacts Overview

Solution(s):

Lenovo Services

 

✔

Microsoft Azure

 

Solution(s):

Event Grid

 

Azure Active Directory Domain Services (Azure AD DS)

 

Azure Database for MariaDB

 

Azure Data Factory

 

Azure Cache for Redis

 

Azure Container Apps

 

Azure Red Hat OpenShift

 

App Configuration

 

✔

Nutanix

 

Solution(s):

Nutanix Unified Storage (NUS)

 

Nutanix Cloud Manager (NCM)

 

✔

Red Hat

 

Solution(s):

Red Hat Enterprise Linux

 

Red Hat Automation Platform

 

✔

UiPath

 

Contact(s):uipath-sd@ingrammicro.com

Solution(s):

Attended or Unattended Robots

 

✔

VMware

 

Contact(s):vmware-licensing@ingrammicro.com

Solution(s):

VMware Aria

 

Middleware

Middleware enables developers to build applications without the need to create a custom integration when needing to connect to a service/microservice, resources, data, or devices.

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco HyperFlex Systems

 

✔

HPE

 

Contact(s):HPE Contacts Overview

Solution(s):

HPE Aerospike Real-time Database Platform

 

HPE Machine Learning Development Environment

 

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

Db2 Connect

 

DataStage

 

Websphere (WAS) 

 

Cloud Pak for Integration

 

✔

UiPath

 

Contact(s):uipath-sd@ingrammicro.com

Solution(s):

Attended or Unattended Robots

 

Compute

Containers

Containers are a form of operating system virtualization in which a single container can run anything from a microservice to a robust application. Unlike server virtualization, containers do not contain operating system images.

✔

AWS

 

Solution(s):

Amazon Elastic Container Registry (ECR)

 

AWS Fargate

 

Amazon Elastic Kubernetes Services (EKS)

 

Amazon Elastic Container Service (ECS)

 

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco HyperFlex Systems

 

Cisco UCS S-Series Storage Servers

 

Cisco UCS C–Series Rack Servers

 

Cisco UCS B-Series Blade Server

 

Cisco UCS X-Series Modular System

 

✔

Dell

 

Contact(s):Dell Contacts Overview

Solution(s):

VxRail

 

✔

Google Cloud Platform

 

Solution(s):

Google Kubernetes Engine

 

✔

HPE

 

Contact(s):HPE Contacts Overview

Solution(s):

HPE Ezmeral

 

HPE Inference Solutions on ProLiant

 

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

IBM RedHat OpenShift

 

Red Hat OpenShift On IBM Cloud (ROKS)

 

IBM Cloud Monitoring

 

✔

Juniper Networks

 

Solution(s):

Cloud-Native Contrail Networking

 

✔

Lenovo

 

Contact(s):Lenovo Contacts Overview

Solution(s):

Lenovo Diamanti Solutions

 

Lenovo ThinkSystem Servers

 

✔

Lexmark

 

Contact(s):Imaging@ingrammicro.com

Solution(s):

Optra Network Monitoring Skill run on Optra Edge Devices- In partnership with Domotz

 

Optra Vehicle Monitoring Plus Skill run on Optra Edge Device

 

✔

Microsoft Azure

 

Solution(s):

App Service

 

Azure Container Registry

 

Container Instances

 

Web App for Containers

 

Azure Service Fabric

 

Azure Functions

 

Azure Container Apps

 

Azure Red Hat OpenShift

 

Azure Kubernetes Service (AKS)

 

App Configuration

 

✔

Nutanix

 

Solution(s):

Nutanix Unified Storage (NUS)

 

Nutanix Cloud Manager (NCM)

 

✔

Red Hat

 

Solution(s):

Red Hat OpenShift

 

✔

SUSE

 

Solution(s):

Rancher

 

✔

VMware

 

Contact(s):vmware-licensing@ingrammicro.com

Solution(s):

VMware Tanzu

 

Converged Infrastructure (CI)

Converged Infrastructure (CI) is a convergence of compute, storage, and networking infrastructure in the data center by deploying the data center infrastructure as a complete system;  simplifying and accelerating the deployment of resources.

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco UCS C–Series Rack Servers

 

Cisco UCS B-Series Blade Server

 

Cisco UCS X-Series Modular System

 

✔

Dell

 

Contact(s):Dell Contacts Overview

Solution(s):

Dell EMC Ready Stack

 

Dell EMC VxBlock

 

 

✔

HPE

 

Contact(s):HPE Contacts Overview

Solution(s):

HPE Synergy

 

HPE Alletra dHCI

 

HPE ProLiant for Microsoft Azure Stack Hub

 

HPE Edgeline

 

✔

Intel

 

Solution(s):

Intel® Xeon® Scalable Processors

 

✔

Lenovo

 

Contact(s):Lenovo Contacts Overview

Solution(s):

Lenovo ThinkSystem Flex System

 

Lenovo ThinkSystem Servers

 

✔

Nutanix

 

Solution(s):

Nutanix Unified Storage (NUS)

 

Nutanix Cloud Manager (NCM)

 

Data Backup and Recovery

Backup Software

✔

AWS

 

Solution(s):

AWS DataSync

 

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco HyperFlex Systems

 

✔

Citrix

 

Contact(s):CitrixMD@ingrammicro.com

Solution(s):

Sharefile

 

✔

HPE

 

Contact(s):HPE Contacts Overview

Solution(s):

StoreOnce

 

✔

Lenovo

 

Contact(s):Lenovo Contacts Overview

Solution(s):

Lenovo ThinkSystem DE Series

 

Lenovo ThinkSystem Servers

 

Lenovo ThinkSystem DM Series

 

Edge Computing

Edge Computing is the computational processing of sensor data away from the centralized nodes and close to the logical edge of the network, toward individual sources of data. It may be referred to as a distributed IT network architecture that enables mobile computing for data produced locally.

✔

AMD

 

Solution(s):

AMD Threadripper Pro

 

✔

AWS

 

Solution(s):

AWS Lambda

 

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco HyperFlex Systems

 

Cisco UCS S-Series Storage Servers

 

Cisco UCS C–Series Rack Servers

 

Cisco UCS B-Series Blade Server

 

Cisco UCS X-Series Modular System

 

✔

Dell

 

Contact(s):Dell Contacts Overview

Solution(s):

PowerEdge

 

✔

HPE

 

Contact(s):HPE Contacts Overview

Solution(s):

HPE Edgeline

 

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

IBM Power Systems

 

Cloud Pak for Network Automation

 

IBM Edge Application Manager

 

IBM Cloud Satellite

 

✔

Igel

 

Solution(s):

IGEL Cosmos IGEL OS 12

 

✔

Intel

 

Solution(s):

Intel® Xeon® Scalable Processors

 

Intel® NUC Kits

 

Intel® Core™ Processor

 

✔

Juniper Networks

 

Solution(s):

Cloud-Native Contrail Networking

 

✔

Lenovo

 

Contact(s):Lenovo Contacts Overview

Solution(s):

Lenovo ThinkEdge

 

Lenovo ThinkSystem Servers

 

✔

Lexmark

 

Contact(s):Imaging@ingrammicro.com

Solution(s):

OPTRA Edge powered by Lexmark

 

Optra Network Monitoring Skill run on Optra Edge Devices- In partnership with Domotz

 

Optra Vehicle Monitoring Plus Skill run on Optra Edge Device

 

Optra Person Heatmapping Skill run on Optra Edge Devices

 

Optra Person Occupancy Plus Skill run on Optra Edge Devices

 

Optra Foot Traffic Skill run on Optra Edge Devices

 

✔

Nutanix

 

Solution(s):

Nutanix Cloud Manager (NCM)

 

Nutanix Unified Storage (NUS)

 

✔

Red Hat

 

Solution(s):

Red Hat OpenShift

 

✔

SUSE

 

Solution(s):

Rancher

 

Hybrid Cloud

Hybrid Cloud refers to a mixed computing, storage, and services environment made up of on-premises infrastructure, private cloud services, and a public cloud.

✔

AWS

 

Solution(s):

Amazon Elastic Container Registry (ECR)

 

Amazon API Gateway

 

AWS Transfer Family

 

Amazon Elastic Kubernetes Services (EKS)

 

AWS Batch

 

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco HyperFlex Systems

 

Cisco UCS S-Series Storage Servers

 

Cisco UCS C–Series Rack Servers

 

Cisco UCS B-Series Blade Server

 

Cisco UCS X-Series Modular System

 

✔

Citrix

 

Contact(s):CitrixMD@ingrammicro.com

Solution(s):

Citrix DaaS (desktop as a service)

 

Sharefile

 

Netscaler VPX

 

✔

Dell

 

Contact(s):Dell Contacts Overview

Solution(s):

VxRail VCF

 

✔

F5

 

Solution(s):

F5 Distributed Cloud Services

 

✔

Google Cloud Platform

 

Solution(s):

Google Cloud Hybrid Connectivity

 

Cloud Identity

 

Anthos

 

Apigee API Management

 

API Gateway

 

Cloud SQL

 

Compute Engine

 

✔

HPE

 

Contact(s):HPE Contacts Overview

Solution(s):

HPE ProLiant for Microsoft Azure Stack Hub

 

HPE ProLiant RL300

 

HPE PointNext

 

HPE CloudPhysics

 

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

IBM Cloud Satellite

 

✔

Intel

 

Solution(s):

Intel® Xeon® Scalable Processors

 

✔

Juniper Networks

 

Solution(s):

Cloud-Native Contrail Networking

 

✔

Lenovo

 

Contact(s):Lenovo Contacts Overview

Solution(s):

Lenovo ThinkAgile

 

Lenovo ThinkSystem Servers

 

✔

Lexmark

 

Contact(s):Imaging@ingrammicro.com

Solution(s):

Optra Network Monitoring Skill run on Optra Edge Devices- In partnership with Domotz

 

Optra Vehicle Monitoring Plus Skill run on Optra Edge Device

 

✔

Microsoft Azure

 

Solution(s):

Event Grid

 

Virtual Machines

 

Azure VMware Solution

 

App Service

 

Azure Database for MariaDB

 

Azure Data Factory

 

Azure Cosmos DB

 

Azure Cache for Redis

 

Azure Container Registry

 

Container Instances

 

Web App for Containers

 

Azure Service Fabric

 

Azure Functions

 

Azure Container Apps

 

Azure Red Hat OpenShift

 

Azure Kubernetes Service (AKS)

 

✔

Nutanix

 

Solution(s):

Nutanix Cloud Infrastructure (NCI)

 

Nutanix Unified Storage (NUS)

 

Nutanix Cloud Manager (NCM)

 

✔

Red Hat

 

Solution(s):

Red Hat OpenShift

 

Red Hat Enterprise Linux

 

✔

SUSE

 

Solution(s):

Rancher

 

Hyperconverged (HCI)

HCI, also known as Hyperconverged Infrastructure, is the process of combining servers and storage with intelligent software to dynamically allocate resources to applications running in VMs or containers.

This process leverages virtualization which allows compute, storage and networking resources to be treated as pooled resources.

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco HyperFlex Systems

 

Cisco UCS S-Series Storage Servers

 

Cisco UCS C–Series Rack Servers

 

Cisco UCS B-Series Blade Server

 

Cisco UCS X-Series Modular System

 

✔

Citrix

 

Contact(s):CitrixMD@ingrammicro.com

Solution(s):

Citrix DaaS (desktop as a service)

 

✔

Dell

 

Contact(s):Dell Contacts Overview

Solution(s):

VxRail

 

XC Family

 

PowerFlex

 

✔

HPE

 

Contact(s):HPE Contacts Overview

Solution(s):

HPE Alletra dHCI

 

HPE SimpliVity

 

HPE Nutanix

 

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

Spectrum Fusion HCI

 

IBM Turbonomic

 

✔

Intel

 

Solution(s):

Intel® Xeon® Scalable Processors

 

✔

Lenovo

 

Contact(s):Lenovo Contacts Overview

Solution(s):

Lenovo ThinkAgile

 

Lenovo ThinkSystem Servers

 

✔

Nutanix

 

Solution(s):

Nutanix Cloud Infrastructure (NCI)

 

Nutanix Unified Storage (NUS)

 

Nutanix Cloud Manager (NCM)

 

✔

Quantum

 

Solution(s):

Quantum Unified Surveillance Platform

 

Management & Automation Software

IT management & automation is the process of reducing manual intervention by creating software and systems to replace repeatable process.

✔

AWS

 

Solution(s):

AWS ParallelCluster

 

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco HyperFlex Systems

 

Cisco UCS S-Series Storage Servers

 

Cisco UCS C–Series Rack Servers

 

Cisco UCS B-Series Blade Server

 

Cisco UCS X-Series Modular System

 

✔

Citrix

 

Contact(s):CitrixMD@ingrammicro.com

Solution(s):

Citrix DaaS (desktop as a service)

 

✔

Dell

 

Contact(s):Dell Contacts Overview

Solution(s):

DataIQ

 

Dell CloudIQ

 

✔

Google Cloud Platform

 

Solution(s):

Apigee API Management

 

✔

HPE

 

Contact(s):HPE Contacts Overview

Solution(s):

HPE OneView Software

 

Integrated Lights Out (iLO) Software

 

HPE Compute Ops Management

 

HPE ProLiant for Microsoft Azure Stack Hub

 

HPE Serviceguard for Linux

 

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

IBM Instana

 

IBM Turbonomic

 

✔

Intel

 

Solution(s):

Intel® Xeon® Scalable Processors

 

✔

Ivanti

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Ivanti Endpoint Manager

 

✔

Juniper Networks

 

Solution(s):

Security Director and Security Director Cloud

 

Cloud-Native Contrail Networking

 

✔

Lenovo

 

Contact(s):Lenovo Contacts Overview

Solution(s):

Lenovo XClarity

 

Lenovo Open Cloud Automation (LOC-A)

 

✔

Lexmark

 

Contact(s):Imaging@ingrammicro.com

Solution(s):

Optra Network Monitoring Skill run on Optra Edge Devices- In partnership with Domotz

 

✔

Microsoft Azure

 

Solution(s):

Event Grid

 

Azure Devops

 

Azure Active Directory Domain Services (Azure AD DS)

 

Azure Cache for Redis

 

Azure Service Fabric

 

✔

Nutanix

 

Solution(s):

Nutanix Unified Storage (NUS)

 

Nutanix Cloud Manager (NCM)

 

✔

Red Hat

 

Solution(s):

Red Hat Automation Platform

 

✔

UiPath

 

Contact(s):uipath-sd@ingrammicro.com

Solution(s):

Attended or Unattended Robots

 

✔

Veeam

 

Contact(s):veeammd@ingrammicro.com

Ingram Micro Cloud Marketplace
Business Transformation Center Partner

Solution(s):

Veeam Data Platform – VeeamONE

 

✔

VMware

 

Contact(s):vmware-licensing@ingrammicro.com

Solution(s):

VMware Aria

 

Servers

Windows Server is a line of operating systems from Microsoft specifically created for use on a server.

Linux Server is a Linux operating system designed to handle more intense storage and operational needs of larger organizations. It is open-source software and provides a high level of stability, security and flexibility.

✔

AMD

 

Solution(s):

AMD EPYC

 

AMD Ryzen for Server

 

✔

AWS

 

Solution(s):

Amazon Elastic Cloud Compute (EC2)

 

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco HyperFlex Systems

 

Cisco UCS S-Series Storage Servers

 

Cisco UCS C–Series Rack Servers

 

Cisco UCS B-Series Blade Server

 

Cisco UCS X-Series Modular System

 

✔

Dell

 

Contact(s):Dell Contacts Overview

Solution(s):

PowerEdge

 

✔

ENET

 

Solution(s):

ENET Network / Server Memory 

 

✔

Google Cloud Platform

 

Solution(s):

Compute Engine

 

✔

HPE

 

Contact(s):HPE Contacts Overview

Solution(s):

HPE Apollo Systems

 

HPE ProLiant Servers

 

HPE Mission Critical Systems

 

HPE NonStop Family of Servers

 

HPE Synergy

 

HPE SimpliVity

 

HPE Nutanix

 

HPE ProLiant for Microsoft Azure Stack Hub

 

HPE ProLiant RL300

 

HPE Superdome Flex

 

HPE Alletra 4120

 

HPE MicroServer

 

HPE Edgeline

 

HPE SGI 8600

 

HPE Cray Supercomputers

 

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

IBM Power Systems

 

IBM Cloud Bare Metal Servers

 

IBM Cloud Power Virtual Server (PowerVS)

 

IBM Cloud Virtual Server for Classic Infrastructure

 

IBM Cloud Virtual Server for VPC (Virtual Private Cloud) Infrastructure

 

✔

Intel

 

Solution(s):

Intel® Xeon® Scalable Processors

 

✔

Lenovo

 

Contact(s):Lenovo Contacts Overview

Solution(s):

Lenovo ThinkSystem Servers

 

✔

Microsoft Azure

 

Solution(s):

Azure Modular Datacentre

 

Azure Container Registry

 

Container Instances

 

Web App for Containers

 

✔

Nutanix

 

Solution(s):

Nutanix Cloud Infrastructure (NCI)

 

✔

Red Hat

 

Solution(s):

Red Hat Enterprise Linux

 

✔

SUSE

 

Solution(s):

SUSE Linux Enterprise Server (SLES)

 

UNIX

UNIX is an oprerating system that is a multi-user, multi-tasking system for servers, desktops and laptops. UNIX can be used for a multitude of different reasons such as:

– Datacenter Application Support
– Cloud support
– Enhanced Cloud Security
– Interoperability and  Ease of Use

A UNIX operating system is made up of three parts:

  1. Kernel
    2. Shell
    3. Programs

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco HyperFlex Systems

 

Cisco UCS S-Series Storage Servers

 

Cisco UCS C–Series Rack Servers

 

Cisco UCS B-Series Blade Server

 

Cisco UCS X-Series Modular System

 

✔

HPE

 

Contact(s):HPE Contacts Overview

Solution(s):

HPE Serviceguard for Linux

 

HPE Integrity with HP-UX

 

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

IBM Cloud Power Virtual Server (PowerVS)

 

✔

Microsoft Azure

 

Solution(s):

Virtual Machines

 

Virtualization

Server Virtualization is the process of dividing a physical server into multiple unique and isolated virtual servers by means of a software application. Each virtual server can run its own operating systems independently.

Key Benefits include:
– Higher server scalability
– Lower operating costs
– Eliminate server complexity
– Increased performance
– Faster deployments

✔

AWS

 

Solution(s):

Amazon Elastic Cloud Compute (EC2)

 

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco HyperFlex Systems

 

Cisco UCS S-Series Storage Servers

 

Cisco UCS C–Series Rack Servers

 

Cisco UCS B-Series Blade Server

 

Cisco UCS X-Series Modular System

 

✔

Citrix

 

Contact(s):CitrixMD@ingrammicro.com

Solution(s):

Citrix DaaS (desktop as a service)

 

Netscaler SDX

 

Netscaler VPX

 

Citrix Virtual Apps and Desktops On Prem

 

✔

Dell

 

Contact(s):Dell Contacts Overview

Solution(s):

VxRail

 

vSAN Ready Nodes

 

Azure Stack

 

XC Family (Nutanix)

 

✔

Google Cloud Platform

 

Solution(s):

Compute Engine

 

✔

HPE

 

Contact(s):HPE Contacts Overview

Solution(s):

HPE SimpliVity

 

HPE Nutanix

 

HPE ProLiant for Microsoft Azure Stack Hub

 

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

IBM Power

 

IBM Power VS

 

✔

Intel

 

Solution(s):

Intel® Xeon® Scalable Processors

 

✔

Lenovo

 

Contact(s):Lenovo Contacts Overview

Solution(s):

Lenovo ThinkAgile

 

Lenovo ThinkSystem Servers

 

✔

Microsoft Azure

 

Solution(s):

Azure Virtual Desktop

 

Virtual Machines

 

Azure VMware Solution

 

Azure Container Registry

 

Container Instances

 

Web App for Containers

 

Azure Service Fabric

 

Azure Container Apps

 

Azure Red Hat OpenShift

 

Azure Kubernetes Service (AKS)

 

✔

Nutanix

 

Solution(s):

Nutanix Cloud Infrastructure (NCI)

 

Nutanix Unified Storage (NUS)

 

Nutanix Cloud Manager (NCM)

 

✔

Red Hat

 

Solution(s):

Red Hat OpenShift

 

Red Hat Enterprise Linux

 

✔

VMware

 

Contact(s):vmware-licensing@ingrammicro.com

Solution(s):

VMware vCenter

 

VMware Horizon

 

VMware vSAN

 

VMware Aria

 

Delivery & Services

Application Performance Management (APM)

Application Performance Management (APM) is the monitoring and management of performance and availability of software applications.

✔

Allied Telesis

 

Solution(s):

Auger IT Monitoring Service 

 

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco AppDynamics

 

Cisco Services

 

Cisco HyperFlex Systems

 

✔

Citrix

 

Contact(s):CitrixMD@ingrammicro.com

Solution(s):

Citrix DaaS (desktop as a service)

 

Netscaler VPX

 

NetScaler MPX

 

✔

HPE

 

Contact(s):HPE Contacts Overview

Solution(s):

HPE IMC Application Performance Manager Software

 

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

IBM Cloud Monitoring

 

IBM Turbonomic

 

✔

Lenovo

 

Contact(s):Lenovo Contacts Overview

Solution(s):

Lenovo Services

 

✔

UiPath

 

Contact(s):uipath-sd@ingrammicro.com

Solution(s):

Attended or Unattended Robots

 

Assessment, Compliance, Monitor & HealthCheck Services

IT compliance services are designed to aid businesses in ensuring their technology infrastructure meets regulatory standards, on both a national and industry-specific level.

IT monitoring comprises a broad class of products designed to determine whether IT equipment is online and performing to expected service levels, while resolving any detected problems.

An IT health check verifies the current state of the technology infrastructure to ensure the environment is stable, reliable, and secure.

✔

Allied Telesis

 

Solution(s):

Auger  IT monitoring services

 

✔

Axis Communications

 

Solution(s):

Axis Device Manager Extend

 

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco Services

 

Cisco HyperFlex Systems

 

✔

Citrix

 

Contact(s):CitrixMD@ingrammicro.com

Solution(s):

Citrix DaaS (desktop as a service)

 

Sharefile

 

Netscaler VPX

 

NetScaler MPX

 

✔

Dell

 

Contact(s):Dell Contacts Overview

Solution(s):

DT Support Services

 

Cloud Services

 

✔

HPE

 

Contact(s):HPE Contacts Overview

Solution(s):

HPE InfoSight

 

HPE CloudPhysics

 

HPE PointNext

 

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

IBM Cloud Security Compliance Center (SCC)

 

IBM Cloud Monitoring

 

✔

Ivanti

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Ivanti Endpoint Manager

 

✔

Juniper Networks

 

Solution(s):

Juniper Network as a Service, NaaS

 

✔

Lenovo

 

Contact(s):Lenovo Contacts Overview

Solution(s):

Lenovo Services

 

✔

Lexmark

 

Contact(s):Imaging@ingrammicro.com

Solution(s):

Optra Network Monitoring Skill run on Optra Edge Devices- In partnership with Domotz

 

✔

UiPath

 

Contact(s):uipath-sd@ingrammicro.com

Solution(s):

Attended or Unattended Robots

 

✔

Veeam

 

Contact(s):veeammd@ingrammicro.com

Ingram Micro Cloud Marketplace
Business Transformation Center Partner

Solution(s):

Veeam Data Platform – VeeamONE

 

Client Management

Client Management is a process that involves coordinating and managing interactions between a client and the organization.

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco Services

 

Cisco HyperFlex Systems

 

✔

Google Cloud Platform

 

Solution(s):

Cloud Identity

 

✔

Intel

 

Solution(s):

Intel® Core™ Processor

 

✔

Ivanti

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Ivanti Endpoint Manager

 

✔

Lenovo

 

Contact(s):Lenovo Contacts Overview

Solution(s):

Lenovo PC Services

 

✔

Lexmark

 

Contact(s):Imaging@ingrammicro.com

Solution(s):

Optra Network Monitoring Skill run on Optra Edge Devices- In partnership with Domotz

 

Optra Vehicle Monitoring Plus Skill run on Optra Edge Device

 

✔

Microsoft Azure

 

Solution(s):

Azure Active Directory Domain Services (Azure AD DS)

 

Azure Active Directory (Azure AD)

 

Azure Cache for Redis

 

Consultative Services

IT Consultative Services are advisory services that help clients assess different technology strategies and, in doing so, align their technology strategies with their business or process strategies.

✔

Allied Telesis

 

Solution(s):

Advisory Services

 

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco Services

 

Cisco HyperFlex Systems

 

✔

Dell

 

Contact(s):Dell Contacts Overview

Solution(s):

DT Consulting Services

 

✔

HPE

 

Contact(s):HPE Contacts Overview

Solution(s):

HPE PointNext

 

HPE Digital Learner

 

✔

Juniper Networks

 

Solution(s):

Juniper Professional Services

 

✔

Lenovo

 

Contact(s):Lenovo Contacts Overview

Solution(s):

Lenovo Services

 

✔

Lexmark

 

Contact(s):Imaging@ingrammicro.com

Solution(s):

Optra Network Monitoring Skill run on Optra Edge Devices- In partnership with Domotz

 

Optra Vehicle Monitoring Plus Skill run on Optra Edge Device

 

Installation & Deployment Services

Deployment Services support the implementation and rollout of new applications or infrastructure.

✔

Allied Telesis

 

Solution(s):

Implementation Services

 

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco Services

 

Cisco HyperFlex Systems

 

✔

Dell

 

Contact(s):Dell Contacts Overview

Solution(s):

Dell IT Deployment Services & Technologies

 

✔

HPE

 

Contact(s):HPE Contacts Overview

Solution(s):

HPE PointNext

 

✔

Juniper Networks

 

Solution(s):

Juniper Professional Services

 

✔

Lenovo

 

Contact(s):Lenovo Contacts Overview

Solution(s):

Lenovo Services

 

✔

Lexmark

 

Contact(s):Imaging@ingrammicro.com

Solution(s):

Optra Network Monitoring Skill run on Optra Edge Devices- In partnership with Domotz

 

Optra Vehicle Monitoring Plus Skill run on Optra Edge Device

 

Integration & Configuration Services

Integration & Configuration Services assist with the arrangement of the hardware and software of IT system. Management of the components, settings and more ensures all IT systems can function smoothly and give  greater control over the devices on the network.

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco Services

 

Cisco HyperFlex Systems

 

✔

Dell

 

Contact(s):Dell Contacts Overview

Solution(s):

DT Configuration Services

 

✔

HPE

 

Contact(s):HPE Contacts Overview

Solution(s):

HPE PointNext

 

✔

Juniper Networks

 

Solution(s):

Juniper Professional Services

 

✔

Lenovo

 

Contact(s):Lenovo Contacts Overview

Solution(s):

Lenovo Services

 

✔

Lexmark

 

Contact(s):Imaging@ingrammicro.com

Solution(s):

Optra Network Monitoring Skill run on Optra Edge Devices- In partnership with Domotz

 

Optra Vehicle Monitoring Plus Skill run on Optra Edge Device

 

✔

Microsoft Azure

 

Solution(s):

App Configuration

 

Azure Database Migration Service

 

IT Asset Disposition (ITAD)

IT asset disposition (ITAD) is the disposing of IT hardware and other equipment that is no longer needed, but it goes beyond simply throwing away old gear.

ITAD also ensures that materials are properly wiped and that all regulatory standards for proper data security are followed throughout the disposal process.

✔

Blancco

 

Contact(s):blancco-licensing@ingrammicro.com

Solution(s):

Blancco Drive Eraser

 

Blancco Vritual Machine Eraser

 

Blancco LUN Eraser

 

Blancco File Eraser

 

Blancco Hardware Solutions

 

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco Services

 

Cisco HyperFlex Systems

 

✔

Dell

 

Contact(s):Dell Contacts Overview

Solution(s):

DT Assett Recovery Services

 

✔

HPE

 

Contact(s):HPE Contacts Overview

Solution(s):

HPE PointNext

 

✔

Lenovo

 

Contact(s):Lenovo Contacts Overview

Solution(s):

Lenovo Services

 

✔

Lexmark

 

Contact(s):Imaging@ingrammicro.com

Solution(s):

Optra Network Monitoring Skill run on Optra Edge Devices- In partnership with Domotz

 

IT Help Desk

An IT Help Desk is a software platform that helps users solve their problems through a single (or multiple) point of contact. IT help desks allow employees and IT team members to troubleshoot problems, track their issues, and get assistance regarding products, services, or processes.

