A PHP Error was encountered

Severity: Notice

Message: Undefined index: type

Filename: controllers/Dashboard.php

Line Number: 86

Backtrace:

File: /opt/bitnami/apache2/htdocs/spitool/application/controllers/Dashboard.php
Line: 86
Function: _error_handler

File: /opt/bitnami/apache2/htdocs/spitool/index.php
Line: 315
Function: require_once

A PHP Error was encountered

Severity: Notice

Message: Undefined index: org_id

Filename: controllers/Dashboard.php

Line Number: 213

Backtrace:

File: /opt/bitnami/apache2/htdocs/spitool/application/controllers/Dashboard.php
Line: 213
Function: _error_handler

File: /opt/bitnami/apache2/htdocs/spitool/index.php
Line: 315
Function: require_once

{"product":[{"product_id":"1985","product_name":"360 Data Management Suite","description":"Combines data protection with global visibility, regulatory compliance, business continuity, workload mobility and storage optimization.","hyperlink":"https:\/\/www.veritas.com\/360\/360-suite","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"69","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1397","product_name":"Access Manager","description":"Access Manager secures, simplifies, and protects user access to apps and data, while delivering the most scalable access gateway on the market.","hyperlink":"https:\/\/www.f5.com\/products\/security\/access-manager","td_contact":"f5@techdata.com","td_extension":"(480) 643-5064","vendor_id":"26","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"1529","product_name":"Access Manager\u00a0","description":"Provides single sign-on for enterprises and federation for cloud applications","hyperlink":"https:\/\/www.netiq.com\/products\/access-manager\/","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"351","product_name":"Access Policy Manager","description":"BIG-IP Access Policy Manager (APM) contextually secures, simplifies, and protects user access to apps and data, whether those resources are in a data center, the cloud, SaaS-based, or a hybrid environment","hyperlink":"https:\/\/f5.com\/products\/big-ip\/access-policy-manager-apm","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"26","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"10","country_name":"CENTRAL AMERICA","parint_id":"0","type":"0","country":"10"},{"product_id":"330","product_name":"Activate","description":"Commvault Activate is an integrated toolset that includes file storage optimization, sensitive data governance, and compliance search and eDiscovery. It extends the value of data residing in secondary storage as it enables the indexing of backed up and archived data so that users can search, analyze, and use data in ways that usually require additional point products for each use case.","hyperlink":"https:\/\/www.commvault.com\/activate","td_contact":"Software-Sales@techdata.com","td_extension":"(800)-237-8931 x5683326","vendor_id":"16","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,9,10,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61"},{"product_id":"1902","product_name":"Active Directory Bridge","description":"Provide a single familiar toolset to manage both Windows and Unix\/Linux systems\n\nProvide audit details to audit and compliance teams and manage group policies centrally\nEnhanced Security\n\nExpand single sign-on (SSO) and file sharing, and control access to non-Windows systems","hyperlink":"https:\/\/www.beyondtrust.com\/privilege-management\/active-directory-bridge","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"94","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"624","product_name":"Active Response","description":"McAfee Active Response is endpoint detection and response software that helps you find and remediate advanced threats.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/active-response.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"780","product_name":"Active Roles","description":"Management and Security for Hybrid Active Directory and Beyond","hyperlink":"https:\/\/www.oneidentity.com\/products\/active-roles\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"44","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,63,64,65,66,67,68,69,70,71,72,73,74,75,76,77,78,79,80,81,82,83,84"},{"product_id":"16","product_name":"ActiveWatch","description":"ActiveWatch Managed Detection and Response Services combine managed security services such as threat detection analytics, 24x7x365 threat monitoring, and WAF tuning with ongoing development of scanning, detection and blocking logic deployed through Alert Logic software-as-a-service solutions.","hyperlink":"https:\/\/www.alertlogic.com\/solutions\/activewatch-managed-detection-and-response\/","td_contact":"enterprisecloudsales@techdata.com","td_extension":"","vendor_id":"2","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,6,8,9,10,12,14,16,18,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61"},{"product_id":"939","product_name":"Adaptive Defense","description":"Panda\u2019s next generation Adaptive Defense solution provides workstations \nwith protection by classifying and analyzing the entire range of \napplications used on them","hyperlink":"https:\/\/www.stormshield.com\/products-services\/products\/endpoint-security\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"59","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,64"},{"product_id":"1938","product_name":"ADC","description":"vADC- vTM, WAF, and load balancing-virtualized Application Delivery Controller for fast, reliable application delivery across virtual and cloud platforms with flexible on demand licensing (1\/2 cost AND 2x plus the performance and optimization)","hyperlink":"https:\/\/www.pulsesecure.net\/products\/adc-overview\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"101","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1656","product_name":"Administration Tools - Visibility Center","description":"A turnkey solution that offers a unified presentation of security events \noriginating from all of Stormshield product ranges. Gives you an overview \nof how secure your infrastructure and data are. The intuitive visualizations you will find in Stormshield Visibility \nCenter enable you to quickly identify significant events and security \nincidents.","hyperlink":"https:\/\/www.stormshield.com\/products\/visibility-center\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"59","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"528","product_name":"Advance Endpoint Security","description":"Kaspersky Endpoint Security for Business Advanced includes all of the functionality delivered by Kaspersky Endpoint Security for Business Select\u2026 plus additional technologies that do even more to protect your business. Medium Business offers Cloud based and Office 365 products shown below","hyperlink":"https:\/\/www.kaspersky.com\/small-to-medium-business-security\/endpoint-advanced","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,9,10,39,51,60"},{"product_id":"686","product_name":"Advanced Authentication\u00a0","description":"Move beyond username and passwords and securely protect data and applications","hyperlink":"https:\/\/www.netiq.com\/products\/advanced-authentication\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,63,65,67,68,69,70,71,74,75,76,77,80,81,84"},{"product_id":"625","product_name":"Advanced Correlation Engine","description":"McAfee Advanced Correlation Engine supplements McAfee Enterprise Security Manager (SIEM) event correlation with two dedicated correlation engines: A risk detection engine that generates a risk score and a threat detection engine.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/advanced-correlation-engine.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1302","product_name":"Advanced Endpoint Threat Prevention","description":"Protect endpoints against advanced 5th generation cyber attacks and zero-day threats, enabling a deep understanding of security events for rapid response and quick remediation of attacks.","hyperlink":"https:\/\/www.checkpoint.com\/products\/sandblast-agent\/","td_contact":"checkpoint@techdata.com \n(727) 539-7429 x-82127","td_extension":"800-237-8931 x5545036","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"352","product_name":"Advanced Firewall Manager","description":"With deep threat intelligence services and flexible mitigation options, BIG-IP Advanced Firewall Manager (AFM) defends against threats to network layers 3\u20134, stopping them before they reach your data center.\n\nSpecifically, BIG-IP AFM scales to shut down high-capacity DDoS attacks that can overwhelm load balancers, firewalls, and even networks. It automatically invokes mitigation, alerts security admins, and configures or adjusts DDoS thresholds as traffic patterns change and without affecting legitimate traffic.","hyperlink":"https:\/\/f5.com\/products\/big-ip\/advanced-firewall-manager-afm","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"26","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"10","country_name":"CENTRAL AMERICA","parint_id":"0","type":"0","country":"10"},{"product_id":"2087","product_name":"Advanced Planning Command Center","description":"Obtains supply chain planning data from complementary demand management, inventory optimization, sales and operations planning, network design, and supply planning applications via web services","hyperlink":"https:\/\/docs.oracle.com\/cd\/E26401_01\/doc.122\/e48757\/T515640T515647.htm","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"46","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2088","product_name":"Advanced Supply Chain Planning (ASCP)","description":"A comprehensive, Internet-based planning solution that decides when and where supplies (for example, inventory, purchase orders and work orders) should be deployed within an extended supply chain","hyperlink":"http:\/\/www.oracle.com\/us\/products\/applications\/056964.pdf","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"46","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1470","product_name":"Advanced Threat Defense","description":"McAfee Advanced Threat Defense protects against advanced malware, including zero-day and advanced persistent threats, providing the strongest advanced threat protection available.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/advanced-threat-defense.html","td_contact":"Tech Data: mcafee@techdata.com\n

DLT: spi@dlt.com<\/p>","td_extension":"Tech Data: 800-237-8931\n

DLT: 703-773-9231<\/p>","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"946","product_name":"Advanced Threat Protection","description":"Uncover, prioritize, and remediate advanced attacks across endpoints, networks, and email in minutes, all from a single console.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/atp-brochure-en","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1759","product_name":"Advanced Threat Protection - Deep Discovery","description":"Detect and respond to targeted attacks moving inbound, outbound, and laterally. Real-time protection against targeted attacks. Provides custom sandbox analysis to extend the value of security products, such as endpoint protection, web and email gateways, network security, and other Deep Discovery offerings.","hyperlink":"https:\/\/www.trendmicro.com\/en_us\/business\/products\/network\/advanced-threat-protection.html","td_contact":"Tech Data: trendmicro@techdata.com\n

DLT: spi@dlt.com<\/p>","td_extension":"Tech Data: 800-237-8931 ext. 5545035 \n

DLT: 703-773-9231<\/p>","vendor_id":"66","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1659","product_name":"Advanced Threat Protection for Email","description":"Symantec's Advanced Threat Protection for Email protect against most sophisticated email threats and gain comprehensive insights in advanced email attacks.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/email-threat-detection-and-response-en","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1384","product_name":"Advanced Web Application Firewall (WAF)","description":"F5 Advanced WAF Protects against the latest wave of attacks using behavioral analytics, proactive bot defense, and application-layer encryption of sensitive data, such as credentials","hyperlink":"https:\/\/f5.com\/products\/security\/advanced-waf","td_contact":"f5@techdata.com","td_extension":"(480) 643-5064","vendor_id":"26","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"2034","product_name":"AI, ML, NLP","description":"IDP uses artificial intelligence (AI) technologies such as machine learning (ML) and natural language processing (NLP) to capture, classify, and extract the most difficult-to-automate data. RPA technology can then be applied to the extracted data for enhanced validation and to automatically enter it into existing applications","hyperlink":"https:\/\/www.automationanywhere.com\/products\/iq-bot","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"115","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1982","product_name":"AMQ","description":"A message broker for building communications among Java applications.","hyperlink":"https:\/\/www.redhat.com\/en\/technologies\/jboss-middleware\/amq","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"108","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1592","product_name":"Analytics-Driven Security Monitoring","description":"Oracle Security Monitoring and Analytics (SMA) Cloud Service is an integrated SIEM and UEBA solution for rapid detection, investigation, and remediation of a broad range of security threats and attacks across your IT.","hyperlink":"https:\/\/www.oracle.com\/cloud\/security-monitoring-and-analytics.html","td_contact":"spi@dlt.com","td_extension":"703-773-9221","vendor_id":"46","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"808","product_name":"Anti-Phishing Suite","description":"Proofpoint Anti-Phishing Suite helps you identify and reduce\nyour employees\u2019 susceptibility to phishing attacks and malware\ninfections by up to 90%.","hyperlink":"https:\/\/www.proofpoint.com\/us\/products\/security-awareness-training","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 633","vendor_id":"48","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,65,71"},{"product_id":"120","product_name":"Anti-Spam & Email Security Software Blade","description":"Check Point Anti-Spam & Email Security provides comprehensive protection for messaging infrastructure. A multidimensional approach protects email infrastructure, provides highly accurate anti-spam coverage and defends organizations from a wide variety of virus and malware threats delivered within email.","hyperlink":"https:\/\/www.checkpoint.com\/products\/anti-spam-email-security-software-blade\/","td_contact":"checkpoint@techdata.com","td_extension":"800-237-8931 x5545036","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"2036","product_name":"APA Platform, Analytics Hub","description":"The Alteryx Analytic Process Automation (APA) PlatformTM delivers end-to-end automation of analytics, machine learning, and data science processes; enabling the agility needed to accelerate digital transformation. With the Alteryx APA Platform you can automate processes, embed intelligent decisioning, and power your people to deliver faster, better business outcomes.\nAlteryx Data Platform speeds data preparation on all sources and data types and get results in minutes. Blend data in simple drag and drop experience from spreadsheets, documents, cloud sources, databases, EDW, data lakes, enterprise applications (e.g., CRM, ERP, HCM, and ITSM), RPA bots, and more.","hyperlink":"https:\/\/www.alteryx.com\/products\/apa-platform","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66102","vendor_id":"117","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2014","product_name":"Apama Streaming Analytics","description":"A platform that enables you to quickly correlate, aggregate and detects patterns across large volumes of fast-moving data from multiple sources","hyperlink":"https:\/\/www.softwareag.com\/us\/products\/data_analytics\/analytics\/default.html","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"106","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1247","product_name":"API Capabilities","description":"Scale, protect, and manage API's","hyperlink":"https:\/\/www.akamai.com\/us\/en\/solutions\/performance\/apis.jsp","td_contact":"akamaius@techdata.com","td_extension":"(800)-237-8931 x5540426","vendor_id":"1","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"1984","product_name":"API Management","description":"An API management platform that makes it easy to share, secure, distribute, control, and monetize your APIs","hyperlink":"https:\/\/www.redhat.com\/en\/technologies\/jboss-middleware\/3scale","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"108","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1927","product_name":"App Gateway","description":"App Gateway service enables secure remote access to on-premises apps without installing and maintaining VPNs, making code changes, or deploying additional infrastructure.","hyperlink":"https:\/\/www.idaptive.com\/product\/app-gateway\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"99","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1814","product_name":"AppDefense","description":"Improve the security of your applications from within the hypervisor \u2014 and get 360 degree visibility into every workload \u2014 with VMware AppDefense. Rather than chasing after threats, reduce your attack surface by leveraging AppDefense to model intended application behavior, monitor for anomalous activity, and provide application control, reputation scoring, and security.","hyperlink":"https:\/\/www.vmware.com\/products\/appdefense.html","td_contact":"vmware@techdata.com","td_extension":"800-237-8931 x5545048","vendor_id":"70","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2098","product_name":"Application Access Governance","description":"SOD Management, certification, compliance controls, Access request, provisioning, role \/ policy management, emergency access management","hyperlink":"https:\/\/saviynt.com\/solutions\/application-access-governance\/","td_contact":"SaviyntUS@techdata.com","td_extension":"800-237-8931 x 5540529","vendor_id":"124","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"2099","product_name":"Application Access SOD Manager","description":"SOD Management, certification, compliance controls","hyperlink":"https:\/\/saviynt.com\/sod-analyzer\/","td_contact":"SaviyntUS@techdata.com","td_extension":"800-237-8931 x 5540529","vendor_id":"124","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1221","product_name":"Application Control","description":"Allow, block, or restrict access to applications based on a user\u2019s department, job function, and time of day. It\u2019s never been easier to decide who, what, when, where, why and how applications are used on your network","hyperlink":"https:\/\/www.watchguard.com\/wgrd-products\/security-services\/application-control","td_contact":"SEWatchGuard@techdata.com","td_extension":"800-237-8931 x5545033","vendor_id":"71","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"628","product_name":"Application Data Monitor","description":"McAfee Application Data Monitor decodes an entire application session to Layer 7 to detect fraud, data loss, and hidden threats, and create an audit trail for application compliance.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/application-data-monitor.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1531","product_name":"Application Defender\u00a0","description":"Gain visibility into application abuse while protecting software from exploits","hyperlink":"https:\/\/software.microfocus.com\/en-us\/software\/application-defender","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"1389","product_name":"Application Security Manager","description":"A comprehensive web application firewall (WAF) that protects apps and data from known and unknown threats, defends against bots that bypass standard protections, and virtually patches app vulnerabilities.","hyperlink":"https:\/\/f5.com\/products\/big-ip\/application-security-manager-asm","td_contact":"f5@techdata.com","td_extension":"(480) 643-5064","vendor_id":"26","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"484","product_name":"Application Security on Cloud","description":"Ensure that security is integrated into the development process so that you can develop secure applications without sacrificing speed-to-market","hyperlink":"","td_contact":"West: Rick.Marshall@techdata.com\n

East: Karen.Bailey@techdata.com<\/p>","td_extension":"West: (480) 254-4420\n

East: (678) 642-3446<\/p>","vendor_id":"35","service_tiering":"Tiered discounting is supported. Upfront, annual, quarterly and monthly billing supported for EPS and other pricing metrics.","partner_benefits":"

\u2022   IBM Security supports multiple partnering models for MSSPs including IBM Embedded Solution Agreement which enables MSSPs to retain entitlement of software and sell a service, achieving a pure OPEX model for their clients.  <\/p>\n

\u2022   IBM Channel Value Rewards provides higher margin for initial license sales and ongoing renewals.<\/p>","typeof_service":"

Managed Security Services Building Block Solution:<\/strong>  Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":"

\u2022   Automate security testing throughout software development lifecyle  <\/p>\n

\u2022  Secure applications during development without sacrificing speed to market.  <\/p>\n

\u2022   Focus on high priority vulnerabilities  <\/p>\n

\u2022   Utilize multiple developer plug ins.  5. Complete coverage of web, mobile, open source, and cloud applications.<\/p>","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,5,7,10,11,13,15,17"},{"product_id":"688","product_name":"ArcSight Data Platform\u00a0","description":"A future-ready, open platform that transforms data chaos into security insight","hyperlink":"https:\/\/software.microfocus.com\/en-us\/software\/siem-data-collection-log-management-platform","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,63,65,67,68,69,70,71,74,75,76,77,80,81,84"},{"product_id":"1533","product_name":"ArcSight Enterprise Security Manager (ESM)\u00a0","description":"A comprehensive threat detection, analysis, and compliance management SIEM solution","hyperlink":"https:\/\/software.microfocus.com\/en-us\/software\/siem-security-information-event-management","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"690","product_name":"ArcSight Investigate\u00a0","description":"An intuitive hunt and investigation solution that decreases security incidents","hyperlink":"https:\/\/software.microfocus.com\/en-us\/software\/arcsight-investigate","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,63,65,67,68,69,70,71,74,75,76,77,80,81,84"},{"product_id":"1535","product_name":"ArcSight User Behavior Analytics (UBA)\u00a0","description":"Detect unknown threats through real-time analytics","hyperlink":"https:\/\/software.microfocus.com\/en-us\/software\/siem-big-data-security-analytics","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"2091","product_name":"Area 1 Security Horizon Advantage","description":"Area 1 Horizon anti-phishing cloud service provides early visibility into phishing infrastructure and payloads, plus innovative, predictive analysis techniques to add a critical layer of security that effectively detects and blocks phishing, malware, ransomware, etc., across all attack vectors, including email, web and network.","hyperlink":"https:\/\/www.area1security.com\/","td_contact":"AREA1US@techdata.com","td_extension":"(800) 237-8931 ext. 5540622","vendor_id":"123","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"2092","product_name":"Area 1 Security Horizon Enterprise","description":"Area 1 Horizon anti-phishing cloud service provides early visibility into phishing infrastructure and payloads, plus innovative, predictive analysis techniques to add a critical layer of security that effectively detects and blocks phishing, malware, ransomware, etc., across all attack vectors, including email, web and network. Horizon Enterprise adds additional features including edge integrations, autonomous SOC\/M-SOAR integratoins, APIs & Orchestrations Partner Extensibility and Security customizations","hyperlink":"https:\/\/www.area1security.com\/","td_contact":"AREA1US@techdata.com","td_extension":"(800) 237-8931 ext. 5540622","vendor_id":"123","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"2093","product_name":"Area 1 Security Horizon Enterprise + Phishguard","description":"Area 1\u2019s Horizon Phishguard - which includes managed email security and active fraud defense - provides dedicated resources for end-to-end targeted attack management response. The service also provides customized notification and responses for fraud and insider threats, as well as tailored threat hunting for your email environment.","hyperlink":"https:\/\/www.area1security.com\/","td_contact":"AREA1US@techdata.com","td_extension":"(800) 237-8931 ext. 5540622","vendor_id":"123","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"948","product_name":"Asset Management Suite","description":"Control your assets, uncover savings, and ensure compliance. Powered by Altiris technology to optimize your IT investments.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/endpoint\/management\/asset-management-suite","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1536","product_name":"Atalla HSM\u00a0","description":"FIPS 140-2 Level 3 hardware cryptographic appliance to meet compliance standards","hyperlink":"https:\/\/software.microfocus.com\/en-us\/software\/hardware-security-module-hsm-atalla-nsp","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"1286","product_name":"Audit And Monitoring Service","description":"For privileged sessions it is best practice to audit everything. With a documented record of all actions performed it not only can be used in forensic analysis to find exactly the issue and attribute it to a specific user and session. Because these sessions are so critical it is also best practice to keep a video recording of the session that can be reviewed or used as evidence for your most critical assets or in highly regulated industries. With the Centrify Audit and Monitoring Service monitoring and session recording can be achieved through either a gateway-based and\/or host-based technique. Advanced monitoring capabilities even allow for process launch and file integrity monitoring.","hyperlink":"","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"11","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1284","product_name":"Authentication Service","description":"Cloud-ready Zero Trust Privilege is designed to handle requesters that are not only human but also machines, services and APIs. There will still be shared accounts, but for increased assurance, best practices now recommend individual identities, not shared accounts, where least privilege can be applied. Centrify Authentication Service allows properly verifying who requests privileged access. This can be achieved by leveraging enterprise directory identities, eliminating local accounts and decreasing the overall number of accounts and passwords, therefore reducing the attack surface.","hyperlink":"","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"11","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"781","product_name":"Authentication Services","description":"Unix and Linux Active Directory authentication that extends infrastructure to the rest of your enterprise","hyperlink":"","td_contact":"oneldus@techdata.com","td_extension":"","vendor_id":"44","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1174","product_name":"Availability Suite","description":"Veeam\u00ae Availability Suite\u2122 enables the recovery of any IT service and related applications and data within seconds and minutes. Turn your enterprise into a Hyper-Available enterprise with Veeam Availability Suite for any app, any data and any cloud.","hyperlink":"https:\/\/www.veeam.com\/data-center-availability-suite.html","td_contact":"","td_extension":"","vendor_id":"68","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2065","product_name":"AWS AI Services","description":"Provide's ready-made intelligence for your applications and workflows. AI Services easily integrate with applications to address common use cases such as personalized recommendations, modernizing contact centers, improving safety and security, and increasing customer engagement","hyperlink":"https:\/\/aws.amazon.com\/machine-learning\/ai-services\/","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"110","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2047","product_name":"AXIS Camera Application Platorm (ACAP)","description":"An open application platform that enables members of Axis Application Development Partner (ADP) Program to develop applications that can be downloaded and installed on Axis network cameras and video encoders","hyperlink":"https:\/\/www.axis.com\/en-us\/support\/developer-support\/axis-camera-application-platform","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"120","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"771","product_name":"Azure Active Directory","description":"Azure Active Directory (Azure AD) helps you manage user identities and create intelligence-driven access policies to secure your resources. As an integral component of Office 365, Azure and Enterprise Mobility + Security, Azure AD centralizes identity and access management to enable deep security, productivity, and management across devices, data, apps, and infrastructure. Azure AD is built to work for apps in the cloud, on mobile, or on-premises, and you can layer security features such as conditional access to help protect users and your business.","hyperlink":"https:\/\/www.microsoft.com\/cloud-platform\/azure-active-directory","td_contact":"microsoft@techdata.com","td_extension":"800-237-8931 x5545006","vendor_id":"43","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"773","product_name":"Azure Advanced Threat Protection","description":"With Azure Advanced Threat Protection, the power and scale of the cloud help you safeguard against threats that are increasing in frequency, severity, and sophistication. Detect and investigate security incidents across your enterprise with a cloud-based security solution that supports the most demanding security analytics workloads.","hyperlink":"https:\/\/azure.microsoft.com\/features\/azure-advanced-threat-protection\/","td_contact":"microsoft@techdata.com","td_extension":"800-237-8931 x5545006","vendor_id":"43","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1994","product_name":"Azure Cosmos DB","description":"A globally distributed database service. The service is designed to allow customers to elastically (and independently) scale throughput and storage across any number of geographical regions","hyperlink":"https:\/\/azure.microsoft.com\/en-us\/services\/cosmos-db\/","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"43","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2009","product_name":"Azure Data Factory & Event Hubs","description":"Event Hubs Capture is the easiest way to get data into Azure. Using Azure Data Lake, Azure Data Factory, and Azure HDInsight, you can perform batch processing and other analytics","hyperlink":"https:\/\/docs.microsoft.com\/en-us\/azure\/event-hubs\/event-hubs-about","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"43","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1978","product_name":"Azure Data Factory - (ADF)","description":"A service designed to allow developers to integrate disparate data sources. It provides access to on-premises data in SQL Server and cloud data in Azure Storage (Blob and Tables) and Azure SQL Database","hyperlink":"https:\/\/docs.microsoft.com\/en-us\/azure\/data-factory\/introduction","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"43","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2061","product_name":"Azure Machine Learning Studio","description":"A collaborative, drag-and-drop tool you can use to build, test, and deploy predictive analytics solutions on your data. Azure Machine Learning Studio (classic) publishes models as web services that can easily be consumed by custom apps or BI tools such as Exce","hyperlink":"https:\/\/studio.azureml.net\/","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"43","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"772","product_name":"Azure MFA","description":"Azure Multi-Factor Authentication helps safeguard access to data and applications while maintaining simplicity for users. It provides additional security by requiring a second form of authentication and delivers strong authentication via a range of easy to use authentication methods. Users may or may not be challenged for MFA based on configuration decisions that an administrator makes.\n\nYour applications or services don't need to make any changes to use Azure Multi-Factor Authentication. The verification prompts are part of the Azure AD sign-in event, which automatically requests and processes the MFA challenge when required.","hyperlink":"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/authentication\/concept-mfa-howitworks","td_contact":"microsoft@techdata.com","td_extension":"800-237-8931 x5545006","vendor_id":"43","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"774","product_name":"Azure Security Center","description":"Get a unified view of security across all of your on-premises and cloud workloads. Automatically discover and onboard new Azure resources, and apply security policies across your hybrid cloud workloads to ensure compliance with security standards. Collect, search, and analyze security data from a variety of sources, including firewalls and other partner solutions.","hyperlink":"https:\/\/azure.microsoft.com\/services\/security-center\/","td_contact":"microsoft@techdata.com","td_extension":"800-237-8931 x5545006","vendor_id":"43","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"2012","product_name":"Azure Stream Analytics","description":"A real-time analytics and complex event-processing engine that is designed to analyze and process high volumes of fast streaming data from multiple sources simultaneously. Analizes real-time telemetry streams from IoT devices","hyperlink":"https:\/\/azure.microsoft.com\/en-us\/services\/stream-analytics\/","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"43","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1173","product_name":"Backup & Replication","description":"New Veeam\u00ae Backup & Replication\u2122 9.5 helps you achieve Hyper-Availability for ALL your virtual, physical and cloud-based workloads. With a single console, you can manage fast, flexible and reliable backup, recovery and replication of all your applications and data.","hyperlink":"https:\/\/www.veeam.com\/vm-backup-recovery-replication-software.html","td_contact":"","td_extension":"","vendor_id":"68","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1172","product_name":"Backup Essentials","description":"Veeam\u00ae Backup Essentials\u2122 delivers Availability for ALL workloads \u2014 virtual, physical, cloud (including VMware vSphere and Microsoft Hyper\u2011V) \u2014 from a single management console. It combines the backup, restore and replication capabilities of Veeam Backup & Replication\u2122 with the advanced monitoring, reporting and capacity planning functionality of Veeam ONE\u2122. Designed for smaller businesses with less than 250 employees and environments no larger than 6 CPU sockets or 50 VMs, Veeam Backup Essentials delivers the exact same, enterprise-level functionality as Veeam Availability Suite\u2122, with a savings of up to 60% or more.","hyperlink":"https:\/\/www.veeam.com\/smb-vmware-hyper-v-essentials.html","td_contact":"","td_extension":"","vendor_id":"68","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1262","product_name":"Barracuda Backup","description":"Barracuda Backup makes it easier and more cost-effective than ever for you to protect all your data from cybercriminals, natural disasters, hardware failures, and more. Physical, virtual, cloud, and SaaS \u2014 a single, integrated solution keeps all your data safe.","hyperlink":"https:\/\/www.barracuda.com\/products\/backup","td_contact":"barracuda@Techdata.com","td_extension":"(800)-237-8931 x5540427","vendor_id":"4","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"30","product_name":"Barracuda Web Application Firewall","description":"The Barracuda Web Application Firewall defeats today\u2019s most sophisticated, complex threats with advanced inspection capabilities that do not impact throughput. It improves overall app performance with built-in application delivery features including SSL offloading, load balancing, and content caching.","hyperlink":"https:\/\/www.barracuda.com\/products\/webapplicationfirewall","td_contact":"barracuda@Techdata.com","td_extension":"(800)-237-8931 x5540427","vendor_id":"4","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,85,87"},{"product_id":"46","product_name":"BBM Enterprise\u00a0","description":"BBM\u00ae Enterprise offers secure text, voice, video, group chat and conferencing on any device, including smartphones and desktops","hyperlink":"BBM Enterprise","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"6","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,64,69,70,73,82,84"},{"product_id":"1473","product_name":"Behavioral Analytics","description":"McAfee Behavioral Analytics is a security analytics technology that alerts you to risk employee behavior and other malicious activity that can put your data and systems at risk.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/behavioral-analytics.html","td_contact":"Tech Data: mcafee@techdata.com\n

DLT: spi@dlt.com<\/p>","td_extension":"Tech Data: 800-237-8931\n

DLT: 703-773-9231<\/p>","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1975","product_name":"Big Data SQL","description":"Enables organizations to immediately analyze data across Apache Hadoop, Apache Kafka, NoSQL, object stores and Oracle Database leveraging their existing SQL skills, security policies and applications with extreme performance","hyperlink":"https:\/\/www.oracle.com\/big-data\/big-data-sql\/","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"46","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"354","product_name":"BIG-IP Application Security Manager","description":"BIG-IP Application Security Manager (ASM) is a powerful WAF that enables you to defeat sophisticated and complex threats while also improving app performance by offloading SSL.","hyperlink":"https:\/\/f5.com\/products\/big-ip\/application-security-manager-asm","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"26","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"10","country_name":"CENTRAL AMERICA","parint_id":"0","type":"0","country":"10"},{"product_id":"1390","product_name":"BIG-IP DNS","description":"BIG-IP DNS improves the performance and availability of your global applications by sending users to the closest or best-performing physical, virtual, or cloud environment. It also hyperscales and secures your DNS infrastructure from DDoS attacks.","hyperlink":"https:\/\/www.f5.com\/products\/big-ip-services\/big-ip-dns","td_contact":"f5@techdata.com","td_extension":"(480) 643-5064","vendor_id":"26","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"355","product_name":"BIG-IP Secure Web Gateway Services (Subscription Service)","description":"Secure Web Gateway Services, when paired with BIG-IP Access Policy Manager (APM), allows you to keep your company connected without putting your network, applications, or data at risk.Secure Web Gateway Services verifies endpoint integrity before and after users connect to the web. It\u2019s the only web access gateway to secure against both inbound and outbound malware.Actively manage web security by blocking access to certain sites. With powerful URL categorization and filters, you can allow, block, or confirm and continue access to sites and applications, on a user-by-user basis. It helps protect your network, apps, and data, without compromising employee productivity.","hyperlink":"https:\/\/f5.com\/products\/big-ip\/secure-web-gateway-services-swgs","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"26","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"10","country_name":"CENTRAL AMERICA","parint_id":"0","type":"0","country":"10"},{"product_id":"1971","product_name":"BigIntegrate Server on Hadoop","description":"(InfoSphere Information Server on Hadoop) provides tools that you can use to transform and cleanse big data by using the resource management capabilities of Hadoop to run jobs on the Hadoop cluster","hyperlink":"https:\/\/www.ibm.com\/products\/bigintegrate?mhsrc=ibmsearch_a&mhq=bigIntegrate","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2000","product_name":"Bigtable","description":"Google's NoSQL Big Data database service. It's the same database that powers many core Google services, including Search, Analytics, Maps, and Gmail","hyperlink":"https:\/\/cloud.google.com\/bigtable","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"111","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1833","product_name":"BitSight for Security Performance","description":"Helps security and risk leaders take a risk-based, outcome-driven approach to managing the performance of their organization\u2019s cybersecurity program through broad measurement, continuous monitoring, and detailed planning and forecasting in an effort to measurably reduce cyber risk.","hyperlink":"https:\/\/www.bitsight.com","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"76","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1834","product_name":"BitSight for Third-Party Risk Management","description":"With BitSight for Third-Party Risk Management, organizations can quickly launch, grow, or optimize their third-party risk management program with the resources they have today.","hyperlink":"https:\/\/www.bitsight.com","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"76","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1832","product_name":"BitSight Security Ratings","description":"Third-party risk management, and security performance management","hyperlink":"https:\/\/www.bitsight.com","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"76","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"43","product_name":"BlackBerry 2FA\u00a0","description":"High-security user authentication that safeguards cloud and standards-based services \u2013 while still protecting your existing VPN","hyperlink":"BlackBerry 2FA","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"6","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,64,69,70,73,82,84"},{"product_id":"44","product_name":"BlackBerry Access\u00a0","description":"Secure Mobile Browser and Remote Access to Web Apps and Intranet","hyperlink":"BlackBerry Access","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"6","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,64,69,70,73,82,84"},{"product_id":"45","product_name":"BlackBerry AtHoc\u00a0","description":"Crisis Communications System","hyperlink":"BlackBerry AtHoc","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"6","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,64,69,70,73,82,84"},{"product_id":"47","product_name":"BlackBerry Connect\u00a0","description":"Secure Instant Messaging & Collaboration","hyperlink":"BlackBerry Connect","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"6","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,64,69,70,73,82,84"},{"product_id":"53","product_name":"BlackBerry Digital Workplace\u00a0","description":"Simple and Secure Access to PIM, Desktops, Apps and Files from Any Device","hyperlink":"BlackBerry Digital Workplace","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"6","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,64,69,70,73,82,84"},{"product_id":"54","product_name":"BlackBerry Dynamics Apps\u00a0","description":"A Full Suite of Mobile Apps","hyperlink":"BlackBerry Dynamics Apps","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"6","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,64,69,70,73,82,84"},{"product_id":"55","product_name":"BlackBerry Dynamics Platform\u00a0","description":"BlackBerry\u00ae Dynamics offers an advanced, mature and tested container for mobile apps.","hyperlink":"BlackBerry Dynamics Platform","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"6","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,64,69,70,73,82,84"},{"product_id":"56","product_name":"BlackBerry Edit\u00a0","description":"BlackBerry\u00ae Edit is an all-in-one enterprise document solution that streamlines mobile editing","hyperlink":"BlackBerry Edit","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"6","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,64,69,70,73,82,84"},{"product_id":"57","product_name":"BlackBerry Enterprise BRIDGE\u00a0","description":"BlackBerry\u00ae Enterprise BRIDGE provides a highly secure option for seamlessly using native Microsoft\u00ae mobile apps on iOS and Android\u2122.","hyperlink":"BlackBerry Enterprise BRIDGE","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"6","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,64,69,70,73,82,84"},{"product_id":"58","product_name":"BlackBerry Enterprise Identity\u00a0","description":"Single Sign-on to Cloud Services","hyperlink":"BlackBerry Enterprise Identity","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"6","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,64,69,70,73,82,84"},{"product_id":"59","product_name":"BlackBerry Hub+\u00a0","description":"Up your game with BlackBerry apps on your Android phone","hyperlink":"BlackBerry Hub+","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"6","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,64,69,70,73,82,84"},{"product_id":"60","product_name":"BlackBerry Notes\u00a0","description":"BlackBerry\u00ae Notes is the secure note-taking solution designed for mobile enterprise users.","hyperlink":"BlackBerry Notes","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"6","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,64,69,70,73,82,84"},{"product_id":"62","product_name":"BlackBerry Secure UEM & Productivity Suites\u00a0","description":"Enabling people to be more productive than ever, while securing and managing all endpoints.","hyperlink":"BlackBerry Secure UEM & Productivity Suites","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"6","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,64,69,70,73,82,84"},{"product_id":"63","product_name":"BlackBerry Spark Communications Services\u00a0","description":"Embed Secure Communication Capabilities into Apps and Smart Devices with CPaaS","hyperlink":"BlackBerry Spark Communications Services","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"6","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"4","country_name":"LATIN AMERICA","parint_id":"0","type":"0","country":"4,6,9,62,64,69,70,73,82,84"},{"product_id":"64","product_name":"BlackBerry Tasks\u00a0","description":"BlackBerry\u00ae Tasks allows users to securely create, open and prioritize tasks synchronized with Microsoft\u00ae Exchange.","hyperlink":"BlackBerry Tasks","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"6","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"4","country_name":"LATIN AMERICA","parint_id":"0","type":"0","country":"4,6,9,62,64,69,70,73,82,84"},{"product_id":"65","product_name":"BlackBerry UEM\u00a0","description":"Unified Endpoint Management with Industry-leading Security","hyperlink":"BlackBerry UEM","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"6","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"4","country_name":"LATIN AMERICA","parint_id":"0","type":"0","country":"4,6,9,62,64,69,70,73,82,84"},{"product_id":"67","product_name":"BlackBerry Workspaces\u00a0","description":"BlackBerry\u00ae Workspaces is the best choice for secure file storage, synchronization and sharing","hyperlink":"BlackBerry Workspaces","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"6","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"4","country_name":"LATIN AMERICA","parint_id":"0","type":"0","country":"4,6,9,62,64,69,70,73,82,84"},{"product_id":"66","product_name":"BlackBerry Work\u00a0","description":"BlackBerry\u00ae Work combines enterprise email, calendar, contacts, presence, document access, document editing and more.","hyperlink":"BlackBerry Work","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"6","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"4","country_name":"LATIN AMERICA","parint_id":"0","type":"0","country":"4,6,9,62,64,69,70,73,82,84"},{"product_id":"1165","product_name":"Boomerang for VMWare Disaster Recovery","description":"Reduce your disaster recovery costs by 90% with simple disaster recovery using AWS or Azure.","hyperlink":"www.unitrends.com\/products","td_contact":"pmunitrends@techdata.com","td_extension":"800-237-8931 x71478","vendor_id":"67","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,10,17"},{"product_id":"13","product_name":"Bot Manager","description":"Stop the most sophisticated bots","hyperlink":"https:\/\/www.akamai.com\/us\/en\/products\/security\/bot-manager.jsp","td_contact":"akamaius@techdata.com","td_extension":"(800)-237-8931 x5540426","vendor_id":"1","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1"},{"product_id":"803","product_name":"Browser Isolation","description":"Browser Isolation allows your users to browse the web while preventing malicious content from impacting your corporate devices.","hyperlink":"https:\/\/www.proofpoint.com\/us\/products\/advanced-threat-protection\/browser-isolation","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 628","vendor_id":"48","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,65,71"},{"product_id":"1853","product_name":"Build Farm for Government","description":"The Polymorphing Build Farm for Government enables any agency to own Polyverse\u2019s polymorphic compiler and control the supply chain of protected packages and updates directly on its own systems, gaining optimal visibility and management over patching and updates. New Polymorphed Linux instances are generated and deployed to registered devices every 24 hours, providing the ultimate protection against cyberattacks and cyber-warfare","hyperlink":"https:\/\/polyverse.com\/products\/build-farm-government-servers\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"81","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1289","product_name":"Capsule Cloud","description":"Your employees expect to do their work whenever and wherever it\u2019s convenient, but their use of laptops and online behaviors can put your corporate network at risk. Check Point Capsule Cloud solves this security dilemma by using a cloud based mobile security container to enforce your in-network security policy on laptops used outside of the corporate network.","hyperlink":"https:\/\/www.checkpoint.com\/products\/capsule-cloud\/","td_contact":"checkpoint@techdata.com","td_extension":"800-237-8931 x5545036","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1639","product_name":"Capture Client","description":"SonicWall Capture Client is an antivirus platform that delivers multiple endpoint and server protection capabilities, including advanced malware protection, network sandbox integration, and support for visibility into encrypted traffic.","hyperlink":"https:\/\/www.sonicwall.com\/en-us\/products\/firewalls\/security-services\/capture-client","td_contact":"sonicwall@techdata.com","td_extension":"800-237-8931 x5545032","vendor_id":"56","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1813","product_name":"Carbon Black Cloud","description":"The VMware Carbon Black Cloud is a cloud-native endpoint protection platform (EPP) that provides what you need to secure your endpoints, using a single lightweight agent and an easy to use console","hyperlink":"https:\/\/www.carbonblack.com\/products\/vmware-carbon-black-cloud\/","td_contact":"vmware@techdata.com","td_extension":"800-237-8931 x5545048","vendor_id":"70","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"71","product_name":"Carbon Black Cloud","description":"The VMware Carbon Black Cloud is a cloud-native endpoint protection platform (EPP) that provides what you need to secure your endpoints, using a single lightweight agent and an easy to use console","hyperlink":"https:\/\/www.carbonblack.com\/products\/vmware-carbon-black-cloud\/","td_contact":"carbonblackus@techdata.com","td_extension":"800-237-8931 x5545048","vendor_id":"9","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1272","product_name":"Carbonite Availability","description":"Continuous replication for physical, virtual and cloud workloads with push-button failover for keeping critical systems online all the time.","hyperlink":"https:\/\/www.carbonite.com\/products\/high-availability\/","td_contact":"carbonite@techdata.com","td_extension":"800-237-8931 x5540414","vendor_id":"10","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"73","product_name":"Carbonite Cloud Backup","description":"Automatic cloud backup for business data, featuring flexible retention options\u2014up to 7 years.","hyperlink":"https:\/\/www.carbonite.com\/products\/cloud-backup\/","td_contact":"carbonite@techdata.com","td_extension":"800-237-8931 x5540414","vendor_id":"10","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,4,6,9,10,12,14,16,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61"},{"product_id":"1274","product_name":"Carbonite Endpoint Protection","description":"Automatic, secure data protection for endpoints\u2013with deployment flexibility for large, distributed organizations.","hyperlink":"https:\/\/www.carbonite.com\/products\/carbonite-endpoint-protection\/","td_contact":"carbonite@techdata.com","td_extension":"800-237-8931 x5540414","vendor_id":"10","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"75","product_name":"Carbonite Hybrid Backup","description":"Automatic, flexible business backup that combines the speed of local data recovery with the added protection of cloud backup.","hyperlink":"https:\/\/www.carbonite.com\/products\/hybrid-backup-solutions\/","td_contact":"carbonite@techdata.com","td_extension":"800-237-8931 x5540414","vendor_id":"10","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,4,6,9,10,12,14,16,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61"},{"product_id":"1276","product_name":"Carbonite Migrate","description":"Structured, repeatable data migration from any source to any target with no data loss and no disruption in service.","hyperlink":"https:\/\/www.carbonite.com\/products\/cloud-migration\/","td_contact":"carbonite@techdata.com","td_extension":"800-237-8931 x5540414","vendor_id":"10","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"77","product_name":"Carbonite Onsite Backup","description":"Automatic backup for business data that enables rapid recovery of files, folders and complete systems.","hyperlink":"https:\/\/www.carbonite.com\/products\/onsite-backup-software\/","td_contact":"carbonite@techdata.com","td_extension":"800-237-8931 x5540414","vendor_id":"10","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,4,6,9,10,12,14,16,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61"},{"product_id":"1278","product_name":"Carbonite Recover","description":"Keep a secondary copy of any system in the cloud for instant failover in the event of an outage.","hyperlink":"https:\/\/www.carbonite.com\/products\/carbonite-recover\/","td_contact":"carbonite@techdata.com","td_extension":"800-237-8931 x5540414","vendor_id":"10","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"385","product_name":"CASB","description":"Cloud Access Security Broker\nComplete security for all cloud applications. Period.","hyperlink":"https:\/\/www.forcepoint.com\/product\/casb-cloud-access-security-broker","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"28","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,80"},{"product_id":"1591","product_name":"CASB Cloud Service","description":"Oracle CASB Cloud Service is a multimode cloud access security broker (CASB) that provides advanced threat analytics using user behavior analytics (UBA) and third-party feeds, configuration seeding, monitoring and alerts, and Shadow IT discovery.","hyperlink":"https:\/\/www.oracle.com\/cloud\/paas\/casb-cloud-service.html","td_contact":"spi@dlt.com","td_extension":"703-773-9221","vendor_id":"46","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"949","product_name":"Certificate Lifecycle Platform","description":"Enable end-to-end information protection, authentication, and secure control for governments and large institutions with PKI.","hyperlink":"https:\/\/community.broadcom.com\/symantecenterprise\/communities\/community-home?CommunityKey=24e6cd72-e3fc-4f77-b346-f8740e624c56","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"630","product_name":"Change Control","description":"McAfee Change Control enforces change policies and alerts you to file integrity issues, while providing options to easily block unauthorized changes to critical system files and directories.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/change-control.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1537","product_name":"Change Guardian\u00a0","description":"Identifies and responds to unmanaged changes that could lead to security breaches. Protect critical data, reduce risk and manage change with Change Guardian","hyperlink":"https:\/\/www.netiq.com\/products\/change-guardian\/","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"1303","product_name":"Check Point MSSP Program","description":"The Check Point Managed Security Service Provider (MSSP) program is based on Check Points 5th Generation security architecture and enables you as an MSP to offer your customers the best security available from the entire Check Point portfolio. CP MSP program provides for a scalable fully integrated security solution based on custmer needs and allows the MSP to manage customer gateways; physical, virtual, and hybrid all from one platform. With the MSP program you have a cost-effective and predictable expense projection to help you remain competitive in the security services industry while operating a value-added business","hyperlink":"","td_contact":"checkpoint@techdata.com \n(727) 539-7429 x-82127","td_extension":"800-237-8931 x5545036","vendor_id":"12","service_tiering":"No tiering. Customers pay monthly for the appliances or services they need. Support is included in the monthly cost. The MSP partner provides all front line support and management.","partner_benefits":"

Check Point\u2019s MSSP Program allows you to lower the TCO and control the cash flow thanks to: <\/p>\n

\u2022  Minimal upfront investment   <\/p>\n

\u2022  Easy & efficient management, reducing man hours & expenses       <\/p>\n

\u2022  Special Co-MSP support  <\/p>\n

\u2022  No assets on the book     <\/p>\n

\u2022  Complete Check Point offering available through MSSP program providing flexibility in partners MSSP offerings          <\/p>\n

\u2022  Check Point MSSP partners receive gold standard, software based, scalable, management platform (MDM) <\/p>","typeof_service":"

Managed Security Service Building Block Solution:<\/strong>  Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":"

\u2022   Fixed monthly pricing that include product, support and services for a 3,4 or 5 year commitment<\/p>\n

\u2022  Check Point\u2019s full offering, both software and physical, ranging from SMB to high end<\/p>\n

\u2022  Co-MSP Support that includes 24x7 support SLA with affordable costs <\/p>\n

\u2022  All equipment & licensing in MSSP deals is owned by Check Point throughout the agreement period, therefore, no assets are on the books, eliminating related expenses <\/p>\n

