Security Line Card - Tech Data
Security Line Card
Vendor
Description
Ext
Security-as-a-Service cloud provider, Monitor, Analyze, Protect. 24x7 Intrusion Detection, Vulnerability Assessment, Web Application Firewall, and Log Management Solutions.
A global provider of leading, innovative network intelligence and security solutions for Service Providers and Enterprises worldwide.
5683696
The only technology that comprehensively blocks phishing attacks before they damage a business.
5540622
Continuous Adaptive Risk and Trust Assessment (CARTA), governance, risk and compliance (GRC)
Email
enterprisecloudsales@ Allot@
AREA1US@ arxnimbus@
MSP Program
M
Engineer
E E
Security, Storage, and Application Delivery
5540427
barracuda@
Delivering Industry leading DNS (Domain Name System), DHCP (Dynamic Host Configuration Protocol ) and IP (Internet Protocol) Address Management DDI
(DNS,DHCP and IP Address Management) solutions.
bluecat@
Customizable, comprehensive hot backup, ensuring critical data is protected with the power of a hybrid solution
5540414
carbonite@
M
Single Architecture Security Products ? Next Generation Threat Prevention,
vSEC Cloud Security Suite, Mobile Security Suite, Data Center and SMB Next 5545036
checkpoint@
M
E
Generation Firewall and Smart Event Management Console
Advanced Malware Protection, Cloud Security, Email Security, Endpoint Security, Network Visibility and Segmentation, Next-Generation Firewalls, Next-
Generation Intrusion Prevention Systems, Router Security, Security Management, VPN Security Clients, and Web Security
1477776
Cisco@
M
E
Hyper-realistic training for cyber security, customized to simulate actual technical infrastructure and environment
5538270 cloudrangecyberUS@
ConnectWise has teamed up with industry-leading security providers to offer
solutions and integrations designed to reduce the risk of external attacks, with
protection of user accounts and endpoints including, but not limited to:
5540517 Connectwisesecurityus@
M
advanced multi-layered security, SIEM tools, SOCs,
Antivirus/Anti-Malware, and more.
Cyberinc's Isla Isolation Platform uses cutting-edge isolation technology to
neutralize threats and prevent them before they have a chance to act,
5540509
CyberincUS@
simplifying the security strategy and delivering immediate protection.
Enterprise-grade security and compliance as a service, at small business prices. 5540509
cybershark@
M
Provider of medical device and Internet of Medical Things (IoMT) security solutions. Protects clinical networks from cyber threats by providing
unparalleled visibility into their medical device ecosystem, proactively mapping 5540425 and prioritizing potential risks, detecting anomalies and preventing breaches by
proactively shrinking the attack surface.
cynerioUS@
Predictive Risk Management, Vulnerability Management, Prioritized Patch Management, Threat Intelligence Services, Security Operations
cyr3con@
Archiving, Backup and Recovery, Business Continuity and Availability,
Collaboration, Content Management, Mobility and Migration, Resource 5545042
emc@
E
Management, Virtualization
Isolation of Malware, Ransomware and other web-borne threats to prevent the infection from spreading to the network
ericom@
Security/Network Analytics as a Cloud Service: Central Log Management,
Monitoring, Correlation, Threat Analytics, Orchestration, 365Plus Data
fluency@
Retention, Speed
Firewall, Management Reporting, Network Authentication, Switches, WAN
Appliances, DDos Protection, Database Security, Endpoint Protection, Wireless
LAN, Advanced Threat Detection, Application Delivery Controllers, Network 5545031
uspmfortinet@
M
E
Testing, SDN Security Appliance, Web Application Firewall, Network-Based
Video Control and Secure Email Gateway
EMAIL: SECURITYSERVICES@ | WEB: WWW.SECURITY | PHONE: 1-800-237-8931 EXT. 5540508
Security Line Card
Vendor
Description
Endpoint Protection, Cloud Protection, Network Protection, Email Protection & Vulnerability Management
End-to-end data encryption and protection; email and document security and protection; endpoint security; SME security assessments and remediation
Ext
Email
MSP Program
Engineer
fsecure@
globalintegrity@
Aruba, Atalla, Voltage
1480174 hpegsupport@
: IBM protects data wherever it resides while providing advanced identity and access management. Our leading solutions are designed to manage risks and detect threats with AI, and market-leading SIEM and SOAR solutions can help
respond to those threats.
Indeni automates best practices for network security and cloud security. Its security infrastructure platform automates health and compliance checks for leading firewalls to maximize uptime and efficiency.
IBMSecuritySolutions@
M
E
Indenius@
Anti-virus, Security Management, Internet Security, Endpoint Security for Business, Security Solutions for Enterprise, Mobile Security
5545037 psckaspersky@
M
System Security, Internet Security, SaaS, Security Management, Network Security, Web and Email Security, Mobile Security, Intrusion Prevention, Data Protection, 5545034 Vulnerability Management, and Risk and Compliance
mcafee@
M
E
Cloud App Security, Exchange Online Protection, Forefront Identity Manager, Intune, Exchange Online Archiving
5545006
microsoft@
E
One Identity delivers a suite of identity governance, access management, and privileged account management solutions that facilitate and secure your digital transformation.