✔

Aisera

 

Contact(s):Aisera Contacts Overview

Solution(s):

AI Service Desk for IT, HR & Business Services

 

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco Services

 

Cisco HyperFlex Systems

 

✔

Dell

 

Contact(s):Dell Contacts Overview

Solution(s):

DT Managed Services

 

IT Service Desk

 

✔

Lenovo

 

Contact(s):Lenovo Contacts Overview

Solution(s):

Lenovo Services

 

IT Staffing Services

IT Staffing Services eliminate the burden many HR departments face in finding and vetting hundreds of applicants to fulfil IT-related roles.

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco Services

 

Cisco HyperFlex Systems

 

✔

HPE

 

Contact(s):HPE Contacts Overview

Solution(s):

HPE GreenLake Management Services Remote Staff Augmentation Services

 

✔

Juniper Networks

 

Solution(s):

Juniper Professional Services

 

✔

Lenovo

 

Contact(s):Lenovo Contacts Overview

Solution(s):

Lenovo Services

 

Training

IT Training assists with ramping up employees to equip them with the skills necessary for performing information technology jobs.

It is often required to achieve vendor-level technical certifications.

✔

Allied Telesis

 

Solution(s):

Allied Telesis Certification Program

 

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco Training

 

Cisco Services

 

Cisco HyperFlex Systems

 

✔

Dell

 

Contact(s):Dell Contacts Overview

Solution(s):

DT Education Services

 

✔

HPE

 

Contact(s):HPE Contacts Overview

Solution(s):

HPE Education

 

HPE Digital Learner

 

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

IBM Training

 

✔

Juniper Networks

 

Solution(s):

Juniper Training

 

Juniper Professional Services

 

✔

Lenovo

 

Contact(s):Lenovo Contacts Overview

Solution(s):

Lenovo Services

 

End-Point

Client

A Client Endpoint is a remote computing device that communicates back and forth with a network to which it is connected.

Examples: Laptop, Tablet, Smart Phone, Desktop

✔

AMD

 

Solution(s):

AMD Threadripper Pro

 

AMD RYZEN

 

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco HyperFlex Systems

 

✔

Dell

 

Contact(s):Dell Contacts Overview

Solution(s):

Wyse

 

Workstation

 

Laptops

 

Dell Lifecycle Hub

 

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

Dizzion Desktop as a Service (DaaS) on IBM Cloud

 

✔

Igel

 

Solution(s):

IGEL Cosmos IGEL OS 12

 

✔

Intel

 

Solution(s):

Intel® NUC Kits

 

Intel® Pentium® Processors

 

✔

Lenovo

 

Contact(s):Lenovo Contacts Overview

Solution(s):

Lenovo ThinkPad

 

Lenovo ThinkStation

 

✔

Microsoft Azure

 

Solution(s):

Azure Virtual Desktop

 

Digital Workspace

A Digital Workspace combines the force of current trends such as cloud, SaaS applications, social, enhanced analytics, work-from-anywhere, bring-your-own-device, and so forth, to meet the immediate and long-term needs of the business and its employees to drive a change in the user experience.  It simplifies the experience of employees accessing their apps and data in one central platform from any endpoint.

✔

Aisera

 

Contact(s):Aisera Contacts Overview

Solution(s):

AI Service Desk for IT, HR & Business Services

 

✔

AMD

 

Solution(s):

AMD Threadripper Pro

 

AMD RYZEN

 

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco Services

 

Cisco HyperFlex Systems

 

✔

Citrix

 

Contact(s):CitrixMD@ingrammicro.com

Solution(s):

Citrix DaaS (desktop as a service)

 

Sharefile

 

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

IBM Digital Workplace Services

 

Dizzion Desktop as a Service (DaaS) on IBM Cloud

 

✔

Intel

 

Solution(s):

Intel® NUC Kits

 

Intel® Pentium® Processors

 

Intel® Core™ Processor

 

✔

Lenovo

 

Contact(s):Lenovo Contacts Overview

Solution(s):

Lenovo Digital Workplace Solutions

 

Lenovo ThinkSmart

 

✔

Nutanix

 

Solution(s):

Nutanix Desktop-as-a-Service (DaaS)

 

End-User Software

End-User Software is a program that is used by end-users – people who are not professional software developers.

Examples:
Cisco AnyConnect
Skype for Business
Microsoft Office

✔

Aisera

 

Contact(s):Aisera Contacts Overview

Solution(s):

AI Service Desk for IT, HR & Business Services

 

✔

Axis Communications

 

Solution(s):

Axis Camera Station

 

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco HyperFlex Systems

 

✔

Igel

 

Solution(s):

IGEL Cosmos IGEL OS 12

 

✔

Lenovo

 

Contact(s):Lenovo Contacts Overview

Solution(s):

Lenovo Software

 

✔

Lexmark

 

Contact(s):Imaging@ingrammicro.com

Solution(s):

Optra Network Monitoring Skill run on Optra Edge Devices- In partnership with Domotz

 

Optra Vehicle Monitoring Plus Skill run on Optra Edge Device

 

✔

UiPath

 

Contact(s):uipath-sd@ingrammicro.com

Solution(s):

Attended or Unattended Robots

 

Management & Automation Software

IT Management & Automation is the process of reducing manual intervention by creating software and systems to replace repeatable process.

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco Services

 

Cisco HyperFlex Systems

 

✔

Dell

 

Contact(s):Dell Contacts Overview

Solution(s):

Dell Client Command Suite

 

Device Management with Microsoft Endpoint Manager

 

✔

Igel

 

Solution(s):

IGEL Cosmos Universal Management Suite 12 (UMS)

 

✔

Ivanti

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Ivanti Endpoint Manager

 

✔

Lenovo

 

Contact(s):Lenovo Contacts Overview

Solution(s):

Lenovo PC Services

 

✔

Microsoft Azure

 

Solution(s):

App Configuration

 

✔

Nutanix

 

Solution(s):

Nutanix Desktop-as-a-Service (DaaS)

 

✔

Red Hat

 

Solution(s):

Red Hat Automation Platform

 

✔

UiPath

 

Contact(s):uipath-sd@ingrammicro.com

Solution(s):

Attended or Unattended Robots

 

Mobile Device Management (MDM)

Mobile Device Management (MDM) is the process of enhancing corporate data security by monitoring, managing and securing the mobile devices such as laptops, smartphones and tablets that are used in enterprises.

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco HyperFlex Systems

 

✔

Dell

 

Contact(s):Dell Contacts Overview

Solution(s):

Device Management with Microsoft Endpoint Manager

 

✔

HPE

 

Contact(s):HPE Contacts Overview

Solution(s):

HPE IMC Endpoint Admission Defense Software

 

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

Mobile Device Management (MDM)

 

✔

Igel

 

Solution(s):

IGEL Cosmos Universal Management Suite 12 (UMS)

 

✔

Ivanti

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Ivanti Endpoint Manager

 

✔

Lenovo

 

Contact(s):Lenovo Contacts Overview

Solution(s):

Lenovo Device Manager

 

Thin Client

A Thin Client is a low-performance computer that has been optimized to connect to a service running on a remote server such as a virtual desktop, server applications, or web application.

The benefits of thin clients include:
– Lower cost
– Increased security (greater control)
– Ease of management
– Scalability

✔

AMD

 

Solution(s):

AMD RYZEN

 

✔

Dell

 

Contact(s):Dell Contacts Overview

Solution(s):

Wyse

 

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

Dizzion Desktop as a Service (DaaS) on IBM Cloud

 

✔

Igel

 

Solution(s):

IGEL Cosmos IGEL OS 12

 

✔

Intel

 

Solution(s):

Intel® NUC Kits

 

Intel® Pentium® Processors

 

Intel® Celeron® Processors

 

✔

Lenovo

 

Contact(s):Lenovo Contacts Overview

Solution(s):

Lenovo ThinkCentre

 

✔

Microsoft Azure

 

Solution(s):

Azure Virtual Desktop

 

✔

VMware

 

Contact(s):vmware-licensing@ingrammicro.com

Solution(s):

VMWare Horizon

 

Infrastructure

Cabling

Refers to the Cabling configuration in a datacenter.

✔

APC

 

Solution(s):

APC by Schneider Electric Cable Management

 

✔

ATEN

 

Contact(s):MIX-Operations@ingrammicro.com

Solution(s):

ATEN Cables

 

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco SD-WN

 

✔

ENET

 

Solution(s):

ENET Copper Cables 

 

ENET Fiber Cables 

 

✔

HPE

 

Contact(s):HPE Contacts Overview

Solution(s):

HPE Cables

 

✔

Juniper Networks

 

Solution(s):

Optics and cables

 

✔

Lenovo

 

Contact(s):Lenovo Contacts Overview

Solution(s):

Lenovo Options

 

✔

NetAlly

 

Contact(s):NetAllyMD@ingrammicro.com

Solution(s):

CyberScope

 

LinkRunner 10G

 

EtherScope nXG

 

✔

Vertiv

 

Solution(s):

Cabling Options

 

Cooling

Traditional data center Cooling techniques used a combination of raised floors and computer room air conditioner or computer room air handler infrastructure.

Modern data centers use a variety of innovative data center cooling technologies; these technologies include basic fans to much more complex heat transfer technologies such as chilled water systems and liquid cooling.

✔

APC

 

Solution(s):

APC by Schneider Electric Data Center Cooling Solution

 

✔

Dell

 

Contact(s):Dell Contacts Overview

Solution(s):

Datta Center Power and Cooling Solutions

 

✔

HPE

 

Contact(s):HPE Contacts Overview

Solution(s):

HPE Racks, Power, and Cooling

 

✔

Lenovo

 

Contact(s):Lenovo Contacts Overview

Solution(s):

Lenovo Options

 

✔

Vertiv

 

Solution(s):

Thermal Management

 

Location

Refers to the Location of the IT infrastructure, which is critical for considerations such as reliability, security, scalability and uptime.

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco Services

 

✔

HPE

 

Contact(s):HPE Contacts Overview

Solution(s):

HPE Modular Data Centers (PODs)

 

✔

Juniper Networks

 

Solution(s):

Juniper Indoor Location Services

 

 

✔

Lenovo

 

Contact(s):Lenovo Contacts Overview

Solution(s):

Lenovo – ITIC Reliability Study

 

✔

Microsoft Azure

 

Solution(s):

Azure Modular Datacentre

 

✔

Nutanix

 

Solution(s):

Nutanix Cloud Infrastructure (NCI)

 

Management & Automation Software

IT Management & Automation is the process of reducing manual intervention by creating software and systems to replace repeatable process.

✔

APC

 

Solution(s):

APC by Schneider Electric EcoStruxure IT Expert – Infrastructure Management Solution

 

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco SD-WN

 

Cisco Services

 

✔

Dell

 

Contact(s):Dell Contacts Overview

Solution(s):

DataIQ

 

Dell CloudIQ

 

✔

HPE

 

Contact(s):HPE Contacts Overview

Solution(s):

HPE OneView Software

 

✔

Lenovo

 

Contact(s):Lenovo Contacts Overview

Solution(s):

Lenovo XClarity

 

✔

Nutanix

 

Solution(s):

Nutanix Unified Storage (NUS)

 

✔

Red Hat

 

Solution(s):

Red Hat Enterprise Linux

 

✔

UiPath

 

Contact(s):uipath-sd@ingrammicro.com

Solution(s):

Attended or Unattended Robots

 

✔

Veeam

 

Contact(s):veeammd@ingrammicro.com

Ingram Micro Cloud Marketplace
Business Transformation Center Partner

Solution(s):

Veeam Data Platform – VeeamONE

 

✔

Vertiv

 

Solution(s):

Monitoring Control and Management Software

 

✔

VMware

 

Contact(s):vmware-licensing@ingrammicro.com

Solution(s):

VMware vCenter

 

VMware Aria

 

Power

Data centers consume more than 416 terawatts of Power annually, which represents nearly 3% of the total electricity generated on a global scale.

It’s critical to understand Power Distribution, Power Efficiency Practices, and Power Sustainability in the data center to be cost effective and operationally efficient.

✔

APC

 

Solution(s):

APC by Schneider Electric Smart-UPS for Network and Server applications 

 

✔

ATEN

 

Contact(s):MIX-Operations@ingrammicro.com

Solution(s):

ATEN Power Equipment

 

✔

CyberPower

 

Contact(s):cyberpowerteam@ingrammicro.com

Solution(s):

UPS

 

PDU

 

Rackbar

 

✔

Dell

 

Contact(s):Dell Contacts Overview

Solution(s):

Datta Center Power and Cooling Solutions

 

✔

Eaton

 

Solution(s):

Eaton UPS – Rackmount, Tower, Desktop. 500VA to 150kVA

 

Eaton PDUs (Power Distribution Units)

 

✔

HPE

 

Contact(s):HPE Contacts Overview

Solution(s):

HPE Racks, Power, and Cooling

 

✔

Lenovo

 

Contact(s):Lenovo Contacts Overview

Solution(s):

Lenovo Options

 

✔

Vertiv

 

Solution(s):

Uninterruptible Power Supplies (UPS)

 

Rack

A data center Rack is a type of physical steel and electronic framework that is designed to house servers, networking devices, cables and other data center computing equipment.

This physical structure provides equipment placement and orchestration within a data center facility.

✔

APC

 

Solution(s):

APC by Schneider Electric Racks and Enclosures

 

✔

ATEN

 

Contact(s):MIX-Operations@ingrammicro.com

Solution(s):

Aten Rack Equipment

 

✔

CyberPower

 

Contact(s):cyberpowerteam@ingrammicro.com

Solution(s):

Server Racks

 

✔

Eaton

 

Solution(s):

Tripp Lite by Eaton Racks – Full enclosure, lockable, open frame, wall-mount, floor-standing

 

✔

HPE

 

Contact(s):HPE Contacts Overview

Solution(s):

HPE Racks, Power, and Cooling

 

✔

Lenovo

 

Contact(s):Lenovo Contacts Overview

Solution(s):

Lenovo Options

 

✔

Rackmount.IT

 

Solution(s):

19″ rack mount kits

 

✔

Vertiv

 

Solution(s):

Vertivâ„¢ VR Rack

 

Networking

LAN / WAN / SD-WAN

A Local Area Network (LAN) is a network contained within a small geographic area, usually within the same building.

A Wide Area Network (WAN) is a large computer network that connects groups of computers over large distances. WANs are often used by large businesses to connect their office network.

*Each office typically has its own local area network, or LAN, and these LANs connect via a WAN.

A Software-Defined Wide Area Network (SD-WAN) is a virtual WAN architecture that allows enterprises to leverage any combination of transport services=.

✔

Allied Telesis

 

Solution(s):

Allied Telesis Routers and Firewalls

 

Allied Telesis Industrial Switches

 

Allied Telesis Small Business Switches

 

Allied Telesis Enterprise Campus Switches 

 

✔

AMD

 

Solution(s):

AMD Pensando

 

✔

Aruba Networks (HPE)

 

Contact(s):HPEAruba@ingrammicro.com

Solution(s):

Aruba CX Data Center Switches

 

Aruba EdgeConnect SD-WAN

 

✔

Buffalo Americas

 

Contact(s):Buffalo Americas Contacts Overview

Solution(s):

Multi Gigabit Business Switch

 

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco SD-WN

 

Cisco Nexus Data Center Switches

 

Cisco Services

 

✔

Citrix

 

Contact(s):CitrixMD@ingrammicro.com

Solution(s):

Netscaler SDX

 

Netscaler VPX

 

NetScaler MPX

 

✔

Cradlepoint

 

Solution(s):

5G SD-WAN

 

5G Routers

 

✔

Dell

 

Contact(s):Dell Contacts Overview

Solution(s):

PowerSwitch

 

✔

ENET

 

Solution(s):

ENET Optical Transceivers

 

✔

F5

 

Solution(s):

F5 Big-IP

 

✔

Google Cloud Platform

 

Solution(s):

Google Cloud Hybrid Connectivity

 

✔

HPE

 

Contact(s):HPE Contacts Overview

Solution(s):

HPE Intel Omni-Path Switches

 

HPE Slingshot

 

HPE Mellanox InfiniBand Switches

 

HPE Mellanox Ethernet Switches

 

✔

Intel

 

Solution(s):

800 Series Network Adapters

 

700 Series Network Adapters

 

✔

Juniper Networks

 

Solution(s):

Juniper PTX Series Routers

 

Juniper ACX Series Routers

 

EX Series Switches

 

QFX Series Switches

 

Juniper SRX Series Firewalls

 

Juniper SSR Series Routers

 

Juniper MX Series

 

Juniper NFX Series

 

✔

Lenovo

 

Contact(s):Lenovo Contacts Overview

Solution(s):

Lenovo Networking

 

✔

Nvidia

 

Solution(s):

Nvidia Quantum Infiniband Switches

 

ConnectX SmartNIC Cards

 

✔

QNAP

 

Contact(s):QNAP Contacts Overview

Solution(s):

Network Switches

 

QuWAN

 

Load Balancing

Load Balancing is a core networking solution used to distribute traffic across multiple servers in a server farm. Load Balancers improve application availability and responsiveness and prevent server overload.

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco SD-WN

 

Cisco Services

 

✔

Citrix

 

Contact(s):CitrixMD@ingrammicro.com

Solution(s):

Netscaler VPX

 

NetScaler MPX

 

✔

F5

 

Solution(s):

F5 NGINX

 

F5 Big-IP

 

✔

Juniper Networks

 

Solution(s):

Cloud-Native Contrail Networking

 

Juniper MX Series

 

Management & Automation Software

IT Management & Automation is the process of reducing manual intervention by creating software and systems to replace repeatable process.

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco Storage Area Networking

 

Cisco SD-WN

 

Cisco Nexus Data Center Switches

 

Cisco Services

 

✔

Citrix

 

Contact(s):CitrixMD@ingrammicro.com

Solution(s):

Netscaler SDX

 

Netscaler VPX

 

NetScaler MPX

 

✔

Dell

 

Contact(s):Dell Contacts Overview

Solution(s):

SmartFabric Services

 

✔

HPE

 

Contact(s):HPE Contacts Overview

Solution(s):

HPE OneView Software

 

HPE Serviceguard for Linux

 

✔

Juniper Networks

 

Solution(s):

Juniper Anuta ATOM

 

Juniper/ Mist AI Dashboard

 

Network Automation

 

Security Director and Security Director Cloud

 

Juniper Apstra

 

Juniper Paragon 

 

Cloud-Native Contrail Networking

 

✔

Lenovo

 

Contact(s):Lenovo Contacts Overview

Solution(s):

Lenovo XClarity

 

✔

Red Hat

 

Solution(s):

Red Hat Automation Platform

 

✔

UiPath

 

Contact(s):uipath-sd@ingrammicro.com

Solution(s):

Attended or Unattended Robots

 

Transport

In networking, the Transport layer is a conceptual division of methods in the layered architecture of protocols in the network stack in the Internet protocol suite and the OSI model.

The protocols of this layer provide end-to-end communication services for applications.

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco Nexus Data Center Switches

 

Cisco Services

 

✔

Citrix

 

Contact(s):CitrixMD@ingrammicro.com

Solution(s):

Netscaler VPX

 

NetScaler MPX

 

✔

F5

 

Solution(s):

F5 Big-IP

 

✔

Google Cloud Platform

 

Solution(s):

Google Cloud Hybrid Connectivity

 

Voice (VoIP / UCC)

Voice over Internet Protocol (VoIP), is a method and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks.

Unified Communications and Collaboration (UCC) is a combination of enterprise communication tools assembled into a single interface and integrated into a single management system.

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco Services

 

✔

Citrix

 

Contact(s):CitrixMD@ingrammicro.com

Solution(s):

Netscaler SDX

 

Netscaler VPX

 

NetScaler MPX

 

Storage

Backup Storage Hardware

Backup service for storage

✔

AWS

 

Solution(s):

AWS Snowball

 

✔

ExaGrid

 

Contact(s):MIX-Operations@ingrammicro.com

Solution(s):

EX10

 

EX84

 

EX84

 

EX52

 

EX36

 

EX27

 

EX18

 

✔

HPE

 

Contact(s):HPE Contacts Overview

Solution(s):

StoreOnce

 

✔

Lenovo

 

Contact(s):Lenovo Contacts Overview

Solution(s):

Lenovo ThinkSystem DE Series

 

✔

QNAP

 

Contact(s):QNAP Contacts Overview

Solution(s):

Backup and Restoration

 

Block Storage

Block Storage is a technology that is used to store data files on Storage Area Networks or cloud-based storage environments. It breaks up data into blocks and then stores those blocks as separate pieces, each with a unique identifier.

✔

AWS

 

Solution(s):

Amazon Elastic Block Store (EBS)

 

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco UCS S-Series Storage Servers

 

✔

Dell

 

Contact(s):Dell Contacts Overview

Solution(s):

PowerStore

 

PowerMax

 

Unity

 

PowerVault

 

✔

Google Cloud Platform

 

Solution(s):

Persistent disk

 

Cloud Storage

 

✔

HPE

 

Contact(s):HPE Contacts Overview

Solution(s):

HPE Nimble

 

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

Flash Systems

 

✔

Lenovo

 

Contact(s):Lenovo Contacts Overview

Solution(s):

Lenovo ThinkSystem DM Series

 

Lenovo ThinkSystem DE Series

 

✔

Nutanix

 

Solution(s):

Nutanix Unified Storage (NUS)

 

Nutanix Cloud Manager (NCM)

 

Direct-Attached Storage (DAS)

Direct-Attached Storage (DAS) refers to a digital storage system directly attached to a server or workstation, without a network in between. This is ideal for small business, departments, workgroups, etc., which do not share information across enterprises.

Examples: External Hard Drives (connected directly), internal server hard drive disks

✔

Dell

 

Contact(s):Dell Contacts Overview

Solution(s):

PowerVault

 

✔

Google Cloud Platform

 

Solution(s):

Cloud Storage

 

✔

HPE

 

Contact(s):HPE Contacts Overview

Solution(s):

HPE D3000 Enclosures

 

✔

Lenovo

 

Contact(s):Lenovo Contacts Overview

Solution(s):

Lenovo Direct Attached Storage (DAS)

 

File Storage

File Storage, also called file-level or file-based storage, stores data in a hierarchical structure.

✔

AWS

 

Solution(s):

Amazon FSx

 

Amazon Elastic File System (EFS)

 

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco HyperFlex Systems

 

Cisco UCS S-Series Storage Servers

 

✔

Citrix

 

Contact(s):CitrixMD@ingrammicro.com

Solution(s):

Sharefile

 

✔

Dell

 

Contact(s):Dell Contacts Overview

Solution(s):

Unity

 

PowerScale – Isilon

 

✔

Google Cloud Platform

 

Solution(s):

Cloud Storage

 

✔

HPE

 

Contact(s):HPE Contacts Overview

Solution(s):

HPE GreenLake for File Storage

 

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

IBM Spectrum Scale

 

✔

Lenovo

 

Contact(s):Lenovo Contacts Overview

Solution(s):

Lenovo ThinkSystem DM Series

 

✔

Nutanix

 

Solution(s):

Nutanix Unified Storage (NUS)

 

Nutanix Cloud Manager (NCM)

 

✔

QNAP

 

Contact(s):QNAP Contacts Overview

Solution(s):

QNAP Storage

 

✔

Quantum

 

Solution(s):

Quantum StorNext

 

Management & Automation Software

IT Management & Automation is the process of reducing manual intervention by creating software and systems to replace repeatable process.

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco Storage Area Networking

 

Cisco HyperFlex Systems

 

Cisco UCS S-Series Storage Servers

 

✔

Citrix

 

Contact(s):CitrixMD@ingrammicro.com

Solution(s):

Sharefile

 

✔

Dell

 

Contact(s):Dell Contacts Overview

Solution(s):

DataIQ

 

Dell CloudIQ

 

✔

HPE

 

Contact(s):HPE Contacts Overview

Solution(s):

HPE OneView Software

 

HPE Data Management Framework

 

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

IBM Sprectrum Portfolio

 

IBM Turbonomic

 

✔

Lenovo

 

Contact(s):Lenovo Contacts Overview

Solution(s):

Lenovo XClarity

 

✔

Nutanix

 

Solution(s):

Nutanix Unified Storage (NUS)

 

Nutanix Cloud Manager (NCM)

 

✔

Red Hat

 

Solution(s):

Red Hat Automation Platform

 

✔

UiPath

 

Contact(s):uipath-sd@ingrammicro.com

Solution(s):

Attended or Unattended Robots

 

✔

VMware

 

Contact(s):vmware-licensing@ingrammicro.com

Solution(s):

VMware vSAN

 

Network-Attached Storage (NAS)

Network-Attached Storage act as centralized network shares for use over a local network. Other machines on the network connect to a NAS to read and write data as if the drive were connected to their computer directly.

✔

AWS

 

Solution(s):

Amazon FSx

 

Amazon Elastic File System (EFS)

 

✔

Buffalo Americas

 

Contact(s):Buffalo Americas Contacts Overview

Solution(s):

NAS for Business

 

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco HyperFlex Systems

 

Cisco UCS S-Series Storage Servers

 

✔

Dell

 

Contact(s):Dell Contacts Overview

Solution(s):

Unity

 

PowerScale – Isilon

 

✔

Google Cloud Platform

 

Solution(s):

Cloud Storage

 

✔

HPE

 

Contact(s):HPE Contacts Overview

Solution(s):

HPE StoreEasy

 

HPE StoreOnce

 

✔

Lenovo

 

Contact(s):Lenovo Contacts Overview

Solution(s):

Lenovo ThinkSystem DM Series

 

✔

QNAP

 

Contact(s):QNAP Contacts Overview

Solution(s):

QNAP Storage

 

✔

Quantum

 

Solution(s):

Quantum StorNext

 

Quantum DXi Series

 

Quantum Myriad

 

Object Storage

Object Storage is a data storage architecture for large stores of unstructured data. It designates each piece of data as an object, keeps it in a separate storehouse, and bundles it with metadata and a unique identifier for easy access and retrieval.

✔

AWS

 

Solution(s):

AWS Snowball

 

AWS Storage Gateway

 

Amazon Simple Storage Service (S3)

 

Amazon S3 Glacier

 

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco UCS S-Series Storage Servers

 

✔

Dell

 

Contact(s):Dell Contacts Overview

Solution(s):

ECS

 

ObjectScale (Kubernetes)

 

✔

Google Cloud Platform

 

Solution(s):

Firebase

 

Cloud Storage

 

✔

HPE

 

Contact(s):HPE Contacts Overview

Solution(s):

Scality ARTESCA and Scality RING

 

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

IBM Object Storage

 

IBM Cloud Object Storage (COS)

 

✔

Lenovo

 

Contact(s):Lenovo Contacts Overview

Solution(s):

Lenovo ThinkSystem DM Series

 

✔

Nutanix

 

Solution(s):

Nutanix Unified Storage (NUS)

 

Nutanix Cloud Manager (NCM)

 

✔

QNAP

 

Contact(s):QNAP Contacts Overview

Solution(s):

QuTScloud

 

✔

Quantum

 

Solution(s):

Quantum ActiveScale

 

Storage Area Network (SAN)

Storage Area Networks (SANs) are the most common storage networking architecture used by enterprises for business-critical applications that need to deliver high throughput and low latency.

SANs make up about two-thirds of the total networked storage market. They are designed to remove single points of failure, making SANs highly available and resilient.

The most common SAN protocols are: FCP, iSCSI, FCoE, & FC-NVMe.