\u2022  E14Flexible delivery methods to suit you and your customers\u2019 needs. This includes both on & offpremise solutions, along with mobile, endpoint and mailbox protection<\/p>","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"125","product_name":"CheckPoint Incident Response","description":"When the worst happens and you get attacked, trust Check Point to mitigate your risk with our Incident Response Service. Just call our dedicated hotline anytime you experience a security threat and our 24\u00d77 experts will instantly respond to help you contain the threat, minimize your losses and return to business as usual. Our Incident Response service will also help you mitigate future risks with post-incident reports and security best practices advisement.","hyperlink":"https:\/\/www.checkpoint.com\/support-services\/threatcloud-incident-response\/","td_contact":"checkpoint@techdata.com","td_extension":"800-237-8931 x5545036","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1293","product_name":"CheckPointIncident Response","description":"When the worst happens and you get attacked, trust Check Point to mitigate your risk with our Incident Response Service. Just call our dedicated hotline anytime you experience a security threat and our 24\u00d77 experts will instantly respond to help you contain the threat, minimize your losses and return to business as usual. Our Incident Response service will also help you mitigate future risks with post-incident reports and security best practices advisement.","hyperlink":"https:\/\/www.checkpoint.com\/support-services\/threatcloud-incident-response\/","td_contact":"checkpoint@techdata.com","td_extension":"800-237-8931 x5545036","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1361","product_name":"Cisco Adaptive Security Appliance Virtual (ASAv)","description":"The Adaptive Security Virtual Appliance is a virtualized network security solution. It supports both traditional and next-generation software-defined networks (SDN), as well as\u00a0Cisco Application Centric Infrastructure\u00a0(ACI) environments. The ASAv provides policy enforcement and threat inspection across heterogeneous, multisite environments.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/virtual-adaptive-security-appliance-firewall\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"No Tiering. Monthly subscription based upon stateful inspection throughput","partner_benefits":"

\u2022  Monthly OPEX post-paid utility licensing model<\/p>\n

\u2022  Low Risk:  No buying up-front<\/p>\n

\u2022  Flexible and Scalable-No shelfware or stranded licensing<\/p>\n

\u2022  Operationally Efficient:  One contract for all products, no term tracking, P.O.s not required on every opportunity<\/p>","typeof_service":"

Managed Security Service Building Block Solution:<\/strong>  Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":"

\u2022  Purpose-built for Data Center Security<\/p>\n

\u2022  Fully Integrated ACI Security<\/p>\n

\u2022  Management Options to Fit Your Needs<\/p>","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"199","product_name":"Cisco 3000 Series Industrial Security Appliances (ISA)","description":"Gain the proven security protection of the Cisco ASA FirePOWER services. Our ruggedized 3000 appliance currently provides the industry's widest range of OT specific access control, threat detection, and application visibility for the harshest and most demanding of environments. It offers four high-performance Ethernet data links in a DIN rail or rack-mount form factor.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/industrial-security-appliance-isa\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1305","product_name":"Cisco 4000 Series Integrated Services Routers","description":"The 4000 Series offers secure WAN connectivity, application experience, unified communications, network automation, virtualization, and branch and direct Internet access security solutions in one platform.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/routers\/4000-series-integrated-services-routers-isr\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"201","product_name":"Cisco Adaptive Security Applicance (ASA) Software","description":"Cisco Adaptive Security Appliance (ASA) Software is the core operating system for the Cisco ASA Family. It delivers enterprise-class firewall capabilities for ASA devices in an array of form factors - standalone appliances, blades, and virtual appliances - for any distributed network environment. ASA Software also integrates with other critical security technologies to deliver comprehensive solutions that meet continuously evolving security needs.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/adaptive-security-appliance-asa-software\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1307","product_name":"Cisco Adaptive Security Device Manager","description":"Use a local, web-based interface to manage the Cisco ASA 5500 Series, 5500-X Series, Cisco AnyConnect Secure Mobility Client, and legacy Cisco IDS\/IPS sensors.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/security-management\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"203","product_name":"Cisco Adaptive Security Virtual Appliance (ASAv)","description":"The Adaptive Security Virtual Appliance is a virtualized network security solution. It supports both traditional and next-generation software-defined networks (SDN), as well as Cisco Application Centric Infrastructure (ACI) environments. The ASAv provides policy enforcement and threat inspection across heterogeneous, multisite environments.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/virtual-adaptive-security-appliance-firewall\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1309","product_name":"Cisco Advanced Malware Protection (AMP)","description":"Get global threat intelligence, advanced sandboxing, and real-time malware blocking to prevent breaches with Cisco Advanced Malware Protection (AMP). But because you can\u2019t rely on prevention alone, AMP also continuously analyzes file activity across your extended network, so you can quickly detect, contain, and remove advanced malware.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/advanced-malware-protection\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"205","product_name":"Cisco Advanced Phishing Protection","description":"Cyber attackers are continuously finding new ways to infiltrate your network. BEC and other identity deception\u2013based threats are examples of new ways attackers are breaching organizations successfully. Business Email Compromise (BEC) has cost companies $5.3 billion globally according to the FBI1 . Organizations need more layers of protection to defend users from fraudulent senders.\nCisco Advanced Phishing Protection further augments sender authentication and BEC detection capabilities already available in Cisco Email Security. It integrates machine learning that combines local identity and relationship modeling with behavior analytics to protect against identity deception\u2013based threats. It models trusted email behavior, within organizations and between individuals. This identity intelligence continuously adapts to drive a real-time understanding of senders and prevent costly breaches.","hyperlink":"https:\/\/www.cisco.com\/c\/dam\/en\/us\/products\/collateral\/security\/cloud-email-security\/at-a-glance-c45-740894.pdf","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1311","product_name":"Cisco AMP for Endpoints","description":"Cisco AMP for Endpoints is a next-generation endpoint security solution that prevents, detects, and responds to advanced threats.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/amp-for-endpoints\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"207","product_name":"Cisco AnyConnect Network Visibility Module","description":"The Cisco AnyConnect\u00ae Network Visibility Module helps you see user and endpoint behavior both on and off premises. It collects standard flows from endpoints (laptops, for example) along with context like user, application, device, location, and destination information. IT administrators can collect and analyze this rich data. They can then better defend the organization against potential security threats as well as address a wide range of network operations challenges.","hyperlink":"https:\/\/www.cisco.com\/c\/dam\/en\/us\/products\/collateral\/security\/anyconnect-secure-mobility-client\/at-a-glance-c45-736671.pdf","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1313","product_name":"Cisco AnyConnect Secure Mobility Client","description":"Empower your employees to work from anywhere, on company laptops or personal mobile devices, at any time. AnyConnect simplifies secure endpoint access and provides the security necessary to help keep your organization safe and protected.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/anyconnect-secure-mobility-client\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"209","product_name":"Cisco ASA 5500-X with FirePOWER Services","description":"Beat sophisticated cyber attacks with a superior security appliance. We offer the industry\u2019s first threat-focused next-generation firewall (NGFW), the ASA 5500-X Series.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/asa-firepower-services\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1315","product_name":"Cisco Cloudlock","description":"Cisco Cloudlock is a cloud-native cloud access security broker (CASB) that helps you move to the cloud safely. It protects your cloud users, data, and apps. Cloudlock's simple, open, and automated approach uses APIs to manage the risks in your cloud app ecosystem. With Cloudlock you can more easily combat data breaches while meeting compliance regulations.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/cloudlock\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"211","product_name":"Cisco Cognitive Threat Analytics","description":"Today\u2019s attacks are more effective than ever. And organizations struggle to secure their rapidly changing networks against them. But you can detect even the most sophisticated attacks with Cognitive Threat Analytics. Deployed by more than 5 million users, it requires no additional hardware or software. And it integrates with several Cisco security solutions.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/cognitive-threat-analytics\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1317","product_name":"Cisco Content Security Management Appliance","description":"Centrally manage Cisco Email Security and Web Security Appliances.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/security-management\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1084","product_name":"Cisco dCloud (POV)","description":"Cisco Managed Security Proof of Value (POV) Assessment is a no cost security assessment over the course of two weeks on your customers\u2019 premises. This service leverages an onsite Cisco ASA which acts a sensor with Firepower Services enabled. The collected data is then transmitted to a Cisco Firepower Management Center in the cloud, a risk report is then generated by our Security Engineers and reviewed in detailed with our Tech Data partner. This service helps to position Cisco Security Solutions to customers as it delivers threat-focused protection, real-time network visibility, and is the most robust next-generation firewalls and threat remediation systems in the industry with no need to purchase subscription licenses.","hyperlink":"https:\/\/tdcontent.techdata.com\/techsolutions\/security\/Services.aspx","td_contact":"SecurityServices@TechData.com","td_extension":"800-237-8931 ext. 5540508","vendor_id":"62","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"213","product_name":"Cisco Defense Orchestrator","description":"Manage security policy from the cloud, simply and consistently. Works across a range of Cisco security products, including ASA firewalls, Cisco ASA with FIrePOWER Services, Umbrella cloud web security, and Web Security Appliances.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/security-management\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1319","product_name":"Cisco Domain Protection","description":"DMARC is a technology that makes it easier for email senders and receivers to determine if a message is from a legitimate sender. Identifying all legitimate senders can be challenging because\nof the complexity of an organization\u2019s email ecosystem. This process can be time consuming and difficult to implement without the right tools, processes, and knowledge.","hyperlink":"https:\/\/www.cisco.com\/c\/dam\/en\/us\/products\/collateral\/security\/cloud-email-security\/at-a-glance-c45-740937.pdf","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"215","product_name":"Cisco Duo","description":"For organizations of all sizes that need to protect sensitive data at scale, Duo is the user-friendly zero-trust security platform for all users, all devices and all applications.\n\nMFA is the foundation for zero trust. Duo verifies that your users are who they say they are, before they access your data \u2014 and with multiple second-factor options, including one-touch Duo Push, users can easily authenticate in seconds. Monitor the health of every device across your organization in real-time, whether it's corporate-managed or not. With Duo's device trust features, you can customize access requirements at the device level, and because it's a cloud-based solution, you'll stay ahead of the latest security threats. Grant your users just the right amount of access. Duo's advanced policy enforcement capabilities let you define security requirements at the user, device, and application level, based on contextual factors like location and update status. Enable your mobile workforce without compromising your company's data. Duo provides modern remote access solutions and protects existing IT infrastructure, making it easy to onboard new employees and contractors and allowing employees to work on the go. Finally, Duo's SSO (Single Sign-On) grants users secure access to all protected applications (on-premises or cloud-based) through a uniform, frictionless interface that's accessible from anywhere.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/adaptive-multi-factor-authentication.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"216","product_name":"Cisco Dynamic Multipoint VPN (DMVPN)","description":"Dynamic Multipoint VPN (DMVPN) is a Cisco IOS Software solution for building scalable IPsec Virtual Private Networks (VPNs). Cisco DMVPN uses a centralized architecture to provide easier implementation and management for deployments that require granular access controls for diverse user communities, including mobile workers, telecommuters, and extranet users.\n\nCisco DMVPN allows branch locations to communicate directly with each other over the public WAN or Internet, such as when using voice over IP (VOIP) between two branch offices, but doesn't require a permanent VPN connection between sites. It enables zero-touch deployment of IPsec VPNs and improves network performance by reducing latency and jitter, while optimizing head office bandwidth utilization.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/dynamic-multipoint-vpn-dmvpn\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1321","product_name":"Cisco Email Encryption","description":"Despite the rise in text messaging, instant messaging, social networking, and other forms of communication, email continues to be the predominant business collaboration tool. The unsecured nature of email, however, has caused the inadvertent and malicious exposure of sensitive information.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/email-encryption\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"218","product_name":"Cisco Email Security","description":"Your cloud email needs an additional layer of protection against threats like ransomware, business email compromise, phishing, and more. Cisco provides you with intelligence from one of the largest threat detection teams in the world, along with the robust features you need to protect your users. Microsoft Office 365 and Cisco Email Security are simply better together.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/email-security\/office-365.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1323","product_name":"Cisco Firepower 2100 Series","description":"Gain business resiliency through superior security with sustained performance. The Firepower 2100 Series has an innovative dual multicore CPU architecture that optimizes firewall, cryptographic, and threat inspection functions simultaneously. Now, achieving security doesn\u2019t come at the expense of network performance.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/firepower-2100-series\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"220","product_name":"Cisco Firepower 4100 Series","description":"Stop more threats with our fully integrated next-generation firewall (NGFW) appliance. The 4100 Series\u2019 1-rack-unit size is ideal at the Internet edge and in high-performance environments. It shows you what\u2019s happening on your network, detects attacks earlier so you can act faster, and reduces management complexity.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/firepower-4100-series\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1325","product_name":"Cisco Firepower 9000 Series","description":"This carrier-grade next-generation firewall (NGFW) is ideal for data centers and other high-performance settings that require low latency and high throughput. Deliver scalable, consistent security to workloads and data flows across physical, virtual, and cloud environments. With tightly integrated services, the Firepower 9000 Series lowers costs and supports open, programmable networks.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/firepower-9000-series\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"222","product_name":"Cisco Firepower Device Manager","description":"Manage a small-scale Firepower NGFW deployment locally, using the web. Available on the new Cisco Firepower 2100 Series and select ASA 5500-X models.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/security-management\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1327","product_name":"Cisco Firepower Management Center","description":"Centrally manage events and policies. Analyze threats. Works with Cisco network security solutions such as ASA with FirePOWER services, Cisco Firepower NGFWs, Firepower NGIPS, FirePOWER AMP, and FirePOWER Threat Defense for ISR.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/security-management\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"224","product_name":"Cisco Group Encrypted Transport VPN","description":"Networks today need to support all forms of media-including data, voice, and video-to enhance business communications and lower operating costs. Voice and video applications are accelerating the need for instantaneous, branch-to-branch communications, while network security risks are increasing. Regulatory compliance has become essential. To solve these pressing challenges, your organization needs an intelligent network that securely integrates applications in a way that is easy to manage.\n\nCisco Group Encrypted Transport VPN, eliminates the need for compromise between network intelligence and data privacy in private WAN environments. Service providers can finally offer managed encryption without a provisioning and management nightmare since GET VPN simplifies the provisioning and management of VPN. GET VPN defines a new category of VPN, one that does not use tunnels.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/group-encrypted-transport-vpn\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1329","product_name":"Cisco Identity Services Engine","description":"Next-generation secure network access...\nGain awareness of everything hitting your network. Provide access consistently and efficiently. Relieve the stress of complex access management.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/identity-services-engine\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"226","product_name":"Cisco IOS Easy VPN","description":"Give your employees great flexibility in performing their job functions with anytime, anyplace network access. Cisco IOS Easy VPN supports employees who need network access from home after hours and weekends to perform business functions such as answering email or using networked applications. VPN technology helps your company increase productivity by improving response times and enabling work without interruptions common in an office environment.\n\nUsing standards-based IPsec technology, Cisco IOS Easy VPN greatly simplifies VPN deployment with centralized VPN management across all Cisco VPN devices. It supports integration of a variety of remote devices within a single deployment and with a consistent policy and key management method, which simplifies remote side administration.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/ios-easy-vpn\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1331","product_name":"Cisco IOS Firewall","description":"Cisco IOS Firewall helps ensure your network's availability and the security of your company's resources by protecting the network infrastructure against network- and application-layer attacks, viruses, and worms. It protects unified communications by guarding Session Initiation Protocol (SIP) endpoints and call-control resources. Cisco IOS Firewall is a stateful firewall solution, certified by Common Criteria (EAL4).","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/ios-firewall\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"228","product_name":"Cisco IOS Flexible Packet Matching (FPM)","description":"Protect against existing and emerging threats at all network entry points with Cisco IOS Flexible Packet Matching (FPM). Cisco FPM uses flexible and granular Layer 2-7 pattern matching deep within the packet header or payload to provide a rapid first line of defense against network threats and notable worms and viruses.\n\nA key component of the Cisco IOS Integrated Threat Control framework, Cisco FPM complements the Cisco IOS Intrusion Prevention System (IPS) by supporting custom filters that can be defined and deployed more rapidly than IPS signatures or antivirus patterns can be updated. It gives network security administrators powerful tools to identify miscreant traffic and immediately drop or log it for audit purposes.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/ios-flexible-packet-matching-fpm\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1333","product_name":"Cisco IOS FlexVPN","description":"Large customers deploying IPSec VPN over IP networks are faced with high complexity and high cost of deploying multiple types of VPN to meet different types of connectivity requirements. Customers often have to learn different types of VPNs to manage and operate different types of network. And once a technology is selected for a deployment, migrating or adding functionality to enhance the VPN is often avoided. FlexVPN was created to simplify the deployment of VPNs, to address the complexity of multiple solutions, and as a unified ecosystem to cover all types of VPN: remote access, teleworker, site to site, mobility, managed security services, and others.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/collateral\/routers\/asr-1000-series-aggregation-services-routers\/data_sheet_c78-704277.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"230","product_name":"Cisco IOS Intrusion Prevention System (IPS)","description":"Cisco IOS Intrusion Prevention System (IPS) is an inline, deep-packet inspection feature that effectively mitigates a wide range of network attacks. A component of the Cisco IOS Integrated Threat Control framework and complemented by Cisco IOS Flexible Packet Matching feature, Cisco IOS IPS provides your network with the intelligence to accurately identify, classify, and stop or block malicious traffic in real time.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/ios-intrusion-prevention-system-ips\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1335","product_name":"Cisco IOS Network Address Translation (NAT)","description":"Cisco IOS Network Address Translation (NAT) is primarily designed for IP address conservation and network design simplification, but it also serves as a security mechanism by hiding a host's IP address and ports as part of a private network. The application enables a private network that uses unregistered (private) IP addresses to connect to the Internet and allows overlapping addressing schemes to communicate with each other.\n\nPart of the Cisco IOS Integrated Threat Control framework, NAT operates on routers and switches by connecting two network segments and translating the private addresses in the internal network to the public address on the external network. It can be configured to show to the outside world only one address for the entire network.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/ios-network-address-translation-nat\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"232","product_name":"Cisco IOS Network Foundation Protection (NFP)","description":"Connecting to the Internet is essential for many organizations, but it exposes the network infrastructure to a myriad of threats and risks. It is critical to secure the network foundation by protecting network elements and their communications. Cisco Network Foundation Protection (NFP) combines a number of security features and techniques to secure routers themselves, helping to ensure the availability of the network even when it is under attack.\n\nPart of the Cisco IOS Integrated Threat Control framework, Cisco NFP provides infrastructure protection with a series of IOS features designed specifically to protect the device control plane by \"locking down\" services and routing protocols; the device data plane from malicious traffic; and the device management plane.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/ios-network-foundation-protection-nfp\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1337","product_name":"Cisco IOS SSL VPN","description":"Securely widen your network's reach to wherever employees need access. Cisco IOS SSL VPN, the industry's first router-based Secure Sockets Layer VPN solution, offers \"anywhere\" connectivity not only from company-managed resources but also from employee-owned PCs, contractor or business partner desktops, and Internet kiosks. Cisco Secure Desktop, a component of SSL VPN, provides data theft prevention even on noncorporate devices.\n\nSSL VPNs offers remote-access connectivity from almost any Internet-enabled location using a standard Web browser and its native SSL encryption. Required software is dynamically downloaded on an as-needed basis, thereby minimizing desktop software maintenance. Cisco IOS SSL VPN supports clientless access to applications such as intranet content, email, network file shares, and Citrix. The Cisco SSL VPN Client enables full network access remotely to virtually any application.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/ios-sslvpn\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"234","product_name":"Cisco Meraki Cloud Managed MDM","description":"Unify management and control of thousands of mobile and desktop devices in the secure, browser-based Meraki dashboard. Drive your organization\u2019s mobility initiatives by seamlessly onboarding new devices and automating application of security policies.","hyperlink":"https:\/\/meraki.cisco.com\/products\/systems-manager","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1339","product_name":"Cisco Meraki Cloud Managed Security Appliances","description":"Every Meraki Security Appliance supports several features, like a stateful firewall and integrated Sourcefire intrusion prevention (IPS) engine, to keep networks secure. Threat definitions and filter lists are seamlessly updated, ensuring every site has bleeding-edge protection from the latest vulnerabilities and troublesome websites.","hyperlink":"https:\/\/meraki.cisco.com\/products\/appliances\/","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"236","product_name":"Cisco Network Visibility and Segmentation","description":"Networks are ever more complex. And devices are proliferating by the minute. It\u2019s harder to see what\u2019s on the network, and it\u2019s harder to spot a threat. Our Network Visibility and Segmentation solution combines Cisco Stealthwatch Enterprise, the Cisco Identity Services Engine, and Cisco TrustSec technology. You get fast threat detection, highly secure access, and software-defined segmentation.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/network-visibility-segmentation\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1363","product_name":"Cisco Next Generation Firewall Virtual (NGFWv)","description":"Prevent breaches, get deep visibility to detect and stop threats fast, and automate your network and security operations to save time and work smarter.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/collateral\/security\/firepower-ngfw-virtual\/datasheet-c78-742858.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"No Tiering. Monthly subscription based upon features and throughput","partner_benefits":"

\u2022   Monthly OPEX post-paid utility licensing model<\/p>\n

\u2022   Low Risk:  No buying up-front<\/p>\n

\u2022   Flexible and Scalable-No shelfware or stranded licensing<\/p>\n

\u2022   Operationally Efficient:  One contract for all products, no term tracking, P.O.s not required on every opportunity<\/p>","typeof_service":"

Managed Security Service Building Block Solution:<\/strong>  Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":"

\u2022   Stop more threats-Contain known and unknown malware with leading Cisco\u00ae Advanced Malware Protection (AMP) and sandboxing.<\/p>\n

\u2022   Gain more insight-Gain superior visibility into your environment with Cisco Firepower next-gen IPS.  Automated risk rankings and impact flags identify priorities for your team.<\/p>\n

\u2022   Detect earlier, act faster-The Cisco Annual Security Report identifies a 100-day median time from infection to detection, across enterprises. Reduce this time to less than a day.<\/p>\n

\u2022   Reduce complexity-Get unified management and automated threat correlation across tightly integrated security functions, including application firewalling, NGIPS, and AMP.<\/p>\n

\u2022   Get more from your network-Enhance security, and take advantage of your existing investments, with optional integration of other Cisco and third-party networking and security solutions.<\/p>","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"237","product_name":"Cisco Next-Generation Firewall Cloud Solutions","description":"Build your virtual security solution on the trusted physical Cisco Next-Generation Firewalls. Protect your virtual and physical data center workloads as they expand, contract, or shift location over time, and securely connect web, data center, and applications workstreams with VPN as a service in virtual domains or private cloud environments.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/solutions\/security\/next-generation-firewall-cloud-solutions\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1342","product_name":"Cisco Next-Generation Firewalls","description":"Block more threats and quickly mitigate those that do breach your defenses with the industry\u2019s first threat-focused NGFW. Our Cisco Firepower NGFW hardware and software options combine our proven network firewall with the industry\u2019s most effective next-gen IPS and advanced malware protection. All so you can get more visibility, be more flexible, save more, and protect better.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/firewalls\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"239","product_name":"Cisco Next-Generation Intrusion Prevention System (NGIPS)","description":"NGIPS receives new policy rules and signatures every two hours, so your security is always up to date. Cisco Talos leverages the world\u2019s largest threat detection network to bring security effectiveness to every Cisco security product. This industry-leading threat intelligence works as an early-warning system that constantly updates with new threats.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/ngips\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1344","product_name":"Cisco Registered Envelope Service","description":"Registered Envelope Service changes your email experience with more control, including read receipts, email recall, email expiration, and control over forward and reply capabilities, in your favorite email client. Registered Envelope Service removes the complexity of encryption and key management, so you can send and receive secure messages as easily as unencrypted emails. Cisco offers unique smartphone support to deliver the same experience to mobile users.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/registered-envelope-service\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"241","product_name":"Cisco Router Security - WAN and Network Protection","description":"Protect your data from malware, intrusions, denial-of-service attacks, and advanced threats. Cisco routers work together to extend corporate security to your branch and WAN to defend your entire network. With integrated network security, you get protection against sophisticated threats while maintaining outstanding performance and lowering costs.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/router-security\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1346","product_name":"Cisco Security Awareness","description":"Cisco Security Awareness provides flexibility and support to effectively deploy your phishing\nsimulations, awareness training \u2014 or both \u2014 and measure and report results. Empower your security\noperations team with the ability to focus on real time threats and not end user mitigation. Their product\nprovides the education that helps employees to work smarter and safer.\nHigh-quality content is central to any security awareness program and a pre-requisite to provide\na training experience that is fun, compelling and relevant. Their content is developed by a team of\nexperts using a proven pedagogical approach and methodology for adult learning that ensures the\nhighest degree of engagement. Your users will learn about cyber security in a way that expands user\nknowledge and increases their affinity for your organization to help protect it.","hyperlink":"https:\/\/www.cisco.com\/c\/dam\/en\/us\/products\/se\/2020\/1\/Collateral\/security-awareness-aag.pdf","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"243","product_name":"Cisco Security Connector","description":"Although iOS is secure, the Internet is not. But you can now protect your business as it grows through mobility, thanks to the Cisco Security Connector. For the first time, you\u2019ll get visibility into network traffic on iOS devices and can block connections to malicious sites, anywhere users go.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/security-connector\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1348","product_name":"Cisco Security Management Portfolio","description":"Security Management Your Way\nLocal, cloud-based or centralized solutions to fit your specific needs.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/security-management\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"245","product_name":"Cisco Security Manager","description":"Centrally manage Cisco ASA firewalls, Cisco AnyConnect Secure Mobility Client, and legacy Cisco IDS\/IPS sensors.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/security-management\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1350","product_name":"Cisco Snort for the 4000 Series ISRs","description":"Based on the open-source Snort IPS, the Cisco Snort IPS is a costeffective, industry-recognized approach to safeguarding your branch connections and data. You simply maintain the Snort IPS engine on your 4000 Series routers by downloading rule set updates from the Cisco Talos Security Intelligence and Research Group. Cisco Talos network security experts work around the clock to proactively discover, assess, and respond to the latest trends in hacking activities, intrusion attempts, malware, and vulnerabilities. Snort IPS complements other integrated security features on the 4000 Series routers such as VPNs, firewalls, and Cisco Cloud Web Security for a cost-effective yet secure network infrastructure solution.","hyperlink":"https:\/\/www.cisco.com\/c\/dam\/en\/us\/products\/collateral\/security\/router-security\/at-a-glance-c45-735895.pdf","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"247","product_name":"Cisco Stealthwatch Cloud","description":"Improve security and incident response across the distributed network, from the office to the public cloud. Detect threats in real time. Reduce false positives. Gain actionable security intelligence to make your security team more efficient. And do it all while lowering costs.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/stealthwatch-cloud\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1352","product_name":"Cisco Stealthwatch Endpoint License","description":"With the Cisco Stealthwatch\u2122 Endpoint License you can conduct in-depth, context-rich investigations into endpoints that exhibit suspicious behavior. Security professionals need to see into the applications and processes that occur at the network edge, down to remote devices. The Cisco Stealthwatch endpoint solution permits security professionals to conduct more efficient, context-rich investigations into user machines that are exhibiting suspicious behavior. Tightly integrated with the Cisco AnyConnect\u00ae Network Visibility Module, the Stealthwatch Endpoint solution provides greater network visibility while enhancing the investigation of endpoints. It offers easy access to endpoint applications and information that security analysts need to speed incident response and remediate policy violations.","hyperlink":"https:\/\/www.cisco.com\/c\/dam\/en\/us\/solutions\/collateral\/security\/stealthwatch-datasheet.pdf","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"249","product_name":"Cisco Stealthwatch Enterprise","description":"Scalable visibility and security analytics across your business...\nOutsmart emerging threats in your digital business with industry-leading machine learning and behavioral modeling. Know who is on the network and what they are doing using telemetry from your network infrastructure. Detect advanced threats and respond to them quickly. Protect critical data with smarter network segmentation. And do it all with a solution that grows with your business.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/stealthwatch\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1354","product_name":"Cisco Tetration","description":"Cisco Tetration offers holistic workload protection for multicloud data centers by enabling a zero-trust model using segmentation. This approach allows you to identify security incidents faster, contain lateral movement and reduce your attack surface. Its infrastructure-agnostic approach supports both on-premises and public cloud workloads.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/data-center-analytics\/tetration-analytics\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"251","product_name":"Cisco TrustSec technology","description":"Software-defined segmentation...\nYou need to segment your network to protect critical business assets. But traditional approaches are complex. Cisco TrustSec software-defined segmentation is simpler to enable than VLAN-based segmentation. Policy is defined through security groups. It is open through IETF, available within OpenDaylight, and supported on third-party and Cisco platforms.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/solutions\/enterprise-networks\/trustsec\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1356","product_name":"Cisco Umbrella","description":"Cisco Umbrella is a cloud-delivered platform that provides visibility and enforcement both on and off the corporate network, and serves as your first line of defense against threats. Because it is cloud-delivered, it uses live threat intelligence versus static feeds that are limited by appliance processing power. So, you get the protection you need to defend against malware infections and breaches over all ports and protocols for the most comprehensive coverage. \n\nAs the industry\u2019s first Secure Internet Gateway in the cloud, Cisco Umbrella provides the first line of defense against threats on the internet. Because Umbrella is delivered from the cloud, it is the easiest way to protect all of your users in minutes.","hyperlink":"https:\/\/info.umbrella.com\/happily-ever-after.html?utm_medium=web-referral&utm_source=homepage&utm_campaign=happy-ever-after-homepage","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"253","product_name":"Cisco Umbrella Branch","description":"Cisco Umbrella Branch is a cloud-delivered security service for the Cisco Integrated Services Router (ISR). It provides the first layer of defense against threats at branch offices. And it offers the simplest, fastest way to protect every device on your branch network. You gain visibility and enforcement at the DNS layer, so you can block requests to malicious domains and IPs before a connection is ever made.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/router-security\/umbrella-branch.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1365","product_name":"Cisco Umbrella MSLA Insights, Easy Protect, Mobile Protect","description":"Umbrella Easy Protect is a cloud-based security platform at the DNS (domain name system) layer that provides the first line of defense against threats on the Internet by blocking requests to malicious destinations (domains, IPs, URLs) before a connection is established. It provides protection against threats over all ports and protocols, and can protect Internet access across all devices on Your network, all office locations, and roaming users","hyperlink":"https:\/\/www.cisco.com\/c\/dam\/en\/us\/products\/collateral\/security\/cloud-security\/mssp-overview.pdf","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"Tiered, volume-based offering, priced per seat (insights), per SIM (Mobile Protect) or per circuit (Easy Protect) per month","partner_benefits":"

\u2022   Monthly OPEX post-paid utility licensing model<\/p>\n

\u2022   Low Risk:  No buying up-front<\/p>\n

\u2022   Flexible and Scalable-No shelfware or stranded licensing<\/p>\n

\u2022   Operationally Efficient:  One contract for all products, no term tracking, P.O.s not required on every opportunity<\/p>","typeof_service":"

Managed Security Service Building Block Solution:<\/strong>  Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":"

As the industry\u2019s first Secure Internet Gateway in the cloud, Cisco Umbrella provides the first line of defense against threats on the internet. Because Umbrella is delivered from the cloud, it is the easiest way to protect all of your users in minutes.<\/p>\n

\u2022   Learn-Intelligence to uncover current and emerging threats.<\/p>\n

\u2022   See-Visibility for activity across all devices and ports, anywhere.<\/p>\n

\u2022   Block-Stop phishing, malware, and ransomware earlier.<\/p>","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"254","product_name":"Cisco VPN Internal Service Module for ISR G2","description":"The Cisco VPN Internal Service Module (VPN ISM) is a compact, versatile high-performance VPN blade for the Cisco Integrated Services Routers Generation 2 (ISR G2). It provides up to three times better performance for IPsec VPN encrypted traffic.\n\nThe VPN ISM multicore processor operates independently of other ISR G2 resources. This helps to ensure maximum concurrent VPN performance while maintaining performance for other business-critical branch router services.\n\nThe Cisco VPN acceleration module supports the latest encryption standards, including stronger National Security Agency (NSA) regulated encryption algorithms such as SUITE-B. Next-generation cryptography helps you provide strong data authentication and confidentiality, entity authentication services, and anti-replay services across branch office sites.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/interfaces-modules\/vpn-internal-service-module-isr-g2\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1359","product_name":"Cisco Web Security","description":"Nasty advanced threats can hide in plain sight on legitimate websites or in enticing pop-up ads. Employees or guests may put your organization at risk by clicking where they shouldn\u2019t. Cisco Web Security Appliance (WSA), powered by Cisco Talos, protects you by automatically blocking risky sites and testing unknown sites before allowing users to link to them, helping with compliance.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/web-security-appliance\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1662","product_name":"Client Management Suite","description":"Automate redundant tasks for managing devices and software to reduce costs. For Windows, Mac, Linux, and virtual desktops.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/endpoint\/management\/client-management-suite","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1238","product_name":"Client Reputation","description":"Stop malicious clients before they can attack, based on Akamai\u2019s visibility into prior behavior of individual IP addresses","hyperlink":"https:\/\/www.akamai.com\/us\/en\/products\/security\/client-reputation.jsp","td_contact":"akamaius@techdata.com","td_extension":"(800)-237-8931 x5540426","vendor_id":"1","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"810","product_name":"Cloud Account Defense (CAD)","description":"Protect your people from Email Account Compromise","hyperlink":"https:\/\/www.proofpoint.com\/us\/products\/cloud-security\/cloud-account-defense","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 635","vendor_id":"48","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,65,71"},{"product_id":"1149","product_name":"Cloud App Security","description":"Advanced threat and data protection for Office 365 and cloud file-sharing services","hyperlink":"https:\/\/www.trendmicro.com\/en_us\/business\/products\/user-protection\/sps\/email-and-collaboration\/cloud-app-security.html","td_contact":"trendmicro@techdata.com","td_extension":"800-237-8931 ext. 5545035","vendor_id":"66","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,85,86,88,89"},{"product_id":"811","product_name":"Cloud App Security Broker","description":"Protect users of cloud apps from threats, data loss, and compliance risks","hyperlink":"https:\/\/www.proofpoint.com\/us\/products\/cloud-security\/cloud-app-security-broker","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 636","vendor_id":"48","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,65,71"},{"product_id":"930","product_name":"Cloud Backup (backup for your SaaS data)","description":"Add granular protection and recovery to your cloud-based applications (Microsoft Office 365 and G Suite by Google), and ensure that even when important data is accidentally or maliciously overwritten or deleted, it isn\u2019t lost.","hyperlink":"https:\/\/www.storagecraft.com\/data-availability-products","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"58","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2025","product_name":"Cloud Datalab","description":"A powerful interactive tool created to explore, analyze, transform, and visualize data and build machine learning models on Google Cloud Platform. It runs on Compute Engine and connects to multiple cloud services easily so you can focus on your data science tasks","hyperlink":"https:\/\/cloud.google.com\/datalab","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"111","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1252","product_name":"Cloud Defender","description":"Cloud Defender is an integrated suite of managed infrastructure and workload security and compliance controls for the cloud, on-premises, hosted, and hybrid infrastructures.","hyperlink":"https:\/\/www.alertlogic.com\/solutions\/managed-cloud-security-solution\/","td_contact":"Tech Data: enterprisecloudsales@techdata.com\n

DLT: spi@dlt.com<\/p>","td_extension":"DLT: 703-773-9239","vendor_id":"2","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"478","product_name":"Cloud Identity","description":"IBM Cloud Identity helps you secure user productivity with cloud-delivered Single Sign-On (SSO), multifactor authentication, and identity governance. It comes with thousands of pre-built connectors to help you quickly provide access to popular SaaS apps; and pre-built templates to help integrate in-house apps.","hyperlink":"https:\/\/www.ibm.com\/us-en\/marketplace\/cloud-identity-connect","td_contact":"West: Rick.Marshall@techdata.com\n

East: Karen.Bailey@techdata.com<\/p>","td_extension":"West: (480) 254-4420\n

East: (678) 642-3446<\/p>","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,5,7,10,11,13,15,17,85,86,87,88,90,91"},{"product_id":"1253","product_name":"Cloud Insight Essentials","description":"Cloud Insight Essentials provides a real-time inventory of your AWS resources with auto-discovery. It creates an interactive topology map so you'll understand the impact of exposures. And, you can search the inventory by AMI, Instance ID & Type, IP range, Availability Zone, Tags and Keywords.","hyperlink":"https:\/\/www.alertlogic.com\/solutions\/aws-vulnerability-scanning-and-assessment\/","td_contact":"Tech Data: enterprisecloudsales@techdata.com\n

DLT: spi@dlt.com<\/p>","td_extension":"DLT: 703-773-9239","vendor_id":"2","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2062","product_name":"Cloud Machine Learning Platform","description":"A platform that makes it easy for machine learning developers, data scientists, and environments for different ML frameworks using Deep Learning VM Image","hyperlink":"https:\/\/cloud.google.com\/ai-platform","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"111","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2059","product_name":"Cloud Pak for Data","description":"A fully-integrated data and AI platform that modernizes how businesses collect, organize and analyze data to infuse AI throughout their organizations. Cloud native by design, the platform unifies market-leading services spanning the entire analytics lifecycle","hyperlink":"https:\/\/www.ibm.com\/products\/cloud-pak-for-data","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2095","product_name":"Cloud Privilege Access Manager","description":"Emergency access management without keystroke monitoring or video recording for non CPAM apps. Privileged \/ service account lifecycle management, certification, cloud security \/ app continuous controls monitoring, keystroke monitoring","hyperlink":"https:\/\/saviynt.com\/solutions\/cloud-privileged-access-management\/","td_contact":"SaviyntUS@techdata.com","td_extension":"800-237-8931 x 5540529","vendor_id":"124","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"2053","product_name":"Cloud Search","description":"A scalable cloud-based search service that forms part of Amazon Web Services (AWS). CloudSearch is typically used to integrate customized search capabilities into other applications","hyperlink":"https:\/\/aws.amazon.com\/cloudsearch\/","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"110","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"453","product_name":"Cloud Security","description":"The cloud is helping your business move forward, faster. But this digital transformation doesn\u2019t come without risk. Wherever your data goes, from public, private, hybrid, or virtual cloud environments, you need to know that it will remain secure and your business will be compliant.\u00a0\u00a0Gemalto offers a comprehensive portfolio of identity and access management and data protection solutions that ensure you are the only one who controls access and keys to your data - especially across multi-tenant, geographically distributed sites.","hyperlink":"https:\/\/www.gemalto.com\/enterprise-security\/cloud-security","td_contact":"","td_extension":"","vendor_id":"31","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"85","country_name":"ASIA PACIFIC","parint_id":"0","type":"0","country":"85,86"},{"product_id":"2096","product_name":"Cloud Security Analyzer","description":"Visibility across cloud apps, remediate recommendations","hyperlink":"https:\/\/saviynt.com\/solutions\/challenge\/continuous-controls-monitoring\/","td_contact":"SaviyntUS@techdata.com","td_extension":"800-237-8931 x 5540529","vendor_id":"124","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"935","product_name":"Cloud Services -DRaaS","description":"Protect your data from a site-wide disaster by storing backups remotely; If you don't need full DRaaS, choose a Service Level for replication as a service (RaaS) in our secure cloud, including system restore or file and folder recovery.","hyperlink":"https:\/\/www.storagecraft.com\/data-availability-products","td_contact":"storagecraft@techdata.com","td_extension":"800-237-8931 x71458","vendor_id":"58","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2042","product_name":"Cloud Speech API","description":"Enables developers to convert audio to text by applying powerful neural network models in an easy to use API. The API recognizes over 80 languages and variants, to support your global user base","hyperlink":"https:\/\/cloud.google.com\/speech-to-text","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"111","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1899","product_name":"Cloud Vault","description":"- Discover, manage, and rotate privileged credentials for Windows platforms and inject them on\n - Control access to and from any system under your management","hyperlink":"https:\/\/www.beyondtrust.com\/remote-access\/features\/vault","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"94","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1663","product_name":"Cloud Workload Protection","description":"Symantec Cloud Workload Protection automates security for public cloud workloads, enabling business agility, compliance and cost savings for organizations, while easing DevOps and administrative burdens.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/endpoint\/hybrid-cloud\/cloud-workload-protection","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1475","product_name":"Cloud Workload Security","description":"McAfee Cloud Workload Security automates the discovery and defense of elastic workloads to eliminate blind spots, deliver advanced threat defense, and simplify hybrid and public cloud security management.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/cloud-workload-security.html","td_contact":"Tech Data: mcafee@techdata.com\n

DLT: spi@dlt.com<\/p>","td_extension":"Tech Data: 800-237-8931\n

DLT: 703-773-9231<\/p>","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1806","product_name":"Cloud-Native Network Services","description":"VMware NSX Cloud delivers consistent and operationally scalable micro-segmentation security for applications running natively in public clouds, managed alongside data center resources for consistent end-to-end networking and security.","hyperlink":"https:\/\/www.vmware.com\/products\/nsx-cloud.html","td_contact":"vmware@techdata.com","td_extension":"800-237-8931 x5545048","vendor_id":"70","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1996","product_name":"Cloudant","description":"A fully managed database service for hybrid multicloud applications \u2014 built on open source Apache CouchDB with a fully compatible API. Sync data to any cloud or to the edge","hyperlink":"https:\/\/www.ibm.com\/cloud\/cloudant","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2005","product_name":"Cloudera Data Platform (CDP)","description":"Cloudera Data Platform (CDP) combines the best of Hortonworks\u2019 and Cloudera\u2019s technologies to deliver the industry\u2019s first enterprise data cloud. CDP delivers powerful self-service analytics across hybrid and multi-cloud environments, along with sophisticated and granular security and governance policies that IT and data leaders demand\nCloudera Data Lake Service enables the creation of safe, secure and governed data lakes with a protective ring around data, wherever it\u2019s stored, from object stores to Hadoop Distributed File System (HDFS)\nCloudera Data Warehouse (CDW) Public Cloud service enables self-serve creation of independent data warehouses and data marts for teams of business analysts without the overhead of bare metal deployments","hyperlink":"https:\/\/www.cloudera.com\/about\/enterprise-data-cloud.html","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66101","vendor_id":"112","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2004","product_name":"Cloudera Data Platform (Cloud Pak for Data)","description":"A comprehensive, on-premises platform for integrated analytics from the edge to AI, spanning ingest, processing, analysis, experimentation and deployment. It combines the best of Cloudera Enterprise Data Hub and Hortonworks Data Platform Enterprise Plus, resulting in a fusion of the latest open source data management and analytics technologies","hyperlink":"https:\/\/www.ibm.com\/us-en\/marketplace\/cdp-data-center-with-ibm","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"28","product_name":"CloudGen Firewall","description":"Barracuda's Cloud Generation Firewalls redefine the role of the Firewall from a perimeter security solution to a distributed network optimization solution that scales across any number of locations and applications, connects on-premises and cloud infrastructures, and helps organizations transform their business.","hyperlink":"https:\/\/www.barracuda.com\/products\/nextgenfirewall_f","td_contact":"barracuda@Techdata.com","td_extension":"(800)-237-8931 x5540427","vendor_id":"4","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,85,87"},{"product_id":"1664","product_name":"CloudSOC Audit \u2013 Shadow IT","description":"Uncover Shadow IT risk \u2013 find and audit use of cloud applications. Evaluate which cloud services are business-ready and control their usage to keep your organization safe and compliant.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/cloudsoc-audit-en","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"953","product_name":"CloudSOC CASB Gateway","description":"Control employee use of a wide range of sanctioned and unsanctioned cloud apps with CloudSOC CASB Gateway, a leading Cloud Security Gateway (CSG) solution.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/cloudsoc-gateway-en","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1666","product_name":"CloudSOC Security for Cloud Apps \u2013 Securlets","description":"Keep your organization secure and compliant while using cloud applications with CloudSOC, a leading Cloud Access Security Broker (CASB) and Cloud Security Gateway (CSG)","hyperlink":"https:\/\/community.broadcom.com\/home","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2060","product_name":"Cognitive Services","description":"APIs, SDKs, and services available to help developers build intelligent applications without having direct AI or data science skills or knowledge. Azure Cognitive Services help's developers create applications that can see, hear, speak, understand, and even begin to reason","hyperlink":"https:\/\/azure.microsoft.com\/en-us\/services\/cognitive-services\/","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"43","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2017","product_name":"Cognos Analytics","description":"A business intelligence solution that empowers users with AI-infused self-service capabilities that accelerate data preparation, analysis, and report creation","hyperlink":"https:\/\/www.ibm.com\/products\/cognos-analytics","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2089","product_name":"Collaborative Planning","description":"An Internet-based collaboration solution that rapidly and significantly improves supply chain performance by providing advanced capabilities for collaborative demand, supply, and inventory planning across your virtual supply chain.","hyperlink":"http:\/\/www.oracle.com\/us\/products\/applications\/peoplesoft-enterprise\/056954.pdf","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"46","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"513","product_name":"Compact Identity - FULL SUITE - Access Management - Identity Administration - Identity Governance","description":"Includees the following modules - Access Management (Single Sign on, Password Management, MFA); Identity Administration (User Life Cycle Management - Provisioning, Access Request); Identity Governance (Acesss certifications, Fulfillment). Identity Analytics - Reporting and dashborads included.","hyperlink":"https:\/\/www.ilantus.com\/products\/compact-identity\/","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"(305) 593-5000","vendor_id":"36","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"4","country_name":"LATIN AMERICA","parint_id":"0","type":"0","country":"4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60"},{"product_id":"510","product_name":"Compact Identity Module - Access Management","description":"Single Sign on (includes to Cloud, web and thick clients); Multi-factor Authentication (Challenge Response, Soft token, Email OTP, SMS OTP), step up authentication; Password Management (self-service and helpdesk assisted; reverse password sync, password reset from locked screen, password policies). Integration to Active Directory (AD), user import from AD, HR systems and CSV files supported. Identity Analytics -Reporting and dashboards included.","hyperlink":"https:\/\/www.ilantus.com\/products\/compact-identity\/#single-sign-on","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"(305) 593-5000","vendor_id":"36","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"4","country_name":"LATIN AMERICA","parint_id":"0","type":"0","country":"4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60"},{"product_id":"512","product_name":"Compact Identity Module - Identity Administration","description":"User Life Cycle Management; Automated Provisioning\/Deprovisioning: role based, birth right account provisioniong; entitlement mapping, static and dynamic role; entitlement and role access request; user access request; multi-level access approval workflow, Cloud and On-premise application Provisioning Connectors. Identity Analytics -Reporting and dashboards included.","hyperlink":"https:\/\/www.ilantus.com\/products\/compact-identity\/#identity-administration\"","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"(305) 593-5000","vendor_id":"36","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"4","country_name":"LATIN AMERICA","parint_id":"0","type":"0","country":"4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60"},{"product_id":"511","product_name":"Compact Identity Module - Identity Governance","description":"Recertification of roles, applications, entitlements, users; Recurring recertification campaigns; multi-level recertification; auto and manual fulfillment; orphan and dorman account management; centralized identity store. Identity Analytics - Reporting and dashboards included.","hyperlink":"https:\/\/www.ilantus.com\/products\/compact-identity\/#identity-governance","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"(305) 593-5000","vendor_id":"36","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"4","country_name":"LATIN AMERICA","parint_id":"0","type":"0","country":"4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60"},{"product_id":"329","product_name":"Complete Backup and Recovery","description":"Fully featured, comprehensive backup and recovery platform. It covers all workloads: physical, virtual, applications, on-premises, cloud, and hybrid. In addition, all management features relative to backup and recovery are covered under Commvault Complete.","hyperlink":"https:\/\/www.commvault.com\/complete-backup","td_contact":"Software-Sales@techdata.com","td_extension":"(800)-237-8931 x5683326","vendor_id":"16","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,9,10,13,14,15,16,17,18,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61"},{"product_id":"632","product_name":"Complete Data Protection","description":"McAfee Complete Data Protection delivers powerful endpoint encryption integrated with centralized management to prevent unauthorized access and data loss.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/complete-data-protection.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1477","product_name":"Complete Data Protection\u2014Advanced","description":"McAfee Complete Data Protection\u2014Advanced uses full-disk encryption, authentication, data loss prevention, and access controls to safeguard sensitive information at rest, during use, and in motion.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/complete-data-protection-advanced.html","td_contact":"Tech Data: mcafee@techdata.com\n