OneIdus@
OPAQ provides enterprise-grade security-as-a-service accessible and affordable for
organizations. Our service provider partners are equipped with a simplified ability to centrally monitor networks, generate reports, manage security infrastructure,
5540434
and enforce policies ? all through a single interface.
OPaQUS@
Oracle's security solutions enable organizations to implement and manage consistent security policies across the hybrid data center. Oracle security cloud
services make leading security technologies available everywhere to organizations large and small.
oracle.quote@
Protects organizations against advanced threats and data loss. Cloud based
security solutions to detect and block targeted attacks. Offers email protection at 5540528 proofpointUS@
M
the gateway, which stops threats from entering your email network. Continuity,
management and encryption, and archiving as additional modules.
RangeForce delivers the most effective way to level-up and accurately assess the
skills of your security team through a scalable, interactive, on-demand cyber-
training platform and CyberSiege blue team simulator. Our on-demand, gamified 5540516 rangeforceUS@
M
training modules develop role-based operational cybersecurity skills through real-
life scenarios that deliver training down to the command line.
Threat, information and Malware protection, Antimalware, Email protection, FTP
protection, Endpoint protection, Scan Kiosk, Gateway Security, Perimeter control,
Antimalware API, Website security, Browsing protection, Content disarm and
resecUS@
Reconstruction, File server protection, Desktop protection, AV Multi-Scan, Cyber
Vault protection, Sanitization.
IGA (Identity Governance & Administration) and Cloud Security. Saviynt has
redefined IGA by converging traditional Identity Management with CASB and Application GRC capabilities. The Saviynt platform enables enterprises to secure
SaviyntUS@
E
applications, data and infrastructure in a single platform forcloud and enterprise.
Security Maturity , GRC (governance, risk and compliance), small business, cloud security strategy, security education and awareness, incident response strategy,
legal and regulatory, risk assessment, security architecture, PCI DSS
securitycolony@
SEPIO provides complete mitigation for malicious hardware attacks before they can cause any harm
sepio@
EMAIL: SECURITYSERVICES@ | WEB: WWW.SECURITY | PHONE: 1-800-237-8931 EXT. 5540508
Security Line Card
Vendor
Description
Firewalls, Firewalls-as-a-Service, Cloud App Security, Secure Email, Wireless Security, Secure Mobile Access, Secure SD-WAN, Endpoint Security, Risk Meters
and WAN Acceleration
Custom cybersecurity solutions for MSPs, MSSPs, and enterprises. Hosted SIEM, SIEM-as-aService, SIEM Management, SOC-as-a-Service, and Threat Intelligence for MSSPs and enterprises with a focus on regulatory compliance
Ext 5545032 5540508
Email SonicWall@ securityservices@
MSP Program
Engineer
M
E
M
Threat Protection, Information Protection, Small Business, Website Security, Data Loss Prevention, SaaS, Data Center Security
5540101
symantec@
M
E
Protection for Desktop, Mobile, Server, Email, Network and Gateway, Hybrid Cloud Security, Threat Intelligence Services
5545035 trendmicro@
M
Cybersecurity and compliance solutions. Tripwire ensures compliance, security, and flexible risk management solutions.
tripwireUS@
Endpoint protection platform (EPP) that delivers next-generation security and IT operations
services through the cloud. It applies big data analytics across all endpoints to make
1473405
vmware@
M
predictions about and provide protection from current, future and unknown attacks.
Rackmount Firebox, Tabletop Firebox, Virtual Firebox, Network Security Products, NGTW Appliances, Gateway Antivirus and Access Points
5545033
sewatchguard@
M
E
Endpoint Security, Mobile Security, Web Security SaaS, Internet Security
1472415
webroot@
Anti-Spam and Email Protection
ZScaler accelerates digital transformation with its Zero Trust Exchange, a SASE- based platform that provides fast, secure connections between users,
devices, and applications over any network. The only leader in the 2020 Gartner Magic Quadrant for Secure Web Gateways.
tdcloud@
Zscalerus@
M
EMAIL: SECURITYSERVICES@ | WEB: WWW.SECURITY | PHONE: 1-800-237-8931 EXT. 5540508
................
................
In order to avoid copyright disputes, this page is only a partial summary.
To fulfill the demand for quickly locating and searching documents.
It is intelligent file search solution for home and business.
Related download
- introducing rsa netwitness detect ai
- nexlog next generation logistics innovation cell
- xchanging application information pack
- security line card tech data
- advanced innovative analysis and concepts
- section 6 project planning and management
- risk management guidance
- program charter template draft
- hud virtual university hvu business course catalog
- this paper employs a 3sls simultaneous equations analysis
Related searches
- data security classification types
- information security data classification
- check status of social security card request
- track social security card application
- data security classification levels
- social security card application form
- data security maturity model
- data security classification
- line graph data examples
- social security card replacement tracking
- gartner data security governance framework
- social security replacement card application