Common use cases include:
– Oracle Databases
– Microsoft SQL Server Databases
– Large Virtualization Deployments
– Virtual Desktop Deployments

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco Storage Area Networking

 

✔

Citrix

 

Contact(s):CitrixMD@ingrammicro.com

Solution(s):

Sharefile

 

✔

Dell

 

Contact(s):Dell Contacts Overview

Solution(s):

Connectrix

 

SAN Health Tools

 

✔

HPE

 

Contact(s):HPE Contacts Overview

Solution(s):

HPE MSA

 

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

IBM San

 

✔

Lenovo

 

Contact(s):Lenovo Contacts Overview

Solution(s):

Lenovo ThinkSystem DM Series

 

Lenovo ThinkSystem DE Series

 

✔

VMware

 

Contact(s):vmware-licensing@ingrammicro.com

Solution(s):

VMware vSAN

 

Tape

A Tape Drive is a data storage device that reads and writes data on a magnetic tape. Magnetic tape data storage is typically used for offline, archival data storage. Tape media generally has a favorable unit cost and a long archival stability.

A Tape Storage system generally consists of magnetic tape media, tape drives and tape automation.

✔

AWS

 

Solution(s):

Amazon S3 Glacier

 

✔

Dell

 

Contact(s):Dell Contacts Overview

Solution(s):

Dell EMC ML3

 

✔

HPE

 

Contact(s):HPE Contacts Overview

Solution(s):

HPE StoreEver

 

✔

Lenovo

 

Contact(s):Lenovo Contacts Overview

Solution(s):

Lenovo Tape Archive Solutions

 

✔

Quantum

 

Solution(s):

Quantum Scalar Tape

 

 


Acronis

ActZero

Adlumin

Alien Vault (LevelBlue)

Artic Wolf

Avepoint

BeyondTrust

Bitdefender

BitTitan

Check Point

Cisco

ConnectWise

DocuSign

Dropbox

ESET

Fortinet

GoTo

ITagree

Juniper

Kaseya

LiveVHD

Mimecast

Palo Alto Networks

Pluralsight

Proofpoint

Samsung

SonicWall

Sophos

SPECTRA

Tenable

Trellix

Trend Micro

Veritas

Watchguard

MSP Basics

Asset Management & Network Discovery

Asset Management & Network Discovery is the automated process of identifying and inventorying all active endpoints, servers, devices, and virtual instances connected to an organization’s networks. This includes local area networks (LANs), wide area networks (WANs), wireless networks, and cloud-based networks. By providing a comprehensive view of all networked assets, Network Discovery enhances asset management, strengthens security by uncovering unauthorized devices, and supports efficient network monitoring and troubleshooting. It ensures that IT teams have complete visibility of their network environment.

✔

ActZero

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

ActZero

 

✔

Adlumin

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Adlumin

 

✔

Alien Vault (LevelBlue)

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

LevelBlue MSSP

 

✔

Artic Wolf

 

Contact(s):ArcticWolfMD@ingrammicro.com

Solution(s):

Managed Risk

 

✔

BeyondTrust

 

Contact(s):BeyondTrust@ingrammicro.com

Solution(s):

Endpoint Privilege Management

 

✔

Bitdefender

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Gravity Zone Cloud for MSP Security

 

✔

Juniper

 

Contact(s):Juniper Contacts Overview

Solution(s):

Asset Visibility

 

✔

Watchguard

 

Contact(s):Watchguard Contacts Overview

Solution(s):

ThreatSync+NDR

 

Data Backup & Disaster Recovery & Continuity

MSPs offer data backup and disaster recovery services to ensure business continuity in case of data loss or system failures. Regular backups are performed to secure data, and disaster recovery plans are developed to restore operations quickly. These services include offsite storage, cloud backups, and testing recovery procedures.

✔

Acronis

 

Contact(s):Acronis-Cloud@ingrammicro.com

Solution(s):

Disaster Recovery

 

✔

Avepoint

 

Contact(s):Avepoint Contacts Overview

Solution(s):

Cloud Backup

 

✔

Dropbox

 

Contact(s):dropbox@ingrammmicro.com

Solution(s):

Dropbox

 

IT Help Desk Support

MSPs commonly offer 9/5 or 24/7 technical help desk support services to address user issues and minimize downtime. Help desk services include troubleshooting hardware and software problems, providing guidance on IT-related queries, and resolving connectivity issues.

✔

BeyondTrust

 

Contact(s):BeyondTrust@ingrammicro.com

Solution(s):

Remote Support

 

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Meraki MSPaaS Bundle Managed Services

 

✔

LiveVHD

 

Contact(s):LiveVHD Contacts Overview

Solution(s):

Outsourced HelpDesk

 

Patch / Vendor Management

Patch management involves the process of identifying, acquiring, testing, and installing software updates (patches) to fix vulnerabilities and improve functionality.  Effective patch management is essential to protect client systems from security threats, ensure compliance with industry standards, and maintain system performance.

✔

Acronis

 

Contact(s):Acronis-Cloud@ingrammicro.com

Solution(s):

Patch Management

 

✔

Artic Wolf

 

Contact(s):ArcticWolfMD@ingrammicro.com

Solution(s):

Managed Risk

 

✔

Avepoint

 

Contact(s):Avepoint Contacts Overview

Solution(s):

M365 License Management

 

M365 Workspace Management

 

M365 Tenant Security

 

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Meraki MSPaaS Bundle Managed Services

 

✔

ESET

 

Contact(s):ESET Contacts Overview

Solution(s):

Endpoint Protect

 

✔

Tenable

 

Contact(s):TenableTeam@ingrammicro.com

Solution(s):

Patch Management

 

✔

Watchguard

 

Contact(s):Watchguard Contacts Overview

Solution(s):

Patch Management and Data Security

 

Remote Monitoring & Management (RMM)

Remote Monitoring and Management (RMM) services enable MSPs to oversee and maintain client IT systems remotely. By installing software agents on client devices, MSPs can monitor performance, automate maintenance tasks, and address issues proactively. Key features include real-time monitoring, automated updates, alerting, remote troubleshooting, and comprehensive reporting.

✔

Acronis

 

Contact(s):Acronis-Cloud@ingrammicro.com

Solution(s):

Management assistant

 

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Meraki MSPaaS Bundle Managed Services

 

✔

ConnectWise

 

Contact(s):ConnectWise Contacts Overview

Solution(s):

ConnectWise Automate

 

ScreenConnect

 

✔

GoTo

 

Contact(s):GoTo Contacts Overview

Solution(s):

GoTo Resolve

 

✔

Juniper

 

Contact(s):Juniper Contacts Overview

Solution(s):

Remote Monitoring

 

Remote access

 

✔

Kaseya

 

Contact(s):Kaseya Contacts Overview

Solution(s):

Datto RMM

 

✔

Sophos

 

Contact(s):sophos-licensing@ingrammicro.com

Solution(s):

Cyber Confidence

 

✔

Watchguard

 

Contact(s):Watchguard Contacts Overview

Solution(s):

Threat Sync Core

 

MSSP Essentials

Email Security

Email security involves protecting email communications from threats like phishing, malware, and unauthorized access. For Managed Service Providers (MSPs), robust email security measures are essential to safeguard client data, ensure compliance with regulations, and maintain trust. By implementing advanced email security solutions, MSPs can prevent data breaches, protect sensitive information, and enhance overall cybersecurity for their clients.

✔

Acronis

 

Contact(s):Acronis-Cloud@ingrammicro.com

Solution(s):

Perception Point

 

✔

Bitdefender

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

GravityZone security for Email

 

✔

Check Point

 

Contact(s):CheckpointMD@ingrammicro.com

Solution(s):

Check Point

 

✔

ESET

 

Contact(s):ESET Contacts Overview

Solution(s):

Endpoint Protect

 

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview

Solution(s):

Fortimail

 

✔

Mimecast

 

Contact(s):Mimecast-Licensing@ingrammicro.com

Solution(s):

Advanced Email Security

 

✔

Proofpoint

 

Contact(s):Proofpoint-Licensing@ingrammicro.com

Solution(s):

Essentials Email Security

 

✔

Sophos

 

Contact(s):sophos-licensing@ingrammicro.com

Solution(s):

Cyber Confidence

 

✔

Trellix

 

Contact(s):Trellix Contacts Overview

Solution(s):

Email Security

 

✔

Watchguard

 

Contact(s):Watchguard Contacts Overview

Solution(s):

Panda Security Operations

 

Endpoint Detection & Response

✔

Acronis

 

Contact(s):Acronis-Cloud@ingrammicro.com

Solution(s):

Security + EDR

 

✔

Alien Vault (LevelBlue)

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

LevelBlue MSSP

 

✔

Bitdefender

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Gravity Zone Cloud for MSP Security

 

✔

Check Point

 

Contact(s):CheckpointMD@ingrammicro.com

Solution(s):

Harmony End Point

 

✔

ESET

 

Contact(s):ESET Contacts Overview

Solution(s):

Endpoint Protect

 

✔

Palo Alto Networks

 

Contact(s):paloaltosolutions@ingrammicro.com

Solution(s):

Cortex XSOAR for MSSPs

 

✔

Sophos

 

Contact(s):sophos-licensing@ingrammicro.com

Solution(s):

Cyber Confidence

 

File / Data Integrity

File and data integrity ensures that data remains accurate, consistent, and unaltered during storage and transmission. For Managed Service Providers (MSPs), maintaining file and data integrity is crucial to prevent data corruption, unauthorized modifications, and ensure reliable backups.

✔

Artic Wolf

 

Contact(s):ArcticWolfMD@ingrammicro.com

Solution(s):

Managed Risk

 

✔

ESET

 

Contact(s):ESET Contacts Overview

Solution(s):

ESET MDR Ultimate Protect

 

✔

Mimecast

 

Contact(s):Mimecast-Licensing@ingrammicro.com

Solution(s):

Secure File Transfer

 

✔

Trellix

 

Contact(s):Trellix Contacts Overview

Solution(s):

Application and Change Control

 

Data Encryption

 

✔

Watchguard

 

Contact(s):Watchguard Contacts Overview

Solution(s):

Full Encryption

 

Firewall / Gateway Protection

Gateway Protection, often implemented through Firewall or Unified Threat Management (UTM) devices, safeguards networks by combining multiple security features into a single solution. This includes antivirus, intrusion detection and prevention, content filtering, and VPN support. Positioned at network entry points, these systems monitor and control incoming and outgoing traffic, blocking malicious activities and unauthorized access. By providing comprehensive protection, UTM and firewalls ensure network integrity, enhance security, and simplify management for IT administrators.

✔

Alien Vault (LevelBlue)

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

LevelBlue MSSP

 

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview

Solution(s):

Fortimanager

 

✔

Juniper

 

Contact(s):Juniper Contacts Overview

Solution(s):

Branch Security

 

✔

Watchguard

 

Contact(s):Watchguard Contacts Overview

Solution(s):

Firewalls

 

MFA / SSO

Multi-Factor Authentication (MFA) enhances security by requiring multiple verification methods before granting access to systems or data.

Single Sign-On (SSO) allows users to access multiple applications with one set of login credentials. For Managed Service Providers (MSPs), implementing SSO simplifies user management, enhances security by reducing password fatigue, and improves user experience.

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview

Solution(s):

Fortitrust

 

✔

Watchguard

 

Contact(s):Watchguard Contacts Overview

Solution(s):

Multi-factor Authentication

 

Mobile Device Security / MDM

Mobile device security involves protecting smartphones, tablets, and other portable devices from threats like malware, unauthorized access, and data breaches.  Mobile device security is crucial to safeguard client data, support remote work, and maintain compliance with security standards

✔

Bitdefender

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Gravity Zone Cloud for MSP Security

 

✔

Check Point

 

Contact(s):CheckpointMD@ingrammicro.com

Solution(s):

Harmony Mobile

 

✔

ESET

 

Contact(s):ESET Contacts Overview

Solution(s):

Endpoint Protect

 

✔

Trellix

 

Contact(s):Trellix Contacts Overview

Solution(s):

Mobile Security

 

Security Awareness Training

Security Awareness Training educates employees about cybersecurity threats and best practices to mitigate risks.  It is crucial as it helps protect client data, reduces the likelihood of security breaches, and ensures compliance with regulations.

✔

Acronis

 

Contact(s):Acronis-Cloud@ingrammicro.com

Solution(s):

Security Awareness Training

 

✔

Artic Wolf

 

Contact(s):ArcticWolfMD@ingrammicro.com

Solution(s):

Managed Security Awareness

 

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview

Solution(s):

FortiSATS

 

✔

Mimecast

 

Contact(s):Mimecast-Licensing@ingrammicro.com

Solution(s):

Human Risk-Centric Security Awareness & Training

 

✔

Proofpoint

 

Contact(s):Proofpoint-Licensing@ingrammicro.com

Solution(s):

Security Awareness

 

Web Content & DNS Filtering

DNS Filtering blocks access to entire domains by intercepting DNS queries and refusing to resolve those flagged as malicious or inappropriate. It’s a broad, first line of defense against harmful sites.

Web Content Filtering provides more granular control by blocking specific URLs or types of content within a website. This allows for more detailed management of what users can access online.

Both methods enhance security and enforce internet usage policies, but they operate at different levels of specificity.

✔

Bitdefender

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Gravity Zone Cloud for MSP Security

 

✔

Juniper

 

Contact(s):Juniper Contacts Overview

Solution(s):

Web Security DNS filtering

 

✔

Proofpoint

 

Contact(s):Proofpoint-Licensing@ingrammicro.com

Solution(s):

Essentials Email Security

 

✔

Watchguard

 

Contact(s):Watchguard Contacts Overview

Solution(s):

DNSwatchGO

 

MSSP Advanced

Behavioral Analytics / Insider Threat Detection

Behavioral Analytics and Insider Threat Detection involve monitoring user activities to identify unusual patterns that may indicate security threats. For Managed Service Providers (MSPs), these tools are crucial in proactively detecting and mitigating risks posed by internal actors, ensuring client data security, and maintaining trust.

 

✔

ActZero

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

ActZero

 

✔

Adlumin

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Adlumin

 

✔

Artic Wolf

 

Contact(s):ArcticWolfMD@ingrammicro.com

Solution(s):

Manage Detect Respond (MDR)

 

✔

Bitdefender

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Gravity Zone Cloud for MSP Security

 

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview

Solution(s):

FortiSIEM

 

✔

Watchguard

 

Contact(s):Watchguard Contacts Overview

Solution(s):

Threatsync+NDR

 

CASB

A Cloud Access Security Broker (CASB) acts as a gatekeeper between users and cloud service providers, enforcing security policies and ensuring compliance.  CASBs are essential in managing and securing clients’ cloud environments. They help MSPs monitor cloud usage, detect threats, and enforce data protection policies, thereby enhancing overall security and compliance for their clients.

✔

Alien Vault (LevelBlue)

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

LevelBlue MSSP

 

✔

Check Point

 

Contact(s):CheckpointMD@ingrammicro.com

Solution(s):

CloudGuard

 

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview

Solution(s):

FortiCASB

 

✔

Juniper

 

Contact(s):Juniper Contacts Overview

Solution(s):

CASB and Cloud Security

 

Cloud Security

Cloud Security and Compliance for a Managed Security Service Provider (MSSP) involves ensuring the protection and regulatory adherence of data and applications hosted in cloud environments

✔

Avepoint

 

Contact(s):Avepoint Contacts Overview

Solution(s):

Cloud Security and Compliance

 

Compliancy Audit Preparation

Compliance audit preparation involves organizing and reviewing processes, policies, and documentation to ensure adherence to regulatory standards. This is vital in helping clients meet industry-specific compliance requirements. By preparing for audits, MSPs can identify and address potential compliance gaps, mitigate risks, and ensure their clients avoid penalties, thereby enhancing trust and reliability in their services.

✔

ActZero

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

ActZero

 

✔

Adlumin

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Adlumin

 

✔

Artic Wolf

 

Contact(s):ArcticWolfMD@ingrammicro.com

Solution(s):

Manage Detect Respond (MDR)

 

✔

Avepoint

 

Contact(s):Avepoint Contacts Overview

Solution(s):

Cloud Security and Compliance

 

✔

Tenable

 

Contact(s):TenableTeam@ingrammicro.com

Solution(s):

Vulnerability management

 

✔

Watchguard

 

Contact(s):Watchguard Contacts Overview

Solution(s):

Compliance Reports

 

Dark Web Monitoring

Dark web monitoring involves scanning hidden parts of the internet for stolen data, credentials, and other illicit activities. By monitoring the dark web, MSPs can proactively alert clients to compromised information, helping to prevent data breaches and mitigate risks, thereby enhancing their overall security posture.

✔

ActZero

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

ActZero

 

✔

Adlumin

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Adlumin

 

✔

Artic Wolf

 

Contact(s):ArcticWolfMD@ingrammicro.com

Solution(s):

Managed Risk

 

✔

Watchguard

 

Contact(s):Watchguard Contacts Overview

Solution(s):

Total Identity Secure

 

Identity Access Management

Identity Access Management refers to the unique identification and authentication of users and devices within a network. It is essential to ensure that only authorized individuals and devices can access sensitive data and systems. Effective security identity management helps MSPs protect client information, prevent unauthorized access, and comply with regulatory requirements.

✔

ActZero

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

ActZero

 

✔

Adlumin

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Adlumin

 

✔

BeyondTrust

 

Contact(s):BeyondTrust@ingrammicro.com

Solution(s):

Entitle

 

Password Safe

 

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview

Solution(s):

FortiTrust

 

✔

Juniper

 

Contact(s):Juniper Contacts Overview

Solution(s):

Access Assurance

 

✔

Watchguard

 

Contact(s):Watchguard Contacts Overview

Solution(s):

Total Identity Security

 

Incident Response

Incident Response involves identifying, analyzing, and resolving security incidents to minimize damage and restore normal operations.  This process is critical as it ensures the swift handling of security breaches, protecting client data and systems.

✔

ActZero

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

ActZero

 

✔

Adlumin

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Adlumin

 

✔

Artic Wolf

 

Contact(s):ArcticWolfMD@ingrammicro.com

Solution(s):

Incident Response Jump Start

 

Manage Detect Respond (MDR)

 

✔

Bitdefender

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Gravity Zone Cloud for MSP Security

 

Privileged Access Management (PAM)

Privileged Access Management (PAM) involves controlling and monitoring access to critical systems and sensitive information by privileged users.  PAM is essential as it helps mitigate the risks associated with privileged accounts, such as unauthorized access and data breaches.

✔

Avepoint

 

Contact(s):Avepoint Contacts Overview

Solution(s):

EnPower

 

✔

BeyondTrust

 

Contact(s):BeyondTrust@ingrammicro.com

Solution(s):

Privileged Remote Access

 

Total PASM

 

✔

Juniper

 

Contact(s):Juniper Contacts Overview

Solution(s):

Mist 

 

SIEM

Security Information and Event Management (SIEM) systems collect, analyze, and correlate security data from various sources to detect and respond to threats in real-time. For Managed Service Providers (MSPs), SIEM is vital as it enhances their ability to monitor client environments, identify potential security incidents, and take proactive measures.

✔

ActZero

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

ActZero

 

✔

Adlumin

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Adlumin

 

✔

Artic Wolf

 

Contact(s):ArcticWolfMD@ingrammicro.com

Solution(s):

Manage Detect Respond (MDR)

 

✔

ConnectWise

 

Contact(s):ConnectWise Contacts Overview

Solution(s):

ConnectWise SIEM

 

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview

Solution(s):

FortiSIEM

 

✔

Juniper

 

Contact(s):Juniper Contacts Overview

Solution(s):

Security Information Event Manager (SIEM)

 

✔

Trellix

 

Contact(s):Trellix Contacts Overview

Solution(s):

SIEM/SECOPS

 

Vulnerability Scanning

A Network Vulnerability Assessment is the process of reviewing and analyzing a computer network for possible security vulnerabilities and loopholes. It is used by network administrators to evaluate the security architecture and defense of a network against possible vulnerabilities and threats.

✔

Acronis

 

Contact(s):Acronis-Cloud@ingrammicro.com

Solution(s):

Vulnerability Assessment

 

✔

ActZero

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

ActZero

 

✔

Adlumin

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Adlumin

 

✔

Artic Wolf

 

Contact(s):ArcticWolfMD@ingrammicro.com

Solution(s):

Managed Risk

 

✔

Bitdefender

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Gravity Zone Cloud for MSP Security

 

✔

ESET

 

Contact(s):ESET Contacts Overview

Solution(s):

Endpoint Protect

 

✔

Tenable

 

Contact(s):TenableTeam@ingrammicro.com

Solution(s):

Vulnerability Management

 

✔

Watchguard

 

Contact(s):Watchguard Contacts Overview

Solution(s):

Endpoint Risk Assessment

 

Tools & Other Considerations

Cloud Migrations

Cloud migration integrity refers to the assurance that data, applications, and services are accurately and securely transferred to the cloud without loss or corruption, maintaining this integrity is crucial as it ensures client trust, minimizes downtime, and enhances overall service reliability. It involves meticulous planning, robust security measures, and continuous monitoring to guarantee seamless transitions and optimal performance in the cloud environment.

✔

Avepoint

 

Contact(s):Avepoint Contacts Overview

Solution(s):

Aviator – FLY SaaS – FLY Server

 

✔

BitTitan

 

Contact(s):BitTitan Contacts Overview

Solution(s):

MigrationWiz

 

DDI (DNS, DHCP, IPAM)

✔

Juniper

 

Contact(s):Juniper Contacts Overview

Solution(s):

MIST

 

Managed NOC

Managed NOC (Network Operations Center) is a  service that monitors and manages network performance, respectively.  These services are essential as they ensure continuous surveillance, and network reliability. A  Managed NOC ensures optimal network performance and uptime. This enhance the overall IT infrastructure’s security and efficiency, providing clients with robust and reliable services.

✔

Artic Wolf

 

Contact(s):ArcticWolfMD@ingrammicro.com

Solution(s):

Managed Risk

 

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Meraki MSPaaS Bundle Managed Services

 

✔

LiveVHD

 

Contact(s):LiveVHD Contacts Overview

Solution(s):

Outsourced Network Operations Center (NOC)

 

✔

Palo Alto Networks

 

Contact(s):paloaltosolutions@ingrammicro.com

Solution(s):

Managed SD-WAN and SASE

 

Managed SOC

Managed Security Operations Center (SOC) is an outsourced service that provides continuous monitoring, threat detection, and incident response for an organization’s IT infrastructure. SOC is crucial as it enhances their cybersecurity offerings, allowing them to protect clients from sophisticated threats without the need for extensive in-house resources.

✔

Acronis

 

Contact(s):Acronis-Cloud@ingrammicro.com

Solution(s):

Managed Detection and Response(MDR)

 

✔

ActZero

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

ActZero

 

✔

Adlumin

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Adlumin

 

✔

Artic Wolf

 

Contact(s):ArcticWolfMD@ingrammicro.com

Solution(s):

Manage Detect Respond (MDR)

 

✔

Bitdefender

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Gravity Zone Cloud for MSP Security

 

✔

Check Point

 

Contact(s):CheckpointMD@ingrammicro.com

Solution(s):

Harmony End Point

 

✔

ESET

 

Contact(s):ESET Contacts Overview

Solution(s):

ESET MDR Ultimate Protect

 

✔

Juniper

 

Contact(s):Juniper Contacts Overview

Solution(s):

Managed SOC services

 

✔

LiveVHD

 

Contact(s):LiveVHD Contacts Overview

Solution(s):

Outsourced Security Operations Center (SOC)

 

✔

Palo Alto Networks

 

Contact(s):paloaltosolutions@ingrammicro.com

Solution(s):

Prisma for SASE

 

✔

Trellix

 

Contact(s):Trellix Contacts Overview

Solution(s):

SIEM/SECOPS

 

✔

Watchguard

 

Contact(s):Watchguard Contacts Overview

Solution(s):

Managed Security Services for MSPs

 

Professional Services Automation

Professional Services Automation (PSA) refers to software solutions that streamline and automate business processes for service organizations. PSA tools are vital as they enhance efficiency by integrating project management, time tracking, billing, and resource allocation. This automation helps MSPs deliver services more effectively, improve client satisfaction, and optimize operational workflows, ultimately driving profitability and growth.

✔

ConnectWise

 

Contact(s):ConnectWise Contacts Overview

Solution(s):

ConnectWise PSA

 

✔

Kaseya

 

Contact(s):Kaseya Contacts Overview

Solution(s):

Autotask PSA

 

✔

SonicWall

 

Contact(s):SonicWall-Renewals@ingrammicro.com

Solution(s):

Service Provider Partnership

 

Quote Management

Quote management involves the creation, tracking, and management of sales quotes for potential clients.  Effective quote management is crucial as it streamlines the sales process, ensures accurate pricing, and enhances client communication. By automating and organizing quotes, MSPs can respond to client inquiries more efficiently, reduce errors, and improve the overall sales cycle, leading to increased client satisfaction and business growth.

✔

ConnectWise

 

Contact(s):ConnectWise Contacts Overview

Solution(s):

ConnectWise CPQ

 

Remote Console Management

Remote console management allows administrators to access and control IT systems and devices from a remote location.  This capability is crucial as it enables efficient troubleshooting, maintenance, and updates without needing physical presence. It enhances service delivery by reducing response times, minimizing downtime, and ensuring continuous monitoring and management of clients’ IT infrastructure, ultimately improving operational efficiency and client satisfaction.

✔

Samsung

 

Solution(s):

Digital Signage Console Management

 

✔

Watchguard

 

Contact(s):Watchguard Contacts Overview

Solution(s):

Watchguard Cloud

 

Security Retainers

Security retainers are pre-arranged agreements where clients pay a fee to ensure priority access to cybersecurity services when needed. Retainers are crucial as they provide a steady revenue stream and ensure readiness to respond to security incidents promptly. This arrangement enhances client trust and satisfaction by guaranteeing swift, expert intervention during cyber threats, thereby minimizing potential damage and downtime.

✔

Artic Wolf

 

Contact(s):ArcticWolfMD@ingrammicro.com

Solution(s):

Incident Response Jump Start

 

Staffing

Technology staffing services involve recruiting and providing skilled IT professionals to meet an organization’s specific needs. Staffing services are essential as they ensure access to a pool of qualified talent for various projects and client demands. By leveraging technology staffing, MSPs can quickly scale their workforce, fill skill gaps, and deliver high-quality services, enhancing their ability to meet client expectations and drive business growth.

 

✔

ActZero

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

ActZero

 

✔

Adlumin

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Adlumin

 

✔

Artic Wolf

 

Contact(s):ArcticWolfMD@ingrammicro.com

Solution(s):

Manage Detect Respond (MDR)

 

Training and Upskilling

Technology training and upskilling involve educating and enhancing the skills of IT professionals to keep pace with evolving technologies. Training initiatives are vital as they ensure their teams remain proficient in the latest tools and practices. This continuous learning enhances service quality, boosts employee performance, and enables MSPs to offer cutting-edge solutions to clients, thereby maintaining a competitive edge in the market.

 

✔

Avepoint

 

Contact(s):Avepoint Contacts Overview

Solution(s):

MaivenPoint

 

✔

Pluralsight

 

Contact(s):Pluralsight Contacts Overview

Solution(s):

A Cloud Gugu 

 

Pluralsight Skills

 

Tech Foundations

 

✔

SPECTRA

 

Contact(s):SPECTRA Contacts Overview

Solution(s):

SPECTRA Certify

 

✔

Watchguard

 

Contact(s):Watchguard Contacts Overview

Solution(s):

Channel Partner Program

 

Warranties & Insurance & Legal Documents

Cybersecurity insurance provides financial protection against losses resulting from cyber incidents, such as data breaches or ransomware attacks.  It is crucial as it mitigates the financial risks associated with managing clients’ IT infrastructure. This insurance helps cover costs related to incident response, legal fees, and recovery efforts, ensuring MSPs can maintain business continuity and client trust even in the face of cyber threats.

Legal documents for Managed Service Providers (MSPs) are essential for defining the scope of services, responsibilities, and protections for both the MSP and their clients.