DLT: spi@dlt.com<\/p>","td_extension":"Tech Data: 800-237-8931\n

DLT: 703-773-9231<\/p>","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"634","product_name":"Complete Endpoint Protection\u2014Business","description":"McAfee Complete Endpoint Protection\u2014Business is an integrated endpoint security suite that protects PCs, Macs, Linux systems, servers, virtual systems, smartphones, and tablets from online threats.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/complete-endpoint-protection-business.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1479","product_name":"Complete Endpoint Threat Protection","description":"McAfee Complete Endpoint Threat Protection provides advanced defenses that investigate, contain, and take action against zero-day threats and sophisticated attacks.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/complete-endpoint-threat-protection.html","td_contact":"Tech Data: mcafee@techdata.com\n

DLT: spi@dlt.com<\/p>","td_extension":"Tech Data: 800-237-8931\n

DLT: 703-773-9231<\/p>","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2001","product_name":"Compose for JanusGraph","description":"Designed to help you answer questions about large or complex networks of interrelated data. It enhances the power of data connections by letting you store, query and visualize data points, connections and properties in a property graph","hyperlink":"https:\/\/www.ibm.com\/cloud\/compose\/janusgraph","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1629","product_name":"Comprehensive Anti-SPAM Service","description":"Remove junk email at the gateway with one-click activation, and ensure that only legitimate emails reach your email server.","hyperlink":"https:\/\/www.sonicwall.com\/en-us\/products\/firewalls\/security-services\/total-secure-bundle","td_contact":"sonicwall@techdata.com","td_extension":"800-237-8931 x5545032","vendor_id":"56","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1912","product_name":"Compromised Credentials Monitoring (CCM)","description":"Flashpoint\u2019s Compromised Credentials Monitoring (CCM) allows users to monitor exposure of compromised credentials for their enterprise domains and customer email addresses to take action after breaches to mitigate risk of account takeover. Flashpoint\u2019s advanced technology quickly collects and processes data and credentials, allowing for organizations to access the most up-to-date breach data and receive notification as soon as credentials have been identified.","hyperlink":"https:\/\/www.flashpoint-intel.com\/compromised-credentials-monitoring\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"97","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1887","product_name":"ConfigOS","description":"ConfigOS is a patented software suite that allows anyone to quickly establish a STIG (Security Technical Implementation Guide) and\/or CIS (Center for Information Security) \u2013 cybersecurity compliant environment. ConfigOS offers scanning, remediation, compliance reporting, and external interfaces to other tools. ConfigOS incorporates both policy content and policy remediation automation for Windows Workstation, Windows Server, and Linux. It lets a user easily adjust policies to address waivers and comply with unique requirements.","hyperlink":"https:\/\/www.steelcloud.com\/configos-cybersecurity\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"90","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1667","product_name":"Content & Malware Analysis","description":"Symantec Content and Malware Analysis protects against advanced threats through file reputation, multiple antimalware and analysis techniques, and sophisticated sandbox detonation.","hyperlink":"https:\/\/community.broadcom.com\/symantecenterprise\/communities\/community-home?CommunityKey=20e864d3-37d2-4fd7-a3cd-71dd178476c5","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1630","product_name":"Content Filtering Service","description":"Address safety, security and productivity concerns with controls to enforce Internet use policies, and block access to harmful and unproductive web content.","hyperlink":"https:\/\/www.sonicwall.com\/en-us\/products\/firewalls\/security-services\/total-secure-bundle","td_contact":"sonicwall@techdata.com","td_extension":"800-237-8931 x5545032","vendor_id":"56","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"519","product_name":"Contrail Security","description":"Contrail Security minimizes risk to applications that run in multicloud environments. It discovers application traffic flows and drastically reduces policy proliferation across different environments. It\u2019s a fundamental building block of Contrail Enterprise Multicloud.","hyperlink":"https:\/\/www.juniper.net\/us\/en\/products-services\/sdn\/contrail\/contrail-security\/","td_contact":"","td_extension":"","vendor_id":"38","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"85","country_name":"ASIA PACIFIC","parint_id":"0","type":"0","country":"85,86"},{"product_id":"956","product_name":"Control Compliance Suite","description":"Delivers a unified view of security controls and vulnerabilities. Align priorities across security, IT operations, and compliance.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/information-protection\/control-compliance-suite","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"40","product_name":"Core Network Services","description":"Unify your DDI services and get centralized visibility across all your DDI data \u2014 establishing a reliable network foundation that fuels innovation and growth. Most businesses don\u2019t take notice of their DDI infrastructure until something goes wrong. Which means while everything\u2019s running smoothly, that infrastructure gets taken for granted, and that\u2019s a shame \u2013 because with the right DDI infrastructure, you can do some pretty awesome things. For example \u2013 with Adaptive DNS all your critical DDI infrastructure will be united under one intelligent roof, giving you centralized visibility and control of all of your DNS traffic, round the clock.","hyperlink":"https:\/\/bluecatnetworks.com\/adaptive-dns\/ddi\/","td_contact":"BluecatUS@techdata.com","td_extension":"727-539-7429 ext 5540423","vendor_id":"5","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1879","product_name":"Corsa Network Security Virtualization Platform","description":"Turnkey approach to scale traffic inspection so you can elastically add virtual NGFW (Next Generation Firewall) capacity to meet increasing bandwidth demand. Uses a pay-as-you-grow cloud model. Continue to use preferred security vendors, while behind the scenes their virtual appliances run on state-of-the-art hyperconverged infrastructure, specifically optimized for scaling network security by Corsa Security.","hyperlink":"https:\/\/www.corsa.com\/products\/corsa-network-security-virtualization-platform\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"87","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1880","product_name":"Corsa Security Orchestrator","description":"Virtual infrastructure manager at the heart of the turnkey Corsa Network Security Virtualization Platform. It controls the entire platform from the compute infrastructure and load balancing up to virtual machines to create and manage virtual firewalls.","hyperlink":"https:\/\/www.corsa.com\/products\/corsa-security-orchestrator-virtual-infrastructure-manager\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"87","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1903","product_name":"Cortext XSOAR","description":"Cortex XSOAR is the industry-leading Security Orchestration, Automation & Response (SOAR) technology by Palo Alto Networks that will automate up to 95% of all response actions requiring human review and allow overloaded security teams to focus on the actions that really require their attention.","hyperlink":"www.demisto.com","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"95","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"344","product_name":"Counter Drone Solution","description":"Sensors connect to DroneTracker software, which detects, classifies, and protects against drone threats, including localizing the drone.","hyperlink":"https:\/\/www.dedrone.com\/","td_contact":"BU-Security@techdata.com","td_extension":"+49 47003 2222","vendor_id":"22","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,64,70"},{"product_id":"1669","product_name":"Critical System Protection","description":"Embed critical protection into Internet of Things (IoT) devices through a lightweight system so they are secure by design.","hyperlink":"https:\/\/community.broadcom.com\/symantecenterprise\/communities\/community-home\/librarydocuments\/viewdocument?DocumentKey=5ac32d32-9e66-4d3a-981c-711f5061719c&CommunityKey=3f8a53f1-00c7-4411-8203-ee040b59e575&tab=librarydocuments","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"452","product_name":"Crypto Management","description":"When\u00a0encryption\u00a0is used, the risk is transferred from the data itself to the cryptographic keys. The ability to securely manage, store, and use keys is essential. With a copy of the private key an attacker could decrypt data, create fraudule nt identities, and generate certificates at will.\u00a0 Deploying a high-assurance crypto management platform is the best way to protect your cryptographic keys. This approach is built on a foundation of strong keys, enterprise key management, centralized crypto resource management, and the use of a hardware root of trust.","hyperlink":"","td_contact":"","td_extension":"","vendor_id":"31","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"85","country_name":"ASIA PACIFIC","parint_id":"0","type":"0","country":"85,86"},{"product_id":"520","product_name":"cSRX Container Firewall","description":"Businesses increasingly rely on container technology for developing and deploying cloud-native applications. The cSRX Container Firewall protects your containerized environments with advanced security services, including content security, intrusion prevention system (IPS), AppSecure, and unified threat management (UTM).","hyperlink":"https:\/\/www.juniper.net\/us\/en\/products-services\/security\/srx-series\/csrx\/","td_contact":"","td_extension":"","vendor_id":"38","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"85","country_name":"ASIA PACIFIC","parint_id":"0","type":"0","country":"85,86"},{"product_id":"1838","product_name":"CxIAST","description":"Automate the detection of run-time vulnerabilities during functional testing.","hyperlink":"https:\/\/www.checkmarx.com\/products\/interactive-application-security-testing","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"77","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1837","product_name":"CxOSA","description":"Software composition analysis","hyperlink":"https:\/\/www.checkmarx.com\/products\/software-composition-analysis\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"77","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1836","product_name":"CxSAST","description":"Custom code security testing","hyperlink":"https:\/\/www.checkmarx.com\/products\/static-application-security-testing","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"77","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"334","product_name":"Cyber Range","description":"Cyberbit Range is the most widely deployed Cyber Security Training and simulation platform","hyperlink":"https:\/\/www.cyberbit.com\/solutions\/cyber-range\/","td_contact":"","td_extension":"","vendor_id":"18","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"85","country_name":"ASIA PACIFIC","parint_id":"0","type":"0","country":"85,87"},{"product_id":"325","product_name":"Cyber Range","description":"Virtual Access or On Site Cyber Range Sessions and Training","hyperlink":"https:\/\/www.cloudrangecyber.com\/","td_contact":"cloudrangecyberUS@techdata.com","td_extension":"(800)-237-8931 x1477150","vendor_id":"14","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1268","product_name":"CYBERShark","description":"CYBERShark takes BlackStratus\u2019 proven security and compliance platform, trusted by thousands of customers, and delivers it at a fraction of the cost in the cloud.","hyperlink":"https:\/\/www.blackstratus.com\/cybershark\/","td_contact":"cybershark@techdata.com","td_extension":"800-237-8931 x5540413","vendor_id":"8","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"68","product_name":"CyberShark SOC Service","description":"CyberShark takes its proven security and compliance platform, trusted by thousands of customers, and delivers it at a fraction of the cost in the cloud.","hyperlink":"https:\/\/www.blackstratus.com\/cybershark\/","td_contact":"cybershark@techdata.com","td_extension":"800-237-8931 x5540413","vendor_id":"7","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"48","product_name":"Cylance Smart Antivirus (consumer)\u00a0","description":"Hassle-free, intelligent protection","hyperlink":"Cylance Smart Antivirus (consumer)","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"6","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,64,69,70,73,82,84"},{"product_id":"49","product_name":"CylanceOPTICS\u00a0","description":"AI-Powered Endpoint Detection and Response","hyperlink":"CylanceOPTICS","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"6","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,64,69,70,73,82,84"},{"product_id":"50","product_name":"CylancePERSONA\u00a0","description":"Adaptive Security and AI to Protect Mobile Endpoints","hyperlink":"CylancePERSONA","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"6","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,64,69,70,73,82,84"},{"product_id":"52","product_name":"CylancePROTECT Mobile for BlackBerry UEM\u00a0","description":"Mobile Threat Defense (MTD) Powered by AI and Integrated with BlackBerry UEM","hyperlink":"CylancePROTECT Mobile for BlackBerry UEM","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"6","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,64,69,70,73,82,84"},{"product_id":"51","product_name":"CylancePROTECT\u00a0","description":"AI-Native Cybersecurity Solutions for Any Situation","hyperlink":"CylancePROTECT","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"6","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,64,69,70,73,82,84"},{"product_id":"340","product_name":"Cynerio","description":"Connected medical devices are exposed to malware and cyber attacks that exploit weaknesses in their security and vulnerabilities of their outdated operating systems. Compromised medical devices act as a gateway for hackers to access patient medical data and expose the organization to potential service disruptions that could impact clinical care and patient safety.","hyperlink":"https:\/\/www.cyr3con.ai\/Home","td_contact":"CynerioUS@techdata.com","td_extension":"(800)-237-8931 x5540425","vendor_id":"20","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2100","product_name":"Data Access Analyzer (Cloud only)","description":"Deep access analysis and visibility","hyperlink":"https:\/\/saviynt.com\/solutions\/role\/it-auditor\/","td_contact":"SaviyntUS@techdata.com","td_extension":"800-237-8931 x 5540529","vendor_id":"124","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"2101","product_name":"Data Access Governance (Cloud only)","description":"Deep access analysis and visibility, real-time prevention, deep access analysis and visibility, content inspection.","hyperlink":"https:\/\/saviynt.com\/solutions\/data-access-governance\/","td_contact":"SaviyntUS@techdata.com","td_extension":"800-237-8931 x 5540529","vendor_id":"124","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1462","product_name":"Data Archive","description":"Retire legacy systems while retaining reporting access, managing long-term retention, and ensuring compliance.","hyperlink":"https:\/\/www.informatica.com\/products\/data-security\/data-archive.html#fbid=UeeCmkL0Wl1","td_contact":"spi@dlt.com","td_extension":"703-708-9654","vendor_id":"37","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1200","product_name":"Data Center & Cloud Workload Migration","description":"NSX Hybrid Connect provides infrastructure hybridity and application workload mobility at scale. It delivers optimized data center extension capabilities for seamless and secure connectivity between sites; interoperability across vSphere 5.0+; and live and bulk migration of application workloads across data centers and clouds without re-architecting the application.","hyperlink":"https:\/\/www.vmware.com\/products\/nsx-hybrid-connect.html","td_contact":"vmware@techdata.com","td_extension":"800-237-8931 x5545048","vendor_id":"70","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,5,10,17,85,87"},{"product_id":"460","product_name":"Data Center Next-Generation Firewalls","description":"Designed for the Unique Requirements of a Data Center","hyperlink":"https:\/\/www.hillstonenet.com\/products\/datacenter-next-gen-firewalls-x-series\/","td_contact":"eduardo.araujo@techdata.com","td_extension":"55-11-31912870 x-5222870","vendor_id":"33","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"4","country_name":"LATIN AMERICA","parint_id":"0","type":"0","country":"4,7,9,10,11,12,13,14,15,16,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60"},{"product_id":"958","product_name":"Data Center Security","description":"Harden security for on-premise, hybrid, and cloud-based data centers using detection, monitoring, and prevention capabilities.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/endpoint\/hybrid-cloud\/data-center-security","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1480","product_name":"Data Center Security Suite for Databases","description":"McAfee Data Center Security Suite for Databases offers real-time, reliable protection for business-critical databases, and requires no architecture changes, costly hardware, or database downtime.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/data-center-security-suite-for-databases.html","td_contact":"Tech Data: mcafee@techdata.com\n

DLT: spi@dlt.com<\/p>","td_extension":"Tech Data: 800-237-8931\n

DLT: 703-773-9231<\/p>","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"814","product_name":"Data Discover","description":"Proofpoint\u2019s Information Protection provides out\u00ad-of-\u00adthe-\u00adbox visibility without the complexity and costs of legacy data protection tools.","hyperlink":"https:\/\/www.proofpoint.com\/us\/products\/information-protection\/data-discover","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 639","vendor_id":"48","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,65,71"},{"product_id":"345","product_name":"Data Domain","description":"The #1 purpose-built backup appliance,2 Data Domain is designed for the modern software-defined data center and is the only architecture capable of natively tiering deduplicated data to any cloud.3 From the largest Fortune 100 organizations to small startups, Data Domain offers simplicity and efficiency combined with high reliability.","hyperlink":"https:\/\/www.dellemc.com\/en-us\/data-protection\/index.htm#data-domain","td_contact":"EMC@techdata.com","td_extension":"800-237-8931 x5545042","vendor_id":"23","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"940","product_name":"Data Enterprise","description":"Give your company all the tools it needs to control confidential data \nexchanged by employees in the course of your business activity.","hyperlink":"https:\/\/www.stormshield.com\/products\/enterprise\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"59","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,64"},{"product_id":"1986","product_name":"Data Insight","description":"Is a solution for unstructured data governance","hyperlink":"https:\/\/www.veritas.com\/insights\/data-insight","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"69","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1973","product_name":"Data Integrator","description":"An Extract, load and transform tool produced by Oracle that offers a graphical environment to build, manage and maintain data integration processes in business intelligence systems","hyperlink":"https:\/\/www.oracle.com\/middleware\/technologies\/data-integration.html","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"46","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1671","product_name":"Data Loss Prevention","description":"Secure your vital information and prevent data leaks\u2014on-premise, mobile, or in the cloud\u2014with our market-leading product.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/information-protection\/data-loss-prevention","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"386","product_name":"Data Loss Prevention (DLP)","description":"DLP\nData Loss Prevention\nA single policy to protect your data, wherever it is","hyperlink":"https:\/\/www.forcepoint.com\/product\/dlp-data-loss-prevention","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"28","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,80"},{"product_id":"960","product_name":"Data Loss Prevention and CASB - Symantec DLP Cloud and Symantec CloudSOC","description":"Eliminate data loss blind spots in cloud apps with Symantec Data Loss Prevention (DLP) Cloud and Symantec CloudSOC, the first integrated cloud security offering that combines DLP and CASB technologies.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/information-protection\/data-loss-prevention","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"961","product_name":"Data Loss Prevention Cloud Service for Email","description":"Data Loss Prevention Cloud Service for Email helps enterprises quickly move their email to the cloud without compromising security by combining data loss prevention and email security.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/dlp-cloud-service-for-email-en","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1290","product_name":"Data Loss Prevention Software Blade","description":"Check Point Data Loss Prevention (DLP) combines technology and processes to revolutionize DLP, helping businesses to pre-emptively protect sensitive information from unintentional loss, educating users on proper data handling policies and empowering them to remediate incidents in real-time.","hyperlink":"https:\/\/www.checkpoint.com\/products\/dlp-software-blade\/","td_contact":"checkpoint@techdata.com","td_extension":"800-237-8931 x5545036","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1463","product_name":"Data Masking","description":"Protects unauthorized access to and disclosure of sensitive, private, and confidential information.","hyperlink":"https:\/\/www.informatica.com\/products\/data-security\/data-masking.html#fbid=UeeCmkL0Wl1","td_contact":"spi@dlt.com","td_extension":"703-708-9654","vendor_id":"37","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2037","product_name":"Data Mining","description":"An option of Oracle Database Enterprise Edition. It contains several data mining and data analysis algorithms for classification, prediction, regression, associations, feature selection, anomaly detection, feature extraction, and specialized analytics","hyperlink":"https:\/\/www.oracle.com\/database\/technologies\/advanced-analytics\/odm.html","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"46","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1596","product_name":"Data Protection","description":"Leverage an always-on, easy-to-manage infrastructure that delivers a full-system, instant recovery to get back online in under 15 minutes.","hyperlink":"https:\/\/www.quest.com\/solutions\/data-protection\/","td_contact":"spi@dlt.com","td_extension":"703-709-7172","vendor_id":"74","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"346","product_name":"Data Protection Suite","description":"Best-in-class Dell EMC Data Protection software solutions accelerate backups up to 20x and recovery up to 10x for mission-critical applications.5 Our software covers a broad range of applications including everything from virtual machines to high IO\/change rate OLTP, and VMware workloads running on AWS.","hyperlink":"https:\/\/www.dellemc.com\/en-us\/data-protection\/index.htm#data-protection-suite","td_contact":"EMC@techdata.com","td_extension":"800-237-8931 x5545042","vendor_id":"23","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1451","product_name":"Data Risk Manager","description":"What you don\u2019t know can hurt you. Identify and help prevent risks to sensitive business data that may impact business processes, operations, and competitive position. IBM Data Risk Manager provides executives and their teams a business-consumable data risk control center that helps to uncover, analyze, and visualize data-related business risks so they can take action to protect their business.","hyperlink":"https:\/\/www.ibm.com\/us-en\/marketplace\/data-risk-manager","td_contact":"West: Rick.Marshall@techdata.com\n

East: Karen.Bailey@techdata.com<\/p>","td_extension":"West: (480) 254-4420\n

East: (678) 642-3446<\/p>","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2063","product_name":"Data Science Cloud Service","description":"An enterprise-grade service in which teams of data scientists can collaborate to solve business problems and leverage the latest and greatest in Oracle Cloud Infrastructure to build, train, and deploy their models in the cloud","hyperlink":"https:\/\/www.oracle.com\/data-science\/cloud-infrastructure-data-science.html","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"46","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1972","product_name":"Data Stage","description":"An ETL tool which extracts data, transform and load data from source to the target","hyperlink":"https:\/\/www.ibm.com\/support\/knowledgecenter\/SSZJPZ_9.1.0\/com.ibm.swg.im.iis.productization.iisinfsv.overview.doc\/topics\/cisodsintro.html","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1983","product_name":"Data Virtualization","description":"A lean, virtual data integration solution that unlocks trapped data and delivers it as easily consumable, unified, and actionable information.","hyperlink":"https:\/\/access.redhat.com\/products\/red-hat-jboss-data-virtualization","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"108","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"637","product_name":"Database Event Monitor for SIEM","description":"McAfee Database Event Monitor for SIEM provides non-intrusive, detailed discovery, logging, and correlation of database transactions, including access to regulated data.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/database-event-monitor-for-siem.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1597","product_name":"Database Management","description":"Automate development and administration tasks to increase productivity, optimize performance, ensure top-quality code and reduce costs.","hyperlink":"https:\/\/www.quest.com\/solutions\/database-management\/","td_contact":"spi@dlt.com","td_extension":"703-709-7172","vendor_id":"74","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1593","product_name":"Database Security","description":"Oracle Databases hold the majority of the world\u2019s relational data, and are attractive targets for attackers seeking high-value targets for data theft. Compromise of a single Oracle Database can result in tens of millions of breached records costing millions in breach-mitigation activity. Safeguard your most valuable data with Oracle\u2019s powerful preventive and detective security controls, including transparent data encryption, encryption key management, privileged user and multifactor access control, data classification and discovery, database activity monitoring and blocking, consolidated auditing and reporting, and data masking. With Oracle, you can deploy reliable data-security solutions that require no changes to existing applications, saving time and money.","hyperlink":"https:\/\/www.oracle.com\/database\/security\/index.html","td_contact":"spi@dlt.com","td_extension":"703-773-9221","vendor_id":"46","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1991","product_name":"DB2","description":"DB2 - is a Relational Database Management System (RDBMS) designed to store, analyze and retrieve the data efficiently. DB2 product is extended with the support of Object-Oriented features and non-relational structures with XML","hyperlink":"www.ibm.com\/db2\/database","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1387","product_name":"DDoS Hybrid Defender","description":"Comprehensive DDoS threat coverage in a simple, dedicated appliance with native, cloud-based scrubbing services","hyperlink":"https:\/\/f5.com\/products\/security\/ddos-hybrid-defender","td_contact":"f5@techdata.com","td_extension":"(480) 643-5064","vendor_id":"26","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"529","product_name":"DDoS Protection","description":"Total defense against all forms of DDoS attack to your infrastructure","hyperlink":"https:\/\/www.kaspersky.com\/enterprise-security\/embedded-security-internet-of-things","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,9,10,39,51,60"},{"product_id":"1291","product_name":"DDoS Protector","description":"Check Point DDoS Protector\u2122Appliances block Denial of Service attacks within seconds with multi-layered protection and up to 40 Gbps of performance.\nModern DDoS attacks use new techniques to exploit areas where traditional security solutions are not equipped to protect. These attacks can cause serious network downtime to businesses who rely on networks and Web services to operate. DDoS Protectors extend company\u2019s security perimeters to block destructive DDoS attacks before they cause damage.","hyperlink":"https:\/\/www.checkpoint.com\/products\/ddos-protector\/","td_contact":"checkpoint@techdata.com","td_extension":"800-237-8931 x5545036","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"962","product_name":"DeepSight\u2122 Adversary Intelligence","description":"Outsmart emerging threats and improve your risk assessment through rich adversary intelligence and context of cyber attacks.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/cyber-security-services-deepsight-intelligence-en","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"963","product_name":"DeepSight\u2122 Technical Intelligence","description":"Improve your security infrastructure with automated access to relevant vulnerability, malware, and threat intelligence.","hyperlink":"https:\/\/www.broadcom.com\/support\/symantec\/services","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"782","product_name":"Defender","description":"Two-factor authentication made easy","hyperlink":"https:\/\/www.oneidentity.com\/products\/defender\/","td_contact":"oneldus@techdata.com","td_extension":"","vendor_id":"44","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1988","product_name":"Dell EMC Cloudera","description":"Combines Dell EMC servers and networking components with CDH, as well as management tools, training, support and professional services, to deliver a single source for deploying, managing, and scaling a comprehensive Apache Hadoop-based stack.","hyperlink":"https:\/\/www.cloudera.com\/partners\/solutions\/dell-emc.html","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"109","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2090","product_name":"Demand Management","description":"Combines proven forecasting algorithms with flexible analytics to anticipate customer demand. You can analyze and dynamically segment customer demand, manage demand variability, handle frequent product introductions, or plan demand of configured products and options","hyperlink":"https:\/\/www.oracle.com\/a\/ocom\/docs\/applications\/supply-chain-management\/oracle-demand-management-cloud-ds.pdf","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"46","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1676","product_name":"Deployment Solution","description":"Manage OS and software deployment, configuration, and PC \u2018personality\u2019 migration across hardware platforms and OS types.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/deployment-solution-en","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"965","product_name":"Desktop Email Encryption","description":"Provide end-to-end email message encryption in your network with a simple user experience.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/encryption-solutions-for-email-en","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1482","product_name":"Device Control","description":"McAfee Device Control protects against data loss by monitoring and controlling data transfers from PCs to removable storage devices such as USB drives.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/device-control.html","td_contact":"Tech Data: mcafee@techdata.com\n

DLT: spi@dlt.com<\/p>","td_extension":"Tech Data: 800-237-8931\n

DLT: 703-773-9231<\/p>","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1926","product_name":"Device Security Management","description":"Secure endpoints used to access corporate resources with centralized policy management, providing device visibility (corporate or BYOD), insights, and consistent preventative security controls for iOS, Android, Mac and Windows endpoints","hyperlink":"https:\/\/www.idaptive.com\/product\/device-security-management\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"99","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1900","product_name":"DevOps Secret Safe","description":"- Secure and automate the storage and access of secrets used by applications, tools, and other processes across development operations environments\n - A REST API-first approach and CLI tool provide teams with a preferred UX \n - Enable faster application delivery via frictionless native integrations with common DevOps tools such as Ansible, Jenkins, and Azure DevOps","hyperlink":"https:\/\/www.beyondtrust.com\/devops","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"94","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"817","product_name":"Digital Risk Protection","description":"Proofpoint Digital Risk Protection secures your brand and customers against digital security risks across web domains, social media, and the deep and dark web. It\u2019s the only solution that gives you a holistic defense for all your digital engagement channels.","hyperlink":"https:\/\/www.proofpoint.com\/us\/products\/digital-risk-protection","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 642","vendor_id":"48","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,65,71"},{"product_id":"341","product_name":"Diligence","description":"Hackers routinely use the deepweb and darkweb to facilitate cyber attacks and exchange what was obtained in the outcome. CYR3CON\u2122 Diligence provides a snapshot of the most recent information hackers are discussing across hundreds of deepweb and darkweb sources relevant to an enterprise\u2019s brands, customers, domains, and employees (B-C-D-E). Upon receiving a standard set of customer inputs, CYR3CON\u2122 produces a customized report which allows the client to understand (1) active hacker discussions about their brand, (2) leaked customer data, (3) discussions on the client\u2019s domains by malicious hackers, and (4) evidence of employee corporate accounts and\/or email being compromised.","hyperlink":"https:\/\/www.cyr3con.ai\/Home","td_contact":"cyr3con@techdata.com","td_extension":"","vendor_id":"21","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"694","product_name":"Directory & Resource Administrator\u00a0","description":"Limits administrative privileges and restricts directory views to specific users","hyperlink":"https:\/\/www.netiq.com\/products\/directory-resource-administrator\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,63,65,67,68,69,70,71,74,75,76,77,80,81,84"},{"product_id":"1777","product_name":"Disaster Recovery Planner","description":"A free online tool that helps you build, customize, and securely store your own DR plan.","hyperlink":"www.unitrends.com\/products","td_contact":"pmunitrends@techdata.com","td_extension":"800-237-8931 x71478","vendor_id":"67","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1952","product_name":"Discovery","description":"Veracode Discovery identifies every web application, not just those that fall within the known IP range. Leveraging multiple inputs, such as domains and brand name keywords, Veracode Discovery provides the most comprehensive list of web applications.","hyperlink":"https:\/\/www.veracode.com\/products\/discovery","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"104","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1483","product_name":"DLP Discover","description":"McAfee Data Loss Prevention (DLP) Discover finds your sensitive data even if the location is unknown. Using advanced network crawling technology, it searches systems based on LAN segment, IP address range, network group, and many other easily defined criteria.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/dlp-discover.html","td_contact":"Tech Data: mcafee@techdata.com\n

DLT: spi@dlt.com<\/p>","td_extension":"Tech Data: 800-237-8931\n

DLT: 703-773-9231<\/p>","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"640","product_name":"DLP Endpoint","description":"McAfee Data Loss Prevention (DLP) Endpoint safeguards intellectual property and ensures compliance by protecting sensitive data on endpoint systems.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/dlp-endpoint.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1485","product_name":"DLP Monitor","description":"McAfee Data Loss Prevention (DLP) Monitor provides industry-leading data protection scanning and analysis that examines network traffic at a deeper level than any other data protection solution on the market.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/dlp-monitor.html","td_contact":"Tech Data: mcafee@techdata.com\n

DLT: spi@dlt.com<\/p>","td_extension":"Tech Data: 800-237-8931\n

DLT: 703-773-9231<\/p>","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"642","product_name":"DLP Prevent","description":"McAfee Data Loss Prevention (DLP) Prevent delivers comprehensive scans of inbound and outbound network traffic across all ports, protocols, and content types.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/dlp-prevent.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"39","product_name":"DNS Edge","description":"Edge adds a much-needed layer of visibility, control, and detection for corporate networks under siege from an explosion of malware attacks that exploit DNS.\nEdge gives network and IT teams unprecedented access to DNS query data with which they can establish smarter policies, optimize traffic and meet stringent compliance and logging requirements.\n\nEdge reduces your attack surface.\nFor security architects and IT staff that need to limit access to sensitive data and lock down critical systems like cloud apps and services, Edge makes it easy to ingest threat intelligence to block access to well-known bad domains.\n\nEdge detects malicious behavior hidden in millions of DNS queries and response activities.\nCybersecurity teams seeking to detect and stop data exfiltration like tunneling, beaconing to C2 servers, or evasive techniques like DGA, use Edge's smart analytics developed by BlueCat's decades of DNS expertise to spot malicious behavior among all DNS queries across their network.\n\nEdge reduces time to respond and remediate breaches.\nFor incident response teams faced with the challenge of uncovering the lateral spread of an infection and rooting out patient zero in a cyberattack, Edge makes it easy to pinpoint the origin and review the internal and external DNS activity surrounding an incident to reduce the time to resolution.","hyperlink":"https:\/\/bluecatnetworks.com\/resources\/bluecat-dns-edge-solution-overview\/","td_contact":"BluecatUS@techdata.com","td_extension":"727-539-7429 ext 5540423","vendor_id":"5","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"11","product_name":"DNS Security and Services","description":"You rely on your DNS for business and customer transactions, we help you make it fast, resilient and secure","hyperlink":"https:\/\/www.akamai.com\/us\/en\/solutions\/security\/dns-security-services.jsp","td_contact":"akamaius@techdata.com","td_extension":"(800)-237-8931 x5540426","vendor_id":"1","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1"},{"product_id":"454","product_name":"dSecure:Mobile","description":"Every business is mobile now. Everyone has a mobile device (or two or three\u2026) and your business information is moving through the wireless world. dSecure:Mobile \u2013 Our Mobile applications provide ultra-secure technology to ensure your voice, text message conversations, your attachments (photos, videos, etc.), chats and email are securely exchanged using Protected Mobility\u2019s FIPS-140-2 certified encryption technologies.","hyperlink":"https:\/\/www.globalintegrity.com\/","td_contact":"globalintegrity@techdata.com","td_extension":"","vendor_id":"32","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"455","product_name":"dSecure:Office","description":"dSecure:Office is the ultimate solution for protecting your business documents and e-mail communications and is fully integrated into the Microsoft Office product suite. Effortlessly send and receive encrypted messages and documents using Microsoft Outlook. There\u2019s a reason encrypted e-mail does not work; it\u2019s just too difficult for mere mortals to use effectively. With dSecure, the hassle and headache of dealing with encrypted communication is all managed for you.","hyperlink":"https:\/\/www.globalintegrity.com\/","td_contact":"globalintegrity@techdata.com","td_extension":"","vendor_id":"32","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1951","product_name":"Dynamic Analysis (DAST)","description":"o ensure organizations are scanning their entire web application inventory, Veracode Dynamic Analysis integrates with Veracode Discovery, which maps an organization\u2019s web attack surface. Veracode Dynamic Analysis provides context around how an application responded to an attack and how it was exploited. Results are coupled with easy-to-follow remediation advice so developers can rapidly remediate vulnerabilities.","hyperlink":"https:\/\/www.veracode.com\/products\/dynamic-analysis-dast","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"104","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2071","product_name":"Dynamics 365","description":"A cloud-based business applications platform that combines components of customer relationship management (CRM) and enterprise resource planning (ERP), along with productivity applications and artificial intelligence tools","hyperlink":"https:\/\/dynamics.microsoft.com\/en-us\/","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"43","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1997","product_name":"DynamoDB","description":"A fully managed proprietary NoSQL database service that supports key-value and document data structure","hyperlink":"https:\/\/aws.amazon.com\/dynamodb\/","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"110","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"821","product_name":"E-Discovery Analytics","description":"Proofpoint E-Discovery Analytics provides an intuitive e-discovery workflow for legal teams. It increases insight by using machine learning with real-time search results and integrated early case analytics.","hyperlink":"https:\/\/www.proofpoint.com\/us\/products\/archiving-and-compliance\/ediscovery-analytics","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 646","vendor_id":"48","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,65,71"},{"product_id":"966","product_name":"Education Services","description":"Maximize your product competency and validate technical knowledge to gain the most benefit from your IT investments with in depth technical training.","hyperlink":"https:\/\/www.broadcom.com\/support\/symantec\/services\/education","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"2003","product_name":"Elastic MapReduce (EMR)","description":"An Amazon Web Services (AWS) tool for big data processing and analysis. MapReduce is a software framework that allows developers to write programs that process massive amounts of unstructured data in parallel across a distributed cluster of processors or stand-alone computers","hyperlink":"https:\/\/www.cloudmanagementinsider.com\/what-is-amazon-elastic-mapreduce-emr-briefly-explained\/","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"110","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1761","product_name":"Email and Collaboration Security Solutions","description":"Stop phishing, malware, ransomware, fraud, and targeted attacks from infiltrating your enterprise","hyperlink":"https:\/\/www.trendmicro.com\/en_us\/business\/products\/user-protection\/sps\/email-and-collaboration.html","td_contact":"Tech Data: trendmicro@techdata.com\n

DLT: spi@dlt.com<\/p>","td_extension":"Tech Data: 800-237-8931 ext. 5545035 \n

DLT: 703-773-9231<\/p>","vendor_id":"66","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"812","product_name":"Email Data Loss Prevention (DLP)","description":"Proofpoint Email DLP mitigates the risk of email data loss and protects against email fraud. Prevent outbound communication of W2s and transfer requests to impostors.","hyperlink":"https:\/\/www.proofpoint.com\/us\/products\/information-protection\/email-dlp","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 637","vendor_id":"48","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,65,71"},{"product_id":"1151","product_name":"Email Encryption","description":"Trend Micro\u2122 Email Encryption Solutions keeps your email confidential, simplifies compliance, including meeting GDPR requirements, and reduces management costs by removing the complexity from encryption.","hyperlink":"https:\/\/www.trendmicro.com\/en_us\/business\/products\/user-protection\/sps\/email-and-collaboration\/email-encryption-solutions.html","td_contact":"trendmicro@techdata.com","td_extension":"800-237-8931 ext. 5545035","vendor_id":"66","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,85,86,88,89"},{"product_id":"813","product_name":"Email Encryption","description":"With Proofpoint Email Encryption, messages and attachments are automatically encrypted with complete transparency. Users don\u2019t need to manually encrypt their email to send and receive messages securely\u2014it just happens in the background.","hyperlink":"https:\/\/www.proofpoint.com\/us\/products\/information-protection\/email-encryption","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 638","vendor_id":"48","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,65,71"},{"product_id":"797","product_name":"Email Fraud Defense (EFD)","description":"Block fraudulent emails before they reach your employees, customers, and partners","hyperlink":"https:\/\/www.proofpoint.com\/us\/products\/email-protection\/email-fraud-defense","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 622","vendor_id":"48","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,65,71"},{"product_id":"802","product_name":"Email Isolation","description":"Email Isolation allows users to freely access personal email while protecting your people and your organization from advanced attacks.","hyperlink":"https:\/\/www.proofpoint.com\/us\/products\/advanced-threat-protection\/email-isolation","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 627","vendor_id":"48","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,65,71"},{"product_id":"796","product_name":"Email Protection","description":"Proofpoint Email Protection protects users against unwanted and malicious email\u2014\nboth malware and non-malware threats.","hyperlink":"https:\/\/www.proofpoint.com\/us\/products\/email-protection\/email-security-and-protection","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 621","vendor_id":"48","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,65,71"},{"product_id":"390","product_name":"Email Security","description":"Most complete email protection\nand visibility","hyperlink":"https:\/\/www.forcepoint.com\/product\/email-security","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"28","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,80"},{"product_id":"883","product_name":"Email Security Appliances","description":"SonicWall Email Security appliances are ideal for organizations that need a dedicated on-premises solution. The hardened Linux-based appliance defends against advanced email-borne threats such as ransomware, zero-day threats, spear phishing and business email compromise. Our multi-layered solution provides comprehensive inbound and outbound protection, and is available in a range of hardware appliance options that scales up to 10,000 users per appliance.","hyperlink":"https:\/\/www.sonicwall.com\/en-us\/products\/secure-email\/email-security-appliance","td_contact":"sonicwall@techdata.com","td_extension":"800-237-8931 x5545032","vendor_id":"56","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"29","product_name":"Email Security Gateway","description":"The Barracuda Email Security Gateway is an email security gateway that manages and filters all inbound and outbound email traffic to protect organizations from email-borne threats and data leaks. As a complete email management solution, the Barracuda Email Security Gateway lets organizations encrypt messages and leverage the cloud to spool email if mail servers become unavailable.","hyperlink":"https:\/\/www.barracuda.com\/products\/emailsecuritygateway","td_contact":"barracuda@Techdata.com","td_extension":"(800)-237-8931 x5540427","vendor_id":"4","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,85,87"},{"product_id":"1719","product_name":"Email Security.cloud","description":"Symantec Email Security.cloud is a complete email security solution that safeguards Office 365, G Suite and on-premises email. It blocks sophisticated email threats such as ransomware, spear phishing, and business email compromise with multi-layered defense and insights from the world\u2019s largest civilian global intelligence network. Email Security.cloud also keeps emails secure and confidential with built-in DLP & encryption controls, which includes tight integration with Symantec DLP.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/web-and-email\/messaging\/email-security-cloud","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"Per user subscription pricing","partner_benefits":"

\u2022  Prevent threats with the highest efficacy and accuracy with multi-layered defense and strong email isolation<\/p>\n

\u2022   Realize integrated cyber defense at scale<\/p>\n

\u2022   Stop spear phishing attacks with the most comprehensive defense<\/p>","typeof_service":"

Managed Security Service Building Block Solution: <\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":"

\u2022  Block ransomware and emerging threats with the highest effectiveness and accuracy<\/p>\n

\u2022  Stop spear phishing with comprehensive defense<\/p>\n

\u2022  Accelerate your threat response with Integrated Cyber Defense<\/p>\n

\u2022  Ensure safe cloud adoption with the industry\u2019s strongest controls<\/p>","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"643","product_name":"Embedded Control","description":"McAfee Embedded Control helps device manufacturers secure embedded systems from malware and attacks by hackers and cybercriminals","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/embedded-control.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"967","product_name":"Emergency Response","description":"Resolve your incident, restore normal operations, and minimize operational impact from attacks with our Incident Response Team.","hyperlink":"https:\/\/community.broadcom.com\/symantecenterprise\/communities\/community-home?CommunityKey=2d17029b-76e4-4bcb-9329-1c5f27a25247","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"805","product_name":"Emerging Threats Intelligence","description":"Proofpoint ET Intelligence delivers the most timely and accurate threat intelligence. Our fully verified intel provides deeper context and integrates seamlessly with your security tools to enhance your decision-making","hyperlink":"https:\/\/www.proofpoint.com\/us\/products\/et-intelligence","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 630","vendor_id":"48","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,65,71"},{"product_id":"806","product_name":"Emerging Threats Pro Ruleset","description":"Proofpoint Emerging Threats (ET) Pro is a timely and accurate\nrule set that detects and blocks threats using your existing\nnetwork security appliances, such as next-generation firewalls\nand network IDS\/IPS.","hyperlink":"","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 631","vendor_id":"48","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,65,71"},{"product_id":"968","product_name":"Encrypted Traffic Management","description":"Symantec Proxy and SSL Visibility Appliance decrypt traffic, feed existing security infrastructure, and maintain privacy compliance.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/web-and-email\/encrypted-traffic-management","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"349","product_name":"Encryptics Data Protection API","description":"Build comprehensive data protection right into your own products and services with our lightweight, API-based tools.","hyperlink":"","td_contact":"","td_extension":"","vendor_id":"24","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"348","product_name":"Encryptics for Email","description":"Encryptics for Email integrates seamlessly with Microsoft Outlook, iPhone, Android, and the Mac to secure all of your messages sent through internal or external networks. Your protected messages maintain the highest levels of security and control even when passed through unaffiliated clients or residing on anonymous email servers.","hyperlink":"https:\/\/www.encryptics.com\/solutions.aspx","td_contact":"","td_extension":"","vendor_id":"24","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"337","product_name":"Endpoint Detection and Response","description":"Cyberbit's Endpoint Detection and Response (EDR) detects advanced, unknown and evasive threats without relying on external sources or connectivity. As a result, it is the only EDR that can be deployed in isolated (air-gapped) environments with no impact on detection.","hyperlink":"https:\/\/www.cyberbit.com\/solutions\/endpoint-detection-response\/","td_contact":"","td_extension":"","vendor_id":"18","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"85","country_name":"ASIA PACIFIC","parint_id":"0","type":"0","country":"85,87"},{"product_id":"1681","product_name":"Endpoint Detection and Response (EDR)","description":"Symantec's Endpoint Detection and Response (EDR) solution detects, investigates, and remediates threats across all endpoints from a single console.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/endpoint\/detection-and-response","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"530","product_name":"Endpoint Detection and Response (EDR) Optimum","description":"Kaspersky Endpoint Detection and Response (EDR) Optimum is a centralized automated tool that addresses advanced and targeted attacks in ways that make it easy on both your staff and your IT resources. EDR solution for the mass market, 100% channel-ready and partner-oriented. Very simple, with no need to install an additional server and managed from the same KSC console as KESB.","hyperlink":"https:\/\/me-en.kaspersky.com\/enterprise-security\/endpoint-detection-response-edr#:~:text=Kaspersky%20EDR%20is%20a%20specialized%2C%20unified%20protection%20solution,trusted%20sources%20can%20easily%20penetrate%20the%20corporate%20perimeter","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,9,10,39,51,60"},{"product_id":"970","product_name":"Endpoint Encryption","description":"Full disk encryption (including BitLocker and FileVault management) to protect data and ensure compliance. Also protects data on removable media.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/information-protection\/encryption","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1279","product_name":"Endpoint for Service Providers","description":"Enterprise-grade protection and management for customer desktops, laptops, tablets, and mobile devices","hyperlink":"","td_contact":"carbonite@techdata.com \n(727) 539-7429 x-71458","td_extension":"800-237-8931 x5540414","vendor_id":"10","service_tiering":"No Tiering.\u00a0 Monthly subscription based upon device count.","partner_benefits":"

\u2022   Fixed monthly pricing that include product, support and services for a 3,4 or 5 year commitment<\/p>\n

\u2022  Check Point\u2019s full offering, both software and physical, ranging from SMB to high end<\/p>\n

\u2022  Co-MSP Support that includes 24x7 support SLA with affordable costs <\/p>\n

\u2022  All equipment & licensing in MSSP deals is owned by Check Point throughout the agreement period, therefore, no assets are on the books, eliminating related expenses <\/p>\n

\u2022  E14Flexible delivery methods to suit you and your customers\u2019 needs. This includes both on & offpremise solutions, along with mobile, endpoint and mailbox protection<\/p>","typeof_service":"

Managed Security Service Building Block Solution:<\/strong>  Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":"

\u2022   Centrally managed, policy-controlled backups with no disruption<\/p>\n

\u2022   Optional QuickCache technology manages bandwidth consumption across distributed networks<\/p>\n

\u2022   Global deduplication reduces storage footprint and cost<\/p>\n

\u2022   Secure, remote data access from any device, anywhere, anytime <\/p>\n

\u2022  Global location tracking and remote data wipe options<\/p>","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1901","product_name":"Endpoint Privilege Management","description":"Maintain security, user productivity, and IT operational efficiency by enforcing least privilege across the desktop environment for Linux, Windows, Mac","hyperlink":"https:\/\/www.beyondtrust.com\/privilege-management","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"94","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1683","product_name":"Endpoint Protection","description":"Symantec Endpoint Protection 14 leverages the largest endpoint work together with advanced machine learning algorithms to protect you and your data.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/endpoint\/end-user","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1008","product_name":"Endpoint Protection Cloud","description":"Symantec Endpoint Protection Cloud (SEP Cloud) is an easy to use security-as-a-service that protects and manages PC, Mac, mobile devices and servers from a single console, making it the ideal solution for organizations with limited IT security resources. SEP Cloud effectively stops today\u2019s ransomware, zero-day threats and other sophisticated attacks using advanced multi-layered technologies including advanced machine learning and behavior analysis. Utilizing SEP Cloud\u2019s, default security settings and user self-enrollment capabilities, this solution quickly protects your endpoints.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/endpoint\/end-user","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"Per user or per device subscription pricing","partner_benefits":"

\u2022   Advanced Endpoint<\/p>\n

\u2022   Easy to Use<\/p>\n

\u2022   Low IT overhead<\/p>","typeof_service":"

Managed Security Services Building Block Solution: <\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":"

Why Endpoint Security is Criticial<\/p>\n

\u2022  Closest termination point to the end-user<\/p>\n

\u2022  The ultimate destination for the criminal (last line of defense)<\/p>\n

\u2022  Data lives for most of its life on endpoints<\/p>\n

\u2022  Proliferation of devices - we live in the \"Cloud Genration\"<\/p>","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1488","product_name":"Endpoint Protection for SMB","description":"McAfee Endpoint Protection for SMB delivers simple and affordable endpoint security, web security and data protection designed for small and medium-size businesses.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/endpoint-protection-for-smb.html","td_contact":"Tech Data: mcafee@techdata.com\n

DLT: spi@dlt.com<\/p>","td_extension":"Tech Data: 800-237-8931\n

DLT: 703-773-9231<\/p>","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1009","product_name":"Endpoint Protection Mobile","description":"Symantec Endpoint Protection Mobile (SEP Mobile) offers comprehensive mobile threat defense solution for both managed and unmanaged devices, delivering superior depth of threat intelligence to help predict, detect and prevent an extensive range of known and unknown threats. SEP Mobile's advanced technology uses a layered approach that leverages massive crowd-sourced threat intelligence, in addition to both device- and server- based analysis, to proactively help protect enterprise mobile devices against malware, network threats, and vulnerability exploits.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/endpoint\/end-user\/protection-mobile","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"Per device subscription pricing","partner_benefits":"

\u2022   Holistic, Layered Mobile Security <\/p>\n

\u2022   Public App<\/p>\n

\u2022   Proactive Protections, Not Just Detections<\/p>\n

\u2022   Enterprise Readiness<\/p>","typeof_service":"

Managed Security Services Building Block Solution: <\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":"

\u2022  Protect BYOD and corporate managed mobile devices <\/p>\n

\u2022  Predictive technology with high efficacy<\/p>\n

\u2022  Productive and unobtrusive to enable seamless mobile experience<\/p>\n

\u2022  Scalable and effortless deployment<\/p>","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1684","product_name":"Endpoint Protection Small Business Edition","description":"Secure your small business desktops, laptops, and servers against cyber attacks, either on-premises or based in the cloud.","hyperlink":"https:\/\/support.broadcom.com\/security\/product-page.html?productName=Endpoint%20Protection%20Small%20Business%20Edition%20(Cloud)","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"789","product_name":"Endpoint Protection-as-a-Service","description":"Endpoint inventory, protection, detection, and response typically requires multiple, complex security products and manual coordination or integration \u2014 leaving many companies with insufficient risk mitigation where it matters most. OPAQ Endpoint Protection from the OPAQ Cloud provides hardware and software asset inventory, software-defined network segmentation, and instant quarantine capabilities \u2014 which increase visibility and reduce attack surface and response time.","hyperlink":"https:\/\/opaq.com\/solutions\/solutions-by-product\/endpoint-protection\/","td_contact":"opaqUS@techdata.com","td_extension":"800-237-8931 x5540434","vendor_id":"45","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"645","product_name":"Endpoint Protection\u2014Advanced Suite","description":"McAfee Endpoint Protection\u2014Advanced Suite delivers proactive anti-malware protection, access control, and centralized policy-based management to keep your assets safe and compliant.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/endpoint-protection-advanced-suite.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1152","product_name":"Endpoint Security","description":"Defend against the threats of today and tomorrow with XGen\u2122 security","hyperlink":"https:\/\/www.trendmicro.com\/en_us\/business\/products\/user-protection\/sps\/endpoint.html","td_contact":"trendmicro@techdata.com","td_extension":"800-237-8931 ext. 5545035","vendor_id":"66","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,85,86,88,89"},{"product_id":"1524","product_name":"Endpoint Security (ENS)","description":"McAfee Endpoint Security delivers centrally managed defenses with integrated capabilities like endpoint detection and response and machine learning analysis. Protect your Windows, Mac, and Linux systems with multiple, collaborative defenses and automated responses.","hyperlink":"","td_contact":"Tech Data: mcafee@techdata.com\n

DLT: spi@dlt.com<\/p>","td_extension":"Tech Data: 800-237-8931\n

DLT: 703-773-9231<\/p>","vendor_id":"41","service_tiering":"Annual Subscription\/PayGo","partner_benefits":"

\u2022  Machine learning analysis:<\/strong>  Detect zero-day threats in near real time by examining how they look and behave to halt threats designed to evade detection.<\/p>\n

\u2022  Dynamic application containment:<\/strong>  Defend against ransomware and greyware by securing endpoints that are leveraged as entry points for attacks.<\/p>\n

\u2022  Proactive web security:<\/strong>  Ensure safe browsing with web protection and filtering for endpoints.<\/p>\n

\u2022  Advanced anti-malware protection:<\/strong>  Our anti-malware engine is continually updated by McAfee Global Threat Intelligence and works efficiently across multiple operating systems.<\/p>","typeof_service":"

Managed Security Service Building Block Solution:<\/strong>  Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":"

\u2022 Zero-impact user scans for greater user productivity.<\/p>\n

\u2022  Stronger forensic data to help you harden your policies.<\/p>\n

\u2022  Performance improvements.<\/p>\n

\u2022  Fewer agents to manage, along with scan avoidance, to reduce manual entry.<\/p>\n

\u2022  Collaborative defenses that work together to defeat advanced threats.<\/p>\n

\u2022  A next-generation framework that is ready to plug into our other advanced threat and endpoint detection.<\/p>","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"533","product_name":"Endpoint Security Cloud","description":"Developed specifically for small and medium-sized businesses, Kaspersky Endpoint Security Cloud lets you manage security for multiple endpoints, mobile devices and file servers remotely, from anywhere","hyperlink":"https:\/\/www.kaspersky.com\/enterprise-security\/fraud-prevention","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,9,10,39,51,60"},{"product_id":"647","product_name":"Endpoint Security for Mac","description":"McAfee Endpoint Security for Mac provides essential endpoint protection for Macs to protect against viruses, spyware, Trojan horses, and other malware threats.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/endpoint-security-for-mac.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1153","product_name":"Endpoint Sensor - Detection and Response","description":"Assess the nature and extent of targeted attacks with context-aware endpoint forensics","hyperlink":"https:\/\/www.trendmicro.com\/en_us\/business\/products\/user-protection\/sps\/endpoint\/endpoint-sensor.html","td_contact":"trendmicro@techdata.com","td_extension":"800-237-8931 ext. 5545035","vendor_id":"66","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,85,86,88,89"},{"product_id":"1598","product_name":"Endpoint Systems Management","description":"Easily provision, manage, secure, and service your growing organization\u2019s network-connected devices with integrated appliances that deliver fast ROI.","hyperlink":"https:\/\/www.quest.com\/solutions\/endpoint-systems-management\/","td_contact":"spi@dlt.com","td_extension":"703-709-7172","vendor_id":"74","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1492","product_name":"Endpoint Threat Defense","description":"McAfee Endpoint Threat Defense is an endpoint security solution that detects zero-day threats, advanced malware, and targeted attacks, and secures endpoint patient zero.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/endpoint-threat-defense.html","td_contact":"Tech Data: mcafee@techdata.com\n

DLT: spi@dlt.com<\/p>","td_extension":"Tech Data: 800-237-8931\n

DLT: 703-773-9231<\/p>","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"649","product_name":"Endpoint Threat Defense and Response","description":"McAfee Endpoint Threat Defense and Response includes advanced protection and endpoint detection and response (EDR) technology that detects, hunts, contains, and eliminates advanced threats, such as ransomware and other greyware.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/endpoint-threat-defense-response.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1494","product_name":"Endpoint Threat Protection","description":"McAfee Endpoint Threat Protection delivers essential, effective endpoint protection to protect against advanced threats.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/endpoint-threat-protection.html","td_contact":"Tech Data: mcafee@techdata.com\n

DLT: spi@dlt.com<\/p>","td_extension":"Tech Data: 800-237-8931\n

DLT: 703-773-9231<\/p>","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1259","product_name":"Enterprise","description":"All the Benefits of Essentials and Professional + WAF and Threat Hunting Analyst options","hyperlink":"","td_contact":"Tech Data: enterprisecloudsales@techdata.com\n

DLT: spi@dlt.com<\/p>","td_extension":"DLT: 703-773-9239","vendor_id":"2","service_tiering":"No Tiering. Monthly subscription based on node count","partner_benefits":"

\u2022  Expands your portfolio capability with  innovative threat detection and response, as a service: platform, intelligence, experts<\/p>\n

\u2022  Cross-sell other security Product<\/p>\n

\u2022  Wrap 24\/7 threat detection, monitoring and response into your service offering to help resource-constrained customers improve their security and compliance posture <\/p>\n

\u2022  24\/7 SOC services \u2013 customer SLA 15 minutes or augment your own soc services<\/p>\n

\u2022  Predictable, recurring revenue model with high margin contribution<\/p>","typeof_service":"

Managed Security Service Turn-Key Solution: <\/strong> People, Processes and Technology (An MSP can plug this solution into their offerings without much effort or investment)<\/p>","end_user_benefits":"

Security Platform<\/strong><\/p>\n

\u2022  Always-on Managed WAF Defense (option)<\/p>\n

\u2022  Intrusion Detection<\/p>\n

\u2022  Log Collection and Monitoring<\/p>\n

Threat Intelligence<\/strong><\/p>\n

\u2022  Dark Web Scanning<\/p>\n

Security Analytics<\/p>\n

Expert Defenders<\/strong><\/p>\n

\u2022  24\/7 Incident Monitoring & Management<\/p>\n

\u2022  Security Event Insights and Analysis<\/p>\n

\u2022  Assigned SOC Analyst with Threat Hunting (option)<\/p>","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"4","product_name":"Enterprise Application Access","description":"Application Access Redefined: Secure, Simple, Fast","hyperlink":"https:\/\/www.akamai.com\/us\/en\/products\/security\/enterprise-application-access.jsp","td_contact":"akamaius@techdata.com","td_extension":"(800)-237-8931 x5540426","vendor_id":"1","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1"},{"product_id":"818","product_name":"Enterprise Archive","description":"Retain, discover and supervise data to meet today\u2019s compliance and e-discovery needs.","hyperlink":"https:\/\/www.proofpoint.com\/us\/products\/archiving-and-compliance\/enterprise-archive","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 643","vendor_id":"48","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,65,71"},{"product_id":"819","product_name":"Enterprise Collaboration Archive","description":"Proofpoint Enterprise Collaboration Archive applies policy based controls to capture social content from Salesforce Chatter, Jive, Skype for Business, LinkedIn, Twitter and other platforms to be managed or reviewed as any other critical data asset in your compliance archive or supervision platform.","hyperlink":"https:\/\/www.proofpoint.com\/us\/products\/archiving-and-compliance","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 644","vendor_id":"48","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,65,71"},{"product_id":"451","product_name":"Enterprise Encryption","description":"To reduce the\u00a0risk posed by\u00a0hackers, insider threats, and other malicious attacks, your organization must utilize encryption to protect sensitive data wherever it is found across your on-premises, virtual, public cloud, and hybrid environments. This includes data at rest in application and web servers, file servers, databases, and network attached storage, as well as data in motion across your network.\u00a0","hyperlink":"https:\/\/www.gemalto.com\/enterprise-security\/enterprise-data-encryption","td_contact":"","td_extension":"","vendor_id":"31","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"85","country_name":"ASIA PACIFIC","parint_id":"0","type":"0","country":"85,86"},{"product_id":"2094","product_name":"Enterprise Identity Governance Administration","description":"SOD management, certification, compliance controls,Access request, Provisioning, role \/ policy management","hyperlink":"https:\/\/saviynt.com\/solutions\/identity-governance-and-administration\/","td_contact":"SaviyntUS@techdata.com","td_extension":"800-237-8931 x 5540529","vendor_id":"124","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1495","product_name":"Enterprise Log Manager","description":"McAfee Enterprise Log Manager automates log management and analysis for all log types, including Windows event logs, database logs, application logs, and syslogs, and integrates with McAfee SIEM for analysis and incident management.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/enterprise-log-manager.html","td_contact":"Tech Data: mcafee@techdata.com\n

DLT: spi@dlt.com<\/p>","td_extension":"Tech Data: 800-237-8931\n

DLT: 703-773-9231<\/p>","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2084","product_name":"Enterprise Planning & Budget Cloud Servic","description":"A solution designed to empower operational planners with flexibility, scalability and ownership to plan the way you want, while still offering the transparency and control required for corporate finance","hyperlink":"https:\/\/www.oracle.com\/applications\/performance-management\/products\/planning.html","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"46","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"695","product_name":"Enterprise Secure Key Manager\u00a0","description":"Automated encryption key lifecycle management appliance","hyperlink":"https:\/\/software.microfocus.com\/en-us\/software\/eskm-enterprise-secure-key-management","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,63,65,67,68,69,70,71,74,75,76,77,80,81,84"},{"product_id":"809","product_name":"Enterprise Security Awareness Training","description":"The Proofpoint Security Awareness Training Enterprise package\nincludes everything from the Anti-Phishing Suite and adds\nThreatSim USB, CyberStrength\u00ae Knowledge Assessments,\nour entire library of Training Modules, and all of our Awareness\nMaterials, including videos.","hyperlink":"https:\/\/www.proofpoint.com\/us\/products\/security-awareness-training","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 634","vendor_id":"48","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,65,71"},{"product_id":"652","product_name":"Enterprise Security Manager","description":"McAfee Enterprise Security Manager delivers intelligent, fast, and accurate security and information (SIEM) and log management.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/enterprise-security-manager.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1240","product_name":"Enterprise Threat Protector","description":"Proactive protection against zero-day malware and phishing","hyperlink":"https:\/\/www.akamai.com\/us\/en\/products\/security\/enterprise-threat-protector.jsp","td_contact":"akamaius@techdata.com","td_extension":"(800)-237-8931 x5540426","vendor_id":"1","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"1497","product_name":"ePolicy Orchestrator","description":"McAfee ePolicy Orchestrator (McAfee ePO) software centralizes and streamlines management of endpoint, network, and data security, and compliance solutions, to drive down the cost and complexity of security management.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/epolicy-orchestrator.html","td_contact":"Tech Data: mcafee@techdata.com\n

DLT: spi@dlt.com<\/p>","td_extension":"Tech Data: 800-237-8931\n

DLT: 703-773-9231<\/p>","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"22","product_name":"Essentials","description":"Vulnerability and Asset Visibility with Extended Endpoint Protection, remediation intelligence, and 24\/7 support","hyperlink":"","td_contact":"enterprisecloudsales@techdata.com","td_extension":"","vendor_id":"2","service_tiering":"No Tiering. Monthly subscription based on node count","partner_benefits":"

\u2022  Visibility & protection across all customer environments: On-premise, hosted, cloud, hybrid<\/p>\n

\u2022  Ability to Cross-sell other security Products<\/p>\n

\u2022  Provides insights to customers, which partners can then provide services and offering around them.<\/p>\n

\u2022  Provides opportunities for partners to wrap additional services around these insights.<\/p>","typeof_service":"

Managed Security Services Turn-Key Solution: <\/strong> People, Processes and Technology (An MSP can plug this solution into their offerings without much effort or investment)<\/p>","end_user_benefits":"

Security Platform<\/strong><\/p>\n

\u2022  Asset discovery<\/p>\n

\u2022  Vulnerability Scanning<\/p>\n

\u2022  Cloud configuration checks<\/p>\n

\u2022  Extended endpoint protection<\/p>\n

Threat Intelligence<\/strong><\/p>\n

\u2022  Threat Risk Index<\/p>\n

\u2022  Remediation intelligence<\/p>\n

\u2022  Prioritization and next steps guidance<\/p>\n

\u2022  Comprehensive vulnerability library<\/p>\n

Expert Defenders<\/strong><\/p>\n

\u2022  24\/7 email and phone support<\/p>\n

\u2022  CI scanning and ASV support<\/p>\n

\u2022  Service health monitoring<\/p>","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,6,8,9,10,12,14,16,18,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61"},{"product_id":"800","product_name":"Essentials for Small Business","description":"Essentials for Small Business provides spam filtering, phishing detection, multilayer anti-virus, dynamic sandboxing\nof URLs, a robust filter rules engine, email continuity, policyenforced encryption, email archive and social media account\nprotection.","hyperlink":"https:\/\/www.proofpoint.com\/us\/products\/email-protection\/essentials","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 625","vendor_id":"48","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,65,71"},{"product_id":"2016","product_name":"Event Hub Cloud Service","description":"A big data streaming platform and event ingestion service. It can receive and process millions of events per second. Data sent to an event hub can be transformed and stored by using any real-time analytics","hyperlink":"https:\/\/docs.oracle.com\/en\/cloud\/paas\/event-hub-cloud\/admin-guide\/eventhub.html","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"46","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"654","product_name":"Event Receiver","description":"McAfee Event Receiver collects third-party events and logs, and correlates events collected by other distributed receivers for system-wide threat detection and fast security data retrieval and analysis.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/event-receiver.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"696","product_name":"Exchange Administrator\u00a0","description":"Provides Exchange administration that restricts privileges to specific users","hyperlink":"https:\/\/www.netiq.com\/products\/exchange-administrator\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,63,65,67,68,69,70,71,74,75,76,77,80,81,84"},{"product_id":"443","product_name":"F-Secure Anti-Virus","description":"Virus and malware protection for PC","hyperlink":"https:\/\/www.f-secure.com\/en_US\/web\/home_us\/anti-virus","td_contact":"fsecure@techdata.com","td_extension":"(480) 643-5064","vendor_id":"30","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"446","product_name":"F-Secure KEY","description":"The ultimate password manager","hyperlink":"https:\/\/www.f-secure.com\/en_US\/web\/home_us\/key","td_contact":"fsecure@techdata.com","td_extension":"(480) 643-5064","vendor_id":"30","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"448","product_name":"F-Secure SENSE","description":"F-Secure SENSE is a secure and elegant WiFi router that secures every device in your home from online threats. Protecting your entire home network as well as your devices on the go, it is the only internet security you need.","hyperlink":"https:\/\/www.f-secure.com\/en_US\/web\/home_us\/sense","td_contact":"fsecure@techdata.com","td_extension":"(480) 643-5064","vendor_id":"30","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"449","product_name":"F-Secure TOTAL","description":"Internet security and VPN for all devices","hyperlink":"https:\/\/www.f-secure.com\/en_US\/web\/home_us\/total","td_contact":"fsecure@techdata.com","td_extension":"(480) 643-5064","vendor_id":"30","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1393","product_name":"F5 Secure Web Gateway","description":"Gain insight and control over web traffic.","hyperlink":"https:\/\/www.f5.com\/products\/security\/access-manager\/secure-web-gateway","td_contact":"f5@techdata.com","td_extension":"(480) 643-5064","vendor_id":"26","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"1957","product_name":"Falcon Cloud Workload Protection","description":"CrowdStrike Falcon Cloud Workload Protection provides comprehensive breach protection across private, public, hybrid and multi-cloud environments, allowing customers to rapidly adopt and secure technology across any workload.","hyperlink":"https:\/\/www.crowdstrike.com\/cloud-security-products\/falcon-cloud-workload-protection\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"105","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1956","product_name":"Falcon Complete","description":"Endpoint protection delivered as a service. The highest level of endpoint security maturity delivered immediately, without the burden of building and managing it yourself.","hyperlink":"https:\/\/www.crowdstrike.com\/endpoint-security-products\/falcon-complete\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"105","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1958","product_name":"Falcon Container Security","description":"The CrowdStrike Falcon\u00ae platform protects workloads across all environments, including workloads and containers running in the cloud and in private, public and hybrid data centers or on-premises. The Falcon platform and intelligent, lightweight Falcon agent offer unparalleled protection and real-time visibility. Specifically tailored for containers, Falcon provides detailed insight into both the host and container-specific data and events. The Falcon platform enables and accelerates critical detection, investigation and threat hunting tasks performed on containers \u2014 even on ephemeral containers after they have been decommissioned. Security teams can secure containers at the speed of DevOps without adding friction.","hyperlink":"https:\/\/www.crowdstrike.com\/resources\/data-sheets\/container-security-solution-brief\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"105","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1966","product_name":"Falcon Discover: IT Hygiene to Prepare & Prevent","description":"Unlimited Visibility\n\n - Monitor everything from one convenient, powerful dashboard, and quickly dive in to explore applications, accounts and assets using real-time and historical data.\nImmediate Data to Repel Attacks\n\nImmediate Data to Repel Attacks\n\n - Get contextual information for all of your systems instantly, utilizing dashboards, graphs, charts and search functionality to drill down into supporting data.\n\nZero Impact on Performance\n\n - Leverage the single lightweight CrowdStrike Falcon\u00ae agent to keep your systems and users free to do their jobs.","hyperlink":"https:\/\/www.crowdstrike.com\/endpoint-security-products\/falcon-discover-network-security-monitoring\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"105","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1968","product_name":"Falcon Endpoint Device Control & USB Security: Falcon Device Control","description":"Mitigate risks associated with USB devices\n\n - Falcon Device Control provides the visibility and granular control required to enable safe usage of USB devices across your organization\n\n - Automatically delivers the complete visibility you need, allowing you to monitor how USB devices are used in your environment\n\n - Enables you to determine precisely what devices are allowed or restricted, and the granular level of access granted to each device\n\n - Falcon Device Control does not require any additional endpoint software installation or hardware to manage","hyperlink":"https:\/\/www.crowdstrike.com\/endpoint-security-products\/falcon-endpoint-device-control\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"105","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1954","product_name":"Falcon Endpoint Protection Enterprise","description":"Unifies the technologies required to successfully stop breaches, including true next-gen antivirus and endpoint detection and response (EDR), managed threat hunting, and threat intelligence automation, delivered via a single lightweight agent.","hyperlink":"https:\/\/www.crowdstrike.com\/endpoint-security-products\/falcon-endpoint-protection-enterprise\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"105","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1955","product_name":"Falcon Endpoint Protection Premium","description":"Take breach-stopping power to the next level with extended endpoint visibility into accounts, assets and applications usage.","hyperlink":"https:\/\/www.crowdstrike.com\/endpoint-security-products\/falcon-endpoint-protection-premium\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"105","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1953","product_name":"Falcon Endpoint Protection Pro","description":"Market-leading NGAV proven to stop malware with integrated threat intelligence and immediate response \u2014 with a single lightweight agent that operates without the need for constant signature updates, on-premises management infrastructure or complex integrations, making it fast and easy to replace your AV.","hyperlink":"https:\/\/www.crowdstrike.com\/endpoint-security-products\/falcon-endpoint-protection-pro\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"105","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1967","product_name":"Falcon Firewall Management","description":"Simple Firewall Management\n\n - Falcon Firewall Management makes it easy to create, manage and enforce policies with a simple, centralized approach.\nsimplicity icon\n\nBetter Protection\n\n - Defend against network threats, and gain instant visibility to enhance protection and inform action.\nReduced Complexity\n\nReduced Complexity\n\n - Delivered via the same lightweight Falcon agent, management console and cloud-native architecture, it deploys and is operational in minutes.","hyperlink":"https:\/\/www.crowdstrike.com\/endpoint-security-products\/falcon-firewall-management\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"105","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1959","product_name":"Falcon for AWS","description":"Continuous and comprehensive workload monitoring, including container visibility, ensuring nothing is missed and stealthy attacks can be stopped.\n\nBuilt in the cloud for the cloud. Reduces the overhead, friction and complexity associated with protecting cloud workloads.\nflow chart.","hyperlink":"https:\/\/www.crowdstrike.com\/endpoint-security-products\/falcon-for-aws\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"105","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1961","product_name":"Falcon for Azure","description":"- Gain insight into the scope and nature of your Azure resources, so you can secure all virtual machines, uncover and mitigate risks, and reduce the attack surface.\n\n - Comprehensive visibility into Azure workload events and virtual machine metadata enables detection, response, proactive threat hunting and investigation, to ensure that nothing goes unseen in your cloud environments.\n\n - Key integrations support continuous integration\/continuous delivery (CI\/CD) workflows, allowing you to secure Azure workloads at the speed of DevOps without sacrificing performance.","hyperlink":"https:\/\/www.crowdstrike.com\/cloud-security-products\/falcon-for-azure\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"105","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1960","product_name":"Falcon for GCP","description":"- Provides insight into your GCP footprint, so you can secure all compute instances, uncover and mitigate risks, and reduce the attack surface.\n\n - Automatically discovers existing cloud workload deployments \u2014 without installing an agent \u2014 by enumerating GCP Compute Engine instances.\n\n - Provides real-time information about compute resources, including context-rich metadata about compute instances by state, type, region and project, as well as public-facing compute instances, total compute disks, firewalls and networks for GCP.\n\n - Identifies compute instances that are not protected by the CrowdStrike\u00ae Falcon platform","hyperlink":"https:\/\/www.crowdstrike.com\/cloud-security-products\/falcon-for-google-cloud-platform\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"105","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1969","product_name":"Falcon for Mobile: Mobile Endpoint Detection and Response (EDR)","description":"Gain unprecedented visibility into malicious, unwanted or accidental access to sensitive corporate data\nUse familiar Falcon tools and skills to detect mobile phishing attempts, mobile malware, network interference, insider threats, vulnerable devices and more.\nSmart dashboards accelerate and simplify triage and show you which devices need attention first\nUnderstand detections at a glance \u2014 threats are mapped to the MITRE ATT&CK FOR MOBILE framework","hyperlink":"https:\/\/www.crowdstrike.com\/endpoint-security-products\/falcon-for-mobile\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"105","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1964","product_name":"Falcon Insight: EDR","description":"Visibility\n\n - Continuous monitoring captures endpoint activity so you know exactly what\u2019s happening - from a threat on a single endpoint to the threat level of the organization.\n\nBreach Protection\n\n- Falcon Insight delivers visibility and in-depth analysis to automatically detect suspicious activity and ensure stealthy attacks - and breaches - are stopped.\n\nEfficiency\n\n - Falcon Insight accelerates security operations, allowing users to minimize efforts spent handling alerts and quickly investigate and respond to attacks.","hyperlink":"https:\/\/www.crowdstrike.com\/endpoint-security-products\/falcon-insight-endpoint-detection-response\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"105","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1965","product_name":"Falcon OverWatch: Proactive Managed Threat Hunting","description":"See and Stop Hidden Advanced Attacks\n\nThe OverWatch team hunts relentlessly to see and stop the stealthiest sophisticated threats: the 1% of 1% of threats that blend in silently and lead to a breach if they remain undetected.\nMaximum Effectiveness and Efficiency\n\nOverWatch delivers the best results by augmenting skilled analysts with the most advanced technology. Our elite human experts use cloud-scale data, custom tools and up-to-the-minute threat intelligence to hunt with unprecedented speed and scale.\nSeamless Extension of Your Team\n\nSeamless Extension of Your Team\n\nAs a core component of the CrowdStrike Falcon\u00ae platform, OverWatch delivers results for organizations of all sizes, operating as a seamless extension of your team \u2014 minimizing overhead, complexity and cost.","hyperlink":"https:\/\/www.crowdstrike.com\/endpoint-security-products\/falcon-overwatch-threat-hunting\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"105","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1962","product_name":"Falcon Prevent: NGAV","description":"- Machine learning and artificial intelligence detect known and unknown malware and ransomware\n\n - Behavior-based indicators of attack (IOAs) prevent sophisticated fileless and malware-free attacks\n\n - Exploit blocking stops the execution and spread of threats via unpatched vulnerabilities\n\n - Threat intelligence prevention blocks activities known to be malicious","hyperlink":"https:\/\/www.crowdstrike.com\/endpoint-security-products\/falcon-prevent-endpoint-antivirus\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"105","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1963","product_name":"Falcon X Automated Threat Intelligence","description":"Falcon X\n - Automatically investigate incidents and accelerate alert triage and response. Built into the Falcon platform, it is operational in seconds.\n\nFalcon X Premium\n\n - Premium adds threat intelligence reporting and research from CrowdStrike experts \u2014 enabling you to get ahead of nation-state, eCrime and hacktivist attacks.\n\nFalcon X Elite\n\n - Falcon X Elite expands your team with access to an intelligence analyst to help defend against threats targeting your organization.","hyperlink":"https:\/\/www.crowdstrike.com\/endpoint-security-products\/falcon-x-threat-intelligence\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"105","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"8","product_name":"Fast DNS","description":"Cloud-based DNS for improved performance, availability and resiliency against DDoS attacks","hyperlink":"https:\/\/www.akamai.com\/us\/en\/products\/security\/fast-dns.jsp","td_contact":"akamaius@techdata.com","td_extension":"(800)-237-8931 x5540426","vendor_id":"1","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1"},{"product_id":"1643","product_name":"File Backup and Recovery","description":"Back up only the business-critical data living on laptops and desktops. This online backup solution identifies the data that should be protected, backs it up to the cloud, and enables easy file and folder recovery.","hyperlink":"https:\/\/www.storagecraft.com\/data-availability-products","td_contact":"storagecraft@techdata.com","td_extension":"800-237-8931 x71458","vendor_id":"58","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1919","product_name":"File Drop","description":"File Drop allows you to get individual files analysed and regenerated by our Rebuild API via a simple drag and drop web interface.","hyperlink":"https:\/\/glasswallsolutions.com\/file-drop\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"98","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1685","product_name":"File Share Encryption","description":"Protect specific files and folders before sharing across devices, servers and in the cloud, with DLP policy enforcement integration.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/file-share-encryption-en","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1918","product_name":"File Type Detection","description":"A quick and effective way to detect file types on demand. File Type Detect will tell you if your file are what they say they are.","hyperlink":"https:\/\/glasswallsolutions.com\/file-type-detection\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"98","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1874","product_name":"Finalcode 6","description":"Automatically encrypts files created and saved on a PC, or on download. The encrypted file prevents internal unauthorized removal.","hyperlink":"https:\/\/www.finalcode.com\/en\/products\/finalcode-6\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"84","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1875","product_name":"Finalcode for Box","description":"Ensures persistent file access, usage control and deletion of files outside the secure Box container in a way that is seamless to Box collaborators. Provides strong file encryption, dynamic permission settings, and lifecycle activity tracking \u2013 directly invoked within the Box interface.\n\nThe FinalCode Encryption Service resides on FinalCode\u2019s secure SaaS running in the Amazon AWS cloud.","hyperlink":"https:\/\/www.finalcode.com\/en\/products\/finalcode-for-box\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"84","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1876","product_name":"Finalcode for CAD","description":"Protects CAD information no matter how files are shared inside and outside of your organization. Sets file access and usage permissions, tracks file activity, and dynamically adjusts policy for recipients. The file owner can change the policy and even delete the file remotely.\n\nSupports 2-D, 3-D and business specific modeling platforms from AutoDesk AutoCAD, DWG TrueView and Dassault Solidworks.\n\nUses 256-bit AES file encryption, comprehensive file-based IRM controls and rich activity logging","hyperlink":"https:\/\/www.finalcode.com\/en\/products\/finalcode-for-cad\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"84","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1818","product_name":"Firebox","description":"Total security appliances with screaming fast performance ideal for mid-sized and distributed enterprise organizations.","hyperlink":"https:\/\/www.watchguard.com\/wgrd-products\/network-security-appliances","td_contact":"watchguard@techdata.com","td_extension":"800-237-8931 x5545033","vendor_id":"71","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1223","product_name":"Firebox Cloud","description":"WatchGuard Firebox Cloud provides the same award-winning UTM security available in our Firebox appliances to protect servers running in public cloud environments.","hyperlink":"https:\/\/www.watchguard.com\/wgrd-products\/virtual-and-cloud\/firebox-cloud","td_contact":"SEWatchGuard@techdata.com","td_extension":"800-237-8931 x5545033","vendor_id":"71","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1820","product_name":"FireboxV","description":"WatchGuard FireboxV brings best-in-class network security to the world of virtualization, enabling your virtual environments to be just as secure as your physical one.","hyperlink":"https:\/\/www.watchguard.com\/wgrd-products\/virtual-and-cloud\/fireboxv","td_contact":"watchguard@techdata.com","td_extension":"800-237-8931 x5545033","vendor_id":"71","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1904","product_name":"Firemon Security Policy Automation","description":"Security policy automation capabilities that address use case, infrastructure, or compliance requirements. The levels of FireMon Automation include: Automated Design, Automated Implementation, Zero-Touch Automation, Continuous Adaptive Enforcement","hyperlink":"https:\/\/www.firemon.com\/products\/firemon-automation\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"96","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"788","product_name":"Firewall-as-a-Service","description":"Now more than ever, advanced firewall capabilities are needed by organizations in order to withstand the increasingly sophisticated assault on their networks. This is particularly true for midsize enterprises, which lack budget, security personnel, and other resources to effectively manage their risk. Buying, testing, integrating, and managing next-gen firewalls is just too complex and expensive. OPAQ\u2019s Firewall-as-a-Service utilizes backend automation and orchestration to provide advanced Next-Generation Firewall capabilities powered by Palo Alto Networks \u2014 delivered from the OPAQ Cloud in the most simplified, cost-effective, and flexible way.","hyperlink":"https:\/\/opaq.com\/solutions\/solutions-by-product\/firewall-as-a-service\/","td_contact":"opaqUS@techdata.com","td_extension":"800-237-8931 x5540434","vendor_id":"45","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1914","product_name":"Flashpoint API","description":"Flashpoint API grants access to intelligence reports, technical data, and uniquely sourced conversations from illicit threat actor communities, enabling users to enrich and enhance internal data with our targeted data acquired from highly curated sources.","hyperlink":"https:\/\/www.flashpoint-intel.com\/api\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"97","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1911","product_name":"Flashpoint Intelligence Platform","description":"Flashpoint Intelligence Platform grants access to our archive of finished intelligence reports, data from illicit forums, marketplaces, chat services, blogs, paste sites, technical data, card shops, and vulnerabilities, in a single, finished intelligence experience. Our platform scales Flashpoint\u2019s internal team of specialized, multilingual intelligence analysts\u2019 ability to quickly provide responses to customers","hyperlink":"https:\/\/www.flashpoint-intel.com\/platform\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"97","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"384","product_name":"Fluency Security for MSP and MSSP","description":"Fluency Security is a data hungry, high capacity next generation SIEM with built-in multi-tenant capability that that can run stand-alone or agument existing SIEM tools. We solve the problems of diversity, operations and analysis especially when businesses need to scale. Our advanced patented streaming database, correlation and risk scoring technology along with our ability to ingress all data sources ensures you aren't just getting notice of events but rather real actionable intelligent information that you can act on. Fluency has built-in pseudonymization for privacy (GDPR, CCPA & PIPEDA) regulations along with native IPv6 support and supports compliance regulations such as PCI-DSS with our 1 year storage, active user tracking and machine learning supporting compliance policies.","hyperlink":"","td_contact":"fluency@techdata.com\n(727) 539-7429 x-84008","td_extension":"","vendor_id":"27","service_tiering":"No Tiering. Quarterly or Annual Subscription","partner_benefits":"

\u2022  Help clients solve streaming and capacity needs<\/p>\n

\u2022  Help clients solve excessive storage fee costs<\/p>\n

\u2022  Help clients meet Privacy needs<\/p>\n

\u2022  Help clients meet Compliance needs (PCI-DSS)<\/p>\n

\u2022  Substantially improve overall efficiencies and lower costs with no utility based pricing<\/p>\n

\u2022  By helping to ingress all data sources (ground truth) you uncover upsell opportunities from endpoints to the system<\/p>\n

\u2022  Opportunity to create services around Fluency for installation and L1 support<\/p>","typeof_service":"

Managed Security Services Building Block Solution: <\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":"

\u2022  Real-time situational awareness <\/p>\n

\u2022  Reduction in Dwell Time<\/p>\n

\u2022  Reduction in False Positives <\/p>\n

\u2022  Unmatched scalability and capacity<\/p>\n

\u2022  Increased SOC efficiencies<\/p>\n

\u2022  Meet GDPR, CCPA and PIPEDA and industry compliance requirements for log management<\/p>\n

\u2022  No installation, maintenance or L1-L3 fees<\/p>\n

\u2022  Pricing based solely on daily ingress needs<\/p>\n

\u2022  Standard try before you buy Proof of Concept<\/p>","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"419","product_name":"FortiADC","description":"Fast layer 4, layer 7, and SSL throughput. All app delivery and security features needed in single solution","hyperlink":"https:\/\/www.fortinet.com\/products\/application-delivery-controller\/fortiadc.html","td_contact":"uspmfortinet@techdata.com","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,85,89"},{"product_id":"1401","product_name":"FortiAnalyzer","description":"Centralized Loggingand Reporting solution.Fabric-based visibility reduces analysis complexity. Fabric Security Ratings assess how secure you are.Lack of visibility continues to extend breach and compromise events to an average of more than 100 days. For each day an organization is exposed, it\u2019s another opportunity for attackers to get to sensitive customer and confidential information.FortiAnalyzer is the NOC-SOC security analysis tool built with operations perspective. With action-oriented views and deep drill-down capabilities, FortiAnalyzer not only gives organizations critical insight into threats, but also accurately scopes risk across the attack surface, pinpointing where immediate response is required.","hyperlink":"https:\/\/www.fortinet.com\/products\/management\/fortianalyzer.html","td_contact":"uspmfortinet@techdata.com","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"421","product_name":"FortiAP","description":"Wireless Access Point. Highest Performing Access Points with the latest 802.11ac Wave 2 standard. Most secure Wi-Fi with UTM services integrated in the Access Points","hyperlink":"https:\/\/www.fortinet.com\/products\/secure-wifi\/access-points.html","td_contact":"uspmfortinet@techdata.com","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,85,89"},{"product_id":"1403","product_name":"FortiAuthenticator","description":"User Identity Management Server. Offers a centralized user identity management solution that simplifies administration and the end user experience. Single Sign On capabilities for both internal and cloud networks","hyperlink":"https:\/\/www.fortinet.com\/products\/identity-access-management\/fortiauthenticator.html","td_contact":"uspmfortinet@techdata.com","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"423","product_name":"FortiCASB","description":"Visibility and Control for SaaS Applications. On-demand scanning of data stored in cloud.User analytics and monitoring.Organizations are increasingly turning to SaaS applications for the agility and savings, but find that they don't have the visibility and control they require.\n\nFortiCASB is a cloud-native Cloud Access Security Broker (CASB) subscription service that is designed to provide visibility, compliance, data security, and threat protection for cloud-based services being used by an organization. With support for major SaaS service providers, FortiCASB provides insights into users, behaviors, and data stored in the cloud with comprehensive reporting tools. It also includes advanced controls to extend security policies from within the network perimeter to SaaS applications.","hyperlink":"https:\/\/www.fortinet.com\/products\/cloud-access-security-broker.html","td_contact":"uspmfortinet@techdata.com","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,85,89"},{"product_id":"1405","product_name":"FortiClient","description":"Advanced Endpoint Protection.Endpoints are frequently the target of initial compromise or attacks. One recent study found that 30% of breaches involved malware being installed on endpoints. FortiClient strengthens endpoint security through integrated visibility, control, and proactive defense. With the ability to discover, monitor, and assess endpoint risks, you can ensure endpoint compliance, mitigate risks, and reduce exposure. FortiClient proactively defends against advanced attacks. Its tight integration with the Security Fabric enables policy-based automation to contain threats and control outbreaks. FortiClient is compatible with Fabric-Ready partners to further strengthen enterprises\u2019 security posture.","hyperlink":"https:\/\/www.fortinet.com\/products\/endpoint-security\/forticlient.html","td_contact":"uspmfortinet@techdata.com","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"425","product_name":"FortiCloud","description":"FortiCloud can help with your security and wireless challenges in a number of ways. Our solution addresses common IT difficulties including time-consuming provisioning, high investment costs, complex management, vulnerability to advanced threats, and the need to easily scale with growth.","hyperlink":"https:\/\/www.fortinet.com\/solutions\/enterprise-midsize-business\/cloud-security.html","td_contact":"uspmfortinet@techdata.com","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,85,89"},{"product_id":"1407","product_name":"FortiDDOS","description":"Hardware Accelerated DDOS Mitigator. Distributed Denial of Service (DDoS) attacks are ever-evolving and use a variety of technologies. To successfully combat these attacks, you need a dynamic, multi-layered security solution. FortiDDoS protects from both known and zero day attacks with very low latency. It\u2019s easy to deploy and manage, and includes comprehensive reporting and analysis tools.","hyperlink":"https:\/\/www.fortinet.com\/products\/ddos\/fortiddos.html","td_contact":"uspmfortinet@techdata.com","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"427","product_name":"FortiExtender","description":"Establishing and maintaining Internet connectivity can be a critical requirement for business execution. To provide a secondary WAN connection, the FortiExtender appliance uses LTE connectivity with the cellular phone infrastructure to provide broadband speeds that can be used in a failover or load-balancing configuration. And for those locations without wired broadband options, FortiExtender can provide the primary Internet connection.","hyperlink":"https:\/\/www.fortinet.com\/products\/wireless-lan-fortiextender.html","td_contact":"uspmfortinet@techdata.com","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,85,89"},{"product_id":"1409","product_name":"FortiExtender - Cloud","description":"Deploy, manage and optimize your LTE modem network with an easy to use, browser-based FortiExtender Cloud. This hosted service enables the management of an unlimited number of FortiExtender Appliances from anywhere you can connect to the Internet. With both free and paid service levels, FortiExtender Cloud offers inventory management, device configuration, carrier data consumption, and more for devices that can be spread around the country or around the world.","hyperlink":"https:\/\/www.fortinet.com\/products\/fortiextender-cloud.html","td_contact":"uspmfortinet@techdata.com","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1541","product_name":"Fortify on Demand\u00a0","description":"Manage your entire application security program from one interface","hyperlink":"https:\/\/software.microfocus.com\/en-us\/software\/fortify-on-demand","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"698","product_name":"Fortify Software Security Center\u00a0","description":"Gain valuable insight with a centralized management repository for scan results","hyperlink":"https:\/\/software.microfocus.com\/en-us\/software\/software-security-assurance-sdlc","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,63,65,67,68,69,70,71,74,75,76,77,80,81,84"},{"product_id":"1543","product_name":"Fortify Static Code Analyzer\u00a0","description":"Identifies security vulnerabilities in source code early in software development","hyperlink":"https:\/\/software.microfocus.com\/en-us\/software\/sca","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"700","product_name":"Fortify WebInspect\u00a0","description":"Provides comprehensive dynamic analysis of complex web applications and services","hyperlink":"https:\/\/software.microfocus.com\/en-us\/software\/webinspect","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,63,65,67,68,69,70,71,74,75,76,77,80,81,84"},{"product_id":"429","product_name":"FortiGate","description":"FortiGate is a market leading, high performance next-generation firewall that delivers advanced protection for north-south and east-west traffic in data centers, at the network edge and in the cloud.","hyperlink":"https:\/\/www.fortinet.com\/solutions\/enterprise-midsize-business\/private-cloud-security-sdn.html","td_contact":"uspmfortinet@techdata.com","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,85,89"},{"product_id":"1410","product_name":"Fortigate for Private Cloud","description":"Virtualization and SDN are rapidly transforming data centers into agile, innovative, and cost-effective private clouds. Unfortunately, if your security is an afterthought and can\u2019t keep up with these fast, flexible environments, there can be protection gaps or manual security processes that negate the advantages of network virtualization and SDN.\n\nOur SDN security framework delivers security built for these networks. It defines security evolution across the network architecture. It evolves network security in each conceptual layer of network architecture: the data plane, control plane, and management plane.","hyperlink":"https:\/\/www.fortinet.com\/solutions\/enterprise-midsize-business\/private-cloud-security-sdn.html","td_contact":"uspmfortinet@techdata.com","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1411","product_name":"FortiGate for Public Cloud","description":"Public clouds provide elastic and scalable infrastructure for applications, storage, and data that changes the way the world does business.","hyperlink":"https:\/\/www.fortinet.com\/products\/cloud-firewall-security.html","td_contact":"uspmfortinet@techdata.com","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1412","product_name":"FortiGate IPS","description":"Fortinet, well known for its next-generation firewall (NGFW) solution, has built IPS technology as part of FortiGate firewalls for more than ten years. Fortinet customers expect and depend on high performance from FortiGate firewalls and FortiGate IPS benefits from this legacy, delivering pound-for-pound, the best IPS performance available in the market today. FortiGate IPS, following a different evolution path than traditional IPS, innovates in ways that other standalone IPS products do not.","hyperlink":"https:\/\/www.fortinet.com\/products\/ips.html","td_contact":"uspmfortinet@techdata.com","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1413","product_name":"Fortigate Network Security Platform-30 FW Appliances","description":"Fortinet\u2019s Security Fabric can intelligently protect a customer\u2019s entire network\u2014There are 30 FW\/UTM security appliances. Fortinet Product Matrix attached.","hyperlink":"https:\/\/www.fortinet.com\/products.html","td_contact":"uspmfortinet@techdata.com","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1414","product_name":"Fortigate Next Gen Virtual Firewall","description":"FortiGate-VM is a virtualized form factor of our market leading, high performance FortiGate next-generation firewall that delivers advanced protection for north-south and east-west traffic in virtualized data centers and cloud.","hyperlink":"https:\/\/www.fortinet.com\/products\/virtualized-next-generation-firewall.html","td_contact":"uspmfortinet@techdata.com","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1415","product_name":"FortiMail","description":"Messaging Security Server.According to analysts, email security solutions from multi-product vendors have lagged behind changes in the threat landscape and email threats bypass traditional threat prevention technologies. As a result, they recommend assessing the advanced threat defense capabilities of incumbent email security solutions, supplementing them or replacing them to fill gaps. In fact, according to Verizon\u2019s 2017 Data Breach Investigations Report, two-thirds of all malware leading to security incidents are initially delivered via email. That\u2019s why you need the powerful protection of FortiMail, as a high performance physical or virtual appliance in your data center, to help secure the dynamic enterprise attack surface with your Fortinet Security Fabric.","hyperlink":"https:\/\/www.fortinet.com\/products\/email-security\/fortimail.html","td_contact":"uspmfortinet@techdata.com","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"431","product_name":"FortiManager","description":"Centralized Management Platform.As the cloud and IoT force networks to evolve, organizations struggle to keep ahead. Too many solutions with varying management tools strain already overworked security teams. A new approach is needed to short-circuit this challenge, one that combines the perspective of both operations and security. FortiManager is the NOC-SOC operations tool that was built with security perspective. It provides a single-pane-of-glass across the entire Fortinet Security Fabric.","hyperlink":"https:\/\/www.fortinet.com\/products\/management\/fortimanager.html","td_contact":"uspmfortinet@techdata.com","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,85,89"},{"product_id":"1425","product_name":"FortiManager-as-a-Service","description":"Tech Data has partnered with StratoZen to offer FortiManager-as-a-Service\u2013 a turnkey, multi-tenant FortiManager environment, hosted and maintained by StratoZen. All FortiManager licensing, high-availability hosting, ongoing maintenance, and user administration for the FortiManager console is included with easy pay-as-you-grow monthly pricing.","hyperlink":"","td_contact":"uspmfortinet@techdata.com","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"Monthly consumption-based subscription model","partner_benefits":"

\u2022  SaaS-delivered device and configuration management solution that is hosted and maintained by Tech Data\u2019s RECON SOC partner, StratoZen. <\/p>\n

\u2022  No software to buy, no infrastructure to build. <\/p>\n

\u2022  Simple pay-as-you-grow pricing <\/p>\n

\u2022  Monthly per-device pricing. Start with as few as 5 managed devices, simply pay for the devices you manage each month.<\/p>","typeof_service":"

Managed Security Service Turn-Key Solution:  People, Processes and Technology (An MSP can plug this solution into their offerings without much effort or investment)<\/p>","end_user_benefits":"

\u2022  Centrally monitored SD-WAN performance with more granular information for each link member, including link status, application performance and bandwidth usage.<\/p>\n