 

✔

DocuSign

 

Contact(s):DocuSign Contacts Overview

Solution(s):

DocuSign for Legal Departments

 

✔

ITagree

 

Contact(s):MSPTools@IngramMicro.com

Solution(s):

ITagree 5 Agreement Pack

 

✔

SPECTRA

 

Contact(s):SPECTRA Contacts Overview

Solution(s):

SPECTRA Assure

 

 


Acronis

ActZero

Adlumin

Alert Logic

Alien Vault (AT&T)

Allied Telesis

Appgate

AppViewX

Arcserve

Arctic Wolf

Atakama

Avast

AvePoint

Axcient

Axiad IDS

Balbix

Barracuda

BeyondTrust

Binary Defense

Bitdefender

Blancco

Check Point

Cisco

Citrix

CloudBlue

Cofense

ConnectWise

CrashPlan

CyberFortress

Dell Technologies

DigiCert

ESET

Evidian (Atos)

F5

Forcepoint

Foresite

Fortinet

Halo Detect (Motorola)

HCLSoftware

HPE (Aruba Networks)

IBM

iboss

Infoblox

Ingram Micro Services

Interguard Software

Intermedia

Interrosec

ITsMine

Ivanti

Juniper

KeepIt

Lantronix

Lenovo

Lookout

Mandiant

Masergy

Meraki (Cisco)

Microsoft

Mimecast

NetAlly

NETSCOUT

NS8

Okta

Opengear

OPSWAT

Palo Alto Networks

PKWARE

Pluralsight

Proofpoint

QS Solutions

Rhombus

RMail

RSA

Rubrik

SentinelOne

SkyhighSecurity

SonicWall

Sophos

Stellar Cyber

SyncDog

TeamViewer

Tenable

ThriveDX

Trellix

Trend Micro

Ubiquiti

V-Key

Veeam

Veritas

Viavi

Vicarius

VMRay

VMware (Carbon Black)

WatchGuard

Yubico

Zerospam

Zyxel

Identify

The Identify category of the NIST Cybersecurity Framework focuses on developing an organizational understanding to manage cybersecurity risk to systems, people, assets, data, and capabilities. This function is foundational, as it helps organizations gain a clear picture of their cybersecurity posture and the resources that need protection.

Attack Surface Management (ASM)

Attack Surface Management (ASM) is the process of the continuously identifying, inventorying, prioritizing, and monitoring both internal and external IT assets, known as the “Attack Surface”.

✔

Balbix

 

Contact(s):USCloud@ingrammicro.com

Solution(s):

Balbix Attack Surface Management

 

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com

Solution(s):

FortiRecon

 

✔

Mandiant

 

Contact(s):Mandiant-Licensing@IngramMicro.com

Solution(s):

Mandiant Advantage Attack Surface Management

 

✔

Palo Alto Networks

 

Contact(s):paloaltosolutions@ingrammicro.com

Solution(s):

Cortex Xpanse

 

✔

Tenable

 

Contact(s):TenableTeam@ingrammicro.com

Solution(s):

Tenable Attack Surface Management

 

Cloud Security Posture Management (CSPM)

CSMP solutions provide organizations with visibility into public cloud infrastructure. With the proliferation of cloud resources, many organizations are unaware of how many cloud resources are running and how they’re all configured. This lack of visibility can cause misconfigurations to go undetected for long periods of time, making it harder to secure the applications.

✔

ActZero

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

ActZero Managed Detection & Response (MDR) Service

 

✔

Adlumin

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Adlumin CVS/CVM

 

✔

Arctic Wolf

 

Contact(s):ArcticWolfMD@ingrammicro.com

Solution(s):

Arctic Wolf® Managed Cloud Monitoring

✔

Bitdefender

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

GravityZone CSPM+

 

✔

Check Point

 

Contact(s):checkpoint-licensing@ingrammicro.com

Solution(s):

CloudGuard Cloud Security Posture Management

✔

Mandiant

 

Contact(s):Mandiant-Licensing@IngramMicro.com

Solution(s):

Mandiant Consulting

 

✔

Palo Alto Networks

 

Contact(s):paloaltosolutions@ingrammicro.com

Solution(s):

Cloud Security Posture Management

 

✔

SkyhighSecurity

 

Contact(s):Skyhigh-Licensing@ingrammicro.com

Solution(s):

Skyhigh Security CNAPP

 

✔

Sophos

 

Contact(s):sophos-licensing@ingrammicro.com

Solution(s):

Cloud Optix

✔

Tenable

 

Contact(s):TenableTeam@ingrammicro.com

Solution(s):

Tenable Cloud Security

 

✔

Trend Micro

 

Contact(s):Trend-Licensing@ingrammicro.com

Solution(s):

Cloud One – Conformity

Cyber Risk Scorecards & Posture Assessments

Cybersecurity posture relates to the security status of an enterprise’s networks, information, and systems based on information security resources (e.g., people, hardware, software, policies) and capabilities in place to manage the defense of the enterprise and to react as the situation changes.

✔

Adlumin

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Adlumin Overwatch

 

✔

Alert Logic

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Security Posture Report Included in:
– Essentials
– Professional
– Enterprise

Security Posture Review Included in:
– Enterprise

✔

Arctic Wolf

 

Contact(s):ArcticWolfMD@ingrammicro.com

Solution(s):

Managed Risk

✔

AvePoint

 

Contact(s):Avepoint@ingrammicro.com

Solution(s):

Policies & Insights for Microsoft Office 365

✔

Balbix

 

Contact(s):USCloud@ingrammicro.com

Solution(s):

Balbix Cyber Risk Quantification

 

✔

Bitdefender

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

GravityZone

 

GravityZone CSPM+

 

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco Identity Services Engine

 

Cisco Secure Network Analytics (Enterprise)

 

Cisco Secure Network Analytics (Cloud)

 

Cisco Secure Access by Duo

 

✔

Dell Technologies

 

Contact(s):Dell Technologies Contacts Overview

Solution(s):

Cyber Assessments 

 

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com

Solution(s):

FortiGuard Attack Surface Security Service

 

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

IBM Security Services & Risk Compliance

 

 

✔

Ivanti

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Ivanti RiskSense

✔

QS Solutions

 

Contact(s):USCloud@ingrammicro.com

Solution(s):

Cyber Security Assessment Tool (CSAT)

✔

Tenable

 

Contact(s):TenableTeam@ingrammicro.com

Solution(s):

Tenable Lumin

 

✔

Vicarius

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Vicarius TOPIA

Dark Web Monitoring

Dark Web Monitoring, also known as cyber monitoring, is an identity theft prevention product that enables you to monitor your identity information on the dark web, and receive notifications if your information is found online.

✔

ActZero

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

ActZero Managed Detection and Response for Mobile

 

✔

Adlumin

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Adlumin DarkNet Exposure Module

 

✔

Alert Logic

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Dark Web Scan Service

Included in Enterprise

✔

Alien Vault (AT&T)

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Dark web monitoring

Included in:
– Standard
– Premium

✔

Arctic Wolf

 

Contact(s):ArcticWolfMD@ingrammicro.com

Solution(s):

Arctic Wolf® Managed Risk

✔

Binary Defense

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Counterintelligence

Binary Defense

 

✔

Dell Technologies

 

Contact(s):Dell Technologies Contacts Overview

Solution(s):

Cyber Advisory Services 

 

✔

Foresite

 

Contact(s):USServices@ingrammicro.com

Solution(s):

Dark Web Monitoring

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com

Solution(s):

FortiRecon

 

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

IBM’s X-Force Incident Response 

 

✔

Mandiant

 

Contact(s):Mandiant-Licensing@IngramMicro.com

Solution(s):

Mandiant Advantage Digital Threat Monitoring

 

Data Security Posture Management (DSPM)

Data security posture management (DSPM) provides visibility as to where sensitive data is, who has access to that data, how it has been used, and what the security posture of the data stored or application is. It does that by assessing the current state of data security, identifying and classifying potential risks and vulnerabilities, implementing security controls to mitigate these risks, and regularly monitoring and updating the security posture to ensure it remains effective. As a result, it enables businesses in maintaining the confidentiality, integrity, and availability of sensitive data. The typical users of DSPM include Information Technology (IT) departments, security teams, compliance teams, and executive leadership.

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

Guardium DSPM

 

✔

Palo Alto Networks

 

Contact(s):paloaltosolutions@ingrammicro.com

Solution(s):

Prisma Cloud

 

✔

PKWARE

 

Contact(s):PKWare@ingrammicro.com

Solution(s):

PKWARE DSPM

 

✔

Rubrik

 

Contact(s):rubrik-licensing-us@ingrammicro.com

Solution(s):

Rubrik DSPM

 

✔

Tenable

 

Contact(s):TenableTeam@ingrammicro.com

Solution(s):

Tenable Cloud Security

 

File Integrity Monitoring

File Integrity Monitoring (FIM) is an internal control or process that performs the act of validating the integrity of operating system and application software files using a verification method between the current file state and a known, good baseline.

✔

Adlumin

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Adlumin Overwatch

 

✔

Alien Vault (AT&T)

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

USM Anywhere

✔

Arctic Wolf

 

Contact(s):ArcticWolfMD@ingrammicro.com

Solution(s):

Arctic Wolf Managed Risk

✔

Axcient

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

x360Recover

 

✔

Barracuda

 

Contact(s):Barracuda Contacts Overview

Solution(s):

Cloud Archiving 

 

✔

BeyondTrust

 

Contact(s):BeyondTrust@ingrammicro.com

Solution(s):

BeyondTrust Privilege Management for Unix & Linux

 

✔

Binary Defense

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Security Information & Event Management

✔

Bitdefender

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

GravityZone Integrity Monitoring 

 

✔

Check Point

 

Contact(s):checkpoint-licensing@ingrammicro.com

Solution(s):

SandBlast Agent

✔

Forcepoint

 

Contact(s):Forcepoint-Licensing@ingrammicro.com

Solution(s):

Forcepoint DLP

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

Guardium for Files

✔

OPSWAT

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

MetaDefender Core

✔

Rubrik

 

Contact(s):rubrik-licensing-us@ingrammicro.com

Solution(s):

Rubrik Ransomware Investigation

 

✔

Sophos

 

Contact(s):sophos-licensing@ingrammicro.com

Solution(s):

Intercept X for server

✔

Stellar Cyber

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Stellar Cyber Central

✔

Trellix

 

Contact(s):trellix-licensing@ingrammicro.com

Solution(s):

Trellix Change Control

✔

Trend Micro

 

Contact(s):Trend-Licensing@ingrammicro.com

Solution(s):

Deep Security: System Security Module

Identity Governance and Administration (IGA)

IGA systems merge identity administration, which addresses administering accounts and credentials, provisioning, and managing entitlements, with identity governance, which addresses the segregation of duties, role management, logging, and analytics and reporting.

IGA systems provide additional functionality beyond standard Identity and Access Management (IAM) systems. In particular, they help organizations meet compliance requirements and enable them to audit access for compliance reporting. They also automate workflows for tasks such as access approvals and provisioning/de-provisioning.

Elements of IGA Systems
– Password management
– Integrations
– Access request managemen
– Automated Provisioning
– Entitlement management

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com

Solution(s):

FortiPAM

 

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

IBM Security Verify Governance

 

✔

Okta

 

Contact(s):Okta-Licensing@ingrammicro.com

Solution(s):

Lifecycle Management

Okta Identity Governance

 

✔

RSA

 

Contact(s):RSA-Licensing@ingrammicro.com

Solution(s):

RSA Identity Governance & Lifecycle

 

✔

Tenable

 

Contact(s):TenableTeam@ingrammicro.com

Solution(s):

Tenable Identity Exposure

 

Mobile Device Management (MDM/MxM)

Manage and secure employees’ mobile devices that are deployed across multiple mobile service providers and across multiple mobile operating systems being used in the organization.

Features typically include:
– Device Tracking
– Application Control
– Remote-wipe
– Anti-Malware
– Web Filtering
– Inventory Management
– Anti-theft

✔

ActZero

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

ActZero Managed Detection and Response for Mobile

 

✔

Avast

 

Contact(s):sporders@avast.com

Solution(s):

Managed Workplace

✔

BeyondTrust

 

Contact(s):BeyondTrust@ingrammicro.com

Solution(s):

BeyondTrust Remote Support

✔

Bitdefender

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Gravity Zone Mobile Security

✔

Check Point

 

Contact(s):checkpoint-licensing@ingrammicro.com

Solution(s):

SandBlast Mobile

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco Security Connector (iOS)

 

✔

Citrix

 

Contact(s):CitrixMD@ingrammicro.com

Solution(s):

XenMobile

✔

Dell Technologies

 

Contact(s):Dell Technologies Contacts Overview

Solution(s):

Device Management with Microsoft Endpoint Manager

 

✔

ESET

 

Contact(s):ESET Contacts Overview
NSX-Sales@ingrammicro.com

Solution(s):

ESET Protect (All levels)

 

✔

Forcepoint

 

Contact(s):Forcepoint-Licensing@ingrammicro.com

Solution(s):

Forcepoint Web Security, Forcepoint Cloud Web Security

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com

Solution(s):

FortiClient with EMS

✔

HCLSoftware

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

HCL BigFix Workplace+

 

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

MaaS360 MDM

✔

Interguard Software

 

Contact(s):USCloud@ingrammicro.com

Solution(s):

InterGuard Computer Monitoring Software

✔

Ivanti

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Ivanti Mobile Threat Defense

✔

Lookout

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Lookout Mobile Endpoint Security

✔

Meraki (Cisco)

 

Contact(s):Meraki (Cisco) Contacts Overview

Solution(s):

Meraki Systems Manager

✔

Microsoft

 

Contact(s):Microsoft Contacts Overview

Solution(s):

Enterprise Mobility + Security (EM+S)

✔

Proofpoint

 

Contact(s):Proofpoint-Licensing@ingrammicro.com

Solution(s):

Mobile Defense

✔

SentinelOne

 

Contact(s):SentinelOne-Licensing@ingrammicro.com

Solution(s):

Singularity Mobile

 

✔

Sophos

 

Contact(s):sophos-licensing@ingrammicro.com

Solution(s):

Sophos Mobile

✔

SyncDog

 

Contact(s):USCloud@IngramMicro.com

Solution(s):

SyncDog’s Secure Mobile Trust Platform

✔

Trellix

 

Contact(s):trellix-licensing@ingrammicro.com

Solution(s):

Trellix MVISION Mobile

✔

Trend Micro

 

Contact(s):Trend-Licensing@ingrammicro.com

Solution(s):

Mobile Security for Enterprises

Network Vulnerability Assessments, Penetration Tests

A network vulnerability assessment is the process of reviewing and analyzing a computer network for possible security vulnerabilities and loopholes. It is used by network administrators to evaluate the security architecture and defense of a network against possible vulnerabilities and threats.

Ingram Micro Professional Service:
Penetration Test Assessment

✔

Adlumin

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Adlumin CVS/CVM

 

✔

Arctic Wolf

 

Contact(s):ArcticWolfMD@ingrammicro.com

Solution(s):

Arctic Wolf Managed Risk

 

✔

Binary Defense

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Binary Defense

 

✔

Dell Technologies

 

Contact(s):Dell Technologies Contacts Overview

Solution(s):

Proactive Security / Pen Testing 

 

Cyber Advisory Services 

 

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com

Solution(s):

FortiGuard Penetration Testing Service

 

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

IBM’s X-Force Red Offensive Testing Services

 

✔

Ingram Micro Services

 

Contact(s):USServices@ingrammicro.com

Solution(s):

Penetration Testing

 

✔

Mandiant

 

Contact(s):Mandiant-Licensing@IngramMicro.com

Solution(s):

Mandiant Consulting

 

✔

NetAlly

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

– CyberScope

 

✔

Tenable

 

Contact(s):TenableTeam@ingrammicro.com

Solution(s):

Tenable Nessus

 

Regulation & Compliance Management

Regulatory compliance is an effort to ensure a company is aware of steps needed to comply with relevant laws, polices, and regulations. Security reflects a large portion of these compliancies.

Ingram Micro Professional Service:
Network Security Services

✔

ActZero

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

ActZero Managed Detection & Response (MDR) Service

 

✔

Adlumin

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Adlumin Overwatch

 

✔

Alert Logic

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Security Compliance

Included in:
– Essentials
– Professional
– Enterprise

✔

Alien Vault (AT&T)

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

IT Compliance Management

✔

Arctic Wolf

 

Contact(s):ArcticWolfMD@ingrammicro.com

Solution(s):

Arctic Wolf Managed Detection & Response

 

✔

Binary Defense

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Security Information & Event Management

✔

Bitdefender

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

GravityZone

✔

Check Point

 

Contact(s):checkpoint-licensing@ingrammicro.com

Solution(s):

Compliance Software Blade

✔

Dell Technologies

 

Contact(s):Dell Technologies Contacts Overview

Solution(s):

Cyber Assessments 

 

Cyber Advisory Services 

 

✔

Forcepoint

 

Contact(s):Forcepoint-Licensing@ingrammicro.com

Solution(s):

Forcepoint NGFW, Forcepoint DLP

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com

Solution(s):

FortiClient

✔

HCLSoftware

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

HCL BigFix Compliance

 

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

Qradar Data Store

✔

Ingram Micro Services

 

Contact(s):USServices@ingrammicro.com

Solution(s):

Network Security Services

✔

Juniper

 

Contact(s):Juniper Contacts Overview
Juniper.Assist@ingrammicro.com

Solution(s):

JSA, vJSA

✔

Microsoft

 

Contact(s):Microsoft Contacts Overview

Solution(s):

Compliance Manager

✔

PKWARE

 

Contact(s):PKWare@ingrammicro.com

Solution(s):

PK Protect

✔

Proofpoint

 

Contact(s):Proofpoint-Licensing@ingrammicro.com

Solution(s):

Proofpoint Intelligent Supervision & E-Discovery or via Proofpoint Essentials Pro

✔

Sophos

 

Contact(s):sophos-licensing@ingrammicro.com

Solution(s):

Cloud Optix

✔

Tenable

 

Contact(s):TenableTeam@ingrammicro.com

Solution(s):

Tenable PCI ASV

 

✔

Trellix

 

Contact(s):trellix-licensing@ingrammicro.com

Solution(s):

Trellix Policy Auditor

✔

Trend Micro

 

Contact(s):Trend-Licensing@ingrammicro.com

Solution(s):

Cloud One – Conformity

✔

Veritas

 

Contact(s):veritas-licensing@ingrammicro.com

Solution(s):

Veritas Information Studio

SSH Key, PKI, or Certificate Managementand/or Machine Identity Management

Public Key Infrastructure (PKI) is a technology for authenticating users and devices in the digital world. The basic idea is to have one or more trusted parties digitally sign documents certifying that a particular cryptographic key belongs to a particular user or device.

Certificate Management is the activity of monitoring, facilitating, and executing every certificate process necessary for uninterrupted network operations.

✔

Adlumin

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Adlumin Overwatch

 

✔

AppViewX

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

AppViewX Cert+

 

✔

Axiad IDS

 

Contact(s):pshelpdesk@ingrammicro.com

Solution(s):

Axiad ID Cloud

 

✔

HCLSoftware

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

HCL BigFix

 

Vulnerability Management & Analytics

Vulnerability Management is the practice of identifying, classifying, remediating, and mitigating vulnerabilities. Vulnerability Analytics is a process that defines, identifies, and classifies the security holes (vulnerabilities) in a computer, network, or communications infrastructure.

Ingram Micro Professional Service:
Dev/Sec/Ops Services

✔

ActZero

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

ActZero Managed Detection & Response (MDR) Service

 

✔

Adlumin

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Adlumin CVS/CVM

 

✔

Alert Logic

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Vulnerability Scanning & Vulnerability Assessment

✔

Alien Vault (AT&T)

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Vulnerability Management

✔

Arctic Wolf

 

Contact(s):ArcticWolfMD@ingrammicro.com

Solution(s):

Arctic Wolf Managed Risk

✔

Avast

 

Contact(s):sporders@avast.com

Solution(s):

Avast Managed Workplace

✔

Balbix

 

Contact(s):USCloud@ingrammicro.com

Solution(s):

Balbix Risk-Based Vulnerability Management

 

Balbix AppSec

 

✔

Barracuda

 

Contact(s):Barracuda Contacts Overview

Solution(s):

Vulnerability Manager

 

✔

Binary Defense

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Security Information & Event Management

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco Secure Network Analytics (Enterprise)

 

Cisco Secure Network Analytics (Cloud)

 

Cisco Secure Endpoint

 

Cisco Secure Firewall Management Center

 

Cisco Secure Workload

 

✔

Dell Technologies

 

Contact(s):Dell Technologies Contacts Overview

Solution(s):

Cyber Advisory and Vulnerability Management 

 

Cyber Advisory Services 

 

✔

Foresite

 

Contact(s):USServices@ingrammicro.com

Solution(s):

Managed security monitoring and alerting

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com

Solution(s):

FortiManager and FortiAnalyzer

✔

HCLSoftware

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

HCL BigFix Compliance

 

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

Qradar Vulnerability Manager, Qradar Watson Advisor

IBM’s X-Force Red Offensive Testing Services

 

✔

Infoblox

 

Contact(s):Infoblox-Licensing@ingrammicro.com

Solution(s):

Infoblox Reporting and Analytics

✔

Ingram Micro Services

 

Contact(s):USServices@ingrammicro.com

Solution(s):

Dev/Sec/Ops Services

✔

Juniper

 

Contact(s):Juniper Contacts Overview
Juniper.Assist@ingrammicro.com

Solution(s):

JSA, vJSA

✔

Mandiant

 

Contact(s):Mandiant-Licensing@IngramMicro.com

Solution(s):

Mandiant Advantage Threat Intelligence: Vulnerability Management

 

✔

Microsoft

 

Contact(s):Microsoft Contacts Overview

Solution(s):

Azure Security Center

✔

SyncDog

 

Contact(s):USCloud@IngramMicro.com

Solution(s):

Mobile threat Defense

✔

Tenable

 

Contact(s):TenableTeam@ingrammicro.com

Solution(s):

Tenable Vulnerability Management

 

Tenable One Exposure Management Platform

 

Tenable PCI ASV

 

Tenable Cloud Security

 

Tenable Security Center

 

Tenable Web App Scanning

 

✔

Vicarius

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Vicarius TOPIA

✔

Zyxel

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

– CNM Secumanager
– CNM SecuReporter

Protect

The Protect category of the NIST Cybersecurity Framework focuses on implementing safeguards to ensure the delivery of critical services and limit the impact of cybersecurity events. It includes Identity Management, Awareness and Training, Data Security, Information Protection Processes, Maintenance, and Protective Technology. These areas collectively help organizations safeguard their systems and data, ensuring business continuity and resilience against cyber threats.

Change Control

Monitor, report, and restrict access to file changes.

✔

Adlumin

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Adlumin Overwatch

 

✔

Microsoft

 

Contact(s):Microsoft Contacts Overview

Solution(s):

System Center Service Manager

✔

Trellix

 

Contact(s):trellix-licensing@ingrammicro.com

Solution(s):

Trellix Change Control

Cloud & Container Security

Cloud Security involves the procedures and technology that secure cloud computing environments against both external and insider cybersecurity threats.

Container Security is the process of implementing security tools and policies to assure that all in your container is running as intended, including protection of infrastructure, software supply chain, runtime, and everything between.

✔

Adlumin

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Adlumin Overwatch

 

✔

Arctic Wolf

 

Contact(s):ArcticWolfMD@ingrammicro.com

Solution(s):

Arctic Wolf Cloud Detection and Response

 

✔

Binary Defense

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Binary Defense

 

✔

Bitdefender

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

GravityZone Security for Containers 

 

✔

Check Point

 

Contact(s):checkpoint-licensing@ingrammicro.com

Solution(s):

CloudGuard

✔

Dell Technologies

 

Contact(s):Dell Technologies Contacts Overview

Solution(s):

Cyber Advisory Services 

 

✔

F5

 

Contact(s):F5-Team@ingrammicro.com

Solution(s):

NGINX App Protect

 

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com

Solution(s):

FortiCNP

 

✔

HCLSoftware

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

HCL AppScan

 

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

IBM Cloud Security Solutions

✔

Mandiant

 

Contact(s):Mandiant-Licensing@IngramMicro.com

Solution(s):

Mandiant Consulting Services: Cloud Security Assessment

 

✔

Microsoft

 

Contact(s):Microsoft Contacts Overview

Solution(s):

Azure Security

✔

Palo Alto Networks

 

Contact(s):paloaltosolutions@ingrammicro.com

Solution(s):

Prisma Cloud

✔

SkyhighSecurity

 

Contact(s):Skyhigh-Licensing@ingrammicro.com

Solution(s):

Skyhigh Security Cloud Security Posture Management (CSPM)

 

✔

Tenable

 

Contact(s):TenableTeam@ingrammicro.com

Solution(s):

Tenable Cloud Security

 

✔

Trend Micro

 

Contact(s):Trend-Licensing@ingrammicro.com

Solution(s):

Trend Micro Cloud One Security Services Platform

Cloud Access Security Broker (CASB)

CASB is a solution that provides security for cloud applications and infrastructure

✔

Check Point

 

Contact(s):checkpoint-licensing@ingrammicro.com

Solution(s):

CloudGuard SaaS

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco Cloudlock

 

Cisco Umbrella

 

✔

Forcepoint

 

Contact(s):Forcepoint-Licensing@ingrammicro.com

Solution(s):

Forcepoint CASB

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com

Solution(s):

FortiCASB

✔

HPE (Aruba Networks)

 

Contact(s):HPEAruba@ingrammicro.com

Solution(s):

HPE Aruba Networking SSE

 

✔

iboss

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Core Package, Malware Defense, and DLP packages
(CASB Cloud Application Visibility & Controls)

✔

Ingram Micro Services

 

Contact(s):USServices@ingrammicro.com

Solution(s):

Cloud Security Services

✔

Microsoft

 

Contact(s):Microsoft Contacts Overview

Solution(s):

Cloud App Security

✔

Palo Alto Networks

 

Contact(s):paloaltosolutions@ingrammicro.com

Solution(s):

Aperture

✔

Proofpoint

 

Contact(s):Proofpoint-Licensing@ingrammicro.com

Solution(s):

Proofpoint Cloud App Security Broker

✔

SkyhighSecurity

 

Contact(s):Skyhigh-Licensing@ingrammicro.com

Solution(s):

Skyhigh Security CASB

 

✔

SonicWall

 

Contact(s):SonicWall-Renewals@ingrammicro.com

Solution(s):

Cloud App Security

✔

Trend Micro

 

Contact(s):Trend-Licensing@ingrammicro.com

Solution(s):

Cloud App Security

Cloud Workload Protection (Kubernetes)

Solutions that monitor for and remove threats from cloud workloads and containers to ensure the security of workloads as they move across cloud environments.