\u2022  Automated Review, approval, and audit of policy changes from a central place to facilitate policy compliance, policy lifecycle management, and  enforced workflow.<\/p>","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"432","product_name":"FortiNAC","description":"Network access control, or NAC, is a zero-trust network access solution that provides users with enhanced visibility into the Internet of Things (IoT) devices on their corporate networks. This technology has been around for nearly two decades, but a new generation of its solutions is helping organizations keep up with today\u2019s ever-expanding attack surface, delivering not only visibility of the network environment, but also enforcement and dynamic policy control. Whether devices are connecting from inside or outside the network, it can automatically respond to compromised devices or anomalous activity. Modern solutions also provide a clear view into network assets to support regulatory certifications and security best practices that require organizations to establish and maintain an accurate inventory of all connected devices\u2014even in virtual environments where assets are constantly connecting and disconnecting from the network. The monitoring and response capabilities are especially critical since many devices open users to additional risk via compromised, poorly written and un-patchable software, unadvertised back doors hardwired into firmware, and other factors.","hyperlink":"https:\/\/www.fortinet.com\/products\/network-access-control","td_contact":"uspmfortinet@techdata.com","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,85,89"},{"product_id":"1417","product_name":"Fortinet Developer Network - FNDN","description":"The Fortinet Developer Network is a subscription-based community built to help administrators\/developers enhance and increase the effectiveness of Fortinet products.It can help create applications to interact with Fortinet products like custom web portals, automated deployment and provisioning systems, and scripted tasks. In addition, the Fortinet Developer Network makes it easy for our customers and Fortinet professionals to interact, share sample code, and upload their own tools.","hyperlink":"https:\/\/www.fortinet.com\/products\/management\/fortinet-developer-network-fndn.html","td_contact":"uspmfortinet@techdata.com","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1428","product_name":"Fortinet Hardware-as-a-Service Program","description":"Fortinet and Tech Data have partnered to provide advanced, security-focused technologies and threat intelligence tailored to broaden your security service portfolio all while being delivered under a monthly recurring procurement model.","hyperlink":"","td_contact":"uspmfortinet@techdata.com","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"Flexible quarter or monthly billing","partner_benefits":"

\u2022   Low barrier to entry enables you to create valuable Managed Security Services offerings and accelerate your Managed Security Services practice. <\/p>\n

\u2022   Ability to deliver an OPEX procurement model to conserve capital. <\/p>\n

\u2022   Ability to offer flexible, monthly billing. <\/p>\n

\u2022   Ability for you to layer on additional Managed Services such as SD-WAN (included feature), FortiSIEM, FortiSandbox, etc.<\/p>","typeof_service":"

Managed Security Service Building Block Solution:<\/strong>  Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":"

\u2022  NGFW with built-in SD-WAN capabilities delivering high-speed application performance while reducing cost.<\/p>\n

\u2022   Enterprise protection featuring NGFW Application Control and IPS, Web Filtering, FortiSandbox Cloud, Antivirus, Mobile Security, IP Reputation & Antibotnet, Antispam, CASB, Industrial Security, Security Rating, Virus Outbreak Protection Service, Content Disarm & Reconstruction, and core FortiCare security services.<\/p>","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"442","product_name":"Fortinet Information Security Awareness and Training Service","description":"The service\u2019s training course was researched and developed by Fortinet\u2019s NSE Training Institute, a world-class team of cybersecurity experts. The awareness components were created to complement the training and keep information security top of mind. \nEducate your workforce about today\u2019s cyber threats, such as phishing, social engineering, and ransomware attacks, and how to protect against them. The awareness and training service is suitable for your entire workforce, from technical to non-technical employees and contractors.","hyperlink":"https:\/\/www.fortinet.com\/training\/infosec-awareness","td_contact":"uspmfortinet@techdata.com\n(727) 539-7429 x-64216","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1418","product_name":"FortiSandbox","description":"Advanced Threat Prevention System","hyperlink":"https:\/\/www.fortinet.com\/products\/sandbox\/fortisandbox.html","td_contact":"uspmfortinet@techdata.com","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"434","product_name":"FortiSIEM","description":"FortiSIEM provides organizations of all sizes with a comprehensive, and scalable solution to monitor IT and security systems, from IoT to the cloud.","hyperlink":"https:\/\/www.fortinet.com\/products\/siem\/fortisiem.html","td_contact":"uspmfortinet@techdata.com","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,85,89"},{"product_id":"1426","product_name":"FortiSIEM- MSSP Licensing","description":"Accelerate your MSSP offerings with Pay-As-You-\u201cGrow\u201d\nLicensing from Fortinet. FortiSIEM-MSSP\nLicensing starts with an annual Program Fee that provides\na FortiSIEM-MSSP license. This license allows you to\nonboard customers and be billed only for what you use.","hyperlink":"","td_contact":"uspmfortinet@techdata.com","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"Tiered Volume Discounting, All-Inclusive Per-Device Pricing, UNLIMITED EPS","partner_benefits":"

\u2022   Low cost of entry: Minimal up-front investment ($4175 list) means you grow at your pace, while keeping costs aligned with revenue.<\/p>\n

\u2022   Predictable Costs: Billing is based on managed devices, so there is no need to account for unknown EPS or ingest rates. Since devices can be added and removed at any time, there are no complex license processes to burden your business.<\/p>\n

\u2022   All-Inclusive Licensing: Fortinet\u2019s Indicators Of Compromise (IOC) Service is included to protect your customers using the most current threat intelligence. Optional Advanced Agents for Windows & Linux provide additional monitoring capabilities. To simplify billing, maintenance and support is included with every license.<\/p>","typeof_service":"

Managed Security Service Building Block Solution:<\/strong>  Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":"

\u2022  Correlation of security events and device availability catch security incidents earlier than traditional log-only tools<\/p>\n

\u2022  Embedded CMDB provides an up-to-date inventory ofcustomer assets<\/p>\n

\u2022  Device health and availability monitoring eliminates the need for a separate tool<\/p>\n

\u2022  Business Services monitors end-user experience by monitoring assets that are used to deliver that business application<\/p>\n

\u2022  Advanced Agents for Windows & Linux provide additional capabilities including file integrity monitoring and registry change notification (Windows only)<\/p>\n

\u2022  Please see the FortiSIEM datasheet for a complete list of features<\/p>","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"440","product_name":"FortiSIEM-as-a-Service","description":"Tech Data has partnered with StratoZen to offer SIEM-as-a-Service\u2013 a turnkey, multi-tenant SIEM environment, hosted and maintained by StratoZen and powered by Fortinet\u2019s FortiSIEM. All FortiSIEM licensing, high-availability hosting, ongoing maintenance, and user administration for the FortiSIEM console is included with easy pay-as-you-grow monthly pricing.","hyperlink":"","td_contact":"uspmfortinet@techdata.com\n(727) 539-7429 x-64216","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"Monthly consumption-based subscription model","partner_benefits":"

\u2022  SaaS-delivered SIEM solution that is hosted and maintained by Tech Data\u2019s RECON SOC partner, StratoZen. <\/p>\n

\u2022   No software to buy, no infrastructure to build. <\/p>\n

\u2022   Simple pay-as-you-grow pricing <\/p>\n

\u2022   Monthly per-device pricing. Start with as few as 10 managed devices per end user, simply pay for the devices you manage each month.<\/p>","typeof_service":"

Managed Security Services Turn-Key Solution:  People, Processes and Technology (An MSP can plug this solution into their offerings without much effort or investment)<\/p>","end_user_benefits":"

\u2022  24x7x365 Monitoring and Alerting <\/p>\n

\u2022 <\/span> Constant monitoring using advanced log correlation, contextual analytics, big data analysis, and StratoZen\u2019s custom-tuned rule database. <\/p>\n

\u2022  Access to Customized, Browser-Based Management Portal <\/p>\n

\u2022  Additional features such as Replication to Secondary Datacenter, Data & System Backup Management, System Upgrades, Role-Based Access Control Management, Collector Registration & Configuration,  StratoZen\u2019s Proprietary Pre-Tuned Rules Matrix, Customized Rules for Each Organization.<\/p>","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1420","product_name":"FortiToken","description":"Establishing identity through secure authentication is important for implementing an effective security policy. Many of today\u2019s most damaging security breaches have been due to users being provided with inappropriate levels of access, or worse\u2014compromised static passwords.","hyperlink":"https:\/\/www.fortinet.com\/products\/identity-access-management.html","td_contact":"uspmfortinet@techdata.com","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1421","product_name":"FortiWAN","description":"FortiWAN intelligently balances Internet and intranet traffic across multiple WAN connections to lower bandwidth costs and keep users connected. It offers easy-to-use multi-WAN management and a flexible policy-based performance management system.","hyperlink":"https:\/\/www.fortinet.com\/products\/wan-appliances\/fortiwan.html","td_contact":"uspmfortinet@techdata.com","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1422","product_name":"FortiWeb","description":"Web Application Firewall. Unprotected web applications are the easiest point of entry for hackers and vulnerable to a number of attack types. FortiWeb\u2019s AI-enhanced and multi-layered approach protects your web apps from the OWASP Top 10 and more. When combined with our Web Application Security Service from FortiGuard Labs you\u2019re protected from the latest application vulnerabilities, bots, and suspicious URLs, and with dual machine learning detection engines your applications are safe from sophisticated threats such as SQL injection, cross-site scripting, buffer overflows, cookie poisoning, malicious sources, and DoS attacks.","hyperlink":"https:\/\/www.fortinet.com\/products\/web-application-firewall\/fortiweb.html","td_contact":"uspmfortinet@techdata.com","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"437","product_name":"FortiWLC\/WLM","description":"Some wireless deployments require high mobility with high performance and the Fortinet Wireless Controller can provide enterprise-class Wi-Fi to deliver this in large and high-density environments.The Controller and Management platforms are available as appliances or as virtual machines, and when combined with enterprise-class 802.11ac Wave 2 access points, the controllers deliver seamless mobility, quick deployment, and easy capacity expansion with radio frequency virtualization.","hyperlink":"https:\/\/www.fortinet.com\/products\/secure-wifi\/wifi-controllers.html","td_contact":"uspmfortinet@techdata.com","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,85,89"},{"product_id":"534","product_name":"Fraud Prevention","description":"Good user verification-Seamless user experience for legitimate clients- Account take over detection-Proactive real-time discovery of early signs of account takeover-Money Laundering detection-Cross-channel detection of money laundering and related activities-Fraud Intelligence-The understanding of what is happening, how fraudsters behave, which schemes they use and how to stop them- Behavioral biometrics-Building user profiles based on mouse, keyboard, mobile phone usage.- Behavioral analysis- Patterns of legitimate and fraudulent behavior- Device and environment analysis-Analysis of session events happening around the users and their devices- Malware detection-Accurate detection of various kinds of malware in both web and mobile channels","hyperlink":"https:\/\/www.kaspersky.com\/enterprise-security\/cloud-security","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,9,10,39,51,60"},{"product_id":"1980","product_name":"Fuse","description":"Red Hat Fuse is an open source integration platform based on Apache Camel","hyperlink":"https:\/\/www.redhat.com\/en\/technologies\/jboss-middleware\/fuse","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"108","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1981","product_name":"Fuse Online","description":"A low-code integration platform as a service (iPaaS) to help business users build faster integration solutions.","hyperlink":"https:\/\/www.redhat.com\/en\/technologies\/jboss-middleware\/fuse-online","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"108","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"444","product_name":"F\u2011Secure FREEDOME VPN","description":"Browse the internet anonymously and securely","hyperlink":"https:\/\/www.f-secure.com\/en_US\/web\/home_us\/freedome","td_contact":"fsecure@techdata.com","td_extension":"(480) 643-5064","vendor_id":"30","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"445","product_name":"F\u2011Secure Internet Security","description":"Advanced protection for PC","hyperlink":"https:\/\/www.f-secure.com\/en_US\/web\/home_us\/internet-security","td_contact":"fsecure@techdata.com","td_extension":"(480) 643-5064","vendor_id":"30","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"447","product_name":"F\u2011Secure SAFE","description":"Internet security for PCs, Macs, smart\u00adphones and tablets","hyperlink":"https:\/\/www.f-secure.com\/en_US\/web\/home_us\/safe","td_contact":"fsecure@techdata.com","td_extension":"(480) 643-5064","vendor_id":"30","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1632","product_name":"Gateway Anti-Virus and anti-spyware","description":"Combine network\u2010based anti\u2010malware with a cloud database of over 12 million malware signatures for deep security protection against advanced modern threats.","hyperlink":"https:\/\/www.sonicwall.com\/en-us\/products\/firewalls\/security-services\/total-secure-bundle","td_contact":"sonicwall@techdata.com","td_extension":"800-237-8931 x5545032","vendor_id":"56","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1821","product_name":"Gateway AntiVirus","description":"Leverage our continuously updated signatures to identify and block known spyware, viruses, trojans, worms, rogueware and blended threats \u2013 including new variants of known viruses. At the same time, heuristic analysis tracks down suspicious data constructions and actions to make sure unknown viruses don\u2019t slip by.","hyperlink":"https:\/\/www.watchguard.com\/wgrd-products\/security-services\/gateway-antivirus","td_contact":"watchguard@techdata.com","td_extension":"800-237-8931 x5545033","vendor_id":"71","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"974","product_name":"Gateway Email Encryption","description":"Protect email as it leaves your network so it can be safely shared with customers and partners.","hyperlink":"https:\/\/community.broadcom.com\/symantecenterprise\/communities\/community-home?CommunityKey=6c3b4f1e-9a34-48a5-8855-c1b5d96fb81a","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1733","product_name":"GDPR Assessments","description":"Service that provides a customer's organization with an accurate and detailed assessment of where they stand in relation to the controls outlined in the GDPR framework. This service delivers both an executive summary document and a detailed technical report that describe all of the findings and technical recommendations needed to be compliant to GDPR. This assessment helps your customer ensure that they are prepared to be GDPR compliant as it applies to any company processing personal data or otherwise monitoring behavior of European Union (EU) residents.","hyperlink":"https:\/\/tdcontent.techdata.com\/techsolutions\/security\/Services.aspx","td_contact":"SecurityServices@TechData.com","td_extension":"800-237-8931 ext. 5540508","vendor_id":"62","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1599","product_name":"General Data Protection Regulation (GDPR)","description":"Continually assess, monitor and control your environment to simplify GDPR compliance in Microsoft environments.","hyperlink":"https:\/\/www.quest.com\/solutions\/gdpr-compliance\/","td_contact":"spi@dlt.com","td_extension":"703-709-7172","vendor_id":"74","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1687","product_name":"Ghost Solution Suite","description":"Facilitate operating system deployment, migration, and cross-platform management for desktops, laptops, tablets, and servers.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/endpoint\/management\/ghost-solutions-suite","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1906","product_name":"Global Policy Controller","description":"Continuous intent-based security and orchestration for complex hybrid environments","hyperlink":"https:\/\/www.firemon.com\/products\/global-policy-controller\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"96","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"655","product_name":"Global Threat Intelligence (GTI) for ESM","description":"Built for big security data, McAfee Global Threat Intelligence (GTI) for ESM puts the power of McAfee Labs directly into the security monitoring flow using McAfee\u2019s high-speed, highly intelligent security information and event management (SIEM).","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/global-threat-intelligence-esm.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1974","product_name":"Golden Gate","description":"A software product that allows you to replicate, filter, and transform data from one database to another database\n\nGolden Gate also provides a way of streaming all changes made to a table, or set of tables, and making them available to other processes in your data pipeline. Oracle GoldenGate can be used with Kafka to directly stream every single change made to your database","hyperlink":"https:\/\/www.oracle.com\/middleware\/technologies\/goldengate.html","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"46","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2052","product_name":"Google Earth","description":"A computer program that renders a 3D representation of Earth based primarily on satellite imagery. The program maps the Earth by superimposing satellite images, aerial photography, and GIS data onto a 3D globe, allowing users to see cities and landscapes from various anglesIs a computer program that renders a 3D representation of Earth based primarily on satellite imagery. The program maps the Earth by superimposing satellite images, aerial photography, and GIS data onto a 3D globe, allowing users to see cities and landscapes from various angles","hyperlink":"https:\/\/www.google.com\/earth\/","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"111","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"783","product_name":"GoPlex","description":"Manage and monitor MultSess, NC-Access and NCI\/XF","hyperlink":"https:\/\/www.oneidentity.com\/products\/goplex\/","td_contact":"oneldus@techdata.com","td_extension":"","vendor_id":"44","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1086","product_name":"Governance, Risk and Compliance (GRC)","description":"Governance, Risk, and Compliance (GRC) is intended to help customers properly apply security controls and regulations within their organization that they must be compliant to, but find that their current security controls are disorganized, unnecessarily complex and fragmented. This service helps your customer first understand their risk tolerance and gaps, and then provide a plan of action to mitigate risks, achieve compliance against their required regulation, and maintain security posture through a Continuous Monitoring Strategy. This GRC complaint service is tailor-made for your end customer's enterprise so they can adopt a GRC program that quickly identifies risks automatically, helps them maintain compliance, as well as prepare for the next generation of GRC innovation.","hyperlink":"https:\/\/tdcontent.techdata.com\/techsolutions\/security\/Services.aspx","td_contact":"SecurityServices@TechData.com","td_extension":"800-237-8931 ext. 5540508","vendor_id":"62","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1644","product_name":"Granular Recovery for Exchange","description":"RE works with your ShadowProtect backups to protect email. This solution to searches for\/recovers Microsoft Exchange message data.","hyperlink":"https:\/\/www.storagecraft.com\/data-availability-products","td_contact":"storagecraft@techdata.com","td_extension":"800-237-8931 x71458","vendor_id":"58","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"701","product_name":"Group Policy Administrator\u00a0","description":"Edit, test, and review Microsoft Group Policy Objects changes before implementation","hyperlink":"https:\/\/www.netiq.com\/products\/group-policy-administrator\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,63,65,67,68,69,70,71,74,75,76,77,80,81,84"},{"product_id":"469","product_name":"Guardium","description":"Support your entire data protection journey with the same infrastructure and approach. IBM Security\u00ae Guardium\u00ae helps ensure the security, privacy and integrity of your critical data across a full range of environments\u2014from databases to big data, cloud, file systems and more.","hyperlink":"https:\/\/www.ibm.com\/security\/data-security\/guardium","td_contact":"West: Rick.Marshall@techdata.com\n

East: Karen.Bailey@techdata.com<\/p>","td_extension":"West: (480) 254-4420\n

East: (678) 642-3446<\/p>","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,5,7,10,11,13,15,17,85,86,87,88,90,91"},{"product_id":"1457","product_name":"Guardium Analyzer","description":"Guardium Analyzer helps you find GDPR-relevant data (emails, phone numbers etc.), understand data and database exposures, and act on a prioritized list of recommendations to address issues and minimize risk","hyperlink":"","td_contact":"West: Rick.Marshall@techdata.com\n

East: Karen.Bailey@techdata.com<\/p>","td_extension":"West: (480) 254-4420\n

East: (678) 642-3446<\/p>","vendor_id":"35","service_tiering":"Tiered discounting is supported. Upfront, annual, quarterly and monthly billing supported for EPS and other pricing metrics.","partner_benefits":"

\u2022  Guardium Analyzer empowers an MSSP to help clients discover data security and regulatory compliance issues.<\/p>\n

\u2022  IBM Security supports multiple partnering models for MSSPs including IBM Embedded Solution Agreement which enables MSSPs to retain entitlement of software and sell a service, achieving a pure OPEX model for their clients.  <\/p>\n

\u2022  IBM Channel Value Rewards provides higher margin for initial license sales and ongoing renewals.<\/p>","typeof_service":"

Managed Security Service Building Block Solution:<\/strong>  Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":"

\u2022  Analyzer applies next-generation data classification to enable organizations to identify security and compliance risk associated with GDPR-relevant data.<\/p>\n

\u2022  View information in a single view across cloud and on-premises databases and provides prioritized, actionable remediation recommendations.<\/p>","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2006","product_name":"HDInsight","description":"A cloud-based service from Microsoft for big data analytics that helps organizations process large amounts of streaming or historical data","hyperlink":"https:\/\/docs.microsoft.com\/en-us\/azure\/hdinsight\/","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"43","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"462","product_name":"Hillstone CloudEdge","description":"Advanced Security Services for Virtual Networks and Applications","hyperlink":"https:\/\/www.hillstonenet.com\/products\/hillstone-cloudedge\/","td_contact":"eduardo.araujo@techdata.com","td_extension":"55-11-31912870 x-5222870","vendor_id":"33","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"4","country_name":"LATIN AMERICA","parint_id":"0","type":"0","country":"4,7,9,10,11,12,13,14,15,16,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60"},{"product_id":"461","product_name":"Hillstone CloudHive","description":"Micro-Segmentation Solution for Virtualized Data Centers","hyperlink":"https:\/\/www.hillstonenet.com\/products\/hillstone-cloudhive\/","td_contact":"eduardo.araujo@techdata.com","td_extension":"55-11-31912870 x-5222870","vendor_id":"33","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"4","country_name":"LATIN AMERICA","parint_id":"0","type":"0","country":"4,7,9,10,11,12,13,14,15,16,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60"},{"product_id":"463","product_name":"Hillstone CloudView","description":"Cloud-Based Security Management and Analytics Platform","hyperlink":"https:\/\/www.hillstonenet.com\/products\/hillstone-cloudview\/","td_contact":"eduardo.araujo@techdata.com","td_extension":"55-11-31912870 x-5222870","vendor_id":"33","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"4","country_name":"LATIN AMERICA","parint_id":"0","type":"0","country":"4,7,9,10,11,12,13,14,15,16,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60"},{"product_id":"465","product_name":"Hillstone Security Audit Platform (HSA)","description":"Centralized log retention and high-speed retrieval","hyperlink":"https:\/\/www.hillstonenet.com\/products\/hillstone-security-audit-platform\/","td_contact":"eduardo.araujo@techdata.com","td_extension":"55-11-31912870 x-5222870","vendor_id":"33","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"4","country_name":"LATIN AMERICA","parint_id":"0","type":"0","country":"4,7,9,10,11,12,13,14,15,16,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60"},{"product_id":"464","product_name":"Hillstone Security Management Platform","description":"Centralized Security Management, Configuration and Monitoring Solution","hyperlink":"https:\/\/www.hillstonenet.com\/products\/hillstone-security-management-platform\/","td_contact":"eduardo.araujo@techdata.com","td_extension":"55-11-31912870 x-5222870","vendor_id":"33","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"4","country_name":"LATIN AMERICA","parint_id":"0","type":"0","country":"4,7,9,10,11,12,13,14,15,16,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60"},{"product_id":"1546","product_name":"Host Access Management & Security Server\u00a0","description":"Integrate the host with your modern security framework","hyperlink":"https:\/\/www.microfocus.com\/products\/mss\/","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"656","product_name":"Host Intrusion Prevention for Desktop","description":"McAfee Host Intrusion Prevention for Desktop protects your systems from known and emerging threats\u2014all through a simple management platform.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/host-ips-for-desktop.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1501","product_name":"Host Intrusion Prevention for Server","description":"McAfee Host Intrusion Prevention for Server guards against zero-day attacks, keeps servers up and running, reduces patch requirements, and protects critical corporate assets.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/host-ips-for-server.html","td_contact":"Tech Data: mcafee@techdata.com\n

DLT: spi@dlt.com<\/p>","td_extension":"Tech Data: 800-237-8931\n

DLT: 703-773-9231<\/p>","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1765","product_name":"Hosted Email Security","description":"Stop phishing, ransomware, BEC, advanced threats, and spam before\nthey reach your network","hyperlink":"https:\/\/www.trendmicro.com\/en_us\/business\/products\/user-protection\/sps\/email-and-collaboration\/hosted-email-security.html","td_contact":"Tech Data: trendmicro@techdata.com\n

DLT: spi@dlt.com<\/p>","td_extension":"Tech Data: 800-237-8931 ext. 5545035 \n

DLT: 703-773-9231<\/p>","vendor_id":"66","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1440","product_name":"HP Proactive Security","description":"

The world's most advanced endpoint security service. HP Proactive Security is a protection-first approach to managing endpoint security. It reduces your risk from attacks and gives users the freedom to work securely from anywhere without increasing IT workload.  <\/p>\n

HP Proactive Security integrates 1) multi-layered, government-grade anti-malware protection combining deep learning and isolation technologies – along with 2) actionable insights and 3) management by cybersecurity experts – delivered as a fully managed service.<\/p>","hyperlink":"http:\/\/www.hp.com\/proactive-security","td_contact":"hpincservices@techdata.com","td_extension":"(727) 539-7429 ext. 5584222","vendor_id":"34","service_tiering":"No Service Tiering","partner_benefits":"

• HP has taken a holistic approach to our service offerings by starting at the hardware level and enhancing our portfolio with end-to-end solutions.<\/p>\n

• We have – and continue – to enable our services for partner delivery that best complements what you are currently offering.<\/p>\n

• We are providing you and your team with our tools, methodologies and resources that will assist you in driving revenue growth, such as security intelligence and dashboards, self-paced training, and easy integration with your current systems (ITSM, SIEM). <\/p>\n

• We’ve implemented robust compensation and partner certification programs that open special opportunities of partnering and selling our services portfolio.<\/p>\n

• With HP Proactive Security, you, our partners can:<\/p>\n

- Broaden your product and solutions portfolio – risk free. HP Proactive Security has no minimum commitment for partners and provides an opportunity for partners to instantly start or expand their security practice in a way that’s low cost, low investment and low risk.<\/p>\n

  - With HP you can build your security practice - HP works with you. And you can leverage HP’s global infrastructure and security expertise to develop your security services. All with simple deployment, no server infrastructure costs and no long-term contracts.<\/p>\n

- Differentiate your security offerings with a compelling managed security service offering that provides advanced government-grade security and insights  -- truly protecting your customers against zero-day threats.<\/p>\n

- Deepen customer relationships and build customer loyalty by being the one-stop-shop for all of your customer’s IT needs, providing them with the “peace of mind” of knowing they are protected from cyberthreats.<\/p>","typeof_service":"Managed Security Service Turn-Key Solution: People, Processes and Technology (An MSP can plug this solution into their offerings without much effort or investment)","end_user_benefits":"

• Take a protection-first approach with real-time, multi-layered defense: Defend against cyberattacks without changing user behavior or increasing IT's workload with HP Proactive Security, a managed solution right-sized for medium businesses that provides proactive protection, reduces your risk, and gives users the freedom to work securely from anywhere.<\/p>\n

• Protection You Can Trust: Protect endpoints from cybersecurity threats with multiple layers of proactive protection that use government-grade isolation and advanced deep learning technologies.<\/p>\n

• Simplified Security Management: Benefit from an advanced security solution, including actionable insights, without the complexity or need for in-house expertise. And, free up IT to work on strategic projects,instead of chasing false positives and security threats.<\/p>\n

• Keep Employees Happy: Empower your employees to work how and where they want with their choice of common productivity tools and applications without the fear of compromising their IT networks.<\/p>","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"467","product_name":"HP Sure Click Enterprise","description":"

Protection that doesn't rely on detection. The HP Sure Click Enterprise software solution for endpoint security helps stop known and unknown threats, regardless of whether they are detectable, through hardware-enforced isolation of email attachments and browsing activity without impact to the user's experience or the way they access their data.<\/p>\n

HP Sure Click Enterprise integrates: 1) government-grade, hardware-enforced malware isolation and containment software, along with 2) full customization of security policies by user role, for organizations with a more mature security posture, plus 3) actionable insights and threat intelligence from certified cybersecurity experts.<\/p>","hyperlink":"https:\/\/www8.hp.com\/us\/en\/solutions\/sure-click-enterprise.html","td_contact":"hpincservices@techdata.com","td_extension":"(727) 539-7429 ext. 5584222","vendor_id":"34","service_tiering":"No Service Tiering","partner_benefits":"

• HP has taken a holistic approach to our service offerings by starting at the hardware level and enhancing our portfolio with end-to-end solutions.<\/p>\n

 <\/span>We have – and continue – to enable our services for partner delivery that best complements what you are currently offering.<\/p>\n

• We are providing you and your team with our tools, methodologies and resources that will assist you in driving revenue growth, such as security intelligence and dashboards, self-paced training, and easy integration with your current systems (ITSM, SIEM). <\/p>\n

• We’ve implemented robust compensation and partner certification programs that open special opportunities of partnering and selling our services portfolio.<\/p>\n

• With HP Proactive Security, you, our partners can:<\/p>\n

- Broaden your product and solutions portfolio – risk free. HP Sure Click Enterprise has no minimum commitment for partners and provides an opportunity to instantly start or expand your security practice in a way that’s low cost, low investment and low risk.  <\/p>\n

- With HP you can build your security practice - HP works with you. And you can leverage HP’s global infrastructure and security expertise to develop your security services. All with simple deployment, no server infrastructure costs and no long-term contracts.<\/p>\n

- Differentiate your security offerings with a protection-first endpoint security solution that provides government-grade security in real-time and detailed threat intelligence -- truly protecting your customers against zero-day threats.<\/p>\n

- Deepen customer relationships and build customer loyalty by being the one-stop-shop for all of your customer’s IT needs, providing them with the “peace of mind” of knowing they are protected from cyberthreats.<\/p>","typeof_service":"Managed Security Service Turn-Key Solution: People, Processes and Technology (An MSP can plug this solution into their offerings without much effort or investment) and\/or Managed Security Service Building Block Solution: Component used by partner to build a Monthly Recurring Revenue (MRR) managed service","end_user_benefits":"

• Isolate and prevent undetectable threats: HP Sure Click Enterprise helps stop known and unknown threats, regardless of whether they are detectable, through hardware-enforced isolation of email and browsing activity without impact to the user’s experience, or the way they access their data.<\/p>\n

 • Keep risky clicks contained: Keep risky clicks contained using hardware-enforced micro-virtual machines (micro-VMs) and advanced hypervisor technology to isolate all email attachments, applications and browsers to safeguard a user’s PC, identity, and network.<\/p>\n

• Improve user and IT productivity: HP Sure Click Enterprise helps improve user productivity by eliminating restrictive security policies and inhibiting workflows, while reducing IT time and spend by providing actionable dashboards and reports to speed and simplify threat analysis.<\/p>\n

• Enterprise-class service and support: Ideal for government and enterprise with more mature security operations, HP Sure Click Enterprise offers simple deployment and advanced, defense-grade threat intelligence with no additional on-premise infrastructure or software purchase required.<\/p>","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1602","product_name":"https:\/\/www.radware.com\/","description":"","hyperlink":"","td_contact":"","td_extension":"","vendor_id":"75","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"2081","product_name":"Human Resource Analytics","description":"Provides organizations detailed analysis on HR programs and workforce performance. It integrates critical data from across the enterprise value chain transforming silos of information into relevant, timely, and actionable insight","hyperlink":"https:\/\/www.oracle.com\/business-analytics\/analytics-cloud-for-hr.html","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"46","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1921","product_name":"Hunna USB Sanitiser","description":"he Hunna System is portable, air-gapped USB sanitiser. Integrated with Glasswall\u2019s Rebuild SDK, it ensures files and data imported or exported on USB are clean and safe.","hyperlink":"https:\/\/glasswallsolutions.com\/hunna-usb-sanitiser\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"98","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"553","product_name":"Hybrid Cloud","description":"Kaspersky Hybrid Cloud Security offers unified security for any stage of your cloud journey. It will secure your physical machines and virtualized workloads, whether running on-premise, in a datacenter or in a public cloud. \ue908Protects Windows and Linux servers and virtual desktops\nProvides Next Gen protection against the latest cyberthreats\n- Helps businesses tailor security for new & legacy systems\n- Reduces exposure to attack\u2026 by hardening corporate servers\n- Manages from a single point across your whole hybrid infrastructure\n- Does more to support your regulatory compliance initiatives\n- Offers convenience and flexibility, integrating with leading public cloud platforms such as AWS and Microsoft Azure.","hyperlink":"","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"Monthly subscription based on band levels over 5,000+ nodes.","partner_benefits":"

\u2022  Increase sales revenue and net new customers <\/p>\n

\u2022  Access to volume-based pricing<\/p>\n

\u2022   Monthly licensing belongs to the partner not the end user<\/p>\n

\u2022  Product and sales trainings and certification <\/p>\n

\u2022  Standard and premium technical support <\/p>\n

\u2022  Sales and marketing materials<\/p>\n

\u2022  Five premium incidents are included for technical support.  <\/p>\n

\u2022  Reduces IT costs and frees up resources.<\/p>","typeof_service":"

Managed Security Services Building Block Solution:<\/strong>  Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":"

\u2022  Unified management for all your software assets<\/p>\n

\u2022  On-premise and in the cloud<\/p>\n

\u2022  Through a single console<\/p>\n

\u2022  Providing full visibility and transparency<\/p>\n

\u2022  Enabling smooth and efficient orchestration and administration<\/p>","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,9,10,39,51,60"},{"product_id":"41","product_name":"Hybrid Cloud Management","description":"Accelerate initiatives, make life easier for DevOps and NetOps, and get a single source of truth across your entire hybrid-cloud estate. We\u2019re all trying to move at the speed of business now. That goes double for DevOps. To be effective, they need to be able to move workloads, spin up and tear down servers at breakneck speed. Hybrid cloud facilitates that \u2014 but there\u2019s a catch\u2026\n\nOnce DevOps teams start standing up DNS resources across hybrid cloud environments, NetOps teams end up in a time-wasting battle against compounding network complexity, instead of focusing their efforts on innovation and growth.\n\nEnter Hybrid Cloud Management \u2013 the cloud DNS solution that puts an end to this costly, outdated paradox.","hyperlink":"https:\/\/bluecatnetworks.com\/adaptive-dns\/cloud-dns\/","td_contact":"BluecatUS@techdata.com","td_extension":"727-539-7429 ext 5540423","vendor_id":"5","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1766","product_name":"Hybrid Cloud Security","description":"Improve visibility and simplify security management across physical, virtual, cloud, and container environments","hyperlink":"https:\/\/www.trendmicro.com\/en_us\/business\/products\/hybrid-cloud.html","td_contact":"Tech Data: trendmicro@techdata.com\n

DLT: spi@dlt.com<\/p>","td_extension":"Tech Data: 800-237-8931 ext. 5545035 \n

DLT: 703-773-9231<\/p>","vendor_id":"66","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"535","product_name":"Hybrid Cloud Security","description":"Our Hybrid Cloud Security solution provides outstanding multi-layered protection to multi-cloud environments. Wherever you process and store critical business data - in a private or public cloud, or both - we deliver a perfectly balanced combination of agile, continuous security and superior efficiency, protecting your data against the most advanced current and future threats without compromising on systems performance.","hyperlink":"https:\/\/www.kaspersky.com\/enterprise-security\/industrial-solution","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,9,10,39,51,60"},{"product_id":"536","product_name":"Hybrid Cloud Security for AWS","description":"Automate security provisioning and simplify orchestration in your AWS cloud","hyperlink":"https:\/\/www.kaspersky.com\/enterprise-security\/threat-management-defense-solution","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,9,10,39,51,60"},{"product_id":"537","product_name":"Hybrid Cloud Security for Azure","description":"Streamline security and accelerate compliance in your Azure cloud","hyperlink":"","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,9,10,39,51,60"},{"product_id":"2085","product_name":"Hyperion Financial Close Suite","description":"Built for centralized, web-based management of period-end close activities across the extended financial close cycle. The first application of its kind, it helps manage all financial close cycle tasks, including ledger and subledger close, data loading and mapping, financial consolidation, account reconciliation, tax\/treasury and internal and external reporting processes","hyperlink":"https:\/\/www.oracle.com\/applications\/performance-management\/products\/financial-close-reporting\/hyperion-financial-close-management\/","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"46","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"331","product_name":"HyperScale\u2122 Technology","description":"Commvault HyperScale is an add-on for Commvault Complete that enables partners to position and sell on-premises scale-out backup and recovery. HyperScale is delivered in two forms: 1) a Commvault-branded integrated appliance, or 2) as a software solution using your preferred hardware provider.","hyperlink":"https:\/\/www.commvault.com\/hyperscale","td_contact":"Software-Sales@techdata.com","td_extension":"(800)-237-8931 x5683326","vendor_id":"16","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,9,10,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61"},{"product_id":"336","product_name":"ICS\/SCADA Security - SCADAShield","description":"Cyberbit SCADAShield is the world-leading OT security platform, chosen by critical infrastructure organizations to protect ICS\/SCADA networks, electric grids, transportation networks, manufacturing lines, smart buildings and data centers. SCADAShield provides unprecedented OT asset discovery and visibility, detects known OT threats, unknown OT threats and anomalies, as well as deviations from operational restrictions, by using 7-layer deep packet inspection (DPI).","hyperlink":"https:\/\/www.cyberbit.com\/solutions\/ics-scada-security-continuity\/","td_contact":"","td_extension":"","vendor_id":"18","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"85","country_name":"ASIA PACIFIC","parint_id":"0","type":"0","country":"85,87"},{"product_id":"450","product_name":"Identity & Access Management","description":"Gemalto's identity and access management (IAM) solutions allow organizations to meet the evolving needs around cloud applications and mobile devices by enabling secure access to online resources and protecting the digital interactions of employees, partners, and customers with market-leading strong authentication and digital signing pr oducts.","hyperlink":"https:\/\/www.gemalto.com\/enterprise-security\/identity-access-management","td_contact":"","td_extension":"","vendor_id":"31","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"85","country_name":"ASIA PACIFIC","parint_id":"0","type":"0","country":"85,86"},{"product_id":"1600","product_name":"Identity & Access Management","description":"Reduce complexity and save time in governing identities, managing privileged accounts and controlling access.","hyperlink":"https:\/\/www.oneidentity.com\/solutions\/identity-and-access-management\/","td_contact":"spi@dlt.com","td_extension":"703-709-7172","vendor_id":"74","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1590","product_name":"Identity and Access Management","description":"Oracle\u2019s complete, integrated, next-generation identity management platform provides breakthrough scalability with an industry-leading suite of identity and access management (IAM) solutions for on-premises or hybrid cloud.","hyperlink":"https:\/\/www.oracle.com\/middleware\/identity-management\/index.html","td_contact":"spi@dlt.com","td_extension":"703-773-9221","vendor_id":"46","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1292","product_name":"Identity Awareness Software Blade","description":"Check Point Identity Awareness provides granular visibility of users, groups and machines, providing unmatched application and access control through the creation of accurate, identity-based policies. Centralized management and monitoring allows for policies to be managed from a single, unified console.","hyperlink":"https:\/\/www.checkpoint.com\/products\/identity-awareness-software-blade\/","td_contact":"checkpoint@techdata.com","td_extension":"800-237-8931 x5545036","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"15","product_name":"Identity Cloud","description":"Mission-critical customer identity and access management to provide trusted digital experiences for end users","hyperlink":"https:\/\/www.akamai.com\/us\/en\/products\/security\/identity-cloud.jsp","td_contact":"akamaius@techdata.com","td_extension":"(800)-237-8931 x5540426","vendor_id":"1","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1"},{"product_id":"703","product_name":"Identity Governance\u00a0","description":"Provides automated user access review and recertification to remain compliant","hyperlink":"https:\/\/www.netiq.com\/products\/identity-governance\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,63,65,67,68,69,70,71,74,75,76,77,80,81,84"},{"product_id":"784","product_name":"Identity Manager","description":"Take the risk out of enterprise identity and access management","hyperlink":"https:\/\/www.oneidentity.com\/products\/identity-manager\/","td_contact":"oneldus@techdata.com","td_extension":"","vendor_id":"44","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"785","product_name":"Identity Manager Data Governance Edition","description":"Data governance that puts you in control of sensitive data access","hyperlink":"https:\/\/www.oneidentity.com\/products\/identity-manager-data-governance\/","td_contact":"oneldus@techdata.com","td_extension":"","vendor_id":"44","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1548","product_name":"Identity Manager\u00a0","description":"Delivers an intelligent identity management framework to service your enterprise","hyperlink":"https:\/\/www.netiq.com\/products\/identity-manager\/advanced\/","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"2035","product_name":"ignio\u2122 AIOps","description":"ignio\u2122 AIOps with its judicious blend of AI\/ML and automation, improves the reliability, resiliency and agility of Enterprise IT Operations. Creates deep visibility and understanding of the landscape by learning context. Eliminates noise, predicts emergent conditions and triages issues by managing alerts","hyperlink":"https:\/\/digitate.com\/ignio-aiops\/","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66101","vendor_id":"116","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1928","product_name":"Illumio Adaptive Security Platform (ASP)","description":"The Illumio Adaptive Security Platform\u00ae (ASP) delivers real-time application dependency mapping and security segmentation to stop lateral movement inside data centers and cloud environments.\nASP provides visibility into the connectivity between workloads across heterogeneous compute environments, generates optimal security segmentation policies based on how workloads communicate, and programs the native stateful enforcement points in each host to enforce applicable firewall rules.","hyperlink":"https:\/\/www.illumio.com\/products\/adaptive-security-platform","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"100","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1929","product_name":"Illumio Edge","description":"A proven whitelist-based policy model turns your laptops into Zero Trust endpoints. Allow inbound traffic only from approved peer-to-peer apps.\ndefault-containment. Containment by default drastically reduces the surface area of the infection. It leaves ransomware and malware with nowhere to go.\nThe lightweight agent is invisible to end users and makes for a low-touch deployment \u2013 with no disruption to users or operations.\nEndpoint segmentation that's not tied to the network like NAC. We go where your users go and give you visibility of every flow in and out of their machines.\ntimer. A trusty companion to EDR and endpoint security.\n\nBy preventing malware from spreading peer-to-peer, you give your other endpoint security tools more time to detect and respond to threats.","hyperlink":"https:\/\/www.illumio.com\/products\/edge","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"100","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2030","product_name":"ILOG CPLEX (Decision Opt)","description":"A prescriptive analytics solution that enables rapid development and deployment of decision optimization models using mathematical and constraint programming","hyperlink":"https:\/\/www.ibm.com\/products\/ilog-cplex-optimization-studio","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"538","product_name":"Incident Response","description":"Managing the aftermath of a security breach","hyperlink":"","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,9,10,39,51,60"},{"product_id":"1089","product_name":"Incident Response - Emergency    <\/span>NEW!","description":"

When a breach occurs it is critical proper steps are taken to contain the damage, capture critical forensic data, and get back up and operational quickly. Tech Data Incident Response-Emergency has multiple tiers of service including global support for those that need it. The core features of the service include:<\/p>\n

\u2022  Threat Identification<\/p>\n

\u2022  Containment Support<\/p>\n

\u2022  Remediation Guidance<\/p>\n

\u2022  Forensic Analysis<\/p>\n

\u2022  Malware Analysis<\/p>\n

\u2022  Log and Threat Analysis<\/p>\n

\u2022  Threat Monitoring and Hunting<\/p>","hyperlink":"","td_contact":"SecurityServices@TechData.com","td_extension":"800-237-8931 ext. 5540508","vendor_id":"62","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1091","product_name":"Incident Response - Plan Development    <\/span>NEW!","description":"

The development of a comprehensive Incident Response Plan is a crucial step in building an effective overall Incident Response Program.\nTech Data works with you to deliver a cyber resilience policy and playbooks which integrate seamlessly with your people and processes and include technical and strategic guidance on effectively identifying, containing, and neutralizing suspected incidents. Tech Data Incident Response-Plan Development core features include:\n

\u2022  Review current Incident Response Plan if applicable and evaluated against a standard framework<\/p>\n

\u2022  Onsite interviews with some interviews handled remotely<\/p>\n

\u2022  Develop Incident Management Process<\/p>\n

\u2022  Detection capabilities<\/p>\n

\u2022  Incident triage process and capabilities<\/p>\n

\u2022  Incident escalation and notification process<\/p>\n

\u2022  Incident containment capabilities<\/p>\n

\u2022  Incident remediation capabilities<\/p>\n

\u2022  Post incident analysis process<\/p>\n

\u2022  Onsite kickoff workshop to explore IR handling topics","hyperlink":"","td_contact":"SecurityServices@TechData.com","td_extension":"800-237-8931 ext. 5540510","vendor_id":"62","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1090","product_name":"Incident Response - Readiness Assessment    <\/span>NEW!","description":"

As threats become more sophisticated and pervasive, organizations must improve their resilience through\nbetter preparation. They need to be sure they can remediate as swiftly as possible \u2013 containing the attack,\nmitigating attacker access \u2013 and getting back to business as soon as possible. Tech Data Incident Response-Readiness Assessment core features include:\n

\u2022  Thorough review of the people, process, and technologies and their integration into the IR program<\/p>\n

\u2022  Report of strategic and tactical data for both findings and initiatives, including gap description and business impact<\/p>\n