✔

Bitdefender

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

GravityZone Security for Containers 

 

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com

Solution(s):

FortiCNP Container Protection

 

✔

Palo Alto Networks

 

Contact(s):paloaltosolutions@ingrammicro.com

Solution(s):

Cloud Workload Protection

 

✔

Tenable

 

Contact(s):TenableTeam@ingrammicro.com

Solution(s):

Tenable Cloud Security

 

COVID & WFH Related Solutions

Solutions that may assist with COVID related issues:
– Remotely Deployable Firewalls
– Remotely Deployable APs
– Other Work From Home or Remote User Products
– Temperature kiosks
– Employee & Asset Tracking

✔

Acronis

 

Contact(s):Acronis-Cloud@ingrammicro.com

Solution(s):

Acronis Cyber Protect

 

✔

Adlumin

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Adlumin Overwatch

 

✔

Arcserve

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

✔

BeyondTrust

 

Contact(s):BeyondTrust@ingrammicro.com

Solution(s):

BeyondTrust Privileged Remote Access

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco Secure Endpoint

 

Cisco Secure Access by Duo

 

Cisco Secure Hybrid Worker

 

✔

CrashPlan

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

CrashPlan

 

✔

Dell Technologies

 

Contact(s):Dell Technologies Contacts Overview

Solution(s):

Cyber Advisory Services 

 

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com

Solution(s):

✔

HCLSoftware

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

HCL BigFix Lifecycle

 

✔

HPE (Aruba Networks)

 

Contact(s):HPEAruba@ingrammicro.com

Solution(s):

Remote Access Points

✔

iboss

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Core Package, Malware Defense, and DLP Packages

✔

Infoblox

 

Contact(s):Infoblox-Licensing@ingrammicro.com

Solution(s):

✔

Ingram Micro Services

 

Contact(s):USServices@ingrammicro.com

Solution(s):

Remote Deployment Services

✔

Interguard Software

 

Contact(s):USCloud@ingrammicro.com

Solution(s):

InterGuard Employee Monitoring Software

✔

Mandiant

 

Contact(s):Mandiant-Licensing@IngramMicro.com

Solution(s):

Mandiant Advantage Security Validation

 

✔

Meraki (Cisco)

 

Contact(s):Meraki (Cisco) Contacts Overview

Solution(s):

Meraki Teleworker Z3

✔

NetAlly

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

– CyberScope

 

✔

Palo Alto Networks

 

Contact(s):paloaltosolutions@ingrammicro.com

Solution(s):

WFH

 

✔

RSA

 

Contact(s):RSA-Licensing@ingrammicro.com

Solution(s):

RSA SecurID Suite

 

✔

Sophos

 

Contact(s):sophos-licensing@ingrammicro.com

Solution(s):

Sophos Remote Ethernet Devices (RED)

✔

SyncDog

 

Contact(s):USCloud@IngramMicro.com

Solution(s):

Secure.Systemsâ„¢

✔

Tenable

 

Contact(s):TenableTeam@ingrammicro.com

Solution(s):

✔

Trellix

 

Contact(s):trellix-licensing@ingrammicro.com

Solution(s):

Trellix Device to Cloud Suites

Customer Identity & Access Management (CIAM)

CIAM enables organizations to securely capture and manage customer identity and profile data, as well as control customer access to applications and services.

✔

Dell Technologies

 

Contact(s):Dell Technologies Contacts Overview

Solution(s):

Cyber Advisory Services 

 

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com

Solution(s):

FortiGuest

 

✔

Microsoft

 

Contact(s):Microsoft Contacts Overview

Solution(s):

Azure Active Directory B2C

✔

Okta

 

Contact(s):Okta-Licensing@ingrammicro.com

Solution(s):

Customer Identity

✔

RSA

 

Contact(s):RSA-Licensing@ingrammicro.com

Solution(s):

Customer Authentication

Data Loss Prevention (DLP)

Data Loss Prevention (DLP) solutions restrict end users from sending sensitive or critical information outside of the corporate network.

✔

Bitdefender

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

GravityZone

 

✔

Blancco

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Drive Eraser

✔

Check Point

 

Contact(s):checkpoint-licensing@ingrammicro.com

Solution(s):

DLP Blade running on Security Gateways and vSec

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco Secure Email

 

Cisco Cloudlock

 

Cisco Umbrella

 

✔

Citrix

 

Contact(s):CitrixMD@ingrammicro.com

Solution(s):

Sharefile

✔

ESET

 

Contact(s):ESET Contacts Overview
NSX-Sales@ingrammicro.com

Solution(s):

Safetica NXT / Safetica ONE

✔

Forcepoint

 

Contact(s):Forcepoint-Licensing@ingrammicro.com

Solution(s):

Forcepoint DLP

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com

Solution(s):

FortiGate with DLP

✔

HPE (Aruba Networks)

 

Contact(s):HPEAruba@ingrammicro.com

Solution(s):

HPE Aruba Networking SSE

 

✔

iboss

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Data Loss Prevention package

✔

Interguard Software

 

Contact(s):USCloud@ingrammicro.com

Solution(s):

InterGuard Data Loss Prevention Software

✔

ITsMine

 

Contact(s):USCloud@ingrammicro.com

Solution(s):

Beyond DLP

✔

Mandiant

 

Contact(s):Mandiant-Licensing@IngramMicro.com

Solution(s):

Mandiant Advantage Security Validation

 

✔

Mimecast

 

Contact(s):Mimecast-Licensing@ingrammicro.com

Solution(s):

Content Control & DLP

✔

OPSWAT

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Secure Access

✔

Palo Alto Networks

 

Contact(s):paloaltosolutions@ingrammicro.com

Solution(s):

Enterprise DLP

 

✔

PKWARE

 

Contact(s):PKWare@ingrammicro.com

Solution(s):

PK Privacy

✔

Proofpoint

 

Contact(s):Proofpoint-Licensing@ingrammicro.com

Solution(s):

– Proofpoint E-Mail Data Loss Prevention
– Proofpoint Essentials

✔

SkyhighSecurity

 

Contact(s):Skyhigh-Licensing@ingrammicro.com

Solution(s):

Skyhigh Security UCE

 

✔

SonicWall

 

Contact(s):SonicWall-Renewals@ingrammicro.com

Solution(s):

– Next-Generation Firewalls
– Enauk Security
– SMA Appliances

✔

Sophos

 

Contact(s):sophos-licensing@ingrammicro.com

Solution(s):

– XG Firewall
– Sophos Email
– Intercept X Endpoint

✔

SyncDog

 

Contact(s):USCloud@IngramMicro.com

Solution(s):

Secure.Systemsâ„¢

✔

Trellix

 

Contact(s):trellix-licensing@ingrammicro.com

Solution(s):

Trellix Data Loss Prevention

✔

Trend Micro

 

Contact(s):Trend-Licensing@ingrammicro.com

Solution(s):

integrated in Worry-Free Svcs, Smart Protection, Cloud App Sec, TMEMS

✔

WatchGuard

 

Contact(s):WatchguardMD@ingrammicro.com

Solution(s):

Firebox

Data Security and Protection

Monitor, scan, mask, and discover vulnerabilities in databases and storage.

✔

Arcserve

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Data Protection Solutions

✔

Atakama

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Atakama

✔

CrashPlan

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

CrashPlan

 

✔

Dell Technologies

 

Contact(s):Dell Technologies Contacts Overview

Solution(s):

Cyber Advisory Services 

 

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

IBM Security Guardium

 

✔

OPSWAT

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

MetaDefender Vault, MetaDefender Drive, MetaDefender for Secure Storage

✔

PKWARE

 

Contact(s):PKWare@ingrammicro.com

Solution(s):

PKProtect Data StoreManager, PKWProtect Endpoint Manager

✔

SkyhighSecurity

 

Contact(s):Skyhigh-Licensing@ingrammicro.com

Solution(s):

Skyhigh Security UCE

 

✔

SyncDog

 

Contact(s):USCloud@IngramMicro.com

Solution(s):

Secure.Systemsâ„¢

✔

Tenable

 

Contact(s):TenableTeam@ingrammicro.com

Solution(s):

Database Audit Policies

✔

Trellix

 

Contact(s):trellix-licensing@ingrammicro.com

Solution(s):

Trellix Integrity Cloud

✔

V-Key

 

Contact(s):USCloud@ingrammicro.com

Solution(s):

V-OS Trusted Identity

Disk Encryption

Full Disk Encryption protects information by converting it into unreadable code that cannot be deciphered easily by unauthorized people.

✔

Axcient

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

x360Recover

 

✔

Bitdefender

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

GravityZone

✔

Check Point

 

Contact(s):checkpoint-licensing@ingrammicro.com

Solution(s):

Endpoint Full Disk Encryption Software

✔

Dell Technologies

 

Contact(s):Dell Technologies Contacts Overview

Solution(s):

Dell Unity XT Unified Storage Solution

 

PowerMax NVMe Storage

 

VMAX All Flash Storage

 

Dell PowerStore

 

Dell EMC Isilon and ECS Storage for Media and Entertainment

 

Dell ECS Enterprise Object Storage

 

Dell VxRail Hyperconverged Infrastructure

 

Dell VxRack System FLEX

 

VxBlock Converged Infrastructure

 

Integrated Data Protection Appliance

 

PowerProtect DD Series Appliances

 

✔

ESET

 

Contact(s):ESET Contacts Overview
NSX-Sales@ingrammicro.com

Solution(s):

ESET Full Disk Protection/ESET Endpoint Encryption PRO

 

✔

HCLSoftware

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

HCL BigFix Workplace+

 

✔

HPE (Aruba Networks)

 

Contact(s):HPEAruba@ingrammicro.com

Solution(s):

– Smart Array SR Secure Encryption Software – Data-at-Rest encryption solution for ProLiant servers
– 3PAR Storage – Hardware and software encrypted SAN storage arrays

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

IBM Multi-Cloud Data Encryption

✔

Microsoft

 

Contact(s):Microsoft Contacts Overview

Solution(s):

Bitlocker

✔

OPSWAT

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

MetaDefender Kiosk

✔

Sophos

 

Contact(s):sophos-licensing@ingrammicro.com

Solution(s):

SafeGuard Encryption, Central Encryption

✔

SyncDog

 

Contact(s):USCloud@IngramMicro.com

Solution(s):

Secure.Systemsâ„¢

✔

Trellix

 

Contact(s):trellix-licensing@ingrammicro.com

Solution(s):

Trellix Drive Encryption

✔

Trend Micro

 

Contact(s):Trend-Licensing@ingrammicro.com

Solution(s):

Trend Micro Endpoint Encryption

DMARC Email Authentication Protocol

Domain-based Message Authentication, Reporting & Conformance (DMARC), is a protocol that uses Sender Policy Framework (SPF) and DomainKeys identified mail (DKIM) to determine the authenticity of an email message.

Most email security vendors support the DMARC protocol at a basic level, this category is for advanced management and analytics.

✔

Adlumin

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Adlumin Overwatch

 

✔

Arctic Wolf

 

Contact(s):ArcticWolfMD@ingrammicro.com

Solution(s):

Arctic Wolf MDR Integrations for Email Gateway

 

✔

Barracuda

 

Contact(s):Barracuda Contacts Overview

Solution(s):

Domain Fraud Protection

 

✔

Mimecast

 

Contact(s):Mimecast-Licensing@ingrammicro.com

Solution(s):

Mimecast DMARC Analyzer

✔

Proofpoint

 

Contact(s):Proofpoint-Licensing@ingrammicro.com

Solution(s):

Email Fraud Defense (efd360)

✔

Trend Micro

 

Contact(s):Trend-Licensing@ingrammicro.com

Solution(s):

Included in TM Email Security, Messaging Security

DNS and DDOS Protection, DHCP & IP Management (DDI)

DNS protection filters device queries to the internet, or from the internet, and blocks known bad websites or DDOS attempts from reaching the device.

A denial-of-service attack (DDOS) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.

A DDI solution provides a centralized platform to manage DNS and DHCP services and has an IP Address Management (IPAM) component.

✔

Adlumin

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Adlumin Overwatch

 

✔

Arctic Wolf

 

Contact(s):ArcticWolfMD@ingrammicro.com

Solution(s):

Arctic Wolf Managed Detection and Response

 

✔

Barracuda

 

Contact(s):Barracuda Contacts Overview

Solution(s):

Full Spectrum DDOS Protection

 

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com

Solution(s):

FortiDDOS

 

✔

HPE (Aruba Networks)

 

Contact(s):HPEAruba@ingrammicro.com

Solution(s):

HPE Aruba Networking SSE

 

✔

Palo Alto Networks

 

Contact(s):paloaltosolutions@ingrammicro.com

Solution(s):

DNS Protection

 

Email Encryption

Email Encryption involves encrypting the content of email messages to protect potentially sensitive information from being read by anyone other than intended recipients.

✔

Adlumin

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Adlumin Overwatch

 

✔

Barracuda

 

Contact(s):Barracuda Contacts Overview

Solution(s):

Email Encryption

 

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco Secure Email Encryption Service

 

✔

ESET

 

Contact(s):ESET Contacts Overview
NSX-Sales@ingrammicro.com

Solution(s):

ESET Endpoint Encryption Pro

✔

Forcepoint

 

Contact(s):Forcepoint-Licensing@ingrammicro.com

Solution(s):

Forcepoint Email Encryption

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com

Solution(s):

FortiMail

✔

Intermedia

 

Contact(s):USCloud@IngramMicro.com

Solution(s):

Email Encryption

✔

Mimecast

 

Contact(s):Mimecast-Licensing@ingrammicro.com

Solution(s):

Email Encryption

✔

PKWARE

 

Contact(s):PKWare@ingrammicro.com

Solution(s):

PKProtect Endpoint Manager

 

✔

Proofpoint

 

Contact(s):Proofpoint-Licensing@ingrammicro.com

Solution(s):

– Proofpoint E-Mail Encryption
– Proofpoint Essentials Advanced & Pro

✔

RMail

 

Contact(s):USCloud@ingrammicro.com

Solution(s):

Multiple RMail Encryption Offerings Availabe

✔

SonicWall

 

Contact(s):SonicWall-Renewals@ingrammicro.com

Solution(s):

– Email Security Appliances
– Hosted Email Security

✔

Sophos

 

Contact(s):sophos-licensing@ingrammicro.com

Solution(s):

Sophos Email

✔

SyncDog

 

Contact(s):USCloud@IngramMicro.com

Solution(s):

Secure.Systemsâ„¢

✔

Trend Micro

 

Contact(s):Trend-Licensing@ingrammicro.com

Solution(s):

Included in TM Email Security, Cloud App Security, Messaging Security

Email Protection and/or Anti-Spam

Email Protection describes different techniques for keeping sensitive information in email communication and accounts secure against unauthorized access, loss or compromise. Email is often used to spread malware, spam and phishing attacks. Attackers use deceptive messages to entice recipients to part with sensitive information, open attachments or click on hyperlinks that install malware on the victim’s device. Email is also a common entry point for attackers looking to gain a foothold in an enterprise network and obtain valuable company data.

Features typically include:
– Anti-Virus
– Anti-SPAM
– Phishing Protection
– URL Rewrites
– Email Data Loss Prevention (DLP)

✔

Adlumin

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Adlumin Overwatch

 

✔

Arctic Wolf

 

Contact(s):ArcticWolfMD@ingrammicro.com

Solution(s):

Arctic Wolf MDR Integrations for Email Gateway

 

✔

Avast

 

Contact(s):sporders@avast.com

Solution(s):

Business Antivirus, CloudCare Antispam

✔

Barracuda

 

Contact(s):Barracuda Contacts Overview

Solution(s):

Barracuda Email Protection

 

Email Gateway Security

 

✔

Binary Defense

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Binary Defense

 

✔

Bitdefender

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

GravityZone Email Security

✔

Check Point

 

Contact(s):checkpoint-licensing@ingrammicro.com

Solution(s):

Anti-Spam & Email Security on Security Gateways and vSec

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco Secure Email

 

Cisco Secure Cloud Mailbox Defense

 

✔

CrashPlan

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

CrashPlan

 

✔

Dell Technologies

 

Contact(s):Dell Technologies Contacts Overview

Solution(s):

Cyber Advisory Services 

 

✔

ESET

 

Contact(s):ESET Contacts Overview
NSX-Sales@ingrammicro.com

Solution(s):

ESET Protect (All levels)

✔

Forcepoint

 

Contact(s):Forcepoint-Licensing@ingrammicro.com

Solution(s):

Forcepoint Email Security

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com

Solution(s):

FortiGate, FortiMail

✔

Juniper

 

Contact(s):Juniper Contacts Overview
Juniper.Assist@ingrammicro.com

Solution(s):

SRX, vSRX

✔

Lookout

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Lookout Phishing and Content Protection

✔

Microsoft

 

Contact(s):Microsoft Contacts Overview

Solution(s):

Exchange Online Protection

✔

Mimecast

 

Contact(s):Mimecast-Licensing@ingrammicro.com

Solution(s):

Secure Email Gateway

✔

OPSWAT

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Metadefender Email Gateway Security

✔

Proofpoint

 

Contact(s):Proofpoint-Licensing@ingrammicro.com

Solution(s):

– Proofpoint E-Mail Protection (PPS)
– Proofpoint Essentials

✔

RMail

 

Contact(s):USCloud@ingrammicro.com

Solution(s):

Multiple RMail Protection Offerings Availabe

✔

SonicWall

 

Contact(s):SonicWall-Renewals@ingrammicro.com

Solution(s):

– Next-Generation Firewalls
– Email Security Appliances
– Hosted Email Security
– Office 365 Security

✔

Sophos

 

Contact(s):sophos-licensing@ingrammicro.com

Solution(s):

Sophos Email

✔

Trellix

 

Contact(s):trellix-licensing@ingrammicro.com

Solution(s):

Trellix Security for Email Servers

✔

Trend Micro

 

Contact(s):Trend-Licensing@ingrammicro.com

Solution(s):

Trend Micro Email Security

✔

VMRay

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

VMRay Email Threat Defender (ETD)

✔

WatchGuard

 

Contact(s):WatchguardMD@ingrammicro.com

Solution(s):

Firebox

✔

Zerospam

 

Contact(s):USCloud@IngramMicro.com

Solution(s):

ZEROSPAM Cloud Email Security

✔

Zyxel

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

USG Firewalls

Endpoint Application Control

Monitor, control, and report on device-based applications and/or web applications

✔

Adlumin

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Adlumin Overwatch

 

✔

BeyondTrust

 

Contact(s):BeyondTrust@ingrammicro.com

Solution(s):

Privilege Management for Win/Mac

✔

Check Point

 

Contact(s):checkpoint-licensing@ingrammicro.com

Solution(s):

Endpoint Policy Management

✔

Citrix

 

Contact(s):CitrixMD@ingrammicro.com

Solution(s):

Citrix Endpoint Management (formerly XenMobile)

✔

F5

 

Contact(s):F5-Team@ingrammicro.com

Solution(s):

Access Policy Manager (APM) (BIG-IP Edge Client)

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com

Solution(s):

FortiClient

✔

HCLSoftware

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

HCL BigFix Workplace+

 

✔

SonicWall

 

Contact(s):SonicWall-Renewals@ingrammicro.com

Solution(s):

Capture Client

✔

Sophos

 

Contact(s):sophos-licensing@ingrammicro.com

Solution(s):

Intercept X Endpoint

✔

SyncDog

 

Contact(s):USCloud@IngramMicro.com

Solution(s):

Secure.Systemsâ„¢

✔

Trellix

 

Contact(s):trellix-licensing@ingrammicro.com

Solution(s):

Trellix Application Control

✔

Trend Micro

 

Contact(s):Trend-Licensing@ingrammicro.com

Solution(s):

TM Application Control (included in Smart Protection & Worry-Free Svcs)

✔

VMware (Carbon Black)

 

Contact(s):VMware_MD_Team@ingrammicro.com

Solution(s):

Application Security Software – AppDefense

Endpoint Protection

Endpoint Security protects computers and other devices on a network or in the cloud from cybersecurity threats. Endpoint security has evolved from traditional antivirus software to providing comprehensive protection from sophisticated malware and evolving zero-day threats.

This category includes:
– Desktop
– Laptop
– Server

Features typically include:
– Anti-Malware
– Application Control
– Web filtering
– Host based IPS
– APT
– Firewall
– Data loss prevention

Mobile devices and security are covered by Mobility Management category above.

Ingram Micro Professional Service:
Endpoint Security Services

✔

Acronis

 

Contact(s):Acronis-Cloud@ingrammicro.com

Solution(s):

Acronis Cyber Protect

 

✔

ActZero

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

ActZero Managed Detection & Response (MDR) Service

 

✔

Adlumin

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Adlumin Overwatch

 

✔

Alert Logic

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Extended Endpoint Protection

Included in:
– Essentials
– Professional
– Enterprise

✔

Arctic Wolf

 

Contact(s):ArcticWolfMD@ingrammicro.com

Solution(s):

Arctic Wolf MDR Integrations for Endpoint

 

✔

Avast

 

Contact(s):sporders@avast.com

Solution(s):

– Business Antivirus
– CloudCare
– Managed Workplace

✔

Binary Defense

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Binary Defense

 

✔

Bitdefender

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

GravityZone

 

✔

Check Point

 

Contact(s):checkpoint-licensing@ingrammicro.com

Solution(s):

Endpoint Anti-Malware

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco Secure Endpoint

 

✔

CrashPlan

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

CrashPlan

 

✔

Dell Technologies

 

Contact(s):Dell Technologies Contacts Overview

Solution(s):

Dell Managed Detection & Response 

 

Cyber Advisory Services 

 

✔

ESET

 

Contact(s):ESET Contacts Overview
NSX-Sales@ingrammicro.com

Solution(s):

ESET Protect (all levels)

✔

Forcepoint

 

Contact(s):Forcepoint-Licensing@ingrammicro.com

Solution(s):

Multiple endpoint products

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com

Solution(s):

Forticlient

✔

Ingram Micro Services

 

Contact(s):USServices@ingrammicro.com

Solution(s):

Endpoint Security Services

✔

Interguard Software

 

Contact(s):USCloud@ingrammicro.com

Solution(s):

InterGuard Web Filtering & Internet Activity Monitoring

✔

Ivanti

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Ivanti Security Controls

✔

Microsoft

 

Contact(s):Microsoft Contacts Overview

Solution(s):

System Center Endpoint Protection

✔

Palo Alto Networks

 

Contact(s):paloaltosolutions@ingrammicro.com

Solution(s):

Traps Advanced Endpoint Protection

✔

PKWARE

 

Contact(s):PKWare@ingrammicro.com

Solution(s):

PKProtect Endpoint Manager

 

✔

SentinelOne

 

Contact(s):SentinelOne-Licensing@ingrammicro.com

Solution(s):

Singularity Complete

 

✔

SonicWall

 

Contact(s):SonicWall-Renewals@ingrammicro.com

Solution(s):

Capture Client

✔

Sophos

 

Contact(s):sophos-licensing@ingrammicro.com

Solution(s):

Intercept X Endpoint

✔

SyncDog

 

Contact(s):USCloud@IngramMicro.com

Solution(s):

Secure.Systemsâ„¢

✔

Trellix

 

Contact(s):trellix-licensing@ingrammicro.com

Solution(s):

Trellix Endpoint Security

✔

Trend Micro

 

Contact(s):Trend-Licensing@ingrammicro.com

Solution(s):

– Worry-Free Business Security
– Apex One
– Deep Security

✔

VMware (Carbon Black)

 

Contact(s):VMware_MD_Team@ingrammicro.com

Solution(s):

Endpoint Standard

✔

WatchGuard

 

Contact(s):WatchguardMD@ingrammicro.com

Solution(s):

Adaptive Defense 360

File/Folder Encryption

File/Folder Encryption or Filesystem-level encryption, is a form of disk encryption where individual files or directories are encrypted by the file system itself.

✔

Atakama

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Atakama

✔

Axcient

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

x360Recover

 

✔

Check Point

 

Contact(s):checkpoint-licensing@ingrammicro.com

Solution(s):

Check Point Endpoint Media encryption and Port Protection
(part of Data Protection Package)

✔

Dell Technologies

 

Contact(s):Dell Technologies Contacts Overview

Solution(s):

Dell Unity XT Unified Storage Solution

 

PowerMax NVMe Storage

 

VMAX All Flash Storage

 

Dell EMC Isilon and ECS Storage for Media and Entertainment

 

Dell ECS Enterprise Object Storage

 

VxBlock Converged Infrastructure

 

✔

ESET

 

Contact(s):ESET Contacts Overview
NSX-Sales@ingrammicro.com

Solution(s):

ESET Endpoint Encryption PRO

 

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

Guardium for File and Database Encryption

✔

OPSWAT

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

MetaDefender ICAP Server

✔

PKWARE

 

Contact(s):PKWare@ingrammicro.com

Solution(s):

PKProtect Endpoint Manager

✔

Sophos

 

Contact(s):sophos-licensing@ingrammicro.com

Solution(s):

– Safeguard File Encryption
– Safeguard Enterprise Encryption

✔

SyncDog

 

Contact(s):USCloud@IngramMicro.com

Solution(s):

Secure.Systemsâ„¢

✔

Trellix

 

Contact(s):trellix-licensing@ingrammicro.com

Solution(s):

Trellix File and Removable Media Protection

✔

Trend Micro

 

Contact(s):Trend-Licensing@ingrammicro.com

Solution(s):

Trend Micro Endpoint Encryption

Firewall / Gateway

This category includes:
– Next Generation Firewall (NGFW)
– Unified Threat Management (UTM) Firewall
– Web Application Firewall (WAF)

Features typically include:
– Web Content Management
– Anti-Virus
– Intrusion Prevention/Detection
– Data Loss Prevention
– VPN
– Web Application Control
– Cloud Sandboxing
– E-mail Anti-Spam

Ingram Micro Professional Service:
Virus & Intrusion Protection Services

✔

Adlumin

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Adlumin Overwatch

 

✔

Alert Logic

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Managed Web Application Firewall

Optional add-on for Enterprise

✔

Allied Telesis

 

Contact(s):AlliedTelesis@ingrammicro.com

Solution(s):

Allied Telesis UTM Firewalls

✔

Appgate

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

AppGate Software-Defined Perimeter (SDP)

✔

Arctic Wolf

 

Contact(s):ArcticWolfMD@ingrammicro.com

Solution(s):

Arctic Wolf MDR Integrations for Firewall

 

✔

Barracuda

 

Contact(s):Barracuda Contacts Overview

Solution(s):

CloudGen Firewall

 

✔

Binary Defense

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Binary Defense

 

✔

Check Point

 

Contact(s):checkpoint-licensing@ingrammicro.com

Solution(s):

Security Gateways and vSec

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco Secure Firewall

 

Cisco Umbrella

 

Cisco Secure Web

 

✔

Citrix

 

Contact(s):CitrixMD@ingrammicro.com

Solution(s):

Citrix ADC (formerly NetScaler ADC)

✔

ESET

 

Contact(s):ESET Contacts Overview
NSX-Sales@ingrammicro.com

Solution(s):

Secure-Enterprise Gateway

✔

F5

 

Contact(s):F5-Team@ingrammicro.com

Solution(s):

Secure Web Gateway, Web Application Firewall

✔

Forcepoint

 

Contact(s):Forcepoint-Licensing@ingrammicro.com

Solution(s):

Forcepoint Trusted Gateway System

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com

Solution(s):

FortiGate & FortiGate Hybrid Cloud (On Cloud)

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

IBM Managed Security Services (MSS)

 

✔

iboss

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Core Package, Malware Defense, and DLP package

✔

Ingram Micro Services

 

Contact(s):USServices@ingrammicro.com

Solution(s):

Virus & Intrusion Protection Services

✔

Juniper

 

Contact(s):Juniper Contacts Overview
Juniper.Assist@ingrammicro.com

Solution(s):

SRX, vSRX

✔

Lantronix

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

External IoT Gateways

✔

Meraki (Cisco)

 

Contact(s):Meraki (Cisco) Contacts Overview

Solution(s):

Meraki MX Firewalls

✔

Opengear

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

IoT Gateways

✔

Palo Alto Networks

 

Contact(s):paloaltosolutions@ingrammicro.com

Solution(s):

PA Series and VM Series Next Gen Firewalls

✔

SonicWall

 

Contact(s):SonicWall-Renewals@ingrammicro.com

Solution(s):

Next-Generation Firewalls
– Hardware
– Virtual
– AWS/Azure

✔

Sophos

 

Contact(s):sophos-licensing@ingrammicro.com

Solution(s):

XG Firewalls

✔

Trellix

 

Contact(s):trellix-licensing@ingrammicro.com

Solution(s):

Trellix ENS Firewall

✔

Trend Micro

 

Contact(s):Trend-Licensing@ingrammicro.com

Solution(s):

Web Security

✔

VMware (Carbon Black)

 

Contact(s):VMware_MD_Team@ingrammicro.com

Solution(s):

VMware NSX

✔

WatchGuard

 

Contact(s):WatchguardMD@ingrammicro.com

Solution(s):

Firebox

✔

Zyxel

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

USG Firewalls

Fraud and Risk Management/Protection

Manage fraud and digital risk across multi-channel environments without impacting customers or transactions.