\u2022  Provides a strategic outcome for IR program<\/p>\n

\u2022  Identifies initiatives focused on building IR capabilities<\/p>\n

\u2022  Clearly communicates priority, risk, and business driver<\/p>\n

\u2022  Identifies key building blocks for risk mitigation strategy<\/p>","hyperlink":"","td_contact":"SecurityServices@TechData.com","td_extension":"800-237-8931 ext. 5540509","vendor_id":"62","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"976","product_name":"Incident Response Retainers and Readiness Services","description":"Preempt attacks and lessen security incident impact through remote and on-site investigations by our Incident Response Teams.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/incident-response-ds-en","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"539","product_name":"Industrial Cybersecurity","description":"Kaspersky Industrial Cybersecurity is a portfolio of technologies and services designed to secure every industrial layer, including SCADA servers, HMI, engineering workstations, PLCs, network connections and people \u2013 without impacting on operational continuity and the consistency of industrial processes. Our solution delivers a logical, incremental path to holistic industrial cybersecurity, from people through to processes and technologies.","hyperlink":"https:\/\/www.kaspersky.com\/enterprise-security\/mail-server-security","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,9,10,39,51,60"},{"product_id":"977","product_name":"Information Centric Analytics","description":"Information Centric Analytics provides centralized analysis and visualization of all user-driven risk. It allows pre-emptive action before a breach, or guides a rapid response during an incident.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/information-centric-analytics-en","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1690","product_name":"Information Centric Tagging","description":"Enhance existing data protection solutions by incorporating user based data classification and tagging as your data is being created or at rest.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/information-centric-tagging-en","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1987","product_name":"Information Map","description":"Helps organizations visualize their unstructured and structured information irrespective of where it is stored \u2013 on-premises, in private cloud or public cloud","hyperlink":"https:\/\/www.veritas.com\/product\/information-governance\/information-map","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"69","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1970","product_name":"InfoSphere","description":"A market-leading data integration platform which includes a family of products that enable you to understand, cleanse, monitor, transform and deliver data, and to collaborate to bridge the gap between business and IT","hyperlink":"https:\/\/www.predictiveanalyticstoday.com\/ibm-infosphere-datastage\/","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"391","product_name":"Insider Threat","description":"Deep collection and forensics for\nunrivaled visibility","hyperlink":"https:\/\/www.forcepoint.com\/product\/insider-threat","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"28","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,80"},{"product_id":"1156","product_name":"Integrated Data Loss Prevention","description":"Now more than ever, your data is on the move\u2014whether it\u2019s on a laptop, flash drive, or moving across physical, virtual, and cloud infrastructures. At any point along the way, your financial data, customer information, intellectual property, or trade secrets could be lost or stolen.","hyperlink":"https:\/\/www.trendmicro.com\/en_us\/business\/products\/user-protection\/sps\/endpoint\/integrated-data-loss-prevention.html","td_contact":"trendmicro@techdata.com","td_extension":"800-237-8931 ext. 5545035","vendor_id":"66","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,85,86,88,89"},{"product_id":"347","product_name":"Integrated Data Protection Appliance (IDPA)","description":"Get powerful data protection in a single appliance that is easy to deploy and manage \u2014 for a low cost-to-protect. The integrated appliance brings together protection storage and software, search, and analytics, plus centralized management and cloud readiness. The clean, intuitive interface of the IDPA System Manager provides a comprehensive view of data protection infrastructure from a single dashboard.","hyperlink":"https:\/\/www.dellemc.com\/en-us\/data-protection\/index.htm#integrated-appliances","td_contact":"EMC@techdata.com","td_extension":"800-237-8931 x5545042","vendor_id":"23","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"532","product_name":"Integrated Endpoint Security","description":"The reliable, proven security platform that protects your bottom line. This tightly integrated solution combines outstanding protection, detection and incident response capabilities, based on unequalled global security intelligence and Next Generation machine learning, to automatically enrich your SOC and enhance your risk mitigation capabilities. Protection for every physical, virtual and cloud-based endpoint is managed together through one console, improving efficiency and reducing your TCO","hyperlink":"https:\/\/www.kaspersky.com\/enterprise-security\/endpoint","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,9,10,39,51,60"},{"product_id":"2020","product_name":"Integrated Management Suite","description":"Integrated Management Suite - allows Cognos users to explore and document Cognos related to a variety of use cases","hyperlink":"https:\/\/www.bspsoftware.com\/products\/ims\/","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"114","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"658","product_name":"Integrity Control","description":"McAfee Integrity Control blocks out-of-policy changes, ensuring that only trusted applications run on fixed-function and point-of-service systems.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/integrity-control.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"458","product_name":"Intelligent Next-Generation Firewalls (iNGFW)","description":"Defend Advanced Threats and Continually Monitor your Network","hyperlink":"https:\/\/www.hillstonenet.com\/products\/intelligent-next-gen-firewalls-t-series\/","td_contact":"eduardo.araujo@techdata.com","td_extension":"55-11-31912870 x-5222870","vendor_id":"33","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"4","country_name":"LATIN AMERICA","parint_id":"0","type":"0","country":"4,7,9,10,11,12,13,14,15,16,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60"},{"product_id":"1808","product_name":"Intelligent Operations","description":"VMware vRealize Network Insight helps customers build an optimized, highly available and secure network infrastructure across multi-cloud environments. It accelerates micro-segmentation deployment, minimizes business risk during application migration and enables customers to confidently manage and scale NSX deployments.","hyperlink":"https:\/\/www.vmware.com\/products\/vrealize-network-insight.html","td_contact":"vmware@techdata.com","td_extension":"800-237-8931 x5545048","vendor_id":"70","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"820","product_name":"Intelligent Supervision","description":"Meet FINRA, SEC, and IIROC obligations quickly and effectively.","hyperlink":"https:\/\/www.proofpoint.com\/us\/products\/archiving-and-compliance\/intelligent-supervision","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 645","vendor_id":"48","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,65,71"},{"product_id":"2046","product_name":"Intelligent Video Analytics","description":"State-of-the-art intelligent video analytics that reliably detects, tracks and analyzes moving objects while suppressing unwanted alarms from spurious sources in the image","hyperlink":"https:\/\/resources-boschsecurity-cdn.azureedge.net\/public\/documents\/DS_IVA_7.10_Data_sheet_enUS_69630079883.pdf","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"119","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1950","product_name":"Interactive Analysis (IAST)","description":"Veracode Interactive Analysis\u2019 agent finds vulnerabilities in code by leveraging existing QA automation. It only extends pipeline run time by about 3 percent for a 5-minute QA phase, that\u2019s only about 9 seconds. Uses a single agent for all languages.","hyperlink":"https:\/\/www.veracode.com\/products\/interactive-analysis-iast","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"104","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"906","product_name":"Intercept X","description":"Experts agree. Intercept X Advanced consistently rates at the top of independent tests and analyst reports for endpoint protection. By combining cutting-edge technologies, such as deep learning and endpoint detection and response, Intercept X delivers unmatched protection against unknown malware, exploits, and ransomware.","hyperlink":"https:\/\/www.sophos.com\/en-us\/products\/intercept-x.aspx","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"57","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,65,66,69,71,72,75,76,78,79,81"},{"product_id":"912","product_name":"Intercept X for Server with EDR","description":"Protect. Discover. Control. Secure your cloud, on-premises, or hybrid server environments.","hyperlink":"https:\/\/www.sophos.com\/en-us\/products\/server-security.aspx","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"57","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,65,66,69,71,72,75,76,78,79,81"},{"product_id":"799","product_name":"Internal Mail Defense","description":"Proofpoint Internal Mail Defense uses a robust, multilayered approach to protect your\norganization\u2019s internal email and help detect compromised accounts.","hyperlink":"https:\/\/www.proofpoint.com\/us\/products\/email-protection","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 624","vendor_id":"48","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,65,71"},{"product_id":"554","product_name":"Internet Gateway","description":"Kaspersky Security for Internet Gateways offers significant risk reduction in areas including infection, data leaks and internet distractions. Provides next gen protection again the latest web-based threats. Blocks infections before they can reach your endpoints. Negates the effects of social engineering. Readily complements your existing gateway-level defenses. Reduces your exposure to attack by controlling internet resource usage. Allows the management of multiple independent workspaces.","hyperlink":"","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"Monthly subscription based on band levels over 5,000+ nodes.","partner_benefits":"

\u2022  Increase sales revenue and net new customers <\/p>\n

\u2022  Access to volume-based pricing<\/p>\n

\u2022   Monthly licensing belongs to the partner not the end user<\/p>\n

\u2022  Product and sales trainings and certification <\/p>\n

\u2022  Standard and premium technical support <\/p>\n

\u2022  Sales and marketing materials<\/p>\n

\u2022  Five premium incidents are included for technical support.  <\/p>","typeof_service":"

Managed Security Services Building Block Solution:<\/strong>  Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":"

\u2022  Supports multi-tenant management capabilities<\/p>\n

\u2022  Flexible licensing<\/p>","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,9,10,39,51,60"},{"product_id":"540","product_name":"Internet of Things and Embedded Security","description":"The Internet of Things forms a cornerstone to digital transformation in all industry sectors. It\u2019s already changing world around us in manufacturing, agriculture, city infrastructure, retail and the automotive industry. This latest industrial revolution relies on all its component parts, from sensors to data centers, incorporating interconnected, unassailable defenses against cyberthreats and malicious attacks.","hyperlink":"https:\/\/www.kaspersky.com\/enterprise-security\/storage-security","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,9,10,39,51,60"},{"product_id":"1822","product_name":"Intrusion Prevention","description":"Intrusion Prevention Service uses continually updated signatures to scan traffic on all major protocols, providing real-time protection against network threats, including spyware, SQL injections, cross-site scripting, and buffer overflows.","hyperlink":"https:\/\/www.watchguard.com\/wgrd-products\/security-services\/intrusion-prevention-service","td_contact":"watchguard@techdata.com","td_extension":"800-237-8931 x5545033","vendor_id":"71","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1634","product_name":"Intrusion Prevention Service","description":"Protect against worms, Trojans, software vulnerabilities and other intrusions by scanning all network traffic for malicious or anomalous patterns, thereby increasing network reliability and performance.","hyperlink":"https:\/\/www.sonicwall.com\/en-us\/products\/firewalls\/security-services\/total-secure-bundle","td_contact":"sonicwall@techdata.com","td_extension":"800-237-8931 x5545032","vendor_id":"56","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1294","product_name":"Intrusion Prevention System Software Blade","description":"The Check Point Intrusion Prevention System (IPS) Software Blade combines industry-leading IPS protection with breakthrough performance at a lower cost than traditional, stand-alone IPS software solutions. The IPS Software Blade delivers complete and proactive intrusion prevention \u2013 all with the deployment and management advantages of a unified and extensible next-generation firewall solution.","hyperlink":"https:\/\/www.checkpoint.com\/products\/ips-software-blade\/","td_contact":"checkpoint@techdata.com","td_extension":"800-237-8931 x5545036","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1503","product_name":"Investigator","description":"McAfee Investigator provides interactive, cloud-based security analytics so incident responders can investigate malware, network threats, and indicators of compromise (IOCs) in less time, with increased accuracy, using automation, human expertise, and machine learning.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/investigator.html","td_contact":"Tech Data: mcafee@techdata.com\n

DLT: spi@dlt.com<\/p>","td_extension":"Tech Data: 800-237-8931\n

DLT: 703-773-9231<\/p>","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1392","product_name":"IP Intelligence","description":"Having the ability to detect and block bad actors before they hit your data center provides a major advantage in your network protection scheme. By blocking malicious activity at the earliest point, F5 IP Intelligence Services significantly reduces risk and increases data center efficiency by eliminating the efforts spent processing bad traffic.","hyperlink":"https:\/\/f5.com\/products\/modules\/ip-intelligence-services","td_contact":"f5@techdata.com","td_extension":"(480) 643-5064","vendor_id":"26","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"127","product_name":"IPSec VPN Software Blade","description":"IPsec VPN provides secure connectivity to corporate networks for remote and mobile users, branch offices and business partners. IPsec integrates access control, authentication and encryption to guarantee the security of network connections over the public Internet.","hyperlink":"https:\/\/www.checkpoint.com\/products\/ipsec-vpn-software-blade\/","td_contact":"checkpoint@techdata.com","td_extension":"800-237-8931 x5545036","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1372","product_name":"Isla Isolation Platform","description":"What if you could stop breaches before they happen? Isla does just that by proactively isolating all active code and returning it to you in the form of harmless pixels, simplifying your security strategy and delivering immediate protection","hyperlink":"https:\/\/cyberinc.com\/isla\/","td_contact":"CyberincUS@techdata.com","td_extension":"(800)-237-8931 x5540509","vendor_id":"19","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1691","product_name":"IT Management Suite","description":"Securely manage your endpoints throughout their entire lifecycle across Windows, Mac, Linux, Unix, and virtual environments.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/it-management-suite-en","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"365","product_name":"iWorkflow","description":"Manually deploying your applications and services is time-consuming and error-prone. iWorkflow is a virtual appliance that serves as a platform for deploying application delivery policies. Through highly configurable, administrator-defined L4\u2013L7 service templates (iApps), your deployments take place in minutes rather than days.","hyperlink":"https:\/\/www.f5.com\/products\/automation-and-orchestration\/iworkflow","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"26","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"10","country_name":"CENTRAL AMERICA","parint_id":"0","type":"0","country":"10"},{"product_id":"521","product_name":"JSA Series Virtual Appliance","description":"Security teams understand the vital need to prevent data breaches by responding effectively to cyber threats in real time. They\u2019re defending against constant change, as attacks continue to hit from every angle. Advanced persistent threats perpetuated by cyber criminals silently breach security defenses, hunt for valuable data, and disappear before they\u2019re detected. Insiders also pose a threat with their direct access to corporate data that renders perimeter security ineffective.\n\nYou need end-to-end threat management that easily reduces the millions of security events occurring every day into a manageable, actionable list of suspected offenses. The ability to detect and track malicious activity over extended time periods helps uncover threats that are often otherwise missed. As IT infrastructure becomes more distributed and vulnerable to attack, security information and event management (SIEM) technology becomes more essential for real-time alerting, analysis, and auditing.","hyperlink":"https:\/\/www.juniper.net\/us\/en\/products-services\/security\/secure-analytics\/jsa-virtual-appliance\/","td_contact":"","td_extension":"","vendor_id":"38","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"85","country_name":"ASIA PACIFIC","parint_id":"0","type":"0","country":"85,86"},{"product_id":"522","product_name":"Juniper Identity Management Service","description":"Juniper Identity Management Service strengthens enterprise security that authenticates and restricts user access. It\u2019s the first line of defense in preventing corporate breaches and safeguarding corporate assets. Employees are identified and assigned corporate roles that determine what applications and data they are permitted to access.","hyperlink":"https:\/\/www.juniper.net\/us\/en\/products-services\/security\/jims\/","td_contact":"","td_extension":"","vendor_id":"38","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"85","country_name":"ASIA PACIFIC","parint_id":"0","type":"0","country":"85,86"},{"product_id":"2082","product_name":"Kenexa","description":"Provides employment and retention services. This includes recruitment process outsourcing onboarding tools, employee assessment, abilities assessment for employment candidates; and Kenexa Interview Builder, a structured interview","hyperlink":"https:\/\/www.ibm.com\/watson\/uk-en\/talent\/kenexa-solutions\/","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2015","product_name":"Kinesis","description":"Capable of processing hundreds of terabytes per hour from high volumes of streaming data from sources such as operating logs, financial transactions and social media feeds","hyperlink":"https:\/\/aws.amazon.com\/kinesis\/data-streams\/","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"113","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2010","product_name":"Kinesis Firehouse","description":"The easiest way to reliably load streaming data into data lakes, data stores and analytics tools","hyperlink":"https:\/\/aws.amazon.com\/kinesis\/data-firehose\/","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"113","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"852","product_name":"Knox Configure","description":"Remotely configure Samsung phones and tablets in bulk and tailor them to specific needs.","hyperlink":"https:\/\/www.samsungknox.com\/en\/solutions\/it-solutions\/knox-configure","td_contact":"BU-Security@techdata.com","td_extension":"+49 89 47003222","vendor_id":"52","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,64,70,82"},{"product_id":"855","product_name":"Knox E-FOTA","description":"Knox Enterprise Firmware-Over-The-Air is a business solution that allows you to manage firmware versions on Samsung mobile devices to maximize cost efficiency","hyperlink":"https:\/\/www.samsungknox.com\/en\/solutions\/it-solutions\/samsung_e-fota","td_contact":"BU-Security@techdata.com","td_extension":"+49 89 47003222","vendor_id":"52","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,64,70,82"},{"product_id":"853","product_name":"Knox Manage","description":"Manage a fleet of devices with a cloud-based EMM solution that increases business efficiency and secures corporate data","hyperlink":"https:\/\/www.samsungknox.com\/en\/solutions\/it-solutions\/knox-manage","td_contact":"BU-Security@techdata.com","td_extension":"+49 89 47003222","vendor_id":"52","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,64,70,82"},{"product_id":"854","product_name":"Knox Platform for Enterprise","description":"A military-grade mobile solution for IT admins to manage and secure Samsung Android phones, tablets and Tizen watches for business","hyperlink":"https:\/\/www.samsungknox.com\/en\/solutions\/it-solutions\/knox-platform-for-enterprise","td_contact":"BU-Security@techdata.com","td_extension":"+49 89 47003222","vendor_id":"52","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,64,70,82"},{"product_id":"1244","product_name":"Kona DDoS Defender","description":"Managed DDoS protection service for critical websites and web applications","hyperlink":"https:\/\/www.akamai.com\/us\/en\/products\/security\/kona-ddos-defender.jsp","td_contact":"akamaius@techdata.com","td_extension":"(800)-237-8931 x5540426","vendor_id":"1","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"1","product_name":"Kona Site Defender","description":"Comprehensive Web Application and API Protection","hyperlink":"https:\/\/www.akamai.com\/us\/en\/products\/security\/kona-site-defender.jsp","td_contact":"akamaius@techdata.com","td_extension":"(800)-237-8931 x5540426","vendor_id":"1","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1"},{"product_id":"383","product_name":"Log Management","description":"Fluency is network behavioral analysis built into a threat hunting & response platform. Fluency appliances collect network application flow data and correlate it with network, host and application logs. The results scored in real time, allowing the strongest threats to be alerted.","hyperlink":"https:\/\/fluencysecurity.com\/technology\/","td_contact":"fluency@techdata.com","td_extension":"","vendor_id":"27","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1840","product_name":"LogRhythm Cloud","description":"Threat detection & visibility platform for cloud (cloud SIEM)","hyperlink":"https:\/\/logrhythm.com\/products\/logrhythm-cloud\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"78","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1269","product_name":"LOGStorm","description":"LOGStorm is a cost-effective, powerful and flexible log management and log monitoring solution that combines complete log management with powerful correlation technology, real-time event log correlation and log monitoring, and an integrated incident response system \u2013 all on one appliance.","hyperlink":"https:\/\/www.blackstratus.com\/log-storm\/","td_contact":"cybershark@techdata.com","td_extension":"800-237-8931 x5540413","vendor_id":"8","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"1877","product_name":"LogZilla NEO","description":"Real-time network insight with an intelligent network operations platform. Identifies problems preemptively and solves them automatically. Vastly reduces log size by eliminating and consolidating duplicate entries.","hyperlink":"https:\/\/www.logzilla.net\/platform.html","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"85","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2077","product_name":"Lumada Maintenance Insights","description":"A new Internet of Things solution that uses machine learning to deliver intelligent maintenance recommendations. A suite of IoT applications to reduce unplanned downtime, predict asset failures, manage asset performance and more","hyperlink":"https:\/\/www.hitachivantara.com\/en-us\/products\/iot\/lumada-maintenance-insights.html","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"107","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2078","product_name":"Lumada Manufacturing Insights","description":"Applies data science rigor to drive continuous improvement opportunities based on predictive and prescriptive analytics. Integrate's data silos and stranded assets and augment's data from video, lidar and other advanced sensors to drive innovative new use cases for competitive advantage","hyperlink":"https:\/\/www.hitachivantara.com\/en-us\/products\/iot\/lumada-manufacturing-insights.html","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"107","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2079","product_name":"Lumada Suite","description":"Hitachi's advanced digital solutions, services, and technologies for turning data into insights to drive digital innovation","hyperlink":"https:\/\/www.hitachivantara.com\/en-us\/products\/data-management-analytics\/lumada-data-services.html?ecid=ps_glo_bd_en_ss0092sem&utm_source=google_ads_search_ds&utm_keyword=lumada&utm_medium=search&gclid=CjwKCAjwgdX4BRB_EiwAg8O8Hf46O5Tcky-wmEJsGQNku7k8x","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"107","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2043","product_name":"Lumada Video Insights","description":"An End-to-End Video Intelligence solution to deliver smart spaces, data integration, blending and analytics for comprehensive intelligence. Lumada Video Insights delivers the ability to combine multiple types of data from IoT sensors, video, enterprise resource planning (ERP) and other business data.","hyperlink":"https:\/\/www.hitachivantara.com\/en-us\/products\/video-intelligence\/lumada-video-insights.html","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"107","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1909","product_name":"Lumeta","description":"A real-time visibility, vulnerability, and risk management solution that enables cloud, network, and security teams to find and secure unknown, rogue and shadow clouds, network infrastructure, and endpoints","hyperlink":"https:\/\/www.firemon.com\/products\/lumeta\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"96","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"470","product_name":"MaaS360","description":"With IBM\u00ae BigFix\u00ae, IT departments can cut operational costs, compress endpoint management cycles and enforce compliance in real-time.","hyperlink":"https:\/\/www.ibm.com\/security\/mobile\/maas360","td_contact":"West: Rick.Marshall@techdata.com\n

East: Karen.Bailey@techdata.com<\/p>","td_extension":"West: (480) 254-4420\n

East: (678) 642-3446<\/p>","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,5,7,10,11,13,15,17,85,86,87,88,90,91"},{"product_id":"2032","product_name":"Machine Learning Server","description":"Your flexible enterprise platform for analyzing data at scale, building intelligent apps, and discovering valuable insights across your business with full support for Python and R. ... Machine Learning Server supports the full data science lifecycle of your R and Python-based analytics","hyperlink":"https:\/\/azure.microsoft.com\/en-us\/services\/machine-learning\/","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"43","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"555","product_name":"Mail","description":"Kaspersky Security for Mail Servers provides a rock-solid frontline defense for corporate infrastructure by filtering out incoming streams of spam and blocking malicious emails of all types. Works on the latest emailing platforms including Microsoft Exchange and Linux-based. Cloud-assisted spam filtering works in real-time to significantly reduce the traffic load. Ability to exclude specified objects from scanning processes. Automatic restart in the event of a system shutdown helps to determine stable security while determining the cause of the malfunction.","hyperlink":"","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"Monthly subscription based on band levels over 5,000+ nodes.","partner_benefits":"

\u2022  Increase sales revenue and net new customers <\/p>\n

\u2022  Access to volume-based pricing<\/p>\n

\u2022   Monthly licensing belongs to the partner not the end user<\/p>\n

\u2022  Product and sales trainings and certification <\/p>\n

\u2022  Standard and premium technical support <\/p>\n

\u2022  Sales and marketing materials<\/p>\n

\u2022  Five premium incidents are included for technical support <\/p>","typeof_service":"

Managed Security Services Building Block Solution:<\/strong>  Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":"

\u2022  User-friendly management tools<\/p>\n

\u2022  Information on mail protection status<\/p>\n

\u2022  Flexible settings for scans<\/p>\n

\u2022  Reporting features<\/p>","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,9,10,39,51,60"},{"product_id":"980","product_name":"Mail Security for Microsoft Exchange","description":"Protect against malware, phishing, and targeted attacks, blocking 99% of spam with less than one in 1 million false positives.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/web-and-email\/messaging\/mail-security-exchange","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1693","product_name":"Malware Analysis Service","description":"Symantec\u2019s cloud-delivered Malware Analysis Service uses threat intelligence, behavioral analysis, and sandboxing to provide scalable inline protection against zero-day, targeted, and advanced malware threats.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/malware-analysis-service","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"909","product_name":"Managed Threat Response","description":"24\/7 threat hunting, detection, and response delivered by an expert team as a fully-managed service","hyperlink":"https:\/\/www.sophos.com\/en-us\/products\/managed-threat-response.aspx","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"57","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,65,66,69,71,72,75,76,78,79,81"},{"product_id":"982","product_name":"Management Center and Reporting","description":"Centralized Management and Reporting solutions for Symantec network security products simplify governance, mitigate cloud access risks, enhance threat defenses, improve visibility and reduce operational costs.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/web-and-email\/gateway\/management-center-and-reporting","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"2056","product_name":"Map 3D","description":"Provides access to GIS and mapping data to support planning, design, and data management. Intelligent models and CAD tools help you to apply regional and discipline-specific standards. Integration of GIS data helps to improve quality, productivity, and asset management","hyperlink":"https:\/\/www.autodesk.com\/products\/autocad\/included-toolsets\/autocad-map-3d?plc=ACDIST&term=1-YEAR&support=ADVANCED&quantity=0","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"122","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2074","product_name":"Maximo","description":"A web-based Computer Maintenance Management System (CMMS) solution. IBM Maximo is an Enterprise asset management solution (equipment, installations, buildings, etc) and services including; purchasing, inventory, management of locations, service desk, and work planning","hyperlink":"https:\/\/www.ibm.com\/products\/maximo","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1455","product_name":"Maximo Application Suite","description":"IBM Maximo\u00ae Application Suite helps drive operational resiliency and reliability with condition-based asset maintenance. With expanded access to CMMS, EAM and asset performance management applications, your teams can reach across the enterprise to unify operations and maintain business continuity, even under rapidly changing or disruptive conditions.","hyperlink":"https:\/\/www.ibm.com\/products\/maximo","td_contact":"West: Rick.Marshall@techdata.com\n

East: Karen.Bailey@techdata.com<\/p>","td_extension":"West: (480) 254-4420\n

East: (678) 642-3446<\/p>","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"627","product_name":"McAfee Application Control","description":"McAfee Application Control guards enterprises against unauthorized applications and malware on servers and endpoints by using a dynamic trust model.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/application-control.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1490","product_name":"McAfee Endpoint Security","description":"McAfee Endpoint Security speeds threat detection and remediation with a framework that enables fast scanning, instant threat detection and updates, and maximized CPU performance.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/endpoint-security.html","td_contact":"Tech Data: mcafee@techdata.com\n

DLT: spi@dlt.com<\/p>","td_extension":"Tech Data: 800-237-8931\n

DLT: 703-773-9231<\/p>","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2008","product_name":"Message Hub & InfoSphere Change Data Capture","description":"Message Hub provides a simple communication mechanism built on Apache Kafka. Message Hub provides powerful real-time communication between Streams and many other IBM Cloud services","hyperlink":"https:\/\/www.ibmbigdatahub.com\/blog\/feed-your-data-lake-change-data-capture-real-time-integration-and-analytics","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1695","product_name":"Messaging Gateway","description":"Defend your email perimeter against spam, malware, and targeted attacks with content filtering, data loss prevention, and encryption.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/web-and-email\/messaging\/gateway","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2019","product_name":"Meta Manager","description":"Tech Data BSP software can help you identify and fix issues in your current Cognos environment before you begin your upgrade. Clean up garbage, fix broken reports, tidy up your security and licensing. MetaManager can help you upgrade to Cognos Analytics and help you maintain a clean, healthy and effective IBM Cognos Analytics environment.","hyperlink":"https:\/\/www.bspsoftware.com\/products\/metamanager\/","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"114","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"776","product_name":"Microsoft Advanced Threat Analytics","description":"Detect suspicious activity right away\nReduce your risk of costly damage and get all the information you need in a succinct, real-time view of the attack timeline with Advanced Threat Analytics. All the intelligence to learn, analyze, and identify normal and suspicious user or device behavior is built-in.","hyperlink":"https:\/\/www.microsoft.com\/cloud-platform\/advanced-threat-analytics","td_contact":"microsoft@techdata.com","td_extension":"800-237-8931 x5545006","vendor_id":"43","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"775","product_name":"Microsoft Cloud App Security","description":"Elevate your security posture by taking control of your cloud environment\nMicrosoft Cloud App Security gives you visibility into your cloud apps and services, provides sophisticated analytics to identify and combat cyberthreats and enables you to control how your data travels.","hyperlink":"https:\/\/www.microsoft.com\/en-us\/cloud-platform\/cloud-app-security","td_contact":"microsoft@techdata.com","td_extension":"800-237-8931 x5545006","vendor_id":"43","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1601","product_name":"Microsoft Platform Management","description":"Automate migration, management and security functions for Active Directory\u00ae, Exchange, Lync\u00ae, SharePoint\u00ae, Office 365\u2122 and more.","hyperlink":"https:\/\/www.quest.com\/solutions\/microsoft-platform-management\/","td_contact":"spi@dlt.com","td_extension":"703-709-7172","vendor_id":"74","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2051","product_name":"Microsoft Search","description":"Designed to bring personalized searches across Office 365, Windows, and Bing. Essentially, Microsoft Search allows you to help you complete what you're working on, and find things such as files, charts, and help you answer common questions","hyperlink":"https:\/\/docs.microsoft.com\/en-us\/microsoftsearch\/overview-microsoft-search","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"43","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"80","product_name":"Migrate for Service Providers","description":"Migrate workloads to your cloud with minimal risk and near-zero downtime","hyperlink":"","td_contact":"carbonite@techdata.com \n(727) 539-7429 x-71458","td_extension":"800-237-8931 x5540414","vendor_id":"10","service_tiering":"No Tiering. Monthly subscription per active migration.","partner_benefits":"

\u2022  Structured, repeatable migrations with near-zero downtime<\/p>\n

\u2022   Simplified customer on-boarding process<\/p>\n

\u2022   One self-service portal to manage all migration projects and customer billing<\/p>\n

\u2022   No upfront cost or order fulfillment process<\/p>\n

\u2022   No need to reorder licenses if your migration project runs longer than expected<\/p>","typeof_service":"

Managed Security Services Building Block Solution:<\/strong>  Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":"

\u2022   Any-to-any migrations between physical, virtual, and cloud platforms<\/p>\n

\u2022   No lock-in to a specific hypervisor or hardware<\/p>\n

\u2022   Efficient, real-time migration with minimal downtime<\/p>\n

\u2022   Non-disruptive testing of target systems before cutover<\/p>\n

\u2022   Simple, low-impact, automated migrations from a central console<\/p>\n

\u2022   Built-in AES 256-bit encryption in flight and at rest <\/p>","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,4,6,9,10,12,14,16,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61"},{"product_id":"1163","product_name":"Mobile Security","description":"Trend Micro\u2122 Mobile Security is an essential component of Trend Micro complete user protection solution that gives you full visibility and control of mobile devices, apps, and data through a single built-in console. It strikes the right balance between user productivity and IT risks.","hyperlink":"https:\/\/www.trendmicro.com\/en_us\/business\/products\/user-protection\/sps\/mobile.html","td_contact":"trendmicro@techdata.com","td_extension":"800-237-8931 ext. 5545035","vendor_id":"66","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,85,86,88,89"},{"product_id":"541","product_name":"Mobile Security","description":"An integrated security and management solution supporting your mobile device strategy","hyperlink":"https:\/\/www.kaspersky.com\/enterprise-security\/ddos-protection","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,9,10,39,51,60"},{"product_id":"1202","product_name":"Modern Application Security","description":"VMware AppDefense is a data center endpoint security product that protects applications running in virtualized environments. Rather than chasing after threats, AppDefense understands an application's intended state and behavior, then monitors for changes to that intended state that indicate a threat. When a threat is detected, AppDefense automatically responds.","hyperlink":"https:\/\/www.vmware.com\/products\/appdefense.html","td_contact":"vmware@techdata.com","td_extension":"800-237-8931 x5545048","vendor_id":"70","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,5,10,17,85,87"},{"product_id":"660","product_name":"MOVE AntiVirus","description":"McAfee Management for Optimized Virtual Environments (MOVE) AntiVirus optimizes security, flexibility, and management for virtual environments, increasing the options for companies investing in virtualization for data centers, applications, and desktops.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/move-anti-virus.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"2058","product_name":"MS Bing Maps","description":"A web mapping service provided as a part of Microsoft's Bing suite of search engines and powered by the Bing Maps for Enterprise framework","hyperlink":"https:\/\/www.microsoft.com\/en-us\/maps","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"43","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1229","product_name":"Multi-Factor Authentication","description":"Our unique multi-factor authentication (MFA) solution not only helps to reduce the likelihood of network disruptions and data breaches arising from lost or stolen credentials, but we deliver this important capability entirely from the Cloud for easy set-up and management. AuthPoint goes beyond traditional 2-Factor Authentication (2FA) by considering innovative ways to positively identify users, and our large ecosystem of 3rd party integrations means that you can use MFA to protect access to the network, VPNs, and Cloud applications. Even non-technical users find the AuthPoint mobile app easy and convenient to use!","hyperlink":"https:\/\/www.watchguard.com\/wgrd-products\/multi-factor-authentication","td_contact":"SEWatchGuard@techdata.com","td_extension":"800-237-8931 x5545033","vendor_id":"71","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1922","product_name":"Multifactor Authentication","description":"Adaptive Multi-Factor Authentication adds an extra layer of protection before access to corporate applications is granted. Leveraging device, network, and user behavior context, Idaptive intelligently assigns risk to each access event and allows you to create dynamic access policies that are triggered when anomalous behavior is detected.","hyperlink":"https:\/\/www.idaptive.com\/product\/multi-factor-authentication\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"99","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"786","product_name":"MultSess","description":"Access multiple applications in VTAM environments to boost productivity","hyperlink":"https:\/\/www.oneidentity.com\/products\/multsess\/","td_contact":"oneldus@techdata.com","td_extension":"","vendor_id":"44","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"681","product_name":"MVISION Cloud","description":"McAfee MVISION Cloud is a cloud access security broker (CASB) that protects data where it lives today, with a solution that was built natively in the cloud, for the cloud. It\u2019s cloud-native data security.","hyperlink":"","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"Annual Subscription\/PayGo","partner_benefits":"

\u2022  DETECT:<\/strong>  Gain complete visibility into data, context and user behavior across all cloud services, users and devices.<\/p>\n

\u2022  PROTECT: <\/strong> Apply persistent protection to sensitive information where it goes inside or outside the cloud.<\/p>\n

\u2022  CORRECT:  <\/strong>Take real-time actions within cloud services to correct policy violations and stop security threats.<\/p>","typeof_service":"

Managed Security Services Building Block Solution:<\/strong>  Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":"

\u2022  Enforce data loss prevention (DLP) policies across data in the cloud Prevent unauthorized sharing of sensitive data to the wrong people <\/p>\n

\u2022  Block sync\/download of corporate data to personal devices Detect compromised accounts, insider threats, and malware<\/p>\n

\u2022  Encrypt cloud data with keys that only you can access <\/p>\n

\u2022  Audit and tighten the security settings of cloud services<\/p>","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1526","product_name":"MVISION Endpoint","description":"McAfee MVISION Endpoint is a unified management and automated workflow control across native and non-native endpoint defense technologies. It augments the security built into Windows 10 and combats sophisticated threats. It delivers machine learning, credential theft monitoring, and rollback remediation to block advanced, traditional, and zero-day threats. It is managed by our industry-leading McAfee ePolicy Orchestrator (McAfee ePO) platform, which provides a single pane of glass to manage Microsoft and McAfee defense settings as well as a centralized view of the attack surface.","hyperlink":"","td_contact":"Tech Data: mcafee@techdata.com\n

DLT: spi@dlt.com<\/p>","td_extension":"Tech Data: 800-237-8931\n

DLT: 703-773-9231<\/p>","vendor_id":"41","service_tiering":"Annual Subscription\/PayGo","partner_benefits":"

\u2022  Advanced defenses for advanced threats: <\/strong> Machine-learning, credential theft defense, and rollback remediation complement Windows 10 basic security capabilities. <\/p>\n

\u2022  No additional complexity:  <\/strong> Manage McAfee technologies, Windows Defender Antivirus policies, Defender Exploit Guard, and Windows Firewall settings using a single policy and console.<\/p>","typeof_service":"

Managed Security Service Building Block Solution:<\/strong>  Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":"

\u2022  Centralized management for all devices<\/p>\n

\u2022  Advanced, file, fileless, and behavioral machine learning defenses<\/p>\n

\u2022  Protection for your Mac, Linux, IoT, and mobile devices<\/p>\n

\u2022  Lower your TCO and streamline workflows<\/p>","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"683","product_name":"MVISION ePolicy Orchestrator","description":"McAfee MVISION ePO\u2122 eliminates the need for maintenance of an on-premises security infrastructure, allowing the security professional to focus exclusively on security. Simply access from a browser with your credentials and manage your security.","hyperlink":"","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"Annual Subscription\/PayGo","partner_benefits":"

\u2022  Be consistent and save time by deploying policies to all devices, including those with native controls.<\/p>\n

\u2022  Save time and eliminate redundant and labor-intensive efforts by scheduling security compliance reports to meet the needs of each stakeholder.<\/p>\n

\u2022  Maintain your security posture by deploying agent or machine-learning security solutions as new devices are added to your corporate network by syncing the McAfee MVISION ePO console with Microsoft Active Directory<\/p>\n

\u2022  Single Management Console for all endpoint protection software<\/p>\n

\u2022  SaaS Interface, allowing access from anywhere in the world<\/p>","typeof_service":"

Managed Security Services Building Block Solution:<\/strong>  Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":"

\u2022  Graphical security posture Dashboard<\/p>\n

\u2022  Role-based access control<\/p>\n

\u2022  Two-factor authentication<\/p>\n

\u2022  Custom reports and queries<\/p>\n

\u2022  Zero downtime upgrades<\/p>\n

\u2022  Migration assistance tool for McAfee\u00ae Endpoint Security and McAfee\u00ae VirusScan\u00ae Enterprise<\/p>","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1528","product_name":"MVISION Mobile","description":"McAfee MVISION Mobile provides visibility and mobile threat defense for iOS and Android devices to ensure they are safeguarded just like any other device. Unlike cloud-based mobile security solutions that rely on app sandboxing or traffic tunneling, McAfee MVISION Mobile sits directly on mobile devices to provide always-on protection no matter how a device is connected (corporate network, public access point (AP), cellular carrier, or even offline).","hyperlink":"","td_contact":"Tech Data: mcafee@techdata.com\n

DLT: spi@dlt.com<\/p>","td_extension":"Tech Data: 800-237-8931\n

DLT: 703-773-9231<\/p>","vendor_id":"41","service_tiering":"Annual Subscription\/PayGo","partner_benefits":"

\u2022  On Device Protection<\/p>\n

\u2022  Unified Management <\/p>\n

\u2022  Security Infrastructure Integration with existing MDM or EMM Solutions <\/p>","typeof_service":"

Managed Security Service Building Block Solution:<\/strong>  Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":"

\u2022  Optimal mobile security provides on-device, real-time protection that detects mobile threats and protects against zero-day attacks<\/p>\n

\u2022  Protection that highlights privacy risks in applications to protect users and ensure that they are aware of the dangers associated with any given application<\/p>\n

\u2022  Enterprise-grade actionable mobile threat intelligence to help you better understand and quickly respond to mobile threats. <\/p>\n

\u2022  Compliance control for mobile devices, allowing your employees to work anywhere, any time and on any device. <\/p>\n

\u2022  Protect users against phishing by detecting harmful links found in text messages, social media apps, and email.<\/p>","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"787","product_name":"NC-Access","description":"Simplify network management support with a flexible, full-featured session manager for OS\/390 or z\/OS","hyperlink":"https:\/\/www.oneidentity.com\/products\/nc-access\/","td_contact":"oneldus@techdata.com","td_extension":"","vendor_id":"44","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1735","product_name":"NERC CIP","description":"This is a vulnerability security assessment of CIP (Critical Infrastructure Protection) required for Electrical utilities as defined the governing body. NERC (North American Electric Reliability Corporation). Our assessment approach is based on the completion of the following four phases: NERC CIP Cyber Assessment Planning; NERC CIP-005 R4 Assessment; NERC CIP-007 R8 Assessment; Assessment Results and Documentation. The final assessment report will be delivered in accordance with NERC CIP-005 R4 & CIP-007 R8 and will assist Electrical utilities in passing their annual audit.","hyperlink":"https:\/\/tdcontent.techdata.com\/techsolutions\/security\/Services.aspx","td_contact":"SecurityServices@TechData.com","td_extension":"800-237-8931 ext. 5540508","vendor_id":"62","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1843","product_name":"NetMon","description":"Network Traffic Analysis","hyperlink":"https:\/\/logrhythm.com\/products\/logrhythm-netmon\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"78","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2070","product_name":"Netsuite CRM","description":"A robust and powerful customer relationship management solution that provides companies of all sizes a complete 360-degree view of their customers in real-time. Users enjoy a continuous stream of information from all points and throughout their customer lifecycle","hyperlink":"https:\/\/www.netsuite.com\/portal\/products\/crm.shtml","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"46","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"42","product_name":"Network Automation","description":"Eliminate manual tasks and harness zero-touch DNS automation to lower network costs, drive rapid innovation, and provide users with a seamless network experience.\nNetworks are getting bigger and more complex every day. So why are 95% of network changes still performed manually?\n\nWay too many network managers have their hands on keyboards, performing repetitive, error-prone network configuration and provisioning tasks.\n\nThat\u2019s why we decided to go all in on network automation, empowering your IT and end users while reducing systemic risk.\n\nOur Adaptive Plug-Ins help you get the most out of your existing infrastructure investments, integrating critical DDI services with applications you use every day.","hyperlink":"https:\/\/bluecatnetworks.com\/adaptive-dns\/network-automation\/","td_contact":"BluecatUS@techdata.com","td_extension":"727-539-7429 ext 5540423","vendor_id":"5","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"859","product_name":"Network Configuration Manager","description":"Automated network configuration and compliance management","hyperlink":"https:\/\/www.solarwinds.com\/network-configuration-manager","td_contact":"solarwindssoftware@techdata.com","td_extension":"1-800-237-8931 ext. 5540493","vendor_id":"55","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61"},{"product_id":"1157","product_name":"Network Defense","description":"Go beyond next-gen IPS to detect, analyze, and prevent advanced threats and targeted attacks","hyperlink":"https:\/\/www.trendmicro.com\/en_us\/business\/products\/network.html","td_contact":"trendmicro@techdata.com","td_extension":"800-237-8931 ext. 5545035","vendor_id":"66","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,85,86,88,89"},{"product_id":"1696","product_name":"Network Forensics & Security Analytics","description":"Security Analytics arms incident response teams with enriched, full-packet capture for complete security visibility, advanced network forensics, and real-time threat detection.","hyperlink":"https:\/\/www.broadcom.com\/info\/symantec\/security-analytics-key-features","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"457","product_name":"Network Intrusion Prevention System (NIPS)","description":"Unparalleled Threat Protection Without Performance Compromise","hyperlink":"https:\/\/www.hillstonenet.com\/products\/network-intrusion-prevention-system-s-series\/","td_contact":"eduardo.araujo@techdata.com","td_extension":"55-11-31912870 x-5222870","vendor_id":"33","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"4","country_name":"LATIN AMERICA","parint_id":"0","type":"0","country":"4,7,9,10,11,12,13,14,15,16,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60"},{"product_id":"1505","product_name":"Network Security Platform","description":"McAfee Network Security Platform guards all your network-connected devices from zero-day and other attacks, with a cost-effective network intrusion prevention system.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/network-security-platform.html","td_contact":"Tech Data: mcafee@techdata.com\n

DLT: spi@dlt.com<\/p>","td_extension":"Tech Data: 800-237-8931\n

DLT: 703-773-9231<\/p>","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1810","product_name":"Networking & Security for all Workloads","description":"VMware NSX Data Center is the network virtualization platform for the Software-Defined Data Center (SDDC), delivering networking and security entirely in software, abstracted from the underlying physical infrastructure.","hyperlink":"https:\/\/www.vmware.com\/products\/nsx.html","td_contact":"vmware@techdata.com","td_extension":"800-237-8931 x5545048","vendor_id":"70","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1841","product_name":"NetworkXDR","description":"Security analytics, centralized search and visualizations, and security orchestration, automation, and response (SOAR) technology.","hyperlink":"https:\/\/logrhythm.com\/products\/logrhythm-network-xdr\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"78","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"128","product_name":"Next Generation Data Protection","description":"Next Generation Data Protection solutions encompass all facets of protecting content from getting into the wrong hands. Data Loss Prevention (DLP) is an integral part of a data protection solution, however to fully protect data, multiple layers must be put into place. Check Point combines these layers into a complete solution protecting against confidential data inadvertently leaving the organization.","hyperlink":"https:\/\/www.checkpoint.com\/products\/next-generation-data-protection\/","td_contact":"checkpoint@techdata.com","td_extension":"800-237-8931 x5545036","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1297","product_name":"Next Generation Firewall","description":"Check Point provides customers of all sizes with the latest data and network security protection in an integrated next generation firewall platform, reducing complexity and lowering the total cost of ownership. Whether you need next-generation security for your data center, enterprise, small business or home office, Check Point has a solution for you.","hyperlink":"https:\/\/www.checkpoint.com\/products-solutions\/next-generation-firewalls\/","td_contact":"checkpoint@techdata.com","td_extension":"800-237-8931 x5545036","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"130","product_name":"Next Generation Secure Web Gateway","description":"Embracing the current paradigm shift from simple URL filtering to comprehensive malware protection, the Check Point Secure Web Gateway provides an intuitive solution that enables secure use of Web 2.0 with real time multi-layered protection against web-borne malware, largest application coverage in the industry, advanced granular control, intuitive centralized management, and essential end-user education functionality.","hyperlink":"https:\/\/www.checkpoint.com\/products\/next-generation-secure-web-gateway\/","td_contact":"checkpoint@techdata.com","td_extension":"800-237-8931 x5545036","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1635","product_name":"Next-Gen Firewall","description":"Get the network security, control and visibility your organization needs to innovate and grow faster with our broad range of award-winning next-generation network firewalls.","hyperlink":"https:\/\/www.sonicwall.com\/en-us\/products\/firewalls","td_contact":"sonicwall@techdata.com","td_extension":"800-237-8931 x5545032","vendor_id":"56","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"456","product_name":"Next-Generation Firewalls (NGFW)","description":"Comprehensive Network Security with Advanced Firewall Features","hyperlink":"https:\/\/www.hillstonenet.com\/products\/next-gen-firewalls-e-series\/","td_contact":"eduardo.araujo@techdata.com","td_extension":"55-11-31912870 x-5222870","vendor_id":"33","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"4","country_name":"LATIN AMERICA","parint_id":"0","type":"0","country":"4,7,9,10,11,12,13,14,15,16,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60"},{"product_id":"1648","product_name":"Next-generation UTM Firewall","description":"Stormshield Network Security solutions are built on the concept of Multi-Layer Collaborative Security. This holistic approach, based on active collaboration between the security engines of other Stormshield products and solutions, represents the future of in-depth IT systems protection.","hyperlink":"https:\/\/www.stormshield.com\/products-services\/products\/network-security\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"59","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"1839","product_name":"NextGen SIEM Platform","description":"Threat detection & visibility platform","hyperlink":"https:\/\/logrhythm.com\/products\/nextgen-siem-platform\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"78","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1945","product_name":"Nexus Auditor","description":"exus Auditor automatically generates a software bill of materials to identify open source components used within 3rd party or legacy applications.\n\nGet a complete list of open source components included within your app to quickly identify components that violate your open source policies.","hyperlink":"https:\/\/www.sonatype.com\/product-nexus-auditor","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"102","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1943","product_name":"Nexus Firewall","description":"Nexus Firewall prevents vulnerable components from entering your SDLC. With support for Java, JavaScript, .NET, Python, Go, Ruby, RPM, and more, Nexus Firewall ensures that your repository is protected.","hyperlink":"https:\/\/www.sonatype.com\/product-nexus-firewall","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"102","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1942","product_name":"Nexus Lifecycle","description":"With integration to source repos and IDE\u2019s, developers can select the best components based on real-time intelligence and move to an approved version with one click. Nexus Lifecycle integrates with GitHub, GitLab, BitBucket, Eclipse, IntelliJ, and Visual Studio.","hyperlink":"https:\/\/www.sonatype.com\/product-nexus-lifecycle","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"102","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1944","product_name":"Nexus Lifecycle Foundation","description":"Verify policy compliance by knowing what components are used and where. In just minutes, generate a precise software BoM for each app to identify every open source component along with its dependencies","hyperlink":"https:\/\/www.sonatype.com\/products-nexus-lifecycle-foundation","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"102","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1946","product_name":"Nexus Repository Manager","description":"Repository Health Check (RHC) provides up-to-date component intelligence, so your teams make informed decisions early on.\nView components in need of remediation, prioritized by the severity of vulnerability.\nEasily avoid known security and license issues for Maven\/Java, npm, NuGet, and PyPI components.","hyperlink":"https:\/\/www.sonatype.com\/product-nexus-repository","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"102","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1844","product_name":"Ngenius ONE","description":"nGeniusONE assures performance of the cloud, virtual, co-lo, and on-site data center platforms. Monitors capacity and performance of VPN, VDI, UC, and healthcare delivery services.","hyperlink":"https:\/\/www.netscout.com\/product\/ngeniusone-platform","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"79","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1845","product_name":"Ngenius Pulse","description":"Network to ensure the availability, over Ethernet or Wi-Fi, from wherever users need access.","hyperlink":"https:\/\/www.netscout.com\/product\/ngeniuspulse","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"79","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"388","product_name":"NGFW","description":"Next Generation Firewall- Enterprise SD-WAN meets the #1\nmost secure next gen firewal","hyperlink":"https:\/\/www.forcepoint.com\/product\/ngfw-next-generation-firewall","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"28","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,80"},{"product_id":"1999","product_name":"NoSQL DB","description":"A NoSQL-type distributed key-value database that provides transactional semantics for data manipulation, horizontal scalability, and simple administration and monitoring","hyperlink":"https:\/\/www.oracle.com\/database\/technologies\/related\/nosql.html","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"46","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2038","product_name":"NoviLens","description":"NoviLens - is an IBM Power 9 analytical application appliance that fuses data from databases and unstructured data. Database sources include electronic medical record systems (EMR) and enterprise resource planning systems (ERP). NoviLens allows users to interactively explore both textual and numerical data from multiple sources in a decision management framework. It\u2019s easy to build and run machine learning models, and natural language processing techniques are core to the system","hyperlink":"https:\/\/novi.systems\/case-studies\/","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66101","vendor_id":"118","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1812","product_name":"NSX Data Center","description":"Enable your virtual cloud network to connect and protect applications across your data center, multi-cloud, bare metal, and container infrastructure. VMware NSX Data Center delivers a complete L2-L7 networking and security virtualization platform \u2014 providing you with the agility, automation, and dramatic cost savings that come with a software-only solution.","hyperlink":"https:\/\/www.vmware.com\/products\/nsx.html","td_contact":"vmware@techdata.com","td_extension":"800-237-8931 x5545048","vendor_id":"70","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1846","product_name":"NUIX Discover","description":"eDiscovery review, visual analytics, and predictive coding.","hyperlink":"https:\/\/www.nuix.com\/products\/nuixdiscover","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"80","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1848","product_name":"NUIX Endpoint","description":"Monitor and respond to threats, searches for valuable, risky, and sensitive information, forensically collects evidence for investigation, litigation, security, and compliance.","hyperlink":"https:\/\/www.nuix.com\/products\/nuixendpoint","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"80","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1847","product_name":"NUIX Investigate","description":"Digital workflows and graphic analysis with elements of traditional, non-digital investigations. With visualizations, search capabilities, and analysis tools built on top of an indexing engine, Nuix Investigate helps corporations, government agencies, law enforcement, and service providers examine and get answers from their case data.","hyperlink":"https:\/\/www.nuix.com\/products\/nuixinvestigate","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"80","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1849","product_name":"NUIX Workstation","description":"Process and extract intelligence from large unstructured, semi-structured, and structured data. Processes, search, index, and analyze your information with forensic precision.","hyperlink":"https:\/\/www.nuix.com\/products\/nuixworkstation","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"80","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"556","product_name":"O365","description":"Detect and block spam and malicious email before it becomes a problem \u2013 without slowing productivity or accidentally deleting legitimate traffic. Advanced heuristics, sandboxing and machine learning protect email from spam, phishing, business email compromise (BEC) and other advanced threats. \ue908Intuitive management from a single, cloud-based console - Kaspersky Business Hub.\n- Complete control over what happens to suspicious email.\n- Latest spam, phishing, malware (including ransomware) protection and advanced attachment filtering.","hyperlink":"","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"Monthly subscription based on band levels over 5,000+ nodes.","partner_benefits":"