✔

Adlumin

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Adlumin Overwatch

 

✔

Arctic Wolf

 

Contact(s):ArcticWolfMD@ingrammicro.com

Solution(s):

Arctic Wolf Managed Risk

 

✔

Binary Defense

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Binary Defense

 

✔

Mandiant

 

Contact(s):Mandiant-Licensing@IngramMicro.com

Solution(s):

Mandiant Consulting Services + Mandiant Advantage (Validation and Intel)

 

✔

NS8

 

Contact(s):USCloud@IngramMicro.com

Solution(s):

NS8 Protect

Gateway Advanced Persistent Threat Protection

Protection against an unauthorized person gaining access to a network undetected for a long period of time.

Solution(s):

✔

Appgate

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

AppGate Software-Defined Perimeter (SDP)

✔

Arctic Wolf

 

Contact(s):ArcticWolfMD@ingrammicro.com

Solution(s):

Arctic Wolf MDR Integrations for Firewall

 

✔

Binary Defense

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Binary Defense

 

✔

Check Point

 

Contact(s):checkpoint-licensing@ingrammicro.com

Solution(s):

Security Gateways and vSec

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco Secure Firewall with Malware Defense

 

Cisco Secure Web with Malware Defense

 

Cisco Umbrella with Malware Defense

 

✔

ESET

 

Contact(s):ESET Contacts Overview
NSX-Sales@ingrammicro.com

Solution(s):

Secure-Enterprise Gateway

✔

Forcepoint

 

Contact(s):Forcepoint-Licensing@ingrammicro.com

Solution(s):

Forcepoint Advanced Persistent Threat (APT) Protection

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com

Solution(s):

FortiGate

✔

iboss

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Core Package, Malware Defense, and DLP Packages

✔

Juniper

 

Contact(s):Juniper Contacts Overview
Juniper.Assist@ingrammicro.com

Solution(s):

SRX, vSRX

✔

Mandiant

 

Contact(s):Mandiant-Licensing@IngramMicro.com

Solution(s):

Mandiant Advantage Threat Intelligence

 

✔

Meraki (Cisco)

 

Contact(s):Meraki (Cisco) Contacts Overview

Solution(s):

Meraki MX with Advanced Security with AMP enabled

✔

Mimecast

 

Contact(s):Mimecast-Licensing@ingrammicro.com

Solution(s):

Advanced Persistent Threats

✔

OPSWAT

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Metadefender Core

✔

Palo Alto Networks

 

Contact(s):paloaltosolutions@ingrammicro.com

Solution(s):

APT Prevention

✔

Proofpoint

 

Contact(s):Proofpoint-Licensing@ingrammicro.com

Solution(s):

Targeted Attack Protection

✔

SonicWall

 

Contact(s):SonicWall-Renewals@ingrammicro.com

Solution(s):

Next-Generation Firewalls
– Hardware
– Virtual
– AWS/Azure

✔

Sophos

 

Contact(s):sophos-licensing@ingrammicro.com

Solution(s):

XG Firewalls

✔

Trend Micro

 

Contact(s):Trend-Licensing@ingrammicro.com

Solution(s):

– Deep Discovery Analyzer
– Cloud Sandbox addon for Apex One as a Service

✔

WatchGuard

 

Contact(s):WatchguardMD@ingrammicro.com

Solution(s):

Firebox

✔

Zyxel

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

USG Firewalls

Gateway Application Control

Monitor, control, and report on web applications.

✔

Appgate

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

AppGate Software-Defined Perimeter (SDP)

✔

Check Point

 

Contact(s):checkpoint-licensing@ingrammicro.com

Solution(s):

Security Gateways and vSec

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco Secure Firewall with AVC

 

Cisco Secure Web with AVC

 

Cisco Umbrella with App Discovery and Blocking

 

Cisco Cloudlock

 

✔

F5

 

Contact(s):F5-Team@ingrammicro.com

Solution(s):

Access Policy Manager (APM), Silverline – As a Service Product

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com

Solution(s):

FortiGate

✔

HPE (Aruba Networks)

 

Contact(s):HPEAruba@ingrammicro.com

Solution(s):

Web APP Firewalls & SD-Branch

✔

Juniper

 

Contact(s):Juniper Contacts Overview
Juniper.Assist@ingrammicro.com

Solution(s):

SRX, vSRX

✔

Meraki (Cisco)

 

Contact(s):Meraki (Cisco) Contacts Overview

Solution(s):

Meraki MX Firewall

✔

Palo Alto Networks

 

Contact(s):paloaltosolutions@ingrammicro.com

Solution(s):

PA Series and VM Series Next Gen Firewalls

✔

SonicWall

 

Contact(s):SonicWall-Renewals@ingrammicro.com

Solution(s):

Next-Generation Firewalls
– Hardware
– Virtual
– AWS/Azure

✔

Sophos

 

Contact(s):sophos-licensing@ingrammicro.com

Solution(s):

XG Firewalls

✔

WatchGuard

 

Contact(s):WatchguardMD@ingrammicro.com

Solution(s):

Firebox

✔

Zyxel

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

USG Firewalls

Identity & Access Management (IAM), Multi-Factor Authentication (MFA), Single Sign-On (SSO)

MFA is access control in which a user is granted access only after successfully utilizing more than one authentication method.
SSO is an authentication process that allows a user to access multiple applications with one set of login credentials.

Ingram Micro Professional Service:
Identity & Access Management Services

✔

Arctic Wolf

 

Contact(s):ArcticWolfMD@ingrammicro.com

Solution(s):

Arctic Wolf MDR Integrations for Authentication

 

✔

Axiad IDS

 

Contact(s):pshelpdesk@ingrammicro.com

Solution(s):

Axiad ID Cloud

 

✔

BeyondTrust

 

Contact(s):BeyondTrust@ingrammicro.com

Solution(s):

– BeyondTrust Password Safe
– BeypndTrust DevOps Secrets Safe

✔

Binary Defense

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Binary Defense

 

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco Identity Services Engine

 

Cisco Secure Access by Duo

 

✔

Citrix

 

Contact(s):CitrixMD@ingrammicro.com

Solution(s):

Netscaler ADC

✔

Dell Technologies

 

Contact(s):Dell Technologies Contacts Overview

Solution(s):

Cyber Advisory Services 

 

✔

ESET

 

Contact(s):ESET Contacts Overview
NSX-Sales@ingrammicro.com

Solution(s):

ESET Secure Authentication

✔

Evidian (Atos)

 

Contact(s):Evidian-Licensing@ingrammicro.com

Solution(s):

– Evidian SSO
– Cloud SSO

✔

F5

 

Contact(s):F5-Team@ingrammicro.com

Solution(s):

F5 Access Management

 

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com

Solution(s):

FortiToken, FortiAuthenticator

✔

HPE (Aruba Networks)

 

Contact(s):HPEAruba@ingrammicro.com

Solution(s):

Aruba ClearPass

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

IBM Verify

 

✔

Ingram Micro Services

 

Contact(s):USServices@ingrammicro.com

Solution(s):

Identity & Access Management Services

✔

Microsoft

 

Contact(s):Microsoft Contacts Overview

Solution(s):

Azure MFA

✔

Okta

 

Contact(s):Okta-Licensing@ingrammicro.com

Solution(s):

– Okta Single Sign-On
– Adaptive Multi-Factor Authentication

✔

RSA

 

Contact(s):RSA-Licensing@ingrammicro.com

Solution(s):

RSA SecurID Access Suite

 

✔

VMware (Carbon Black)

 

Contact(s):VMware_MD_Team@ingrammicro.com

Solution(s):

Workspace ONE

✔

WatchGuard

 

Contact(s):WatchguardMD@ingrammicro.com

Solution(s):

AuthPoint

✔

Yubico

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Yubikey

 

IT Asset Disposition (ITAD)

IT Asset Disposition (ITAD) is the business built around disposing of obsolete or unwanted equipment in a safe and ecologically-responsible manner.

✔

Ingram Micro Services

 

Contact(s):USServices@ingrammicro.com

Solution(s):

IT Asset Disposition (ITAD)

Network Access Control (NAC)

Network management and security that enforces security policy, compliance and management of access control to a network.

✔

Barracuda

 

Contact(s):Barracuda Contacts Overview

Solution(s):

Zero Trust Access for Microsoft 365

 

✔

Check Point

 

Contact(s):checkpoint-licensing@ingrammicro.com

Solution(s):

Security Gateways and vSec

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Identity Services Engine (ISE)

Cisco Identity Services Engine

 

✔

F5

 

Contact(s):F5-Team@ingrammicro.com

Solution(s):

Access Policy Manager (APM)

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com

Solution(s):

– FortiNAC
– FortiAuthenticator

✔

HPE (Aruba Networks)

 

Contact(s):HPEAruba@ingrammicro.com

Solution(s):

Aruba ClearPass

✔

OPSWAT

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

NAC Enterprise Network Access Control

Network Intrusion Prevention System

Including Network Intrusion prevention System (NIPS) & Intrusion Detection System (IDS) signature/behavioral/protocol-based security.

✔

Adlumin

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Adlumin Overwatch

 

✔

Appgate

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

AppGate Software-Defined Perimeter (SDP)

✔

Arctic Wolf

 

Contact(s):ArcticWolfMD@ingrammicro.com

Solution(s):

Arctic Wolf MDR Integrations for Firewall

 

✔

Binary Defense

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Binary Defense

 

✔

Check Point

 

Contact(s):checkpoint-licensing@ingrammicro.com

Solution(s):

Security Gateways and vSec

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco Umbrella

 

Cisco Secure Firewall with NGIPS

 

✔

Dell Technologies

 

Contact(s):Dell Technologies Contacts Overview

Solution(s):

Dell Managed Detection & Response 

 

Cyber Advisory Services 

 

✔

ESET

 

Contact(s):ESET Contacts Overview
NSX-Sales@ingrammicro.com

Solution(s):

Secure-Enterprise Gateway

✔

F5

 

Contact(s):F5-Team@ingrammicro.com

Solution(s):

F5 BIG-IP AFM Intrusion Prevention System (IPS)

 

✔

Forcepoint

 

Contact(s):Forcepoint-Licensing@ingrammicro.com

Solution(s):

FORCEPOINT Intrusion Prevention System

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com

Solution(s):

FortiGate

✔

HPE (Aruba Networks)

 

Contact(s):HPEAruba@ingrammicro.com

Solution(s):

HPE Aruba EdgeConnect (SilverPeak)

 

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

IBM Managed Security Services (MSS)

 

✔

iboss

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Malware Defense and Data Loss Prevention Packages

✔

Juniper

 

Contact(s):Juniper Contacts Overview
Juniper.Assist@ingrammicro.com

Solution(s):

SRX, vSRX

✔

Meraki (Cisco)

 

Contact(s):Meraki (Cisco) Contacts Overview

Solution(s):

Meraki MX Firewalls

✔

Palo Alto Networks

 

Contact(s):paloaltosolutions@ingrammicro.com

Solution(s):

NGIPS

✔

SonicWall

 

Contact(s):SonicWall-Renewals@ingrammicro.com

Solution(s):

Next-Generation Firewalls
– Hardware
– Virtual
– AWS/Azure

✔

Sophos

 

Contact(s):sophos-licensing@ingrammicro.com

Solution(s):

XG Firewalls

✔

Trellix

 

Contact(s):trellix-licensing@ingrammicro.com

Solution(s):

Trellix Network Security Platform

✔

Trend Micro

 

Contact(s):Trend-Licensing@ingrammicro.com

Solution(s):

– Tipping Point
– Cloud One Network Security

✔

WatchGuard

 

Contact(s):WatchguardMD@ingrammicro.com

Solution(s):

Firebox

✔

Zyxel

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

USG FIrewalls

Ransomware Protection & Mitigation

Tools to detect, prevent, and remediate from ransomware attacks

✔

Acronis

 

Contact(s):Acronis-Cloud@ingrammicro.com

Solution(s):

Acronis Cyber Protect

 

✔

ActZero

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

ActZero Managed Detection & Response (MDR) Service

 

✔

Adlumin

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Adlumin UEBA

 

✔

Alien Vault (AT&T)

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

AlienVault Unified Security Management (USM)

✔

Arctic Wolf

 

Contact(s):ArcticWolfMD@ingrammicro.com

Solution(s):

Arctic Wolf Managed Detection & Response

 

✔

Atakama

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Atakama File Encryption

✔

Binary Defense

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Binary Defense

 

✔

Bitdefender

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

GravityZone Elite

✔

Check Point

 

Contact(s):checkpoint-licensing@ingrammicro.com

Solution(s):

Harmony Endpoint (All Versions)

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco Ransomware Defense

Cisco Identity Services Engine

 

Cisco Secure Endpoint

 

Cisco Secure Access by Duo

 

✔

Cofense

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Cofense Ransomware Intelligence

✔

CrashPlan

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

CrashPlan

 

✔

CyberFortress

 

Contact(s):OffsiteDataSync-Licensing@ingrammicro.com

Solution(s):

Office 365 Cloud Backup

✔

Dell Technologies

 

Contact(s):Dell Technologies Contacts Overview

Solution(s):

Proactive Security / Pen Testing 

 

Cyber Advisory Services 

 

✔

ESET

 

Contact(s):ESET Contacts Overview
NSX-Sales@ingrammicro.com

Solution(s):

ESET Protect (All Versions)

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com

Solution(s):

Stop Ransomware and Phishing with the Fortinet Security Fabric

✔

HPE (Aruba Networks)

 

Contact(s):HPEAruba@ingrammicro.com

Solution(s):

HPE Aruba Networking SSE

 

✔

Intermedia

 

Contact(s):USCloud@IngramMicro.com

Solution(s):

SecuriSync® by Intermedia

✔

Juniper

 

Contact(s):Juniper Contacts Overview
Juniper.Assist@ingrammicro.com

Solution(s):

Juniper Next-Generation Firewalls

✔

Mandiant

 

Contact(s):Mandiant-Licensing@IngramMicro.com

Solution(s):

Mandiant Ransomware Defense Assessment

 

✔

Microsoft

 

Contact(s):Microsoft Contacts Overview

Solution(s):

Microsoft 365 advanced protection

✔

Mimecast

 

Contact(s):Mimecast-Licensing@ingrammicro.com

Solution(s):

Mimecast Email Security

✔

Palo Alto Networks

 

Contact(s):paloaltosolutions@ingrammicro.com

Solution(s):

Cortex

✔

Proofpoint

 

Contact(s):Proofpoint-Licensing@ingrammicro.com

Solution(s):

Proofpoint Targeted Attack Protection

✔

RSA

 

Contact(s):RSA-Licensing@ingrammicro.com

Solution(s):

✔

Rubrik

 

Contact(s):rubrik-licensing-us@ingrammicro.com

Solution(s):

Rubrik Ransomware Investigation

 

✔

SentinelOne

 

Contact(s):SentinelOne-Licensing@ingrammicro.com

Solution(s):

Singularity Complete

 

✔

SonicWall

 

Contact(s):SonicWall-Renewals@ingrammicro.com

Solution(s):

SonicWALL Next-Gen Firewalls, Capture Endpoint Client

✔

Sophos

 

Contact(s):sophos-licensing@ingrammicro.com

Solution(s):

Sophos Next-Gen Firewalls, Intercept X Endpoint Client

✔

Trellix

 

Contact(s):trellix-licensing@ingrammicro.com

Solution(s):

Trellix Endpoint Security

✔

Trend Micro

 

Contact(s):Trend-Licensing@ingrammicro.com

Solution(s):

Endpoint, Email & Web, Network & Server

✔

Veeam

 

Contact(s):VeeamMD@ingrammicro.com

Solution(s):

Veeam Backup & Replication

✔

Veritas

 

Contact(s):veritas-licensing@ingrammicro.com

Solution(s):

NetBackup

✔

VMware (Carbon Black)

 

Contact(s):VMware_MD_Team@ingrammicro.com

Solution(s):

VMware Carbon Black

✔

WatchGuard

 

Contact(s):WatchguardMD@ingrammicro.com

Solution(s):

Total Security Suite

Sandboxing or Advanced Threat Protection (ATP)

A sandbox is used to detect new and unknown malware threats. A sandbox is a security mechanism used to execute untested or untrusted programs or code without risking harm to the host machine or operating system. Advanced Threat Protection (ATP) is a feature that incorporates multiple security technologies to provide protection against targeted attacks.

✔

Bitdefender

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Bitdefender Hypervisor Introspection (HVI)

✔

Check Point

 

Contact(s):checkpoint-licensing@ingrammicro.com

Solution(s):

SandBlast on Security Gateways and vSec

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco Secure Endpoint

 

Cisco Secure Firewall with Malware Defense

 

Cisco Secure Malware Analytics

 

Cisco Secure Web with Malware Defense

 

Cisco Umbrella with Malware Defense

 

✔

ESET

 

Contact(s):ESET Contacts Overview
NSX-Sales@ingrammicro.com

Solution(s):

ESET LiveGuard Advanced (ESET Protect Advanced)

✔

Forcepoint

 

Contact(s):Forcepoint-Licensing@ingrammicro.com

Solution(s):

Forcepoint Advanced Malware Detection (AMD),

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com

Solution(s):

FortiSandbox

✔

HPE (Aruba Networks)

 

Contact(s):HPEAruba@ingrammicro.com

Solution(s):

HPE Aruba Networking SSE

 

✔

iboss

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Malware Defense and Data Loss Prevention Packages

✔

Juniper

 

Contact(s):Juniper Contacts Overview
Juniper.Assist@ingrammicro.com

Solution(s):

Sky ATP, ATP Appliance

✔

Mandiant

 

Contact(s):Mandiant-Licensing@IngramMicro.com

Solution(s):

Mandiant Advantage Threat Intelligence

 

✔

Microsoft

 

Contact(s):Microsoft Contacts Overview

Solution(s):

Office 365 Advanced Threat Protection

✔

Mimecast

 

Contact(s):Mimecast-Licensing@ingrammicro.com

Solution(s):

Attachment Protect

✔

OPSWAT

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

MetaDefender Cloud Sandboxing

✔

Palo Alto Networks

 

Contact(s):paloaltosolutions@ingrammicro.com

Solution(s):

WildFire Malware Analysis

✔

SentinelOne

 

Contact(s):SentinelOne-Licensing@ingrammicro.com

Solution(s):

Singularity Complete

 

✔

SonicWall

 

Contact(s):SonicWall-Renewals@ingrammicro.com

Solution(s):

Capture ATP on Next-Generation Firewalls

✔

Sophos

 

Contact(s):sophos-licensing@ingrammicro.com

Solution(s):

Sandstorm for XG Firewalls

✔

Stellar Cyber

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Stellar Cyber Central

✔

Trellix

 

Contact(s):trellix-licensing@ingrammicro.com

Solution(s):

Trellix Advanced Threat Detection

✔

Trend Micro

 

Contact(s):Trend-Licensing@ingrammicro.com

Solution(s):

– Deep Discovery
– Apex One Cloud Sandbox as a Service Add-on

✔

VMRay

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

VMRay Analyzer

✔

WatchGuard

 

Contact(s):WatchguardMD@ingrammicro.com

Solution(s):

APT Blocker

✔

Zyxel

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

ATP Firewalls
(ATP200, ATP500, ATP800)

Secure Access Service Edge (SASE)

SASE is a network architecture that combines WAN capabilities with cloud-native security functions like secure web gateways, cloud access security brokers, firewalls, and zero-trust network access

Ingram Micro Professional Service:
Cloud Security Services

✔

Appgate

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Appgate SDP

✔

Barracuda

 

Contact(s):Barracuda Contacts Overview

Solution(s):

Service Edge

 

✔

Check Point

 

Contact(s):checkpoint-licensing@ingrammicro.com

Solution(s):

CloudGuard Connect

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco Secure Access by Duo

 

Cisco SASE

 

✔

Forcepoint

 

Contact(s):Forcepoint-Licensing@ingrammicro.com

Solution(s):

Forcepoint Dynamic Edge Protection

✔

HPE (Aruba Networks)

 

Contact(s):HPEAruba@ingrammicro.com

Solution(s):

HPE Aruba Unified SASE

 

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

IBM Managed Security Services (MSS)

 

✔

iboss

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Core Package, Malware Defense, and DLP packages

✔

Infoblox

 

Contact(s):Infoblox-Licensing@ingrammicro.com

Solution(s):

BloxOne

✔

Palo Alto Networks

 

Contact(s):paloaltosolutions@ingrammicro.com

Solution(s):

Prisma Access

✔

SkyhighSecurity

 

Contact(s):Skyhigh-Licensing@ingrammicro.com

Solution(s):

Skyhigh Security UCE

 

Secure Wireless

Certain Access Points have the ability to perform security checks on the accesspoint independent of a firewall or other security device.

Features typically include:
– Wireless Intrusion Prevention
– Web Content Filtering
– AV Scanning
– Guest/Device Tracking

Ingram Micro Professional Service:
Wireless Network Assessment

✔

Adlumin

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Adlumin Overwatch

 

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Catalyst Wireless, Identity Services Engine (ISE)

Cisco Identity Services Engine

 

Cisco Catalyst Wireless

 

Cisco DNA Center

 

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com

Solution(s):

Secure Wi-Fi

✔

HPE (Aruba Networks)

 

Contact(s):HPEAruba@ingrammicro.com

Solution(s):

Enterprise-Grade Wi-Fi Access Points

✔

Ingram Micro Services

 

Contact(s):USServices@ingrammicro.com

Solution(s):

Wireless Network Assessment

✔

Juniper

 

Contact(s):Juniper Contacts Overview
Juniper.Assist@ingrammicro.com

Solution(s):

Mist Wireless

✔

Meraki (Cisco)

 

Contact(s):Meraki (Cisco) Contacts Overview

Solution(s):

MR Series Wireless APs

✔

NetAlly

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

– CyberScope

 

–  Aircheck G3

 

– EtherScope nXG

 

✔

SonicWall

 

Contact(s):SonicWall-Renewals@ingrammicro.com

Solution(s):

Sophos Wireless

✔

Sophos

 

Contact(s):sophos-licensing@ingrammicro.com

Solution(s):

Sophos Wireless

✔

WatchGuard

 

Contact(s):WatchguardMD@ingrammicro.com

Solution(s):

Secure Wi-Fi

Security Awareness Training

Tools to improve employee knowledge of social engineering and cyberattack techniques. Products/Services can include training as well as phishing simulations.

Ingram Micro Professional Service:
Ingram Micro Training

✔

Arctic Wolf

 

Contact(s):ArcticWolfMD@ingrammicro.com

Solution(s):

Managed Security Awareness®

✔

Barracuda

 

Contact(s):Barracuda Contacts Overview

Solution(s):

Security Awareness Training

 

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco Secure Email Security Awareness Training

 

✔

Cofense

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Cofense PhishMe

✔

Dell Technologies

 

Contact(s):Dell Technologies Contacts Overview

Solution(s):

Employee Training / Anti Phishing 

 

✔

ESET

 

Contact(s):ESET Contacts Overview
NSX-Sales@ingrammicro.com

Solution(s):

ESET Cybersecurity Awareness Training

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com

Solution(s):

FortiPhish

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

IBM Security Command Center

 

✔

Ingram Micro Services

 

Contact(s):USServices@ingrammicro.com

Solution(s):

Ingram Micro Training

✔

Mandiant

 

Contact(s):Mandiant-Licensing@IngramMicro.com

Solution(s):

Mandiant Academy

 

✔

Mimecast

 

Contact(s):Mimecast-Licensing@ingrammicro.com

Solution(s):

Mimecast Awareness Training

✔

OPSWAT

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

OPSWAT Academy

✔

Pluralsight

 

Contact(s):USServices@ingrammicro.com

Solution(s):

Pluralsight Cybersecurity Training

 

✔

Proofpoint

 

Contact(s):Proofpoint-Licensing@ingrammicro.com

Solution(s):

Proofpoint Security Awareness Training (PSAT)

✔

Sophos

 

Contact(s):sophos-licensing@ingrammicro.com

Solution(s):

Phish Threat

✔

ThriveDX

 

Contact(s):NXS-Sales@ingrammicro.com

Solution(s):

Awareness Training & Phishing

 

Cyber Academy / Digital Skills Training

 

✔

Trend Micro

 

Contact(s):Trend-Licensing@ingrammicro.com

Solution(s):

Phish Insight

Software-Defined WAN (SD-WAN)

SD-WAN is a virtual WAN architecture that allows enterprises to leverage any combination of transport services – including MPLS, LTE and broadband internet service.

Ingram Micro Professional Service:
SD-WAN Network Optimization & Services

✔

Allied Telesis

 

Contact(s):AlliedTelesis@ingrammicro.com

Solution(s):

Secure SD-WAN

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco SD-WAN

 

✔

Citrix

 

Contact(s):CitrixMD@ingrammicro.com

Solution(s):

Citrix SD-WAN (formerly NetScaler SD-WAN)

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com

Solution(s):

FortiGate Secure SD-WAN

✔

HPE (Aruba Networks)

 

Contact(s):HPEAruba@ingrammicro.com

Solution(s):

SD-Branch

HPE Aruba EdgeConnect (Silver Peak)

 

✔

Ingram Micro Services

 

Contact(s):USServices@ingrammicro.com

Solution(s):

SD-WAN Network Optimization & Services

✔

Juniper

 

Contact(s):Juniper Contacts Overview
Juniper.Assist@ingrammicro.com

Solution(s):

SD-WAN

✔

Masergy

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Masergy Managed SD-WAN Secure

 

✔

Meraki (Cisco)

 

Contact(s):Meraki (Cisco) Contacts Overview

Solution(s):

Meraki SD-WAN for MX Firewalls

✔

Opengear

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

SD-WAN & Out-of-Band

✔

Palo Alto Networks

 

Contact(s):paloaltosolutions@ingrammicro.com

Solution(s):

SD-WAN

 

✔

SkyhighSecurity

 

Contact(s):Skyhigh-Licensing@ingrammicro.com

Solution(s):

Skyhigh Security CASB

 

✔

SonicWall

 

Contact(s):SonicWall-Renewals@ingrammicro.com

Solution(s):

Secure SD-WAN on Next-Generation Firewalls

✔

VMware (Carbon Black)

 

Contact(s):VMware_MD_Team@ingrammicro.com

Solution(s):

Velocloud (AKA NSX SD-WAN)

✔

WatchGuard

 

Contact(s):WatchguardMD@ingrammicro.com

Solution(s):

SD-WAN

✔

Zyxel

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

SD-WAN
(VPN50, VPN100, VPN300)

Virtual Private Network (VPN)

Virtual Private Networks (VPN) allow users to connect their devices back to an office to access resources and files though an encrypted connection. This prevents anyone snooping from the outside from accessing plain text traffic that might be transmitted.

Common types of VPNs Include:
– IPsec (Internet Protocol Security), Software client based
– SSL (Secure Sockets Layer), clientless

✔

Allied Telesis

 

Contact(s):AlliedTelesis@ingrammicro.com

Solution(s):

Allied Telesis Secure VPN Routers

✔

Appgate

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

AppGate Software-Defined Perimeter (SDP)

✔

Arctic Wolf

 

Contact(s):ArcticWolfMD@ingrammicro.com

Solution(s):

Arctic Wolf MDR Integrations for Firewall

 

✔

Check Point

 

Contact(s):checkpoint-licensing@ingrammicro.com

Solution(s):

Security Gateways and vSec

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco Secure Client

 

✔

Citrix

 

Contact(s):CitrixMD@ingrammicro.com

Solution(s):

Netscaler ADC

✔

F5

 

Contact(s):F5-Team@ingrammicro.com

Solution(s):

Access Policy Manager (APM)

✔

Forcepoint

 

Contact(s):Forcepoint-Licensing@ingrammicro.com

Solution(s):

NGFW Enterprise Firewall

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com

Solution(s):

FortiGate

✔

HPE (Aruba Networks)

 

Contact(s):HPEAruba@ingrammicro.com

Solution(s):

SD-Branch & Wireless Controllers

✔

Juniper

 

Contact(s):Juniper Contacts Overview
Juniper.Assist@ingrammicro.com

Solution(s):

SRX, vSRX

✔

Meraki (Cisco)

 

Contact(s):Meraki (Cisco) Contacts Overview

Solution(s):

Meraki MX Firewall

✔

Palo Alto Networks

 

Contact(s):paloaltosolutions@ingrammicro.com

Solution(s):

NGFW VPN

✔

SkyhighSecurity

 

Contact(s):Skyhigh-Licensing@ingrammicro.com

Solution(s):

Skyhigh Security Private Access

 

✔

SonicWall

 

Contact(s):SonicWall-Renewals@ingrammicro.com

Solution(s):

– Next-Generation Firewalls
– SMA Appliances

✔

Sophos

 

Contact(s):sophos-licensing@ingrammicro.com

Solution(s):

XG Firewalls

✔

SyncDog

 

Contact(s):USCloud@IngramMicro.com

Solution(s):

Secure.Systemsâ„¢

✔

Trend Micro

 

Contact(s):Trend-Licensing@ingrammicro.com

Solution(s):

Cloud Edge

✔

VMware (Carbon Black)

 

Contact(s):VMware_MD_Team@ingrammicro.com

Solution(s):

VMware NSX

✔

WatchGuard

 

Contact(s):WatchguardMD@ingrammicro.com

Solution(s):

Firebox

✔

Zyxel

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

USG Firewalls, Cloud Managed NSG Firewalls

Detect

The Detect category of the NIST Cybersecurity Framework focuses on identifying the occurrence of cybersecurity events in a timely manner. It includes Anomalies and Events, Security Continuous Monitoring, and Detection Processes. These areas ensure that organizations can detect and understand potential cybersecurity incidents quickly, enabling prompt response and mitigation efforts.