\u2022   Increase sales revenue and net new customers <\/p>\n

\u2022  Access to volume-based pricing<\/p>\n

\u2022   Monthly licensing belongs to the partner not the end user<\/p>\n

\u2022  Product and sales trainings and certification <\/p>\n

\u2022  Standard and premium technical support <\/p>\n

\u2022  Sales and marketing materials<\/p>\n

\u2022  Five premium incidents are included for technical support.  <\/p>\n

\u2022  Reduces IT costs and frees up resources.  <\/p>","typeof_service":"

Managed Security Services Building Block Solution:<\/strong>  Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":"

\u2022  Managed with a single cloud-based administration console<\/p>","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,9,10,39,51,60"},{"product_id":"2002","product_name":"OAC Data Lake","description":"The newest, cloud-based analytics solution within the Oracle Analytics or Business Intelligence space. OAC isn't an application, it's a platform. Oracle touts this offering as the most comprehensive analytics in the industry","hyperlink":"https:\/\/www.us-analytics.com\/hyperionblog\/oracle-unveils-data-lake-edition-for-oac","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"46","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1920","product_name":"Oakdoor File Gateway","description":"The PA Consulting Oakdoor\u2122 File Gateway is a hardware security solution that provides secure file import and export to the stringent standards required by government intelligence agencies.","hyperlink":"https:\/\/glasswallsolutions.com\/Oakdoor-File-Gateway\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"98","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1878","product_name":"ObserveIT","description":"ObserveIT contextualizes user activity and data movement in an easy to understand and shareable way.\n\nGuard against insider threats by detecting data loss, unauthorized machine access, bypassing of security controls, careless behavior, time fraud, and other out-of-policy activity. \nObserveIT captures user activity as screenshots before and after the threat signal(s), and provides the evidence as summary reports.","hyperlink":"https:\/\/www.observeit.com\/#","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"86","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"816","product_name":"ObserveIT Insider Threat Management","description":"Protect your IP and people from insider threats across the organization","hyperlink":"https:\/\/www.proofpoint.com\/us\/products\/information-protection\/insider-threat-management","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 641","vendor_id":"48","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,65,71"},{"product_id":"557","product_name":"Off-Prem Solution Cloud","description":"Endpoint security in the Cloud available in two tiers licensed by user, not device. Tier 1 - offers protection for 2 mobile devices for free, for every license. No device and web controls, but offers all of the other features of Kaspersky's Endpoint. \nTier 2 - Offers Patch Management and Data Encryption. Retains the Web and Device control features, but no application control.","hyperlink":"","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"Monthly subscription based on band levels up to 999","partner_benefits":"

\u2022   Increase sales revenue and net new customers <\/p>\n

\u2022  Access to volume-based pricing<\/p>\n

\u2022   Monthly licensing belongs to the partner not the end user<\/p>\n

\u2022  Product and sales trainings and certification <\/p>\n

\u2022  Standard and premium technical support <\/p>\n

\u2022  Sales and marketing materials<\/p>\n

\u2022  Five premium incidents are included for technical support.  <\/p>\n

\u2022  Reduces IT costs and frees up resources.  <\/p>","typeof_service":"

Managed Security Services Building Block Solution:<\/strong>  Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":"

\u2022  Cloud-based console allows administrators to update settings from any remote location<\/p>\n

\u2022  Support multi-tenancy<\/p>\n

\u2022  Each end customer is limited to 1000 nodes <\/p>","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,9,10,39,51,60"},{"product_id":"777","product_name":"Office 365 Advanced Threat Protection","description":"Get trusted, enterprise-grade threat protection\nWith a hacker attack happening somewhere every 39 seconds, you need trustworthy, tested protection for your digital environment. The Microsoft Office 365 collection of threat-protection technologies helps protect against and provides visibility about spam, malware, viruses, phishing attempts, malicious links, and other threats.","hyperlink":"https:\/\/products.office.com\/business\/security-and-compliance\/threat-protection","td_contact":"microsoft@techdata.com","td_extension":"800-237-8931 x5545006","vendor_id":"43","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"778","product_name":"Office 365 Security & Compliance Center","description":"The Office 365 Security & Compliance Center is your one-stop portal for protecting your data in Office 365. Use the Office 365 Security & Compliance Center to manage compliance for all of your organization\u2019s data across Office 365.","hyperlink":"https:\/\/support.office.com\/article\/Office-365-Security-Compliance-Center-7e696a40-b86b-4a20-afcc-559218b7b1b8","td_contact":"microsoft@techdata.com","td_extension":"800-237-8931 x5545006","vendor_id":"43","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"558","product_name":"On-Prem Solution Advanced","description":"Kaspersky Endpoint Security for Business Advanced includes all of the functionality delivered by Kaspersky Endpoint Security for Business Select, plus additional technologies that do even more to protect your business including data encryption, systems management, patch management, and 3rd party application deployment.","hyperlink":"","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"Monthly subscription based on band levels over 5,000+ nodes.","partner_benefits":"

\u2022   Increase sales revenue and net new customers <\/p>\n

\u2022  Access to volume-based pricing<\/p>\n

\u2022   Monthly licensing belongs to the partner not the end user<\/p>\n

\u2022  Product and sales trainings and certification <\/p>\n

\u2022  Standard and premium technical support <\/p>\n

\u2022  Sales and marketing materials<\/p>\n

\u2022  Five premium incidents are included for technical support.  <\/p>\n

\u2022  Reduces IT costs and frees up resources.  <\/p>","typeof_service":"

Managed Security Services Building Block Solution:<\/strong>  Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":"

\u2022  Simple, seamless security administration for desktop, portable, mobile, virtual endpoints and servers<\/p>\n

\u2022  Delivered through a single pane of glass   <\/p>","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,9,10,39,51,60"},{"product_id":"559","product_name":"On-Prem Solution Select","description":"With more of your business operations going digital, you need to protect every server, laptop and mobile device. We deliver Next Gen security in a single solution that helps you protect every endpoint your business runs.\nProtects against the latest threats, including ransomware\nHardens endpoints \u2013 to reduce your exposure to cyberattacks\nHelps boost productivity \u2013 via cloud-enabled usage controls\nProtects servers & endpoints without damaging performance\nSecures diverse environments \u2013 PC, Mac, Linux, iOS & Android\nSimplifies security management \u2013 with one unified console","hyperlink":"","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"Monthly subscription based on band levels over 5,000+ nodes.","partner_benefits":"

\u2022   Increase sales revenue and net new customers <\/p>\n

\u2022  Access to volume-based pricing<\/p>\n

\u2022   Monthly licensing belongs to the partner not the end user<\/p>\n

\u2022  Product and sales trainings and certification <\/p>\n

\u2022  Standard and premium technical support <\/p>\n

\u2022  Sales and marketing materials<\/p>\n

\u2022  Five premium incidents are included for technical support.  <\/p>\n

\u2022  Reduces IT costs and frees up resources.  <\/p>","typeof_service":"

Managed Security Services Building Block Solution:<\/strong>  Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":"

\u2022  Simple, seamless security administration for desktop, portable, mobile, virtual endpoints and servers<\/p>\n

\u2022  Delivered through a single pane of glass   <\/p>","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,9,10,39,51,60"},{"product_id":"1864","product_name":"OneLogin Access","description":"OneLogin Access extends the reach of the OneLogin Trusted Experience Platform\u2122 to applications hosted on-premises and in public or private clouds. Simplifies administration, reduces IT costs, improves security, and enhances user experience.\n \nUsers enjoy a simple, consistent experience with single-click access to SaaS and on-premise applications from any device.","hyperlink":"https:\/\/www.onelogin.com\/product\/onelogin-access","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"83","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1863","product_name":"OneLogin Advanced Directory","description":"Synchronize users with any number of directories, such as Active Directory, LDAP, Workday, or Google Apps. Leverage identity and access management (IAM) technology to import custom user attributes and pass them on to downstream apps via SAML or API-based provisioning. The integration with Active Directory synchronizes users in real-time and supports multiple forests and domains via a single connector.","hyperlink":"https:\/\/www.onelogin.com\/product\/directory","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"83","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1865","product_name":"OneLogin Desktop","description":"Users log in once to access to all the apps in their OneLogin Portal as well as SAML-enabled desktop apps. With Desktop Pro, they can sign into a laptop with their OneLogin password, eliminating the separate laptop password","hyperlink":"https:\/\/www.onelogin.com\/product\/desktop","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"83","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1873","product_name":"OneLogin Mobile Identity","description":"Entering credentials manually is frustrating and time-consuming. Multiply that by ten for mobile devices.\n\nIn an increasingly competitive marketplace where workers struggle to strike work-life balance, being able to respond to work-related requests in seconds benefits employers and employees alike. OneLogin Mobile identity management gives users one-click access to all their enterprise apps on both smartphones and tablet","hyperlink":"https:\/\/www.onelogin.com\/product\/mobile-identity","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"83","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1862","product_name":"OneLogin Multifactor Authentication (MFA)","description":"Policy-based OneLogin MFA providers flexible authentication factors including OneLogin Protect one-time-password (OTP) app, email, SMS, voice, WebAuthn for biometric factors, plus a range of third party options including Google Authenticator, Yubico, Duo Security, RSA SecurID, and more. Go beyond static MFA with SmartFactor Authentication, which uses machine learning to evaluate the risk and context of each login and adapt accordingly.","hyperlink":"https:\/\/www.onelogin.com\/product\/multi-factor-authentication","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"83","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1861","product_name":"OneLogin Single Sign-on","description":"This foundational identity and access management (IAM) measure is a first step in building trusted experiences for your workforce, customers, and partners. OneLogin's policy-driven password security, multi-factor authentication, and context aware access management ensure that only authorized users get access to sensitive data.","hyperlink":"https:\/\/www.onelogin.com\/product\/sso","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"83","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1871","product_name":"OneLogin Smart Factor Authentication","description":"Standard multi-factor authentication (MFA) uses static rules requiring users to authenticate every time they log into an application. However, this can impact the user experience and does not always effectively protect an organization from more advanced threats like spear-phishing and brute force attacks.\n\nAs part of our Trusted Experience Platform\u2122, SmartFactor Authentication leverages our Vigilance AI\u2122 risk score to dynamically adjust authentication requirements in real-time based on the level of risk for each login, balancing security with usabil","hyperlink":"https:\/\/www.onelogin.com\/product\/smartfactor-authentication","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"83","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1868","product_name":"OneLogin Social Login","description":"Allows customers to login using identification via Google, Facebook, LinkedIn, and other social sites. Uses either SAML or OpenID Connect.","hyperlink":"https:\/\/www.onelogin.com\/product\/ciam#social-login","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"83","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1869","product_name":"OneLogin User Management","description":"User management and identity operations can be complex and labor-intensive, especially at the massive scale common in the CIAM world. OneLogin abstracts the complexity away from managing users, configuring access policies, layering security, and even migrating from existing identity platforms.","hyperlink":"https:\/\/www.onelogin.com\/product\/ciam#user-management","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"83","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1867","product_name":"OneLogin User Provisioning","description":"Manual user management is error-prone and labor intensive. Leveraging automated user provisioning with onboarding and offboarding processes to reduce human involvement and streamline access control based on role, department, location, title and other attributes. Changes in Active Directory are synchronized to downstream applications within seconds, providing you with an effective user kill switch that can help minimize exposure.","hyperlink":"https:\/\/www.onelogin.com\/product\/vldap","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"83","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1872","product_name":"OneLogin Vigilance AI","description":"Powered by artificial intelligence and machine learning, Vigilance AI analyzes large volumes of data from first- and third-party sources to identify anomalies and prevent threats across your users and applications.\n\nVigilance AI leverages User and Entity Behavior Analytics (UEBA) capabilities to build a profile of typical user behavior and subsequently identify anomalies and prevent risk in real-time for advanced threat defense.","hyperlink":"https:\/\/www.onelogin.com\/product\/vigilance-ai","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"83","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1866","product_name":"OneLogin Virtual LDAP","description":"OneLogin VLDAP eliminates the need to run LDAP servers. It adds an LDAP interface to OneLogin's cloud directory, yielding a high availability, scalable LDAP service. It is integrated with OneLogin OTP as part of the OneLogin Trusted Experience Platform\u2122, bringing secure multifactor authentication to LDAP.","hyperlink":"https:\/\/www.onelogin.com\/product\/vldap","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"83","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2031","product_name":"Oracle Advanced Analytics","description":"Empowers data and business analysts to extract knowledge, discover new insights and make predictions\u2014working directly with large data volumes in the Oracle Database","hyperlink":"https:\/\/www.oracle.com\/business-analytics\/","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"46","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2021","product_name":"Oracle Analytics","description":"Empowers customers with industry-leading, AI-powered, self-service analytics capabilities for data preparation, visualization, enterprise reporting, augmented analysis, and natural language processing","hyperlink":"https:\/\/www.oracle.com\/business-analytics\/","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"46","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1594","product_name":"Oracle Configuration and Compliance","description":"Oracle Configuration and Compliance (OCC) Cloud Service is an integrated security configuration and compliance management solution to monitor, assess, and remediate misconfigurations and compliance violations.","hyperlink":"https:\/\/www.oracle.com\/cloud\/configuration-compliance.html","td_contact":"spi@dlt.com","td_extension":"703-773-9221","vendor_id":"46","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2068","product_name":"Oracle CRM","description":"Complete CRM solutions offer the broadest and deepest capabilities that help organizations drive sales, marketing, loyalty, and service effectiveness","hyperlink":"https:\/\/www.oracle.com\/crmondemand\/","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"46","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1990","product_name":"Oracle Database","description":"A multi-model database management system produced and marketed by Oracle Corporation. It is a database commonly used for running online transaction processing, data warehousing and mixed database workloads","hyperlink":"https:\/\/docs.oracle.com\/cd\/B19306_01\/server.102\/b14220\/intro.htm","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"46","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2057","product_name":"Oracle Spatial & Graph","description":"Includes high performance, enterprise-scale, commercial spatial and graph database and analytics for Oracle Database 18c, in the cloud and on premises. It supports enterprise business, business intelligence, large-scale Geographic Information Systems, and location services applications","hyperlink":"https:\/\/www.oracle.com\/technetwork\/database\/options\/spatialandgraph\/overview\/spatialandgraph-1707409.html","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"46","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"332","product_name":"Orchestrate","description":"Commvault Orchestrate allows customers to extend the value of their data sitting in secondary storage. Secondary copies of data can now be used for accelerating development\/test routines or performing data migrations. Operations that were previously manual can now be orchestrated and automated, saving valuable time and money.","hyperlink":"https:\/\/www.commvault.com\/orchestrate","td_contact":"Software-Sales@techdata.com","td_extension":"(800)-237-8931 x5683326","vendor_id":"16","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,9,10,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61"},{"product_id":"514","product_name":"PAM - Privileged Access Management","description":"All in one solution for least privileged management, threat intelligence, application control. Features the following - Secure vault (encrypted, centralized), discover privileges (full view of all accounts), managed secrets (password complexity and rotation), delegate access (RBAC, access request workflow), control sessions (monitoring and recordings). On-premise or Cloud with choice of standard or premium support and distributed engine capability.","hyperlink":"https:\/\/www.ilantus.com\/products\/compact-identity\/privilege-access-management\/","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"(305) 593-5000","vendor_id":"36","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"4","country_name":"LATIN AMERICA","parint_id":"0","type":"0","country":"4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60"},{"product_id":"542","product_name":"Password Manager","description":"Gives you easy access to your accounts, plus a secure digital vault for your passport, driver\u2019s license, bank cards & other personal data.","hyperlink":"https:\/\/usa.kaspersky.com\/password-manager","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,9,10,39,51,60"},{"product_id":"1158","product_name":"Password Manager","description":"Trend Micro Password Manager handles all the basics. It captures passwords as you log in, plays them back when needed, and offers a browser menu of all your saved logins. It keeps secure notes for you, and helps you fill Web forms. It even offers a secure browser for your financial sites.","hyperlink":"https:\/\/www.trendmicro.com\/en_us\/forHome\/products\/password-manager.html","td_contact":"trendmicro@techdata.com","td_extension":"800-237-8931 ext. 5545035","vendor_id":"66","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,85,86,88,89"},{"product_id":"1898","product_name":"Password Safe","description":"- Scan, identify and profile all assets and applications with auto-onboarding of privileged accounts\n - Store, manage and rotate privileged account passwords, eliminating embedded credentials and ensuring password strength\n - Log and monitor all privileged credential activity and sessions for compliance and forensic review","hyperlink":"https:\/\/www.beyondtrust.com\/password-safe","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"94","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1697","product_name":"Patch Management Solution","description":"Manage patches and software updates by automating the collection, analysis, and delivery processes across your enterprise.","hyperlink":"https:\/\/support.broadcom.com\/security\/product-page.html?productName=Patch%20Management%20Solution%20for%20Windows","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"860","product_name":"Patch Manager","description":"Intuitive patch management software for quickly addressing software vulnerabilities","hyperlink":"https:\/\/www.solarwinds.com\/patch-manager","td_contact":"solarwindssoftware@techdata.com","td_extension":"1-800-237-8931 ext. 5540493","vendor_id":"55","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61"},{"product_id":"1088","product_name":"PCI Audit","description":"PCI compliance audit is a routine audit required of merchants that process credit card transactions to make sure that they are compliant with the Payment Card Industry Data Security Standard (PCI DSS) set up by various credit card companies. This service examines the customer\u2019s environment, identifies vulnerabilities in order to prevent data from being compromised as it relates to a customer's point of sale system and delivers a detailed risk assessment report and guides customers to address problem areas that will improve data security. This service gives companies that must comply with the Payment Card Industry Data Security Standard (PCI DSS) a risk assessment that shows them where they stand in terms of PCI compliance.","hyperlink":"https:\/\/tdcontent.techdata.com\/techsolutions\/security\/Services.aspx","td_contact":"SecurityServices@TechData.com","td_extension":"800-237-8931 ext. 5540508","vendor_id":"62","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1729","product_name":"Penetration Testing","description":"Real world simulation of how an attacker would gain access to a customer network. This service leverages both technical and social engineering penetration testing techniques that an attacker may leverage in order to penetrate the customer's network. A report is generated and delivered to the customer that details how our attack penetrated the network. Not only does this service help our partners identify new security solutions opportunities, it also lays a path to help the customer on their security posture maturity.","hyperlink":"https:\/\/tdcontent.techdata.com\/techsolutions\/security\/Services.aspx","td_contact":"SecurityServices@TechData.com","td_extension":"800-237-8931 ext. 5540508","vendor_id":"62","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2007","product_name":"Pentaho","description":"Enables stream data ingestion and processing using its native engine or Spark","hyperlink":"https:\/\/www.hitachivantara.com\/en-us\/products\/data-management-analytics\/pentaho-platform.html","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"107","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2023","product_name":"Pentaho Business Analytics","description":"Empower users to visualize and analyze data and embed analytics in everyday workflows with minimal IT support","hyperlink":"https:\/\/www.hitachivantara.com\/en-us\/products\/data-management-analytics\/pentaho-platform\/pentaho-business-analytics.html","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"107","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1977","product_name":"Pentaho Data Integration (PDI)","description":"A part of the Pentaho Open Source Business intelligence suite. It includes software for all aspects of supporting business decision making: the data warehouse managing utilities, data integration and analysis tools, software for managers, and data mining tools","hyperlink":"https:\/\/www.hitachivantara.com\/en-us\/products\/data-management-analytics\/pentaho-platform\/pentaho-data-integration.html","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"107","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2044","product_name":"Pentaho Machine Learning","description":"Pentaho Data Integration and analytics platform ends the 'gridlock' associated with machine learning","hyperlink":"https:\/\/www.hitachivantara.com\/en-us\/pdf\/datasheet\/pentaho-machine-learning-orchestration-datasheet.pdf","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"107","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2033","product_name":"Pentaho Machine Learning w\/ML Ochestration","description":"The Pentaho platform from Hitachi Vantara streamlines your entire machine learning workflow and enables teams of data scientists, engineers and analysts to train, tune, test and deploy predictive models","hyperlink":"https:\/\/www.hitachivantara.com\/en-us\/video\/pentaho-orchestrating-machine-learning-workloads.html","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"107","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2066","product_name":"Pentaho Machine Learning w\/ML Orchestration","description":"Streamlines the entire machine learning workflow and enables teams of data scientists, engineers and analysts to train, tune test and deploy predictive models.","hyperlink":"https:\/\/www.predictiveanalyticstoday.com\/pentaho-orchestration-streamlines-machine-learning-workflow\/","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"107","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"333","product_name":"Perch Security","description":"Co-managed threat detection and response solution","hyperlink":"https:\/\/www.connectwise.com\/platform-integrations\/security\/perch","td_contact":"Connectwisesecurityus@techdata.com","td_extension":"(727) 539-7249 ext. 5540517","vendor_id":"17","service_tiering":"No tiering. Monthly subscription, based on user count. Including network threat detection, SIEM, O365 & GSuite Monitoring.","partner_benefits":"

1.    <\/span>US Based SOC 24x7x365<\/p>\n

2.    <\/span>Become an “MSSP” without the cost or lengthy implementation<\/p>\n

3.    <\/span>Create a predictable revenue stream for you, and reliable cost structure for your client<\/p>\n

4.    <\/span>Build loyalty: Use the threat activity Perch finds on customer networks as new opportunities to validate their investment in your services.<\/p>\n

5.    <\/span>SIEM features: Perch’s log aggregation adds valuable context to network activity, and helps customers meet compliance requirements.<\/p>\n

6.    <\/span>Protect your house:Install Perch and secure your own network <\/p>\n

7.    <\/span>Integrations with ConnectWise, AWS, G Suite, Microsoft, Cisco, Webroot, Bitdefender, Carbon Black, and many more.<\/p>\n

8.    <\/span>Perch is hosted in AWS in the US<\/p>\n

9.    <\/span>Access to Security Analyst team any time of the day<\/p>\n

10.    <\/span>Reoccurring alert reviews with SOC - Increase partners security skillset<\/p>\n

11.    <\/span>Unlimited professional service hours<\/p>","typeof_service":"MSSP Turn-Key Solution: People, Processes and Technology (An MSP can plug this solution into their offerings without much effort or investment) and can also be purchased as an MSSP Building Block Solution: Component used by partner to build a Monthly Recurring Revenue (MRR) managed service.","end_user_benefits":"

1.    <\/span>Reliable cost structure <\/p>\n

2.    <\/span>Helps customers meet compliance requirements. (HIPAA, GLBA, NIST SP\/CSF) <\/p>\n

3.    <\/span>Executive and compliance driven scheduled reporting - Compliance reports are mapped to specific standards<\/p>\n

4.    <\/span>Unlimited log sources offers best practices <\/p>\n

5.    <\/span>Automate threat intelligence<\/p>","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1159","product_name":"Phish Insight","description":"Trend Micro provides this security awareness service to help your organization resist online scams. We are committed to making our connected world a safer place and are offering our simulation tool for free to ensure your organization is equipped to handle the latest cyber threats. Phish Insight lets you test and educate your employees on how to spot phishing and avoid attacks. Find out what could happen to your organization before the bad guys try.","hyperlink":"https:\/\/phishinsight.trendmicro.com\/en\/","td_contact":"trendmicro@techdata.com","td_extension":"800-237-8931 ext. 5545035","vendor_id":"66","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,85,86,88,89"},{"product_id":"1698","product_name":"Phishing Readiness","description":"Improve your employees\u2019 recognition and reporting of phishing attacks so they are better equipped as your first line of defense.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/web-and-email\/messaging\/phishing-readiness","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1264","product_name":"Phishline","description":"With PhishLine, you guard against every facet of social-engineering threats with continuous simulation and training for employees. Expose them to the latest attack techniques, and teach them to recognize the subtle clues and help stop email fraud, data loss, and brand damage. Embed learning into your everyday business processes with customized simulations that test and reinforce good behavior.\n\nPhishLine helps you guard against a range of threats with patented, highly-variable attack simulations for multiple vectors, including phishing, smishing, vishing, and found physical media.","hyperlink":"https:\/\/www.barracuda.com\/products\/phishline","td_contact":"barracuda@Techdata.com","td_extension":"(800)-237-8931 x5540427","vendor_id":"4","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1731","product_name":"Physical Penetration Testing","description":"A physical penetration assessment will evaluate how well the environment resists physical attack. By locating and exploiting vulnerabilities in physical security controls, technology, and personnel (also known as Social Engineering) the assessment team will attempt to gain access to pre-determined physical locations and capture approved evidence of compromise","hyperlink":"https:\/\/tdcontent.techdata.com\/techsolutions\/security\/Services.aspx","td_contact":"SecurityServices@TechData.com","td_extension":"800-237-8931 ext. 5540508","vendor_id":"62","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2083","product_name":"Planning Analytics","description":"A business performance management software suite designed to implement collaborative planning, budgeting and forecasting solutions, interactive \"what-if\" analyses, as well as analytical and reporting applications","hyperlink":"https:\/\/www.ibm.com\/products\/planning-analytics","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1506","product_name":"Policy Auditor","description":"McAfee Policy Auditor automates IT audits to help you easily meet industry security compliance requirements and save time.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/policy-auditor.html","td_contact":"Tech Data: mcafee@techdata.com\n

DLT: spi@dlt.com<\/p>","td_extension":"Tech Data: 800-237-8931\n

DLT: 703-773-9231<\/p>","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1908","product_name":"Policy Optimizer","description":"Automates the change review process and streamlines rule justification and clean-up efforts to optimize performance and ensure continuous compliance with internal and external standards.","hyperlink":"https:\/\/www.firemon.com\/products\/policy-optimizer\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"96","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1907","product_name":"Policy Planner","description":"Comprehensive rule lifecycle management to manage and automate change management. Workflows can be customized and automated to conform to meet security goals and standards","hyperlink":"https:\/\/www.firemon.com\/products\/policy-planner\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"96","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1851","product_name":"Polymorphing - Embedded\/IOT","description":"Polymorphing provides a unique security offering that enables diversity of the source code inside your products. Even if one of your products is compromised, the rest will still be safe, massively limiting damage and exposure.\n\nPolymorphing scrambles the source code at the binary level. By replacing your compiler with the Polyverse compiler, this code can be deployed individually or in batches ensuring enough diversity to protect your product from unwanted attacks.","hyperlink":"https:\/\/polyverse.com\/products\/polymorphing-embedded-iot\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"81","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1850","product_name":"Polymorphing - Linux","description":"Polymorphing Linux OS immediately protects against 100% of all memory-based vulnerabilities, removing the race to patch and stopping attacks before they start.","hyperlink":"https:\/\/polyverse.com\/products\/polymorphing-linux-security\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"81","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1852","product_name":"Polyscripting","description":"Polyscripting takes a vulnerable server-side language and changes the grammar by adding uniqueness to the keywords. With a unique interpreter and a way to transform the code into the matching polyscripted version, your program now has its very own distinct language. Any maliciously injected code will not be recognized by your application and will result in a syntax error","hyperlink":"https:\/\/polyverse.com\/products\/php-security-polyscripting\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"81","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1992","product_name":"PostgeSQL","description":"An open source database that has a strong reputation for its reliability, flexibility, and support of open technical standards","hyperlink":"https:\/\/www.ibm.com\/cloud\/databases-for-postgresql","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2022","product_name":"Power BI","description":"A business analytics service that aims to provide interactive visualizations and business intelligence capabilities with an interface simple enough for end users to create their own reports and dashboards","hyperlink":"https:\/\/powerbi.microsoft.com\/en-us\/","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"43","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"807","product_name":"Premium Threat Information Service (PTIS)","description":"Proofpoint Premium Threat Information Service (PTIS) enables\nyou to prioritize security decisions by providing you with\na deeper situational understanding of the ongoing threat\nlandscape.","hyperlink":"","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 632","vendor_id":"48","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,65,71"},{"product_id":"561","product_name":"Prevention","description":"Malwarebytes offers two endpoint protection platforms featuring seven layers of technology, driven by the industry's best-informed telemetry, to protect your endpoints against known and unknown threats.","hyperlink":"https:\/\/www.malwarebytes.com\/business\/products\/","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"40","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"1299","product_name":"Private ThreatCloud","description":"Check Point Private ThreatCloud\u2122 enables organizations to maintain the highest security posture in air-gapped environments by providing real-time product updates and access to intelligence feeds. This system ensures absolute privacy with one-way data syncing, ensuring no data or queries exit the defined perimeter.","hyperlink":"https:\/\/www.checkpoint.com\/products\/private-threatcloud\/","td_contact":"checkpoint@techdata.com","td_extension":"800-237-8931 x5545036","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1285","product_name":"Privilege Elevation Service","description":"Centrify Privilege Elevation Service minimizes the risk exposure to cyber-attacks caused by individuals with too much privilege. The service allows customers to implement just enough, just-in-time privileged access best practices and in turn limiting potential damage from security breaches.","hyperlink":"","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"11","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1287","product_name":"Privilege Threat Analytics Service","description":"Cyber adversaries are getting more and more sophisticated and therefore it is best practice to apply multiple security layers when protecting against privileged access abuse. Today\u2019s threatscape requires security controls to be adaptive to the risk-context and to use machine learning to carefully analyze a privileged user\u2019s behavior. Leveraging Centrify Privilege Threat Analytics Service can make the difference between falling victim to a breach or stopping it in its tracks.","hyperlink":"","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"11","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1283","product_name":"Privileged Access Service","description":"Cloud-ready Zero Trust Privilege is designed to handle the rudimentary use case of privileged access management (PAM), which lies in granting access to privileged user accounts via a shared account, password or applications password and secrets vault, as well as securing remote access. Centrify Privileged Access Service allows for all the above as well as secure administrative access via jump box, workflow-driven access requests and approvals as well as multi-factor-authentication (MFA) at the vault.","hyperlink":"https:\/\/www.centrify.com\/privileged-access-management\/privileged-access-service\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"11","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"705","product_name":"Privileged Account Manager\u00a0","description":"Enables IT administrators to work on systems without exposing credentials","hyperlink":"https:\/\/www.netiq.com\/products\/privileged-account-manager\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,63,65,67,68,69,70,71,74,75,76,77,80,81,84"},{"product_id":"1897","product_name":"Privileged Remote Access","description":"- Give contractors and vendors privileged access to critical assets without giving them a VPN.\n - Satisfy internal and external compliance requirements with comprehensive audit trails and session forensics","hyperlink":"https:\/\/www.beyondtrust.com\/remote-access","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"94","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1258","product_name":"Professional","description":"Essentials + Threat Detection & Incident Management, including 24\/7 security monitoring and threat intelligence","hyperlink":"","td_contact":"Tech Data: enterprisecloudsales@techdata.com\n

DLT: spi@dlt.com<\/p>","td_extension":"DLT: 703-773-9239","vendor_id":"2","service_tiering":"No Tiering. Monthly subscription based on node count","partner_benefits":"

\u2022  Expands your portfolio capability with  innovative threat detection and response, as a service: platform, intelligence, experts<\/p>\n

\u2022  Cross-sell other security Product<\/p>\n

\u2022  Wrap 24\/7 threat detection, monitoring and response into your service offering to help resource-constrained customers improve their security and compliance posture <\/p>\n

\u2022  24\/7 SOC services \u2013 customer SLA 15 minutes or augment your own soc services<\/p>\n

\u2022  Predictable, recurring revenue model with high margin contribution<\/p>","typeof_service":"

Managed Security Service Turn-Key Solution: <\/strong> People, Processes and Technology (An MSP can plug this solution into their offerings without much effort or investment)<\/p>","end_user_benefits":"

Security Platform<\/strong><\/p>\n

\u2022  Threat monitoring and visibility<\/p>\n

\u2022  Intrusion detection<\/p>\n

\u2022  Security analytics<\/p>\n

\u2022  Log collection and monitoring<\/p>\n

\u2022  Office 365 log collection and search<\/p>\n

\u2022  Azure Event Hubs integration<\/p>\n

\u2022  AWS user behavior anomaly detection<\/p>\n

Threat Intelligence<\/strong><\/p>\n

\u2022  Security analytics<\/p>\n

\u2022  Event insights and analysis<\/p>\n

\u2022  Threat frequency, severity, and status intelligence<\/p>\n

\u2022  Attack prevention capabilities<\/p>\n

\u2022  Continuously advancing intelligence informed by machine and behavioral analytics<\/p>\n

Expert Defenders<\/strong><\/p>\n

\u2022  24\/7 SOC with incident management, escalation, and response support<\/p>","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"543","product_name":"Professional Services","description":"Extract the maximum benefit from your Kaspersky Lab security solutions","hyperlink":"https:\/\/www.kaspersky.com\/enterprise-security\/aws-hybrid-cloud-security","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,9,10,39,51,60"},{"product_id":"1241","product_name":"Prolexic Routed","description":"Fastest DDoS Mitigation of Terabit Scale Attacks","hyperlink":"https:\/\/www.akamai.com\/us\/en\/products\/security\/prolexic-solutions.jsp","td_contact":"akamaius@techdata.com","td_extension":"(800)-237-8931 x5540426","vendor_id":"1","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"815","product_name":"Proofpoint Meta","description":"A people-centric solution, Meta ensures employees, contractors and partners have zero-trust, identity based access to enterprise resources in the datacenter and any cloud.","hyperlink":"https:\/\/www.proofpoint.com\/us","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 640","vendor_id":"48","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,65,71"},{"product_id":"987","product_name":"Protection Suite Enterprise Edition","description":"Secure your endpoint and email infrastructure with advanced protection against complex malware, data loss and spam threats.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/protection-suite-enterprise-edition-en","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1924","product_name":"Provisioning and Lifecycle Management","description":"Idaptive Provisioning and Lifecycle Management solution provides an easy way to route application access requests, create application accounts, manage entitlements for those accounts, and revoke access when necessary. Users can request access to applications from the Idaptive App Catalog, and gain permissions based on roles","hyperlink":"https:\/\/www.idaptive.com\/product\/provisioning-and-lifecycle-management\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"99","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1931","product_name":"Pulse Access Suite Advanced Plus","description":"\u2022 Network and cloud SSO\n\u2022 Mobile VPN and MDM for BYOD\n\u2022 Network endpoint and IoT device\ndiscovery, profiling, tracking\n\u2022 Centralized visibility and management\n\u2022 Network access control for guest,\nprivileged and service users\n\u2022 Endpoint and IoT device enforcement\n\u2022 Network access segmentation\n\u2022 Anomaly detection and response\n\u2022 Automated ecosystem threat response\n\u2022 Optimal Gateway Selection\n\u2022 Flexible license management","hyperlink":"https:\/\/www.pulsesecure.net\/products\/pulse-access-suite-plus\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"101","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1932","product_name":"Pulse Access Suite Enterprise Plus","description":"\u2022 Network and cloud SSO\n\u2022 Mobile VPN and MDM for BYOD\n\u2022 Network endpoint and IoT device\ndiscovery, profiling, tracking\n\u2022 Centralized visibility and management\n\u2022 Network access control for guest,\nprivileged and service users\n\u2022 Endpoint and IoT device enforcement\n\u2022 Network access segmentation\n\u2022 Anomaly detection and response\n\u2022 Automated ecosystem threat response\n\u2022 Optimal Gateway Selection\n\u2022 Flexible license management\n\u2022 SLA-based performance\n\u2022 High availability\n\u2022 Emergency capacity\n\u2022 Disaster recovery","hyperlink":"https:\/\/www.pulsesecure.net\/products\/pulse-access-suite-plus\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"101","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1930","product_name":"Pulse Access Suite Essential Plus","description":"\u2022 Network and cloud SSO\n\u2022 Mobile VPN and MDM for BYOD\n\u2022 Network endpoint and IoT device\ndiscovery, profiling, tracking\n\u2022 Centralized visibility and management","hyperlink":"https:\/\/www.pulsesecure.net\/products\/pulse-access-suite-plus\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"101","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1936","product_name":"Pulse Cloud Secure","description":"Provides anytime access to multi-cloud environments. Out of the box features, like single sign-on (SSO), eliminate workers\u2019 need for multiple passwords and provide automatic access to applications and service.\n\nCloud Secure inter-operates with third party identity and access management (IAM) vendor. Host-checking capabilities assess the status and health of the user\u2019s devices.\nCan secure O365 and SaaS apps, i.e. Salesforce and Box","hyperlink":"https:\/\/www.pulsesecure.net\/products\/cloud-secure\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"101","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1935","product_name":"Pulse Connect Secure (VPN)","description":"Pulse Connect Secure provides\na seamless, cost-effective, SSL\nVPN solution for remote and\nmobile users from any webenabled\ndevice to corporate\nresources\u2014 anytime,\nanywhere.","hyperlink":"https:\/\/www.pulsesecure.net\/products\/pulse-connect-secure\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"101","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1933","product_name":"Pulse One Manager","description":"- Web-based console with drill-down monitoring dashboards \n- Context-aware visibility and on-demand reporting of appliances, mobile, and IoT devices\n- Automated software configuration and disaster recovery through backup and restoration of appliance configurations\n- Deployment options include SaaS, virtual, or appliance\n- Group-based policy management of appliances and endpoints","hyperlink":"https:\/\/www.pulsesecure.net\/products\/pulse-one\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"101","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1937","product_name":"Pulse Policy Secure (NAC)","description":"Role based policy enforcement for pre and post policy management and profiling capabilities.","hyperlink":"https:\/\/www.pulsesecure.net\/products\/pulse-policy-secure-nac\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"101","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1934","product_name":"Pulse SDP","description":"Dual-mode VPN and SDP solution that enables employees and guests to quickly access the applications and resources, while administrators can define detailed policy rules that govern the applications users can access.","hyperlink":"https:\/\/www.pulsesecure.net\/products\/pulse-sdp\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"101","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2045","product_name":"Pulse Video Analytics","description":"Makes videos easy to find and consume based on what's spoken and who's speaking. An easy-to-use browser-based interface for managing content makes it easy for end users to transform videos without training or administrative assistance","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/video\/mxe-3500-series-media-experience-engines\/index.html","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1941","product_name":"Pulse Workspace","description":"Mobile Device Management and Mobile Application Management","hyperlink":"https:\/\/www.pulsesecure.net\/products\/pws\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"101","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"795","product_name":"Pwnie Pulse","description":"Pwine Pulse discovers, inventories, and classifies all IT and IoT devices, building a comprehensive identity for each device. Device discovery and classification is performed on a continual basis, without the need for agents or network changes.","hyperlink":"https:\/\/www.pwnieexpress.com\/iot-security","td_contact":"pwnieexpress@techdata.com","td_extension":"","vendor_id":"47","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1595","product_name":"Pwnie Pulse","description":"Pwine Pulse discovers, inventories, and classifies all IT and IoT devices, building a comprehensive identity for each device. Device discovery and classification is performed on a continual basis, without the need for agents or network changes.","hyperlink":"https:\/\/www.pwnieexpress.com\/iot-security","td_contact":"pwnieexpress@techdata.com","td_extension":"","vendor_id":"73","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"471","product_name":"QRadar","description":"The IBM QRadar Security Intelligence Platform, with SIEM at the core, provides security teams with the visibility and analytics needed to quickly and accurately detect, prioritize, investigate and respond to threats across on-premises and cloud-based environments.","hyperlink":"https:\/\/www.ibm.com\/security\/security-intelligence\/qradar","td_contact":"West: Rick.Marshall@techdata.com\n

East: Karen.Bailey@techdata.com<\/p>","td_extension":"West: (480) 254-4420\n

East: (678) 642-3446<\/p>","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,5,7,10,11,13,15,17,85,86,87,88,90,91"},{"product_id":"1448","product_name":"Qradar Incident Forensics","description":"IBM\u00ae QRadar\u00ae Incident Forensics allows you to retrace the step-by-step actions of a potential attacker and quickly and easily conduct an in-depth forensics investigation of suspected malicious network security incidents. It reduces the time it takes security teams to investigate QRadar offense records, in many cases from days to hours\u2014or even minutes. It can also help you remediate a network security breach and prevent it from happening again. IBM QRadar Packet Capture appliances are also available to store and manage data if no other network packet capture (PCAP) device is deployed.","hyperlink":"https:\/\/www.ibm.com\/us-en\/marketplace\/ibm-qradar-incident-forensics","td_contact":"West: Rick.Marshall@techdata.com\n

East: Karen.Bailey@techdata.com<\/p>","td_extension":"West: (480) 254-4420\n

East: (678) 642-3446<\/p>","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"477","product_name":"Qradar Network Insights","description":"Attackers can't hide on your network with IBM\u00ae QRadar\u00ae Network Insights. Security teams are flooded with security log activity every day, but inspecting those logs does not always generate the level of insight required to detect modern threats. They are eager to find additional methods to provide more accurate threat detection. QRadar Network Insights analyzes network data in real-time to uncover an attacker\u2019s footprints and expose hidden security threats in many scenarios before they can damage your organization, including: phishing e-mails, malware, data exfiltration, lateral movement, DNS and other application abuse, and compliance gaps.","hyperlink":"https:\/\/www.ibm.com\/us-en\/marketplace\/real-time-threat-identification","td_contact":"West: Rick.Marshall@techdata.com\n

East: Karen.Bailey@techdata.com<\/p>","td_extension":"West: (480) 254-4420\n

East: (678) 642-3446<\/p>","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,5,7,10,11,13,15,17,85,86,87,88,90,91"},{"product_id":"1459","product_name":"Qradar on Cloud","description":"IBM QRadar SIEM provides centralized visibility, \nthreat detection and pre-built reporting capabilities \nto help organizations effectively manage compliance \nwith far less manual effort than competitive \nsolutions.","hyperlink":"","td_contact":"West: Rick.Marshall@techdata.com\n

East: Karen.Bailey@techdata.com<\/p>","td_extension":"West: (480) 254-4420\n

East: (678) 642-3446<\/p>","vendor_id":"35","service_tiering":"Tiering discount at certain Events Per Second (EPS) level. Upfront, annual, quarterly and monthly billing supported for EPS and other pricing metrics.","partner_benefits":"

\u2022  IBM QRadar on Cloud provides the lowest TCO of any SIEM soluton for MSSPs.  The QRadar Security Intelligence platform empoweres MSSPs to offer a number of different managed service offerings to drive multiple revenue streams including:<\/p>\n

   -  Log Management<\/p>\n

   -  Managed SIEM and Advance Threat Detection<\/p>\n

   -  Risk Vulnerability Management<\/p>\n

   -  Compliance Management<\/p>\n

   -  Insider Threat<\/p>\n

   -  Cloud Security and Monitoring<\/p>\n

\u2022   IBM Security supports multiple partnering models for MSSPs including IBM Embedded Solution Agreement which enables MSSPs to retain entitlement of software and sell a service, achieving a pure OPEX model for their clients.  IBM Channel Value Rewards provides higher margin for initial license sales and ongoing renewals.<\/p>","typeof_service":"

Managed Security Service Building Block Solution:<\/strong>  Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":"

\u2022  External and internal threat and malware detection <\/p>\n

\u2022   Compliance reporting  <\/p>\n

\u2022  Built in integrations to third-party security tools  <\/p>\n

\u2022   Reduction in point devices across network  <\/p>\n

\u2022   Cloud implementation provides easy implementation and quick time to value.<\/p>","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2024","product_name":"QuickSight","description":"A fast, cloud-powered business intelligence service that makes it easy to deliver insights to everyone in your organization. As a fully managed service, QuickSight lets you easily create and publish interactive dashboards that include ML Insights","hyperlink":"https:\/\/aws.amazon.com\/quicksight\/","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"110","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"823","product_name":"RangeForce CyberSkills Platform","description":"The RangeForce CyberSkills Training Platform will engage your team in hands-on lessons that teach how to detect and respond to the latest cyber threats and system vulnerabilities. A cloud-based, on-demand, SaaS environment that includes dvanced training features like attack bots that recreate real-life targeted cyberattacks, an integrated gaming engine, learning paths that match security roles, a virtual teaching assistant that provides timely support, and comprehensive reporting dashboards quickly and accurately identify individual and team skill levels and competencies.","hyperlink":"https:\/\/rangeforce.com\/","td_contact":"RangeForceUS@TechData.com","td_extension":"(727) 539-7249 ext 5540516","vendor_id":"49","service_tiering":"The platform is sold as a monthly subscription single-tier per user with access to all training modules. CyberSiege blue and red team exercises are sold separately and cost $20,000 per exercise.","partner_benefits":"1) Offers a way to train up clients on the skills they must have to compliment the MSP serves (for example how to go into the CLI and clean up an infected server. 2) Offers a way for MSP clients to assess their people's skills and assess the skills of new hires. 3) Offers and affordable and consumable way to train.","typeof_service":"MSSP Turn-Key Solution: People, Processes and Technology (An MSP can plug this solution into their offerings without much effort or investment)","end_user_benefits":"1) Hands-on simulation training allows learners to build and practice critical skills needed for career success. 2) Allows junior IT and Security folks to get up to speed quickly and cost-efficiently. 3) Allow managers to understand the skills of their team and improve them.","mssp_available":"1","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1917","product_name":"Rebuild API","description":"Glasswall\u2019s Rebuild API regenerates safe, clean and visually identical files in seconds. Hosted on either a dedicated or shared customer environment Rebuild API is available on all AWS data centres globally.","hyperlink":"https:\/\/glasswallsolutions.com\/rebuild-api\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"98","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1916","product_name":"Rebuild for E-mail","description":"Rebuild for Email ensures only clean, safe and trusted attachments enter your organisation.","hyperlink":"https:\/\/glasswallsolutions.com\/rebuild-for-email\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"98","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1915","product_name":"Rebuild SDK","description":"Rebuild SDK regenerates safe, clean and visually identical files in seconds, integrating the world\u2019s most advanced CDR technology into any business process.","hyperlink":"https:\/\/glasswallsolutions.com\/rebuild-sdk\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"98","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1074","product_name":"RECON Policy - Powered by Security Colony","description":"Online subscription portal service which provides access to ready-made security policy templates that are challenging and time consuming to develop on your own.\nIt includes an extensive resource library of documents that have been developed for real world organizations that paid to have them developed and are now available to our customers at a fraction of the cost. The service also enables collaboration with a community of customers and consultants who share best practices and common challenges. It's a great way to jumpstart your customer with tested security policies and controls and it plays a critical role in helping your customer develop a solid security posture.","hyperlink":"https:\/\/tdcontent.techdata.com\/techsolutions\/security\/recon_security_suite.aspx","td_contact":"securitycolony@techdata.com\n(727) 539-7429 x-84008","td_extension":"800-237-8931 ext. 5540508","vendor_id":"62","service_tiering":"No Tiering. Annual Subscription","partner_benefits":"