Dark Web Monitoring

Dark Web Monitoring, also known as cyber monitoring, is an identity theft prevention product that enables you to monitor your identity information on the dark web, and receive notifications if your information is found online.

✔

ActZero

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

ActZero Managed Detection & Response (MDR) Service

 

✔

Arctic Wolf

 

Contact(s):ArcticWolfMD@ingrammicro.com

Solution(s):

Arctic Wolf Managed Risk

 

✔

Dell Technologies

 

Contact(s):Dell Technologies Contacts Overview

Solution(s):

Cyber Advisory Services 

 

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

IBM’s X-Force Incident Response 

 

✔

Mandiant

 

Contact(s):Mandiant-Licensing@IngramMicro.com

Solution(s):

Mandiant Advantage Threat Intelligence: Digital Threat Monitoring

 

Endpoint Detection and Response (EDR, XDR)

EDR solutions record and store endpoint-system-level behaviors, use various data analytics techniques to detect suspicious system behavior, provide contextual information, block malicious activity, and provide remediation suggestions to restore affected systems.

XDR provides cross-layered threat detection and response. XDR collects and correlates detections and deep activity data across multiple security layers – email, endpoint, server, cloud workloads, and network.

✔

ActZero

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

ActZero Managed Detection & Response (MDR) Service

 

✔

Adlumin

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Adlumin Overwatch

 

✔

Arctic Wolf

 

Contact(s):ArcticWolfMD@ingrammicro.com

Solution(s):

Arctic Wolf Managed Detection and Response

✔

Binary Defense

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Binary Defense EDR

✔

Bitdefender

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

GravityZone Ultra

✔

Check Point

 

Contact(s):checkpoint-licensing@ingrammicro.com

Solution(s):

Advanced Endpoint Protection and Threat Prevention

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco Secure Endpoint

 

Cisco SecureX

 

✔

Dell Technologies

 

Contact(s):Dell Technologies Contacts Overview

Solution(s):

Dell Managed Detection & Response 

 

Cyber Advisory Services 

 

✔

ESET

 

Contact(s):ESET Contacts Overview
NSX-Sales@ingrammicro.com

Solution(s):

ESET Inspect

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com

Solution(s):

FortiClient Security Fabric telemetry

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

IBM ReaQta

 

✔

Mandiant

 

Contact(s):Mandiant-Licensing@IngramMicro.com

Solution(s):

Mandiant Advantage Automated Defense

 

✔

Microsoft

 

Contact(s):Microsoft Contacts Overview

Solution(s):

Windows Defender Advanced Threat Protection

✔

Palo Alto Networks

 

Contact(s):paloaltosolutions@ingrammicro.com

Solution(s):

Traps Advanced Endpoint Protection

✔

SentinelOne

 

Contact(s):SentinelOne-Licensing@ingrammicro.com

Solution(s):

Singularity Complete

 

✔

Sophos

 

Contact(s):sophos-licensing@ingrammicro.com

Solution(s):

Intercept X Advanced with EDR

✔

Stellar Cyber

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Stellar Cyber Central

✔

Trellix

 

Contact(s):trellix-licensing@ingrammicro.com

Solution(s):

Trellix EDR/XDR

✔

Trend Micro

 

Contact(s):Trend-Licensing@ingrammicro.com

Solution(s):

EDR/XDR is available for Worry Free Services, Apex One, Deep Security,
Cloud One Workload Security, Deep Discovery, Cloud App Security, etc.

✔

VMRay

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

VMRay Detector

✔

VMware (Carbon Black)

 

Contact(s):VMware_MD_Team@ingrammicro.com

Solution(s):

VMware Carbon Black Enterprise EDR

✔

WatchGuard

 

Contact(s):WatchguardMD@ingrammicro.com

Solution(s):

Threat Detection and Response

Network Vulnerability Assessments, Penetration Tests

A network vulnerability assessment is the process of reviewing and analyzing a computer network for possible security vulnerabilities and loopholes. It is used by network administrators to evaluate the security architecture and defense of a network against possible vulnerabilities and threats.

Ingram Micro Professional Service:
Penetration Test Assessment

✔

Adlumin

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Adlumin CVS/CVM

 

✔

Arctic Wolf

 

Contact(s):ArcticWolfMD@ingrammicro.com

Solution(s):

Arctic Wolf Managed Risk

 

✔

Binary Defense

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Binary Defense

 

✔

Dell Technologies

 

Contact(s):Dell Technologies Contacts Overview

Solution(s):

Proactive Security / Pen Testing 

 

Cyber Assessments 

 

Cyber Advisory Services 

 

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

IBM’s X-Force Red Offensive Testing Services

 

✔

Ingram Micro Services

 

Contact(s):USServices@ingrammicro.com

Solution(s):

Penetration Testing

 

✔

Mandiant

 

Contact(s):Mandiant-Licensing@IngramMicro.com

Solution(s):

Mandiant Consulting Services

 

✔

NetAlly

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

– CyberScope

 

–  CyberScope Site Assesment

 

✔

Tenable

 

Contact(s):TenableTeam@ingrammicro.com

Solution(s):

Tenable Vulnerability Management

 

Tenable PCI ASV

 

Tenable Nessus

 

Security Information and Event Management (SIEM) and/or Log Management

SIEM software products and services combine Security Information Management (SIM) and Security Event Management (SEM). They provide real-time analysis of security alerts generated by network hardware and applications.

✔

ActZero

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

ActZero Managed Detection & Response (MDR) Service

 

✔

Adlumin

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Adlumin Overwatch

 

✔

Alert Logic

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Part of Alert Logic Professional & Alert Logic Enterprise offerings

✔

Alien Vault (AT&T)

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

SIEM and Log Management

✔

AppViewX

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

AppViewX Platform

 

✔

Arctic Wolf

 

Contact(s):ArcticWolfMD@ingrammicro.com

Solution(s):

Arctic Wolf Managed Detection and Response

✔

Binary Defense

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Security Information & Event Management

✔

Check Point

 

Contact(s):checkpoint-licensing@ingrammicro.com

Solution(s):

Security Management

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco Security Analytics and Logging (SAL)

Cisco Security Analytics and Logging

 

✔

Dell Technologies

 

Contact(s):Dell Technologies Contacts Overview

Solution(s):

Dell Managed Detection & Response 

 

Cyber Advisory Services 

 

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com

Solution(s):

FortiSIEM

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

QRadar

✔

Juniper

 

Contact(s):Juniper Contacts Overview
Juniper.Assist@ingrammicro.com

Solution(s):

JSA, vJSA

✔

Mandiant

 

Contact(s):Mandiant-Licensing@IngramMicro.com

Solution(s):

Mandiant Advantage Security Validation: SIEM Optimization Use Case

 

✔

Microsoft

 

Contact(s):Microsoft Contacts Overview

Solution(s):

Azure Log Analytics

✔

Palo Alto Networks

 

Contact(s):paloaltosolutions@ingrammicro.com

Solution(s):

XSIAM

 

✔

SentinelOne

 

Contact(s):SentinelOne-Licensing@ingrammicro.com

Solution(s):

Dataset

 

✔

Stellar Cyber

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Stellar Cyber Central

✔

Trellix

 

Contact(s):trellix-licensing@ingrammicro.com

Solution(s):

Trellix Enterprise Security Manager

✔

Viavi

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

GigaFlow

✔

VMware (Carbon Black)

 

Contact(s):VMware_MD_Team@ingrammicro.com

Solution(s):

LogInsight

Security Operations Center as a Service (SOCaaS) and/or Managed Detection and Responce (MDR)

SOCaaS is a subscription or software-based service that manages and monitors your logs, devices, clouds, network and assets for internal IT teams.

MDR is an advanced managed security service that provides threat intelligence, threat hunting, security monitoring, incident analysis, and incident response. This is unlike traditional MSSPs who only provide alerts from security monitoring.

Ingram Micro Professional Service:
Security Operating Center (SOC) Services

✔

ActZero

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

ActZero Managed Detection & Response (MDR) Service

 

✔

Adlumin

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Adlumin Overwatch

 

✔

Alert Logic

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Security Operations Center

Included in:
– Professional
– Enterprise

✔

Arctic Wolf

 

Contact(s):ArcticWolfMD@ingrammicro.com

Solution(s):

Arctic Wolf Managed Detection and Response

✔

Barracuda

 

Contact(s):Barracuda Contacts Overview

Solution(s):

Managed XDR

 

✔

Binary Defense

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

SOC-as-a-Service

✔

Bitdefender

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Bitdefender Managed Detection and Response (MDR)

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco MDR for:
AMP for Endpoints, Umbrella, Steathwatch Cloud and Threat Grid

Cisco Managed Detection and Response

 

✔

ConnectWise

 

Contact(s):usservices@ingrammicro.com

Solution(s):

Perch – Co-managed threat detection and response

✔

Dell Technologies

 

Contact(s):Dell Technologies Contacts Overview

Solution(s):

Dell Managed Detection & Response 

 

✔

ESET

 

Contact(s):ESET Contacts Overview
NSX-Sales@ingrammicro.com

Solution(s):

ESET Protect MDR

✔

F5

 

Contact(s):F5-Team@ingrammicro.com

Solution(s):

Silverline Managed Security Services

✔

Foresite

 

Contact(s):USServices@ingrammicro.com

Solution(s):

Security Monitoring & Alerting

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com

Solution(s):

FortiGuard MDR

 

FortiGuard SOCaaS

 

✔

Ingram Micro Services

 

Contact(s):USServices@ingrammicro.com

Solution(s):

Security Operating Center (SOC) Services

✔

Mandiant

 

Contact(s):Mandiant-Licensing@IngramMicro.com

Solution(s):

Mandiant Managed Defense

 

✔

Palo Alto Networks

 

Contact(s):paloaltosolutions@ingrammicro.com

Solution(s):

PAN MDR

 

✔

SentinelOne

 

Contact(s):SentinelOne-Licensing@ingrammicro.com

Solution(s):

Vigilance Respond

 

✔

Sophos

 

Contact(s):sophos-licensing@ingrammicro.com

Solution(s):

Sophos Managed Threat Response

✔

Trellix

 

Contact(s):trellix-licensing@ingrammicro.com

Solution(s):

Trellix EDR/XDR

✔

Trend Micro

 

Contact(s):Trend-Licensing@ingrammicro.com

Solution(s):

Trend Micro Managed Detection and Response

✔

VMware (Carbon Black)

 

Contact(s):VMware_MD_Team@ingrammicro.com

Solution(s):

Carbon Black Cloud Managed Detection

User and Entity Behavior Analytics (UEBA)

UEBA solutions use analytics to build the standard profiles and behaviors of users and entities (hosts, applications, network traffic and data repositories) across time and peer group horizons. Activity that is anomalous to these standard baselines is presented as suspicious, and packaged analytics applied on these anomalies can help discover threats and potential incidents. The most common use cases sought by enterprises are detecting malicious insiders and external attackers infiltrating their organizations (compromised insiders)

✔

Adlumin

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Adlumin UEBA

 

✔

Alert Logic

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

User behavior anomaly detection

Included in:
– Professional
– Enterprise

✔

Binary Defense

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Binary Defense

 

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco Secure Network Analytics (Enterprise)

 

Cisco Secure Network Analytics (Cloud)

 

Cisco Cloudlock

 

✔

ESET

 

Contact(s):ESET Contacts Overview
NSX-Sales@ingrammicro.com

Solution(s):

Safetica NXT / Safetica ONE

✔

Forcepoint

 

Contact(s):Forcepoint-Licensing@ingrammicro.com

Solution(s):

UEBA Behavioral Analytics

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com

Solution(s):

FortiInsight

✔

HPE (Aruba Networks)

 

Contact(s):HPEAruba@ingrammicro.com

Solution(s):

Aruba IntroSpect

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

User Behavior Analytics (Qradar App that is available once you install Qradar)

✔

Microsoft

 

Contact(s):Microsoft Contacts Overview

Solution(s):

User Behavior Analytics Tools for Application Insights

✔

Palo Alto Networks

 

Contact(s):paloaltosolutions@ingrammicro.com

Solution(s):

Cortex XDR

✔

Stellar Cyber

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Stellar Cyber Central

✔

Viavi

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

GigaFlow

✔

VMware (Carbon Black)

 

Contact(s):VMware_MD_Team@ingrammicro.com

Solution(s):

vSphere Platinum & AppDefense

Respond

The Respond category of the NIST Cybersecurity Framework focuses on developing and implementing activities to take action regarding detected cybersecurity incidents. It includes Response Planning, Communications, Analysis, Mitigation, and Improvements. These areas ensure that organizations can effectively contain the impact of cybersecurity incidents, coordinate response efforts, analyze incidents to support recovery, and implement improvements to prevent future incidents.

Forensic Analysis

Forensic analysis is the examination of structured data with regard to incidents with the aim of discovering and analyzing patterns of fraudulent activities.

✔

Acronis

 

Contact(s):Acronis-Cloud@ingrammicro.com

Solution(s):

Acronis Cyber Protect

 

✔

Adlumin

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Adlumin Overwatch

 

✔

Alien Vault (AT&T)

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Security Log Analysis & Management

✔

Arctic Wolf

 

Contact(s):ArcticWolfMD@ingrammicro.com

Solution(s):

Arctic Wolf Incident Response

 

✔

Binary Defense

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

SOC-as-a-Service

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco Secure Network Analytics (Enterprise)

 

Cisco Secure Network Analytics (Cloud)

 

Cisco Umbrella Investigate

 

✔

Cofense

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Cofense Vision

✔

Dell Technologies

 

Contact(s):Dell Technologies Contacts Overview

Solution(s):

Incident Response Retainer and Emergency IR 

 

✔

ESET

 

Contact(s):ESET Contacts Overview
NSX-Sales@ingrammicro.com

Solution(s):

ESET Security Services

 

✔

Forcepoint

 

Contact(s):Forcepoint-Licensing@ingrammicro.com

Solution(s):

Forcepoint UEBA

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com

Solution(s):

FortiInsight

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

Qradar Incident Forensics

✔

Juniper

 

Contact(s):Juniper Contacts Overview
Juniper.Assist@ingrammicro.com

Solution(s):

Sky ATP, ATP Appliance

✔

Mandiant

 

Contact(s):Mandiant-Licensing@IngramMicro.com

Solution(s):

Mandiant Advantage Threat Intelligence

 

✔

NetAlly

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

– CyberScope

 

✔

Palo Alto Networks

 

Contact(s):paloaltosolutions@ingrammicro.com

Solution(s):

XDR

 

✔

SentinelOne

 

Contact(s):SentinelOne-Licensing@ingrammicro.com

Solution(s):

Vigilance Respond Pro

 

✔

Stellar Cyber

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Stellar Cyber Central

✔

Trellix

 

Contact(s):trellix-licensing@ingrammicro.com

Solution(s):

Trellix EDR/XDR

✔

Trend Micro

 

Contact(s):Trend-Licensing@ingrammicro.com

Solution(s):

Trend Micro Managed Detection and Response

✔

Veritas

 

Contact(s):veritas-licensing@ingrammicro.com

Solution(s):

Veritas Data Insight

✔

Viavi

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

GigaFlow/GigaStor

✔

VMRay

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

VMRay Analyzer

Incident Response

Incident Response is an organized approach to addressing and managing the aftermath of a security breach or attack. The goal is to handle the situation in a way that limits damage and reduces recovery time and costs.

✔

ActZero

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

ActZero Managed Detection & Response (MDR) Service

 

✔

Adlumin

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Adlumin Overwatch

 

✔

Alien Vault (AT&T)

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

USM Anywhere

✔

Arctic Wolf

 

Contact(s):ArcticWolfMD@ingrammicro.com

Solution(s):

Arctic Wolf Incident Response

 

✔

Binary Defense

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

SOC-as-a-Service

✔

Bitdefender

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Managed Endpoint Detection and Response Service (MEDR)

✔

Check Point

 

Contact(s):checkpoint-licensing@ingrammicro.com

Solution(s):

Check Point Incident Response (Professional Service)
Can be offered as a post-incident service or pre-billed hours.

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco Incident Response Team

Cisco Talos Incident Response

 

✔

Cofense

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Cofense Triage

✔

Dell Technologies

 

Contact(s):Dell Technologies Contacts Overview

Solution(s):

Incident Response Retainer and Emergency IR 

 

✔

ESET

 

Contact(s):ESET Contacts Overview
NSX-Sales@ingrammicro.com

Solution(s):

ESET Security Services

 

✔

F5

 

Contact(s):F5-Team@ingrammicro.com

Solution(s):

Silverline Managed Security Services

✔

Forcepoint

 

Contact(s):Forcepoint-Licensing@ingrammicro.com

Solution(s):

Forcepoint DLP

✔

Foresite

 

Contact(s):USServices@ingrammicro.com

Solution(s):

Foresite’s managed incident response

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com

Solution(s):

FortiGuard Incident Response Service

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

Resilient

IBM’s X-Force Incident Response 

 

✔

Juniper

 

Contact(s):Juniper Contacts Overview
Juniper.Assist@ingrammicro.com

Solution(s):

JSA, vJSA

✔

Mandiant

 

Contact(s):Mandiant-Licensing@IngramMicro.com

Solution(s):

Mandiant IR Services

 

✔

Palo Alto Networks

 

Contact(s):paloaltosolutions@ingrammicro.com

Solution(s):

Cortex XSOAR

✔

SentinelOne

 

Contact(s):SentinelOne-Licensing@ingrammicro.com

Solution(s):

Vigilance Respond Pro

 

✔

Sophos

 

Contact(s):sophos-licensing@ingrammicro.com

Solution(s):

Sophos MTR

✔

Trellix

 

Contact(s):trellix-licensing@ingrammicro.com

Solution(s):

Trellix EDR/XDR

✔

Trend Micro

 

Contact(s):Trend-Licensing@ingrammicro.com

Solution(s):

Trend Micro Managed Detection and Response

✔

Viavi

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

GigaFlow/GigaStor

✔

VMRay

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

VMRay Analyzer

✔

VMware (Carbon Black)

 

Contact(s):VMware_MD_Team@ingrammicro.com

Solution(s):

VMware Carbon Black Audit and Remediation

Orchestration, Automation and Response (SOAR) and/or Automation Components

SOAR is a method of integrating and streamlining workflows across disparate tools in order to improve both security analyst efficiency and threat detection and response. Security automation is used to execute security operations tasks without human intervention.

✔

ActZero

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

ActZero Managed Detection & Response (MDR) Service

 

✔

Adlumin

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Adlumin Overwatch

 

✔

Alien Vault (AT&T)

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

USM Anywhere
(Security Automation & Orchestration)

✔

AppViewX

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

AppViewX Platform

 

✔

Arctic Wolf

 

Contact(s):ArcticWolfMD@ingrammicro.com

Solution(s):

Revelstoke Soar

 

✔

Binary Defense

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Security Information & Event Management

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

SecureX

Cisco SecureX

 

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com

Solution(s):

FortiSOAR

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

Cloud Pak for Security (CP4S)

✔

Palo Alto Networks

 

Contact(s):paloaltosolutions@ingrammicro.com

Solution(s):

Cortex XSOAR

✔

Stellar Cyber

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Stellar Cyber Central

✔

Vicarius

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Vicarius TOPIA

Patch Management

Managing patches or upgrades for software applications and technologies.

✔

Acronis

 

Contact(s):Acronis-Cloud@ingrammicro.com

Solution(s):

Acronis Cyber Protect

 

✔

Adlumin

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Adlumin Overwatch

 

✔

AppViewX

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

AppViewX Platform

 

✔

Avast

 

Contact(s):sporders@avast.com

Solution(s):

Managed Workplace

✔

Bitdefender

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

add on for GravityZone Endpoint

✔

ConnectWise

 

Contact(s):usservices@ingrammicro.com

Solution(s):

Automate

✔

Dell Technologies

 

Contact(s):Dell Technologies Contacts Overview

Solution(s):

Cyber Advisory Services 

 

✔

Foresite

 

Contact(s):USServices@ingrammicro.com

Solution(s):

Foresite’s Vulnerability and Patch Management

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com

Solution(s):

FortiClient with EMS

✔

HCLSoftware

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

HCL BigFix

 

✔

Ivanti

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Ivanti Neurons for Patch Management

✔

Mandiant

 

Contact(s):Mandiant-Licensing@IngramMicro.com

Solution(s):

Mandiant Advantage Threat Intelligence: Vulnerability Management

 

✔

Microsoft

 

Contact(s):Microsoft Contacts Overview

Solution(s):

System Center Configuration Manager

✔

Trend Micro

 

Contact(s):Trend-Licensing@ingrammicro.com

Solution(s):

Apex One & TippingPoint

✔

Vicarius

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Vicarius TOPIA

Remote Monitoring and Management (RMM)

RMM technology gives IT service providers the ability to manage more clients than traditional break/fix IT providers, and to do so more efficiently. Through RMM, technicians can remotely install software and updates, administer patches, and more – and this can often all be done from a single, unified dashboard. Technicians can administer tasks simultaneously to many computers at once, and no longer have to travel from office to office to handle routine maintenance.

✔

Adlumin

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Adlumin Overwatch

 

✔

ConnectWise

 

Contact(s):usservices@ingrammicro.com

Solution(s):

ConnectWise Automate

✔

Dell Technologies

 

Contact(s):Dell Technologies Contacts Overview

Solution(s):

Cyber Advisory Services 

 

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com

Solution(s):

FortiSRA

 

✔

HCLSoftware

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

HCL BigFix Compliance

 

✔

Mandiant

 

Contact(s):Mandiant-Licensing@IngramMicro.com

Solution(s):

Mandiant Managed Defense

 

✔

TeamViewer

 

Contact(s):USCloud@IngramMicro.com

Solution(s):

TeamViewer Remote Management

Recover

The Recover category of the NIST Cybersecurity Framework focuses on maintaining plans for resilience and restoring capabilities or services impaired by cybersecurity incidents. It includes Recovery Planning, Improvements, and Communications. These areas ensure that organizations can quickly return to normal operations, reduce the impact of incidents, and implement lessons learned to enhance future resilience.

Backup, Recovery (DR) & Data Protection

Backups are copies of data that are made in order to restore in case of a loss. This is a more advanced form of system copies, and modern solutions often include processing capabilities and extra features such as:

  • Immutability – to prevent threat actors from encrypting data and locking you out of your backups
  • Unified management – to access and manage your backups across multiple environments with ease
  • The ability to backup to physical storage or the cloud

Disaster Recovery refers to the process of returning to standard operation after an event or loss of data. DR solutions often include ways to quickly stage recent backups and methods by which to orchestrate recovery plans in order to restore mission critical data and functions as efficiently as possible.

Ingram Micro Professional Service:
Backup and Disaster Recovery Services

✔

Acronis

 

Contact(s):Acronis-Cloud@ingrammicro.com

Solution(s):

Acronis Cyber Protect

 

Acronis Cloud Disaster Recovery Service for Service Providers

 

✔

Arcserve

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Unified Data Protection (UDP)

✔

Avast

 

Contact(s):sporders@avast.com

Solution(s):

CloudCare, Managed Workplace

✔

Axcient

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

x360Recover

 

✔

Barracuda

 

Contact(s):Barracuda Contacts Overview

Solution(s):

Cloud to Cloud Backup for Microsoft 365

 

✔

Citrix

 

Contact(s):CitrixMD@ingrammicro.com

Solution(s):

Citrix ADC

✔

CrashPlan

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

CrashPlan

 

✔

CyberFortress

 

Contact(s):OffsiteDataSync-Licensing@ingrammicro.com

Solution(s):

Veam Cloud Connect: Backup & Replication with Disaster Recovery

✔

Dell Technologies

 

Contact(s):Dell Technologies Contacts Overview

Solution(s):

Integrated Data Protection Appliance

 

PowerProtect DD Series Appliances

 

Dell Data Protection Suite

 

PowerProtect Cyber Recovery

 

Dell RecoverPoint

 

Cyber Vault 

 

✔

F5

 

Contact(s):F5-Team@ingrammicro.com

Solution(s):

BIG-IP DNS, BIG-IP Local Traffic Manager

✔

HPE (Aruba Networks)

 

Contact(s):HPEAruba@ingrammicro.com

Solution(s):

HPE StoreOnce & StoreEver

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

Spectrum Protect

✔

Ingram Micro Services

 

Contact(s):USServices@ingrammicro.com

Solution(s):

Backup and Disaster Recovery Services

✔

KeepIt

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Keepit Dedicated Cloud / SaaS Data Protection

 

✔

Microsoft

 

Contact(s):Microsoft Contacts Overview

Solution(s):

Azure Backup, Azure Site Recovery

✔

Mimecast

 

Contact(s):Mimecast-Licensing@ingrammicro.com

Solution(s):

Email Backup & Recovery

✔

Rubrik

 

Contact(s):rubrik-licensing-us@ingrammicro.com

Solution(s):

Rubrik Data Backup & Recovery Software

 

✔

Veeam

 

Contact(s):VeeamMD@ingrammicro.com

Solution(s):

Backup & Replication, Cloud Connect, Backup Essentials, Availability Suite

✔

Veritas

 

Contact(s):veritas-licensing@ingrammicro.com

Solution(s):

Netbackup – Enterprise, Backup Exec – SMB, System Recovery – Home Office

✔

VMware (Carbon Black)

 

Contact(s):VMware_MD_Team@ingrammicro.com

Solution(s):

Site Recovery Manager

Data Archiving

Data Archiving is the process of moving data that is no longer actively used to a separate storage device for long-term retention.

✔

Arcserve

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Unified Data Protection (UDP)

✔

Axcient

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

x360Recover

 

✔

CrashPlan

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

CrashPlan

 

✔

Dell Technologies

 

Contact(s):Dell Technologies Contacts Overview

Solution(s):

Integrated Data Protection Appliance

 

PowerProtect DD Series Appliances

 

Dell Data Protection Suite

 

Cyber Vault 

 

✔

HPE (Aruba Networks)

 

Contact(s):HPEAruba@ingrammicro.com

Solution(s):

HPE StoreEver

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

IBM Content Collector for File Systems

✔

Intermedia

 

Contact(s):USCloud@IngramMicro.com

Solution(s):

SecuriSync

✔

Mimecast

 

Contact(s):Mimecast-Licensing@ingrammicro.com

Solution(s):

Enterprise Information Archive

✔

Proofpoint

 

Contact(s):Proofpoint-Licensing@ingrammicro.com

Solution(s):

Information Archiving

✔

Veeam

 

Contact(s):VeeamMD@ingrammicro.com

Solution(s):

Backup & Replication

✔

Veritas

 

Contact(s):veritas-licensing@ingrammicro.com

Solution(s):

Netbackup, Backup Exec, Enterprise Vault

Device Deployment and Imaging

Deployment and Imaging solutions allow for faster recovery and deployemnt time to get back up and running if a disaster such as ransomware were to occur.

✔

Acronis

 

Contact(s):Acronis-Cloud@ingrammicro.com

Solution(s):

Snap Deploy

✔

CrashPlan

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

CrashPlan

 

✔

HCLSoftware

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

HCL BigFix Enterprise+

 

✔

Veeam

 

Contact(s):VeeamMD@ingrammicro.com

Solution(s):

Veeam Backup & Replication

Email Archiving

Email Archiving is the process of archiving cloud or on-premise email soltuions for recovery due to outtage, legal hold, and/or malicious attacks.

✔

Acronis

 

Contact(s):Acronis-Cloud@ingrammicro.com

Solution(s):

Acronis Backup for O365

✔

Arcserve

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Unified Data Protection (UDP) Archiving

✔

Axcient

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

X360Cloud

 

✔

Citrix

 

Contact(s):CitrixMD@ingrammicro.com

Solution(s):

Sharefile

✔

CrashPlan

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

CrashPlan

 

✔

CyberFortress

 

Contact(s):OffsiteDataSync-Licensing@ingrammicro.com

Solution(s):

Backup for Office 365 – Cloud to Cloud

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com

Solution(s):

FortiMail

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

IBM Content Collector for Email

✔

Intermedia

 

Contact(s):USCloud@IngramMicro.com

Solution(s):

Email Archiving

✔

Microsoft

 

Contact(s):Microsoft Contacts Overview

Solution(s):

Exchange Online Archiving, Azure Information Protection

✔

Mimecast

 

Contact(s):Mimecast-Licensing@ingrammicro.com

Solution(s):

Enterprise Information Archive

✔

Proofpoint

 

Contact(s):Proofpoint-Licensing@ingrammicro.com

Solution(s):

– Proofpoint Enterprise Archive
– Proofpoint Essentials Pro

✔

Veritas

 

Contact(s):veritas-licensing@ingrammicro.com

Solution(s):

High Availability and/or Continuity

This refers to solutions dedicated to high availability and business continuity.

Some features may include:
– Replication (Periodic, Multi-Stream, etc.)
– Compression
– Offline synchronization
– Email Continuity

✔

Arcserve

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

ArcServe RHA

✔

Axcient

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

x360Recover

 

✔

Citrix

 

Contact(s):CitrixMD@ingrammicro.com

Solution(s):

Citrix ADC

✔

CrashPlan

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

CrashPlan

 

✔

Dell Technologies

 

Contact(s):Dell Technologies Contacts Overview

Solution(s):

Dell Unity XT Unified Storage Solution

 

PowerMax NVMe Storage

 

VMAX All Flash Storage

 

Dell EMC Isilon and ECS Storage for Media and Entertainment

 

Dell ECS Enterprise Object Storage

 

Dell VxRail Hyperconverged Infrastructure

 

Dell VxRack System FLEX

 

VxBlock Converged Infrastructure

 

Dell RecoverPoint

 

Cyber Vault 

 

✔

F5

 

Contact(s):F5-Team@ingrammicro.com

Solution(s):

BIG-IP DNS, BIG-IP Local Traffic Manager

✔

Forcepoint

 

Contact(s):Forcepoint-Licensing@ingrammicro.com

Solution(s):

Multiple

✔

HPE (Aruba Networks)

 

Contact(s):HPEAruba@ingrammicro.com

Solution(s):

✔

KeepIt

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Keepit Dedicated Cloud / SaaS Data Protection

 

✔

Mimecast

 

Contact(s):Mimecast-Licensing@ingrammicro.com

Solution(s):

Email Continuity

✔

Proofpoint

 

Contact(s):Proofpoint-Licensing@ingrammicro.com

Solution(s):

– Proofpoint E-Mail Protection (PPS)
– Proofpoint Essentials

✔

SonicWall

 

Contact(s):SonicWall-Renewals@ingrammicro.com

Solution(s):

Email Continuity

✔

Sophos

 

Contact(s):sophos-licensing@ingrammicro.com

Solution(s):

Email Security

✔

Trend Micro

 

Contact(s):Trend-Licensing@ingrammicro.com

Solution(s):

Email Security Advanced

✔

Veeam

 

Contact(s):VeeamMD@ingrammicro.com

Solution(s):

Availability Suite

✔

Veritas

 

Contact(s):veritas-licensing@ingrammicro.com

Solution(s):

Backup Exec with CASO license, Netbackup

✔

VMware (Carbon Black)

 

Contact(s):VMware_MD_Team@ingrammicro.com

Solution(s):

Site Recovery Manager

Out-of-Band Management (OOBM)

OOBM provides access and control of IT assets outside of the production network.

✔

AppViewX

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

ADC+

 

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com

Solution(s):

FortiExtender
(Intended for use with FortiGate Firewalls)

✔

Lantronix

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

– Branch Office Managers
– Console Managers

✔

Opengear

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

– Data center OOB
– Remote Site OOB

Other

GenAI – Integrated & Generative AI

Integrated AI refers to Artificial Intelligence technology that is embedded and leveraged within existing security solutions, to improve or enhance the solution using this new, emerging technology. This includes machine learning, deep learning, artificial intelligence, and generative AI technologies.

Generative AI (GenAI) are deep-learning models capable of generating new content in a variety of mediums, such as images and text. These capabilities have enabled new use cases for AI technology integrated into vendor products and portfolios such as querying data in natural language, providing explanations, making suggestions, and providing guided workflows to accomplish tasks.

✔

Balbix

 

Contact(s):USCloud@ingrammicro.com

Solution(s):

Balbix AI

 

✔

F5

 

Contact(s):F5-Team@ingrammicro.com

Solution(s):

Distribute, Optimize and Secure Your AI Workloads with F5

 

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com

Solution(s):

Fortinet Advisor

 

✔

HCLSoftware

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

HCL BigFix AEX

 

✔

Juniper

 

Contact(s):Juniper Contacts Overview
Juniper.Assist@ingrammicro.com

Solution(s):

Marvis Virtual Network Assistant

 

✔

Microsoft

 

Contact(s):Microsoft Contacts Overview

Solution(s):

Security Copilot

 

✔

Rubrik

 

Contact(s):rubrik-licensing-us@ingrammicro.com

Solution(s):

Ruby

 

✔

SentinelOne

 

Contact(s):SentinelOne-Licensing@ingrammicro.com

Solution(s):

Purple AI

 

✔

Tenable

 

Contact(s):TenableTeam@ingrammicro.com

Solution(s):

Exposure AI

 

✔

Trellix

 

Contact(s):trellix-licensing@ingrammicro.com

Solution(s):

AI and Security Operations

 

✔

Trend Micro

 

Contact(s):Trend-Licensing@ingrammicro.com

Solution(s):

Trend Vision One™ – Companion

 

Help Desk & Ticketing Software

Help desk software refers to a computer program that enables customer-care operators to keep track of user requests and deal with other customer-care-related issues. It is what makes customer-care service efficient and enterprising.

A ticketing system is a software program that a customer support team uses to create, manage, and maintain a list (or lists) of customer problems.

✔

ConnectWise

 

Contact(s):usservices@ingrammicro.com

Solution(s):

ConnectWise Manage Help Desk

✔

Dell Technologies

 

Contact(s):Dell Technologies Contacts Overview

Solution(s):

Cyber Advisory Services 

 

✔

HCLSoftware

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

HCL BigFix Product Family

 

✔

Ivanti

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Ivanti Neurons for ITSM

IoT, Sensors, Beacons, and Analytics

Includes IoT devices, location beacons, IoT type sensors, and various analytics

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco DNA Spaces IoT, Cisco Kinetic

Cisco Spaces for IoT

 

Cisco IoT Operations Dashboard

 

✔

Dell Technologies

 

Contact(s):Dell Technologies Contacts Overview

Solution(s):

Cyber Advisory Services 

 

✔

Halo Detect (Motorola)

 

Contact(s):sba-operations@ingrammicro.com

Solution(s):

Halo Smart Sensor

 

✔

HPE (Aruba Networks)

 

Contact(s):HPEAruba@ingrammicro.com

Solution(s):

Aruba Bluetooth Beacons & Tags

✔

Mandiant

 

Contact(s):Mandiant-Licensing@IngramMicro.com

Solution(s):

Mandiant Consulting Services (ICS)

 

✔

NetAlly

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

– CyberScope

 

– EtherScope nXG

 

–  Aircheck G3

 

✔

Palo Alto Networks

 

Contact(s):paloaltosolutions@ingrammicro.com

Solution(s):

IoT

 

✔

Rhombus

 

Contact(s):sba-operations@ingrammicro.com

Solution(s):

Cloud-Managed Sensors

 

✔

SentinelOne

 

Contact(s):SentinelOne-Licensing@ingrammicro.com

Solution(s):

Singularity Ranger IoT

 

✔

Trellix

 

Contact(s):trellix-licensing@ingrammicro.com

Solution(s):

Trellix Change Control

✔

Trend Micro

 

Contact(s):Trend-Licensing@ingrammicro.com

Solution(s):

EdgeFire & TXOne

✔

Ubiquiti

 

Contact(s):Ubiquiti@ingrammicro.com

Solution(s):

UniFi LED

Network Switching and POE Systems

Includes Networking Switches, Industial Switches, other core networking equipment, and POE systems.

✔

Allied Telesis

 

Contact(s):AlliedTelesis@ingrammicro.com

Solution(s):

-Enterprise
– SMB
– Industrial

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco Catalyst

 

Cisco Nexus

 

✔

Dell Technologies

 

Contact(s):Dell Technologies Contacts Overview

Solution(s):

Dell Network Switches

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com

Solution(s):

Secure Ethernet Switching

✔

HPE (Aruba Networks)

 

Contact(s):HPEAruba@ingrammicro.com

Solution(s):

Aruba Switches

✔

Juniper

 

Contact(s):Juniper Contacts Overview
Juniper.Assist@ingrammicro.com

Solution(s):

Juniper Network Switches

✔

Meraki (Cisco)

 

Contact(s):Meraki (Cisco) Contacts Overview

Solution(s):

Meraki Cloud Managed Switches

Meraki Switches

 

✔

SonicWall

 

Contact(s):SonicWall-Renewals@ingrammicro.com

Solution(s):

SonicWall Switches

✔

Ubiquiti

 

Contact(s):Ubiquiti@ingrammicro.com

Solution(s):

– UniFi Switch
– EdgeSwitch

✔

Zyxel

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Zyxel Switches

OT – Operational Technology Security

Operational Technology (OT) & Industrial control systems (ICS) often present a sitting target for cybercriminals. The majority of these systems monitor complex industrial processes and critical infrastructures that deliver power, water, transport, manufacturing and other essential services.

✔

Check Point

 

Contact(s):checkpoint-licensing@ingrammicro.com

Solution(s):

Checkpoint ICS Solutions

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco Cyber Vision

Cisco Cybervision

 

Cisco Secure Firewall ISA 3000

 

✔

Forcepoint

 

Contact(s):Forcepoint-Licensing@ingrammicro.com

Solution(s):

Next Generation Firewall

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com

Solution(s):

Securing Critical Infrastructure with Fortinet

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

Operational Technology Security

✔

Mandiant

 

Contact(s):Mandiant-Licensing@IngramMicro.com

Solution(s):

Mandiant Consulting Services

 

✔

Palo Alto Networks

 

Contact(s):paloaltosolutions@ingrammicro.com

Solution(s):

OT Security

 

✔

Tenable

 

Contact(s):TenableTeam@ingrammicro.com

Solution(s):

Tenable OT Security

 

✔

Trellix

 

Contact(s):trellix-licensing@ingrammicro.com

Solution(s):

Trellix Embedded Control

✔

Trend Micro

 

Contact(s):Trend-Licensing@ingrammicro.com

Solution(s):

SafeLock

PSA – Professional Services Automation

A PSA, or professional services automation tool, is a solution that is commonly used to assist in running a services-led company. By design, these tools implement an automated workflow, which connects every area of your business and prevents disarray. By utilizing a PSA tool, you’ll have total visibility into every aspect of your business, reduce redundant tasks, and boost efficiency.

✔

CloudBlue

 

Contact(s):USServices@ingrammicro.com

Solution(s):

CloudBlue PSA

 

✔

ConnectWise

 

Contact(s):usservices@ingrammicro.com

Solution(s):

Manage

Info

ARR / MRR – Recurring Revenue Offering(s)

This vendor or partner offers products, services, or solutions leveraging a recurring revenue (i.e., software subscription) model.

✔

Acronis

 

Contact(s):Acronis-Cloud@ingrammicro.com

Solution(s):

Acronis Cloud Marketplace

 

✔

Alert Logic

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Alert Logic Cloud Marketplace

 

✔

Arcserve

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Arcserve Cloud Marketplace

 

✔

Arctic Wolf

 

Contact(s):ArcticWolfMD@ingrammicro.com

Solution(s):

Arctic Wolf for MSP partners

 

✔

Avast

 

Contact(s):sporders@avast.com

Solution(s):

Avast Cloud Marketplace

 

✔

AvePoint

 

Contact(s):Avepoint@ingrammicro.com

Solution(s):

AvePoint Cloud Marketplace

 

✔

Axcient

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Axcient Cloud Marketplace

 

✔

Balbix

 

Contact(s):USCloud@ingrammicro.com

Solution(s):

Balbix Cloud Marketplace

 

✔

Bitdefender

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Bitdefender Cloud Marketplace

 

✔

Check Point

 

Contact(s):checkpoint-licensing@ingrammicro.com

Solution(s):

Check Point Cloud Marketplace

 

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Cisco Cloud Marketplace

 

✔

CloudBlue

 

Contact(s):USServices@ingrammicro.com

Solution(s):

CloudBlue Cloud Marketplace

 

✔

ConnectWise

 

Contact(s):usservices@ingrammicro.com

Solution(s):

ConnectWise Cloud Marketplace

 

✔

CrashPlan

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

CrashPlan

 

✔

DigiCert

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

DigiCert Cloud Marketplace

 

✔

ESET

 

Contact(s):ESET Contacts Overview
NSX-Sales@ingrammicro.com

Solution(s):

ESET Cloud Marketplace

 

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com

Solution(s):

Fortinet Cloud Marketplace

 

✔

HCLSoftware

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

HCL Partner Connect

 

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

IBM Cloud Marketplace

 

✔

Ingram Micro Services

 

Contact(s):USServices@ingrammicro.com

Solution(s):

Ingram Micro Services Cloud Marketplace

 

✔

Interguard Software

 

Contact(s):USCloud@ingrammicro.com

Solution(s):

Interguard Software Cloudmarketplace

 

✔

Intermedia

 

Contact(s):USCloud@IngramMicro.com

Solution(s):

Intermedia Cloud Marketplace

 

✔

ITsMine

 

Contact(s):USCloud@ingrammicro.com

Solution(s):

ITsMine Cloud Marketplace

 

✔

Microsoft

 

Contact(s):Microsoft Contacts Overview

Solution(s):

Microsoft Cloud Marketplace

 

✔

Mimecast

 

Contact(s):Mimecast-Licensing@ingrammicro.com

Solution(s):

Mimecast Cloud Marketplace

 

✔

NS8

 

Contact(s):USCloud@IngramMicro.com

Solution(s):

NS8 Cloud Marketplace

 

✔

PKWARE

 

Contact(s):PKWare@ingrammicro.com

Solution(s):

PKWARE Cloud Marketplace

 

✔

Proofpoint

 

Contact(s):Proofpoint-Licensing@ingrammicro.com

Solution(s):

Proofpoint Cloud Marketplace

 

✔

QS Solutions

 

Contact(s):USCloud@ingrammicro.com

Solution(s):

QS Solutions Cloud Marketplace

 

✔

RMail

 

Contact(s):USCloud@ingrammicro.com

Solution(s):

RMail Cloud Marketplace

 

✔

Sophos

 

Contact(s):sophos-licensing@ingrammicro.com

Solution(s):

Sophos Cloud Marketplace

 

✔

SyncDog

 

Contact(s):USCloud@IngramMicro.com

Solution(s):

SyncDog Cloud Marketplace

 

✔

TeamViewer

 

Contact(s):USCloud@IngramMicro.com

Solution(s):

TeamViewer Cloud Marketplace

 

✔

Trellix

 

Contact(s):trellix-licensing@ingrammicro.com

Solution(s):

Trellix Cloud Marketplace

 

✔

Trend Micro

 

Contact(s):Trend-Licensing@ingrammicro.com

Solution(s):

Trend Micro Cloud Marketplace

 

✔

V-Key

 

Contact(s):USCloud@ingrammicro.com

Solution(s):

V-Key Cloud Marketplace

 

✔

Veeam

 

Contact(s):VeeamMD@ingrammicro.com

Solution(s):

Veeam Cloud Marketplace

 

✔

Veritas

 

Contact(s):veritas-licensing@ingrammicro.com

Solution(s):

Veritas Cloud Marketplace

 

✔

VMware (Carbon Black)

 

Contact(s):VMware_MD_Team@ingrammicro.com

Solution(s):

VMware (Carbon Black) Cloud Marketplace

 

✔

Zerospam

 

Contact(s):USCloud@IngramMicro.com

Solution(s):

Zerospam Cloud Marketplace

 

Emerging Vendor

To qualify as an emerging vendor, a software, hardware or solution provider must meet the following criteria:

  • New—It could be a startup company or just new to the channel or IT distribution.
  • Complementary—The vendor must offer complementary features to the products and services our partners are already offering.
  • Value—Ingram Micro selected these vendors because of the exceptional value they provide to your customers in solving their business challenges.

✔

ActZero

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

ActZero EBG

 

✔

Adlumin

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Adlumin EBG

 

✔

AppViewX

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

AppViewX EBG

 

✔

Arctic Wolf

 

Contact(s):ArcticWolfMD@ingrammicro.com

Solution(s):

Arctic Wolf EBG

 

✔

Atakama

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Atakama EBG

 

✔

BeyondTrust

 

Contact(s):BeyondTrust@ingrammicro.com

Solution(s):

BeyondTrust

 

✔

Binary Defense

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Binary Defense

 

Binary Defense

 

✔

Bitdefender

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Bitdefender

 

✔

Blancco

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Blancco

 

✔

CrashPlan

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

CrashPlan

 

✔

Evidian (Atos)

 

Contact(s):Evidian-Licensing@ingrammicro.com

Solution(s):

Evidian EBG

 

✔

HCLSoftware

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

HCL Partner Connect

 

✔

iboss

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

iBoss EBG

 

✔

Lookout

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Lookout EBG

 

✔

Mandiant

 

Contact(s):Mandiant-Licensing@IngramMicro.com

Solution(s):

Mandiant EBG

 

✔

NETSCOUT

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

NETSCOUT EBG

 

✔

Opengear

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Opengear EBG

 

✔

OPSWAT

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

OPSWAT EBG

 

✔

PKWARE

 

Contact(s):PKWare@ingrammicro.com

Solution(s):

PKWARE EBG

 

✔

SkyhighSecurity

 

Contact(s):Skyhigh-Licensing@ingrammicro.com

Solution(s):

SkyhighSecurity EBG

 

✔

Stellar Cyber

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Stellar Cyber EBG

 

Stellar Cyber Ingram Exclusive

 

✔

Viavi

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Viavi EBG

 

✔

Vicarius

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Vicarius EBG

 

✔

VMRay

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

VMRay EBG

 

✔

Yubico

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Yubico EBG

 

Ingram Micro Exclusive

This vendor or partner is exclusively sold through Ingram Micro.

✔

Adlumin

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Adlumin Ingram Exclusive

 

✔

Appgate

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

✔

AppViewX

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

✔

Arctic Wolf

 

Contact(s):ArcticWolfMD@ingrammicro.com

Solution(s):

IM Exclusive

 

✔

Atakama

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

✔

BeyondTrust

 

Contact(s):BeyondTrust@ingrammicro.com

Solution(s):

✔

Binary Defense

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

✔

Blancco

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

✔

Evidian (Atos)

 

Contact(s):Evidian-Licensing@ingrammicro.com

Solution(s):

✔

Halo Detect (Motorola)

 

Contact(s):sba-operations@ingrammicro.com

Solution(s):

Motorola / IPVideo / Halo Detect

 

✔

HCLSoftware

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

HCL Partner Connect

 

✔

iboss

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

iboss Ingram Exclusive

 

✔

Ingram Micro Services

 

Contact(s):USServices@ingrammicro.com

Solution(s):

✔

Lookout

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

✔

Mandiant

 

Contact(s):Mandiant-Licensing@IngramMicro.com

Solution(s):

Mandiant Ingram Exclusive

 

✔

Mimecast

 

Contact(s):Mimecast-Licensing@ingrammicro.com

Solution(s):

✔

NETSCOUT

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

✔

Rhombus

 

Contact(s):sba-operations@ingrammicro.com

Solution(s):

✔

Tenable

 

Contact(s):TenableTeam@ingrammicro.com

Solution(s):

✔

Vicarius

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Vicarius Ingram Exclusive

 

✔

VMRay

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

VMRay Ingram Exclusive

 

Managed Service Provider Offerings (MSP/MSSP)

Service Provider offerings available. May include multi-tenancy, monthly billing, or a combination of both.

✔

ActZero

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

ActZero MSP Offerings

 

✔

Adlumin

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Adlumin Advantage Partner Program

 

✔

Alert Logic

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Alert Logic Managed Security Services for Ingram Micro

✔

Alien Vault (AT&T)

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

✔

Arcserve

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

MSP Program

✔

Arctic Wolf

 

Contact(s):ArcticWolfMD@ingrammicro.com

Solution(s):

Vendor authorization and agreement required

 

✔

Avast

 

Contact(s):sporders@avast.com

Solution(s):

MSP Program

✔

Axcient

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

BCDR for MSPs

 

✔

Binary Defense

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

MSP Program

Binary Defense

 

✔

Bitdefender

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Bitdefender Cloud Security for MSPs

✔

Blancco

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Service Provider Partner Program

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Security Solutions for MSSPs and MSP, Cisco Managed Detection and Response (MDR)

Cisco Secure Endpoint

 

Cisco Umbrella

 

Cisco SD-WAN

 

Cisco Secure Firewall

 

✔

Cofense

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

MSSP Program Coming Soon

✔

CrashPlan

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

CrashPlan

 

✔

Dell Technologies

 

Contact(s):Dell Technologies Contacts Overview

Solution(s):

Dell Managed Detection & Response 

 

✔

ESET

 

Contact(s):ESET Contacts Overview
NSX-Sales@ingrammicro.com

Solution(s):

Availabe through Ingram Micro’s Cloud Marketplace

✔

Forcepoint

 

Contact(s):Forcepoint-Licensing@ingrammicro.com

Solution(s):

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com

Solution(s):

MSSP Program

✔

HCLSoftware

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

HCL Partner Connect

 

✔

IBM

 

Contact(s):IBM Contacts Overview

Solution(s):

Embedded Solutions Agreement (ESA)

✔

iboss

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

MSSP Program

✔

Meraki (Cisco)

 

Contact(s):Meraki (Cisco) Contacts Overview

Solution(s):

Security Solutions for MSSPs

✔

Mimecast

 

Contact(s):Mimecast-Licensing@ingrammicro.com

Solution(s):

Managed Service Program

✔

Palo Alto Networks

 

Contact(s):paloaltosolutions@ingrammicro.com

Solution(s):

NextWave Managed Security Service Provider Specialization

✔

Proofpoint

 

Contact(s):Proofpoint-Licensing@ingrammicro.com

Solution(s):

Proofpoint Essentials Partner Program

✔

SonicWall

 

Contact(s):SonicWall-Renewals@ingrammicro.com

Solution(s):

SonicWall MSP Advantage Program

✔

Sophos

 

Contact(s):sophos-licensing@ingrammicro.com

Solution(s):

Sophos MSP Connect

✔

Tenable

 

Contact(s):TenableTeam@ingrammicro.com

Solution(s):

Tenable MSSP Program

 

✔

Trend Micro

 

Contact(s):Trend-Licensing@ingrammicro.com

Solution(s):

MSP Program

✔

VMware (Carbon Black)

 

Contact(s):VMware_MD_Team@ingrammicro.com

Solution(s):

VMware Cloud Provider Program

Reseller Partner Requirement

If there’s a requirement such as signing a contact, or being in a partner program to resell this vendor, the box will be checked.

✔

Adlumin

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Adlumin Advantage Partner Program

 

✔

Arctic Wolf

 

Contact(s):ArcticWolfMD@ingrammicro.com

Solution(s):

Vendor resell approval

✔

Binary Defense

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Simple registration and short demo

Binary Defense

 

✔

Check Point

 

Contact(s):checkpoint-licensing@ingrammicro.com

Solution(s):

Partner Growth Program

✔

Cisco

 

Contact(s):Cisco Contacts Overview

Solution(s):

Must be registered partner

✔

Cofense

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

Simple Registration

✔

CrashPlan

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

CrashPlan

 

✔

Dell Technologies

 

Contact(s):Dell Technologies Contacts Overview

Solution(s):

Must be registered partner

✔

Evidian (Atos)

 

Contact(s):Evidian-Licensing@ingrammicro.com

Solution(s):

✔

F5

 

Contact(s):F5-Team@ingrammicro.com

Solution(s):

F5 UNITY programs

✔

Fortinet

 

Contact(s):Fortinet Contacts Overview
Fortinet-Licensing@ingrammicro.com

Solution(s):

Fortinet Engage Partner Program

 

✔

HCLSoftware

 

Contact(s):NSX-Sales@ingrammicro.com

Solution(s):

HCL Partner Connect

 

✔

Juniper

 

Contact(s):Juniper Contacts Overview
Juniper.Assist@ingrammicro.com

Solution(s):

Simple Registration

✔

Meraki (Cisco)

 

Contact(s):Meraki (Cisco) Contacts Overview

Solution(s):

Must be registered partner

✔

Palo Alto Networks

 

Contact(s):paloaltosolutions@ingrammicro.com

Solution(s):

Palo Alto Partner

 

✔

Proofpoint

 

Contact(s):Proofpoint-Licensing@ingrammicro.com

Solution(s):

Must be registered partner

✔

SkyhighSecurity

 

Contact(s):Skyhigh-Licensing@ingrammicro.com

Solution(s):

Skyhigh Security Partner Portal

 

✔

SonicWall

 

Contact(s):SonicWall-Renewals@ingrammicro.com

Solution(s):

SecureFirst Partner Program

 


Cisco Meraki

Cloud Discovery

Cloud Enablement

Cloud Migrations

Cloud Optimization

Cloud Placement

Cloud Security

Cloud Strategy

Cloud Transformation

Critical Security Controls

Deployments & Rollouts

Depot Services

Express Warehousing

Financial Services

Firewall Rules Audit

Firewall-as-a-Service

Fortinet

Infrastructure Solutions

Integration & Configs

IT Staffing

ITAD / Asset Disposition

Marketing Services

Palo Alto Networks

Penetration Testing

Reverse Logistics

Social Engineering

Training

Vulnerability Scanning

Wireless Networking

Security

Assessments

Our red teaming services focused on ensuring your network is protected and complaint.

Click to See Services of This Type:

✔

Critical Security Controls

 

Contact(s):usservices@ingrammicro.com

Solution(s):

Critical Security Controls Assessment

 

✔

Firewall Rules Audit

 

Contact(s):usservices@ingrammicro.com

Solution(s):

Firewall Rules Audit

 

✔

Penetration Testing

 

Contact(s):usservices@ingrammicro.com

Solution(s):

Network Penetration Testing

 

Social Engineering

 

✔

Social Engineering

 

Contact(s):usservices@ingrammicro.com

Solution(s):

Social Engineering Assessment

 

✔

Vulnerability Scanning

 

Contact(s):usservices@ingrammicro.com

Solution(s):

External Vulnerability Scan Assessment

 

Web Application Vulnerability Assessment

 

✔

Wireless Networking

 

Contact(s):usservices@ingrammicro.com

Solution(s):

Wireless Penetration Test

 

Consultative

Our services focused on expanding your cybersecurity practice  and project management.

Click to See Services of This Type:

✔

Cloud Security

 

Cloud Security Services

 

 

 

Shopping cart

0
image/svg+xml

No products in the cart.

Continue Shopping