\u2022  Jumpstart a security consultancy practice <\/p>\n

\u2022  Establish credibility and reputation with your clients <\/p>\n

\u2022  Upsell policy customization consulting <\/p>\n

\u2022  Subscription service delivering Monthly Recurring Revenue (MRR) <\/p>","typeof_service":"

Managed Security Services Building Block Solution: <\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":"

\u2022  Vetted Library of security policies<\/p>\n

\u2022  Assess supply chain security<\/p>\n

\u2022  Preformatted compliance material<\/p>\n

\u2022  Accessible community of contributors<\/p>","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1075","product_name":"RECON Priority - Powered by Cyr3con","description":"Provides monthly subscription services to prioritize vulnerabilities specific to an organization based on which ones hackers are most likely to exploit according to deep and dark web searches. \nUses a CyRating system to document how often a vulnerability is mentioned on the dark web as well as providing customers with supporting data to prioritize their deployed patches. \nA REST-based API is also available for consuming the threat intelligence information.","hyperlink":"https:\/\/tdcontent.techdata.com\/techsolutions\/security\/recon_security_suite.aspx","td_contact":"cyr3con@techdata.com\n(727) 539-7429 x-84008","td_extension":"800-237-8931 ext. 5540508","vendor_id":"62","service_tiering":"No Tiering. Monthly subscription","partner_benefits":"

\u2022  Subscription service delivering Monthly Recurring Revenue (MRR) <\/p>\n

\u2022  Upsell to a patch management solution<\/p>\n

\u2022  Ready made managed security service<\/p>\n

\u2022  Drives additional security opportunity<\/p>","typeof_service":"

Managed Security Services Building Block Solution: <\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":"

\u2022  Reduce breaches by prioritizing vulnerabilities <\/p>\n

\u2022  Patch management prioritization<\/p>\n

\u2022  Subscription pricing (OpEx)<\/p>\n

\u2022  Actionable step after vulnerability assessment<\/p>","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1076","product_name":"RECON Radar - Powered by Pwnie Express","description":"RECON\u2122 Radar is built for company security teams to discover, assess, and analyze all the wireless and wired devices accessing their network. Leveraging technology from Pwnie Express, RECON\u2122 Radar enables central management of wireless devices from a single cloud dashboard for scalable, continuous intelligence around BYOD across the enterprise, as well as remote and branch locations.","hyperlink":"https:\/\/tdcontent.techdata.com\/techsolutions\/security\/recon_security_suite.aspx","td_contact":"pwnieexpress@techdata.com\n(727) 539-7429 x-84008","td_extension":"800-237-8931 ext. 5540508","vendor_id":"62","service_tiering":"No Tiering. Monthly subscription","partner_benefits":"

\u2022  Uncover \"blind spots\" on customer networks <\/p>\n

\u2022  Subscription service delivering MRR<\/p>\n

\u2022  Upsell to networking projects<\/p>\n

\u2022  Assist your customers in complying with regulations<\/p>","typeof_service":"

Managed Security Services Building Block Solution: <\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":"

\u2022  Asset Discovery, Classification and Assessment<\/p>\n

\u2022  Rogue Devices and Networks<\/p>\n

\u2022  Wireless Monitoring and Control<\/p>\n

\u2022  Cloud based dashboard for complete visibility<\/p>\n

\u2022  Add Security to IoT architectures<\/p>","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1077","product_name":"RECON Range - Powered by Cloud Range","description":"A hosted cyber range providing hyper-realistic security operations training in a simulated, live-combat environment. SOC operations teams gain the necessary skills to detect and respond to sophisticated cyber attacks. Service includes fully licensed security tools (SIEM, firewall, EDR, etc) to emulate your customer\u2019s security environment. The service is subscription-based providing access to live, instructor-led sessions.","hyperlink":"https:\/\/tdcontent.techdata.com\/techsolutions\/security\/recon_security_suite.aspx","td_contact":"cyberrangecloudUS@techdata.com\n(727) 539-7429 x-84008","td_extension":"800-237-8931 ext. 5540508","vendor_id":"62","service_tiering":"No Tiering. Subscription based service with various options","partner_benefits":"

\u2022  Be a hero; solve the #1 cybersecurity challenge, the Skills Shortage<\/p>\n

\u2022  Introduce one of the most sought after services in the industry today<\/p>\n

\u2022  Limited competition<\/p>\n

\u2022  Enable and accelerate sales of other products<\/p>\n

\u2022  Significant margin opportunity<\/p>","typeof_service":"

Managed Security Services Building Block Solution: <\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":"

\u2022 Helps to solve their most critical challenge: the shortage of skilled security operations staff <\/p>\n

\u2022 Consumption and subscription pricing provide ongoing access to train on defending emerging threat vectors <\/p>\n

\u2022 Like a fighter pilot, security teams train in a hyper-realistic simulation environment using real tools <\/p>\n

\u2022 Remote access to live sessions reduce downtime <\/p>\n

\u2022 Private customized subscriptions or out of the box options<\/p>","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1078","product_name":"RECON Risk - Powered by Arx Nimbus","description":"The results from a penetration test or vulnerability assessment don\u2019t necessarily imply a level of risk to an organization unless a corresponding threat is also identified. RECON Risk provides the financial impact of cybersecurity risk. Customers can load information about their threats, risks, vulnerabilities and capabilities into a quantitative modeling tool which then advises the executive team on how to make business decisions based on the financial impact of mitigating those risks\u2026or not. It also provides what-if scenarios which show the financial impact of deciding whether to mitigate some of the exposures.","hyperlink":"https:\/\/tdcontent.techdata.com\/techsolutions\/security\/recon_security_suite.aspx","td_contact":"arxnimbus@techdata.com\n(727) 539-7429 x-84008","td_extension":"800-237-8931 ext. 5540508","vendor_id":"62","service_tiering":"No Tiering. Annual Subscription","partner_benefits":"

\u2022  Annual subscription service <\/p>\n

\u2022  Assessments drive security sales<\/p>\n

\u2022  Gain access to customer security budget <\/p>\n

\u2022  Gain trust with your customer\u2019s executive team<\/p>\n

\u2022  Prioritize customer security spending<\/p>","typeof_service":"

Managed Security Services Building Block Solution: <\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":"

\u2022  Financial Insight in Security Risk<\/p>\n

\u2022  Documented Security Compliance & Traceability<\/p>\n

\u2022  Cyber Insurance Analysis to determine target coverage           <\/p>\n

\u2022  Documents Security Risk Exposure <\/p>\n

Graphical Assessment Results <\/p>","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1080","product_name":"RECON SOC + Alert Response - Powered by StratoZen and STS International","description":"RECON SOC focuses on identification of Security Incidents and Alert Response delivers the expert response to those incidents in order to contain or immediately mitigate against cyber threat. \n\nService includes: \n(1) Remote Access to your network and systems\n(2) Expert personnel, responsible for responding to RECON SOC alerts\n(3) Perform remediation steps to contain or block outward network access","hyperlink":"","td_contact":"SecurityServices@TechData.com","td_extension":"800-237-8931 ext. 5540508","vendor_id":"62","service_tiering":"No Tiering. Monthly subscription based upon device count","partner_benefits":"

\u2022  Ability to offer end-user critical remediation assistance if there is a breach or critical security issues needs to be addressed.<\/p>\n

\u2022  Additional revenue stream without operational risk<\/p>\n

\u2022  More entanglement in an account with visibility into key IT issues<\/p>","typeof_service":"

Managed Security Services Building Block Solution: <\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":"

\u2022  Team of security professionals able to assist the end-user to immeditely mitigate against a cyber threat 24\/7.<\/p>\n

\u2022  More cost effective than hiring own personnel<\/p>\n

\u2022  Hired personnel don't have to be on call 24\/7 to handle an issue.<\/p>","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1727","product_name":"RECON SOC - Powered by StratoZen","description":"24\/7 cloud based monitoring of security infrastructure to correlate and identify threats as well as recommend remediation.","hyperlink":"https:\/\/tdcontent.techdata.com\/techsolutions\/security\/recon_security_suite.aspx","td_contact":"SecurityServices@TechData.com","td_extension":"800-237-8931 ext. 5540508","vendor_id":"62","service_tiering":"No Tiering. Monthly subscription based upon device count","partner_benefits":"

\u2022  Upsell to security products<\/p>\n

\u2022  Instant security credibility<\/p>\n

\u2022  Ready made managed security services<\/p>\n

\u2022  Subscription service delivering MRR<\/p>\n

\u2022  Partner view to customer infrastructure<\/p>","typeof_service":"

Managed Security Service Building Block Solution: <\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":"

\u2022  Outsourced security monitoring<\/p>\n

\u2022  Subsctription Pricing (OpEx)<\/p>\n

\u2022  Aggregated security event perspective<\/p>\n

\u2022  Instant security expertise<\/p>\n

\u2022  Standard 30 day try before you buy<\/p>","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1281","product_name":"Recover for Service Providers","description":"Disaster recovery in the cloud for key systems","hyperlink":"","td_contact":"carbonite@techdata.com \n(727) 539-7429 x-71458","td_extension":"800-237-8931 x5540414","vendor_id":"10","service_tiering":"Tiered pricing. Monthly subscription per connection.","partner_benefits":"

\u2022   Minimal customization needs<\/p>\n

\u2022   Centralized, web-based console<\/p>\n

\u2022   Built-in multi-tenancy<\/p>\n

\u2022   Push button reverse back to original or replacement server<\/p>\n

\u2022 Lower TCO:<\/p>\n

     - N:1 \u2013 only target appliance running during protection<\/p>\n

     - Allows for customer self-service<\/p>\n

     - More automation for discovery, installs, and provisioning<\/p>\n

\u2022   White label capabilities to align with your go-to-market plans and branding<\/p>","typeof_service":"

Managed Security Service Building Block Solution:<\/strong>  Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":"

\u2022  Continuous replication for failover of customer workloads<\/p>\n

\u2022   Orchestration for multi-tier applications, with boot order and script points<\/p>\n

\u2022   Automated discovery of systems in customer environments and non-disruptive testing<\/p>\n

\u2022   Automated provisioning eliminates the need to manually build\/install OS and applications on recovery servers<\/p>\n

\u2022   Efficiency\u2014bandwidth optimization, volume-level exclusion rules, simplified DNS management<\/p>\n

\u2022   N:1 topology lowers costs by keeping target servers offline until they are needed<\/p>\n

\u2022   Straightforward administration with a single console, role-based access controls, and enhanced reporting<\/p>\n

\u2022   Built-in 256-bit encryption in flight and at rest<\/p>","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1167","product_name":"Recovery Series Backup Appliance","description":"Just rack, connect, and go with an all-in-one backup appliance. Sizes from SMB to enterprise.","hyperlink":"www.unitrends.com\/products","td_contact":"pmunitrends@techdata.com","td_extension":"800-237-8931 x71478","vendor_id":"67","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,10,17"},{"product_id":"1995","product_name":"Redshift","description":"A fully managed, petabyte-scale data warehouse service in the cloud that enables you to use your data to acquire new insights for your business and customers","hyperlink":"https:\/\/docs.aws.amazon.com\/redshift\/latest\/mgmt\/welcome.html","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"110","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1550","product_name":"Reflection for Secure IT\u00a0","description":"File transfer protection to control privileged users and stop persistent threats","hyperlink":"https:\/\/www.microfocus.com\/products\/reflection-secure-it\/","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"562","product_name":"Remediation","description":"Malwarebytes Incident Response is a threat detection and remediation platform that completely removes advanced threats from enterprise endpoints, both Windows and Mac.","hyperlink":"https:\/\/www.malwarebytes.com\/business\/products\/","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"40","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"1896","product_name":"Remote Support","description":"- Scalable, enterprise-grade support that keeps your business running, whether you\u2019re fixing a Linux server across the ocean or an iPhone across town \n - Reliable remote support to end-users and customers on or off a network. \n - The security of remote access tools is crucial in protecting systems from threats and meeting compliance regulations.","hyperlink":"https:\/\/www.beyondtrust.com\/remote-support","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"94","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"827","product_name":"ReSecure Endpoint","description":"The ReSecure Endpoint agent is deployed directly on end-users\u2019 computers and integrated with all common device control. Files loaded on the endpoint from external devices are intercepted and sent directly from the external device to the ReSecure platform for processing according to policy, and threat free replicas are placed in a predefined folder on the network or endpoint.","hyperlink":"https:\/\/resec.co\/resecure-endpoint\/","td_contact":"resecus@techdata.com","td_extension":"","vendor_id":"50","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"826","product_name":"ReSecure File Transfer","description":"The ReSecure File Transfer suite contains these agents\u2013 ReSecure File Server, ReSecure FTP, and ReSecure Vault. The agents constantly monitor the specified directory or folder. When a new file is identified, the agent fetches the file automatically, and transfers it to the ReSecure Engine for processing according to policy. At the end of the process, the agent can return the file to the same directory, or even forward it to another directory.","hyperlink":"https:\/\/resec.co\/resecure-file-transfer\/","td_contact":"resecus@techdata.com","td_extension":"","vendor_id":"50","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"824","product_name":"ReSecure Mail","description":"ReSecure Mail, one of the ReSecure Platform 360-degree agents, can be installed as a service in the DMZ or in the cloud and connected to the organization\u2019s mail gateway. When an email arrives the ReSecure Mail agent fetches the email, including the body and any attachments, and transfers it to the core of the ReSecure platform. The ReSecure Engine processes the email according to policy and ensures no threats reach the organization. ReSecure Mail transfers the email in real time back to the mail server for delivery to its destination.","hyperlink":"https:\/\/resec.co\/resecure-email\/","td_contact":"resecus@techdata.com","td_extension":"","vendor_id":"50","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"825","product_name":"ReSecure Safe Browsing","description":"ReSecure Safe Browsing, one of the ReSecure Platform 360-degree agents is a lightweight agent that monitors all the files being downloaded by your end-users to their personal computer via their web browser or other web services. When a user downloads a file, the ReSecure Safe Browsing\u00a0agent automatically fetches the file and sends it to the ReSecure Engine. The ReSecure Engine then processes the file according to policy to ensure that no threats reach the organization. ReSecure Safe Browsing then saves the clean replica file in the end-user\u2019s download directory.","hyperlink":"https:\/\/resec.co\/resecure-web\/","td_contact":"resecus@techdata.com","td_extension":"","vendor_id":"50","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"472","product_name":"Resilient","description":"IBM Resilient Incident Response Platform (IRP) is the leading platform for orchestrating and automating incident response processes. IBM Resilient IRP quickly and easily integrates with your organization\u2019s existing security and IT investments. It makes security alerts instantly actionable, provides valuable intelligence and incident context, and enables adaptive response to complex cyber threats.","hyperlink":"https:\/\/www.ibm.com\/us-en\/marketplace\/resilient-incident-response-platform","td_contact":"West: Rick.Marshall@techdata.com\n

East: Karen.Bailey@techdata.com<\/p>","td_extension":"West: (480) 254-4420\n

East: (678) 642-3446<\/p>","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,5,7,10,11,13,15,17,85,86,87,88,90,91"},{"product_id":"1925","product_name":"Risk Analytics","description":"Idaptive Analytics \u2014 based on user behavior \u2014 stops credential-based attacks as it serves as the heart and core that fuels Adaptive SSO and MFA. Behavior-based scoring enables a frictionless user experience that is adjusted based on risk, improving productivity \u2014 while maintaining security.","hyperlink":"https:\/\/www.idaptive.com\/product\/analytics\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"99","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1910","product_name":"Risk Analyzer","description":"Vulnerability management through real-time risk analysis and threat modeling to uncover exposures, score network risk and prioritize remediation.","hyperlink":"https:\/\/www.firemon.com\/products\/risk-analyzer\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"96","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1700","product_name":"Risk Insight","description":"Automated, cloud-based risk assessment allows you to proactively monitor and analyze your enterprise, industry, and global risks to refine and improve your security posture.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/risk-insight-en","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2080","product_name":"RPA for Healthcare Claims","description":"Robotic Process Automation solution named IQ Bot, replaces the manual process of healthcare claims. IQ Bot can be easily set up and used by business users to automatically read and process a variety of complex documents and emails faster and more efficiently. By learning from human behavior, IQ Bot becomes quicker and more accurate while reducing setup and operational costs","hyperlink":"https:\/\/www.automationanywhere.com\/solutions\/healthcare","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"115","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2067","product_name":"RPA IQ BOT","description":"Combines the power of RPA with AI technologies such as Computer Vision, Natural Language Processing (NLP), fuzzy logic and machine learning (ML) to automatically classify, extract and validate information from business documents and emails","hyperlink":"https:\/\/www.automationanywhere.com\/products\/iq-bot","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"115","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1607","product_name":"RSA Archer\u00ae Suite","description":"Recognized by Gartner\u00ae as a perennial leader for operational risk management, IT risk management, IT vendor risk management, business continuity management and GRC platform solutions. Offers the depth, breadth and adaptability you need to manage risk in multiple domains, combined with the ecosystem and track record to deliver strategic value to your organization.","hyperlink":"https:\/\/www.rsa.com\/en-us\/products\/governance-risk-and-compliance","td_contact":"rsa2@techdata.com","td_extension":"(480) 643-5064","vendor_id":"51","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"841","product_name":"RSA NetWitness UEBA","description":"UEBA, which stands for user and entity behavior analytics, is software that analyzes user activity data from logs, network traffic and endpoints and correlates this data with threat intelligence to identify activities\u2014or behaviors\u2014likely to indicate a malicious presence in your environment. It uses machine learning technology to baseline \u201cnormal\u201d behavior and get smarter over time, and applies both static rules and statistical analysis to rapidly and accurately detect suspicious activity. Using such advanced technology and statistical models, UEBA is a force multiplier for security teams struggling to stay on top of today\u2019s advanced, targeted threats.","hyperlink":"https:\/\/www.rsa.com\/en-us\/products\/threat-detection-response\/ueba","td_contact":"rsa2@techdata.com","td_extension":"(480) 643-5064","vendor_id":"51","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1609","product_name":"RSA NetWitness\u00ae Endpoint","description":"an endpoint detection and response solution that leverages unique, continuous endpoint behavioral monitoring and advanced machine learning to dive deeper into endpoints and more accurately and rapidly identify targeted, unknown and non-malware attacks that other endpoint security solutions miss entirely. With RSA NetWitness Endpoint, security teams gain the unparalleled endpoint visibility they need to more quickly detect threats they couldn\u2019t see before and investigate them more thoroughly.","hyperlink":"https:\/\/www.rsa.com\/en-us\/products\/threat-detection-response\/endpoint-security-endpoint-detection-response","td_contact":"rsa2@techdata.com","td_extension":"(480) 643-5064","vendor_id":"51","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"843","product_name":"RSA NetWitness\u00ae Logs","description":"Log management and monitoring tools like RSA NetWitness Logs are designed to address those challenges by collecting data from a wide range of sources (both on premises and in the cloud), interpreting relevant security information from this data, providing short- and longer-term retention capabilities, and applying advanced analytics to speed correlation and detection.","hyperlink":"https:\/\/www.rsa.com\/en-us\/products\/threat-detection-response\/log-management-monitoring","td_contact":"rsa2@techdata.com","td_extension":"(480) 643-5064","vendor_id":"51","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1611","product_name":"RSA NetWitness\u00ae Orchestrator","description":"Security automation and orchestration tools, also known as O&A or SOAR solutions, are designed to improve the productivity, efficiency and effectiveness of security operations centers and the analysts who work in them. As the term suggests, these tools automate routine, often time-consuming tasks, such as gathering and correlating data from disparate security systems, and they help orchestrate the incident management and incident response lifecycles. In the process, they help security teams address the staffing shortage; bring consistency, discipline and predictability to security operations; and help reduce the time it takes to detect and respond to incidents.","hyperlink":"https:\/\/www.rsa.com\/en-us\/products\/threat-detection-response\/security-automation-orchestration","td_contact":"rsa2@techdata.com","td_extension":"(480) 643-5064","vendor_id":"51","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"845","product_name":"RSA NetWitness\u00ae Platform","description":"Security information and event management (SIEM) tools were originally intended for compliance and log management. Over time, as SIEM tools became the aggregation point for security alerts, organizations began using them to detect and investigate attacks\u2014but with limited success. Log-centric SIEMs make it difficult to detect and investigate today\u2019s complex threats in a timely manner because they don\u2019t provide full visibility across an enterprise. In contrast, the RSA NetWitness Platform evolved SIEM accelerates threat detection and response by providing unparalleled visibility to see threats anywhere\u2014on endpoints, across the network, in the cloud and virtual environments. In addition, it combines essential business context with automation and machine learning capabilities to help pinpoint and respond definitively to the threats that matter most.","hyperlink":"https:\/\/www.rsa.com\/en-us\/products\/threat-detection-response\/siem-security-information-event-management","td_contact":"rsa2@techdata.com","td_extension":"(480) 643-5064","vendor_id":"51","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1613","product_name":"RSA SecurID\u00ae Suite","description":"Attackers are finding ways to compromise your users\u2019 credentials every day. RSA SecurID Suite delivers the identity and access assurance you need to thwart them at every turn\u2014while delivering an absolutely seamless access experience for your users.\n\nRSA SecurID Suite goes beyond traditional identity and access management, using identity insights, threat intelligence and business context to provide secure access to all of your users, across all of your applications, from the ground to the cloud. It brings together multi-factor authentication, risk-based access management, identity governance and user lifecycle management in one powerful suite of solutions.","hyperlink":"https:\/\/www.rsa.com\/en-us\/products\/rsa-securid-suite","td_contact":"rsa2@techdata.com","td_extension":"(480) 643-5064","vendor_id":"51","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"847","product_name":"RSA\u00ae Adaptive Authentication","description":"RSA Adaptive Authentication is a comprehensive, risk-based authentication and fraud detection platform. The Mobile Protection module allows organizations to easily extend strong risk-based authentication to mobile transactions. Allows developers to build controls directly into their mobile applications.\nIntegrates through a web services call or a software development kit (SDK).\nSupported platforms include iOS and Android\u2122.","hyperlink":"https:\/\/www.rsa.com\/en-us\/products\/fraud-prevention\/mobile-transaction-protection","td_contact":"rsa2@techdata.com","td_extension":"(480) 643-5064","vendor_id":"51","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1615","product_name":"RSA\u00ae Adaptive Authentication for eCommerce","description":"Prevent payment fraud and accelerate digital commerce with a fraud detection and risk-based authentication solution that supports the 3D Secure 2.0 protocol. RSA Adaptive Authentication for eCommerce:\nDetects up to 97 percent of fraudulent transactions\nGenerates average monthly fraud savings of nearly $2 million\nProvides a seamless, secure payments experience for consumers","hyperlink":"https:\/\/www.rsa.com\/en-us\/products\/fraud-prevention\/3d-secure-authentication","td_contact":"rsa2@techdata.com","td_extension":"(480) 643-5064","vendor_id":"51","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"849","product_name":"RSA\u00ae FraudAction\u2122","description":"Protect your customers and your organization against phishing, Trojan attacks, social media threats and rogue mobile apps using the all-inclusive RSA FraudAction threat management service.","hyperlink":"https:\/\/www.rsa.com\/en-us\/products\/fraud-prevention\/phishing-protection","td_contact":"rsa2@techdata.com","td_extension":"(480) 643-5064","vendor_id":"51","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1617","product_name":"RSA\u00ae FraudAction\u2122 Cyber Intelligence Service","description":"Get unprecedented insight into the cybercriminal underground and attacks targeting your organization. Our dedicated team of multilingual analysts monitors the underground forums, IRC chat rooms and other clandestine communication channels cybercriminals use.\nDeep undercover intelligence agents engage in this underground community.\nIntelligence capable of revealing the identities of threat actors behind attacks","hyperlink":"https:\/\/www.rsa.com\/en-us\/products\/fraud-prevention\/fraud-intelligence-services","td_contact":"rsa2@techdata.com","td_extension":"(480) 643-5064","vendor_id":"51","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"851","product_name":"RSA\u00ae Web Threat Detection","description":"Data breaches have exposed billions of user names and passwords in recent years, leading to a surge in account takeover\u2014cybercriminals taking over consumers\u2019 online accounts or account credentials to make purchases, transfer money or steal their data. Cybercriminals\u2019 account takeover attempts are getting stealthier, but they\u2019re not clever enough to outsmart RSA Web Threat Detection.","hyperlink":"https:\/\/www.rsa.com\/en-us\/products\/fraud-prevention\/account-takeover-prevention","td_contact":"rsa2@techdata.com","td_extension":"(480) 643-5064","vendor_id":"51","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1701","product_name":"RuleSpace","description":"Filter malicious or inappropriate content with categorization databases, ensuring a safe web environment for 350 million+ users.","hyperlink":"https:\/\/www.broadcom.com\/company\/partners\/symantec\/programs\/oem-sales-program\/rulespace","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1884","product_name":"SafeLogic Chaos Control","description":"To comply with FIPS 140, keys should be generated with a deterministic random bit generator (DRBG), which is seeded with a value derived from the OS (i.e., via dev\/random). The value here is unpredictable input. The stronger the entropy, the stronger the output from the DRBG, and the stronger the key. \n\nSafeLogic developed ChaosControl to bring statistically random entropy to software environments. Further, this patented solution:\n\n- Complies with NIST SP800-90\n\n- Includes test suite from NIST SP800-22\n\n- Is available cross-platform\n\n- Conforms to draft FIPS 140 Implementation Guidance for entropy\n\n- Meets Common Criteria guidelines for entropy requirements","hyperlink":"https:\/\/www.safelogic.com\/chaoscontrol\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"88","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1881","product_name":"SafeLogic CryptoComply","description":"CryptoComply is a family of standards-based \u201cDrop-in Compliance\u201d cryptographic engines designed for use in servers, workstations, Cloud, appliances, and mobile devices. SafeLogic\u2019s modules deliver core cryptographic functions to these platforms and feature robust algorithm support, including Suite B algorithms. CryptoComply modules offload secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation. As a FIPS 140-2 validated module, CryptoComply can be deployed quickly to meet various needs and requirements.","hyperlink":"https:\/\/www.safelogic.com\/cryptocomply\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"88","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1885","product_name":"SafeLogic CryptoComply for Java","description":"CyptoComply for Java is part of SafeLogic\u2019s family of standards-based \u201cDrop-in Compliance\u201d cryptographic engines designed for use in servers, workstations, Cloud, appliances, and mobile devices. SafeLogic\u2019s modules deliver core cryptographic functions to these platforms and feature robust algorithm support, including Suite B algorithms. CryptoComply modules offload secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation. As a FIPS 140-2 validated module, CryptoComply for Java can be deployed quickly to meet various needs and requirements.","hyperlink":"https:\/\/www.safelogic.com\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"88","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1883","product_name":"SafeLogic CryptoComply for Libgrcrypt","description":"CryptoComply for Libgcrypt is part of SafeLogic\u2019s family of standards-based \u201cDrop-in Compliance\u201d cryptographic engines designed for use in servers, workstations, Cloud, appliances, and mobile devices. SafeLogic\u2019s modules deliver core cryptographic functions to these platforms and feature robust algorithm support, including Suite B algorithms. CryptoComply modules offload secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation. As a FIPS 140-2 validated module, CryptoComply for Libgcrypt can be deployed quickly to meet various needs and requirements","hyperlink":"https:\/\/www.safelogic.com\/cryptocomply-for-libgcrypt\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"88","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1882","product_name":"SafeLogic CryptoComply for NSS","description":"CryptoComply for NSS is part of SafeLogic\u2019s family of standards-based \u201cDrop-in Compliance\u201d cryptographic engines designed for use in servers, workstations, Cloud, appliances, and mobile devices. SafeLogic\u2019s modules deliver core cryptographic functions to these platforms and feature robust algorithm support, including Suite B algorithms. CryptoComply modules offload secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation. As a FIPS 140-2 validated module, CryptoComply for NSS can be deployed quickly to meet various needs and requirements.","hyperlink":"https:\/\/www.safelogic.com\/cryptocomply-for-java\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"88","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2064","product_name":"SageMaker","description":"A cloud machine-learning platform that enables developers to create, train, and deploy machine-learning models in the cloud. SageMaker also enables developers to deploy ML models on embedded systems and edge-devices","hyperlink":"https:\/\/aws.amazon.com\/sagemaker\/","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"110","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2069","product_name":"Sales Cloud (SMB)","description":"Provides a fully integrated customer experience to help high growth SMBs maximize sales and enhance customer loyalty","hyperlink":"https:\/\/www.oracle.com\/smb\/","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"46","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"856","product_name":"Samsung ETS","description":"Samsung Enterprise Technical Support is our dedicated technical support for IT admins","hyperlink":"https:\/\/www.samsungknox.com\/en\/enterprise-tech-support","td_contact":"BU-Security@techdata.com","td_extension":"+49 89 47003222","vendor_id":"52","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,64,70,82"},{"product_id":"132","product_name":"SandBlast Threat Emulation (Sandboxing)","description":"As part of the Check Point SandBlast Zero-Day Protection solution, Threat Emulation prevents infections from new malware and targeted attacks. This innovative zero-day threat sandboxing capability within the SandBlast solution delivers the best possible catch rate for threats, and is virtually immune to attackers\u2019 evasion techniques.","hyperlink":"https:\/\/www.checkpoint.com\/products\/threat-emulation-sandboxing\/","td_contact":"checkpoint@techdata.com","td_extension":"800-237-8931 x5545036","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"531","product_name":"Sandbox","description":"Today\u2019s businesses need to combat the growing number and complexity of modern threats that bypass existing antivirus and EPP-class solutions, such as unknown malware, new viruses and ransomware, zero-day exploits and others. At the same time, there is a global shortage of skilled cybersecurity professionals, which can make it tough and expensive to hire them. Companies are looking for ways to automate the detection and response to advanced threats as much as possible. Kaspersky Sandbox harnesses their best expert practices in combating complex threats and APT-level attacks, providing advanced threat protection without the need for information security analysts.","hyperlink":"https:\/\/me-en.kaspersky.com\/enterprise-security\/malware-sandbox","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,9,10,39,51,60"},{"product_id":"1249","product_name":"Scalable Cloud Security","description":"Deliver flawless and uninterrupted viewing experiences, with secure content, applications, sites and data","hyperlink":"https:\/\/www.akamai.com\/us\/en\/campaign\/scalable-cloud-security-neutralize-threats.jsp","td_contact":"akamaius@techdata.com","td_extension":"(800)-237-8931 x5540426","vendor_id":"1","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"2055","product_name":"Search & AI Driven Analytics","description":"Uncover the \"why\" hidden in all your data and identify insights, trends and anomalies to enable users of any skill level to drive value from their data. ThoughtSpot makes it easy for anyone to get answers from their agency data in seconds","hyperlink":"https:\/\/www.thoughtspot.com\/","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"121","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"525","product_name":"Secure Analytics","description":"Market-leading security information and event management (SIEM) system that consolidates large volumes of event data from thousands of devices, endpoints, and applications in near real time.","hyperlink":"https:\/\/www.juniper.net\/us\/en\/products-services\/security\/secure-analytics\/","td_contact":"","td_extension":"","vendor_id":"38","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"85","country_name":"ASIA PACIFIC","parint_id":"0","type":"0","country":"85,86"},{"product_id":"707","product_name":"Secure Configuration Manager\u00a0","description":"Finds and repairs configuration errors that lead to security breaches or downtime","hyperlink":"https:\/\/www.netiq.com\/products\/secure-configuration-manager\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,63,65,67,68,69,70,71,74,75,76,77,80,81,84"},{"product_id":"2050","product_name":"Secure Enterprise Search","description":"Enables a secure, high quality, easy-to-use search across all enterprise information assets. The ability to search and locate public, private and shared content across Intranet web-servers, databases, files on local disks or file servers, IMAP e-mail, document management systems, applications, and portals","hyperlink":"https:\/\/docs.oracle.com\/cd\/B19306_01\/search.102\/b32259\/over.htm","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"46","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1552","product_name":"Secure Messaging Gateway\u00a0","description":"Protect your network and messaging system from malware, viruses, and harmful content","hyperlink":"https:\/\/www.microfocus.com\/products\/secure-gateway\/","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"888","product_name":"Secure Mobile Access Appliances","description":"Empower your mobile workforce and reduce IT costs with a unified secure access gateway that provides best-in-class SSL VPN, per app VPN, device authorization and single sign-on (SSO). Choose the deployment option that best fits your needs.","hyperlink":"https:\/\/www.sonicwall.com\/en-us\/products\/remote-access\/remote-access-appliances","td_contact":"sonicwall@techdata.com","td_extension":"800-237-8931 x5545032","vendor_id":"56","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"466","product_name":"Secure SD-WAN Solution","description":"Helps multi-branch organizations quickly deploy a secure VPN network, anywhere.","hyperlink":"https:\/\/www.hillstonenet.com\/what-we-do\/","td_contact":"eduardo.araujo@techdata.com","td_extension":"55-11-31912870 x-5222870","vendor_id":"33","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"4","country_name":"LATIN AMERICA","parint_id":"0","type":"0","country":"4,7,9,10,11,12,13,14,15,16,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60"},{"product_id":"914","product_name":"Secure Web Appliance","description":"Get the ultimate in web security, control, and insights. It\u2019s web protection that\u2019s effective,\naffordable, and easy with lightning performance that won\u2019t slow users down.","hyperlink":"https:\/\/www.sophos.com\/en-us\/products\/secure-web-gateway.aspx","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"57","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,65,66,69,71,72,75,76,78,79,81"},{"product_id":"1770","product_name":"Secure Web Gateway","description":"Protects your users and their information from web-based threats","hyperlink":"https:\/\/www.trendmicro.com\/en_us\/business\/products\/user-protection\/sps\/web-security.html","td_contact":"Tech Data: trendmicro@techdata.com\n

DLT: spi@dlt.com<\/p>","td_extension":"Tech Data: 800-237-8931 ext. 5545035 \n

DLT: 703-773-9231<\/p>","vendor_id":"66","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"339","product_name":"Secure Web Gateway","description":"Set Policies. Manage Users. Isolate Threats.\nSimplify and strengthen your security by combining the power of Isla isolation with the Secure Web Gateway (SWG) function. Leverage the power of a single-source security platform built to provide the control you need with total protection for your users","hyperlink":"https:\/\/cyberinc.com\/secure-web-gateway\/","td_contact":"CyberincUS@techdata.com","td_extension":"(800)-237-8931 x5540509","vendor_id":"19","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"990","product_name":"Secure Web Gateway (SWG) Solutions","description":"Symantec secure web gateway offers the industry\u2019s most sophisticated ecosystem to protect your organization\u2019s cloud use.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/web-and-email\/gateway","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1424","product_name":"Secure Web Gateway - SWG","description":"SWG protects against web attacks with URL filtering, visibility and control of encrypted web traffic via SSL inspection, and application of granular web application policies.","hyperlink":"https:\/\/www.fortinet.com\/products\/secure-web-gateway.html","td_contact":"uspmfortinet@techdata.com","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1230","product_name":"Secure Wi-Fi","description":"Technology has changed the way everyone does business. Organizations of all types and across all industries are facing increased pressure from customers, vendors, and even employees to offer secure and fast wireless access. Wi-Fi is a necessity that has become all about convenience, security, and performance. WatchGuard doesn\u2019t just offer Wi-Fi connectivity, we offer patented security, increased productivity, and improved customer satisfaction. When you deploy a WatchGuard access point that has WatchGuard Wi-Fi Cloud enabled with a Secure Wi-Fi or Total Wi-Fi license, you unlock invaluable tools to take your business to the next level","hyperlink":"https:\/\/www.watchguard.com\/wgrd-products\/secure-wifi","td_contact":"SEWatchGuard@techdata.com","td_extension":"800-237-8931 x5545033","vendor_id":"71","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1464","product_name":"Secure@Source","description":"Locate, analyze, and remediate the risk of your sensitive data with data protection, and monitor data access and movement for suspicious activity.","hyperlink":"https:\/\/www.informatica.com\/products\/data-security\/secure-at-source.html#fbid=UeeCmkL0Wl1","td_contact":"spi@dlt.com","td_extension":"703-708-9654","vendor_id":"37","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1232","product_name":"SecureAnywhere\u00ae Business Endpoint Protection","description":"Cybercriminals attack endpoints from all angles. Multi-vector protection from Webroot is the only way to secure endpoints and users across all stages of a cyberattack","hyperlink":"https:\/\/www.webroot.com\/us\/en\/business\/smb\/endpoint-protection","td_contact":"webroot@techdata.com","td_extension":"800-237-8931 x1472415","vendor_id":"72","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,4,8,9,10,21,22,23,24,25,26,27,29,30,31,32,33,34,35,37,38,39,40,41,42,43,44,45,46,47,48,49,51,52,53,54,55,57,58,60"},{"product_id":"1233","product_name":"SecureAnywhere\u00ae DNS Protection","description":"Secure your DNS connection against cyberattacks, get total visibility into web usage, and enforce acceptable web usage policies to reduce risk.","hyperlink":"https:\/\/www.webroot.com\/us\/en\/business\/dns-protection","td_contact":"webroot@techdata.com","td_extension":"800-237-8931 x1472415","vendor_id":"72","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,4,8,9,10,21,22,23,24,25,26,27,29,30,31,32,33,34,35,37,38,39,40,41,42,43,44,45,46,47,48,49,51,52,53,54,55,57,58,60"},{"product_id":"1553","product_name":"SecureLogin\u00a0","description":"Streamlines authentication for enterprise apps with a single login experience","hyperlink":"https:\/\/www.netiq.com\/products\/securelogin\/","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"481","product_name":"Security Access Manager","description":"In a world of highly fragmented access management environments, IBM Security Access Manager helps you simplify your users' access while more securely adopting web, mobile and cloud technologies. This solution helps you strike a balance between usability and security through the use of risk-based access, single sign-on, integrated access management control, identity federation and its mobile multi-factor authentication capability, IBM Verify. Take back control of your access management with IBM Security Access Manager.","hyperlink":"https:\/\/www.ibm.com\/us-en\/marketplace\/access-management","td_contact":"West: Rick.Marshall@techdata.com\n

East: Karen.Bailey@techdata.com<\/p>","td_extension":"West: (480) 254-4420\n

East: (678) 642-3446<\/p>","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,5,7,10,11,13,15,17,85,86,87,88,90,91"},{"product_id":"544","product_name":"Security Assessment","description":"Practical demonstration of potential attack vectors that could bypass your security controls","hyperlink":"https:\/\/www.kaspersky.com\/enterprise-security\/mobile","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,9,10,39,51,60"},{"product_id":"335","product_name":"Security Automation and Orchestration","description":"SOC 3D is the first Security Automation and Orchestration (SOAR) platform combining automation, orchestration, and big-data powered investigation into a single and comprehensive incident response platform that triples SOC efficiency, provides unprecedented visibility and reduces time-to-respond by 90%","hyperlink":"https:\/\/www.cyberbit.com\/solutions\/security-operations-automation-orchestration\/","td_contact":"","td_extension":"","vendor_id":"18","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"85","country_name":"ASIA PACIFIC","parint_id":"0","type":"0","country":"85,87"},{"product_id":"545","product_name":"Security Awareness","description":"Building a safe corporate cyber-environment with gamified training","hyperlink":"https:\/\/www.kaspersky.com\/enterprise-security\/azure-hybrid-cloud-security","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,9,10,39,51,60"},{"product_id":"991","product_name":"Security Awareness Service","description":"Mitigate information risk by educating your employees through the Symantec Security Awareness Program. Contact Symantec Education to register.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/security-awareness-service-en","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1830","product_name":"Security Awareness Training","description":"Security awareness training is ongoing education that provides employees relevant information and tests of their cyber-awareness by covering all aspects of data security and regulatory compliance. It is a proven way of changing risky employee IT behaviors that can lead to security compromises\u2014including financial, intellectual property, customer trust and other major data losses\u2014and increases businesses\u2019 resilience against attacks.","hyperlink":"https:\/\/www.webroot.com\/us\/en\/business\/security-awareness","td_contact":"webroot@techdata.com","td_extension":"800-237-8931 x1472415","vendor_id":"72","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"857","product_name":"Security Colony","description":"A library of resources including an entire ISO27001-based ISMS, incident response guidelines, awareness training materials, sample cyber security roadmaps and more to help implement information security in your organisation.","hyperlink":"https:\/\/securitycolony.com\/","td_contact":"securitycolony@techdata.com\n(727) 539-7429 x-84008","td_extension":"","vendor_id":"53","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1461","product_name":"Security Consulting Services for Managed Securty Service Providers","description":"IBM Security Consulting Services for MSSPs provides expertise on MSSP business practices including service catalog definition and development, organizatonal design and development, process development and optimization and technology architecture and implementation specializing in but not limited to IBM Security technologies.","hyperlink":"","td_contact":"West: Rick.Marshall@techdata.com\n

East: Karen.Bailey@techdata.com<\/p>","td_extension":"West: (480) 254-4420\n

East: (678) 642-3446<\/p>","vendor_id":"35","service_tiering":"Services are billed by the the day and week with support for flexible subscription style offerings as well.","partner_benefits":"

IBM Security Consulting Services for MSSPs help:<\/p>\n

 \u2022  Optimize existing processes and architect from scratch<\/p>\n

 \u2022   Service Catalog and Use-Case development<\/p>\n

 \u2022   Technology architecture and implementation<\/p>\n

 \u2022   Staff Augmentation<\/p>","typeof_service":"

Managed Security Service Building Block Solution:<\/strong>  Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":"IBM Security Consulting Services for MSSPs are designed to help an MSSP grow their MSS business and advance their service delivery maturity, resulting in more value to the end-client.","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"473","product_name":"Security Directory Suite","description":"IBM Security Directory Suite is a scalable, standards-based identity platform that simplifies identity and directory management. Directory Suite helps collapse identity silos into a single authoritative identity source. This unified identity enables faster and more agile application deployment and improved user experience. Directory Suite also captures user insight for auditing and compliance reporting.","hyperlink":"https:\/\/www.ibm.com\/us-en\/marketplace\/ibm-security-directory-suite","td_contact":"West: Rick.Marshall@techdata.com\n

East: Karen.Bailey@techdata.com<\/p>","td_extension":"West: (480) 254-4420\n

East: (678) 642-3446<\/p>","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,5,7,10,11,13,15,17,85,86,87,88,90,91"},{"product_id":"1507","product_name":"Security for Email Servers","description":"McAfee Security for Email Servers detects and blocks viruses, spam, and other unwanted programs on inbound and outbound emails on Microsoft Exchange and Lotus Domino servers.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/security-for-email-servers.html","td_contact":"Tech Data: mcafee@techdata.com\n

DLT: spi@dlt.com<\/p>","td_extension":"Tech Data: 800-237-8931\n

DLT: 703-773-9231<\/p>","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"546","product_name":"Security for Mail Server","description":"Proven Next Generation protection against mail-based attacks","hyperlink":"https:\/\/www.kaspersky.com\/enterprise-security\/security-awareness","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,9,10,39,51,60"},{"product_id":"547","product_name":"Security for Microsoft Office 365","description":"Detect and block spam and malicious email before it becomes a problem \u2013 without slowing productivity or accidentally deleting legitimate traffic. Advanced heuristics, sandboxing and machine learning protect email from spam, phishing, business email compromise (BEC) and other advanced threats.","hyperlink":"https:\/\/www.kaspersky.com\/enterprise-security\/professional-services","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,9,10,39,51,60"},{"product_id":"664","product_name":"Security for Microsoft SharePoint","description":"McAfee Security for Microsoft SharePoint filters content and detects, blocks, and removes malware to secure information in SharePoint servers.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/security-for-microsoft-sharepoint.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"548","product_name":"Security for Storage","description":"High-performance protection integrated with network-attached storage systems","hyperlink":"https:\/\/www.kaspersky.com\/enterprise-security\/threat-intelligence","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,9,10,39,51,60"},{"product_id":"1454","product_name":"Security Identity Governance & Intelligence (IGI)","description":"Within your organization, you need to be able to understand who has access to what and how that access is being used. Is your identity governance working intelligently? IBM is focused on collecting and analyzing identity data to support enterprise IT and regulatory compliance. With IGI, you\u2019ll improve visibility into how access is being utilized, prioritize compliance actions with risk-based insights, and make better decisions with clear actionable intelligence. All of this is driven by a business-activity based approach to risk modeling, a major differentiator for IBM that makes life easier for auditors and risk compliance managers.","hyperlink":"https:\/\/www.ibm.com\/us-en\/marketplace\/identity-governance-and-intelligence","td_contact":"West: Rick.Marshall@techdata.com\n

East: Karen.Bailey@techdata.com<\/p>","td_extension":"West: (480) 254-4420\n

East: (678) 642-3446<\/p>","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"861","product_name":"Security Information and Event Management (SIEM)","description":"Log & Event Manager makes it easy to use logs for security, compliance, and troubleshooting","hyperlink":"https:\/\/www.solarwinds.com\/siem-security-information-event-management-software","td_contact":"solarwindssoftware@techdata.com","td_extension":"1-800-237-8931 ext. 5540493","vendor_id":"55","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61"},{"product_id":"1554","product_name":"Security Intelligence & Operations Consulting\u00a0","description":"Consulting to help build and mature enterprise security operation capabilities","hyperlink":"https:\/\/software.microfocus.com\/en-us\/software\/security-operations-center","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"1905","product_name":"Security Manager","description":"Automated compliance assessment capabilities to validate configuration requirements and alert when violations occur. Audit reports ready out-of-the-box or customizable.","hyperlink":"https:\/\/www.firemon.com\/products\/security-manager\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"96","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"480","product_name":"Security Secret Server","description":"IBM Security Secret Server protects privileged accounts from hackers and insider threats, helps ensure compliance with evolving regulations, and allows authorized employees to seamlessly gain access to the tools and information they need to drive productivity. Easily detect, manage and audit privileged accounts, and control which applications are permitted to run on endpoints and servers to prevent malicious applications from penetrating the environment. IBM Security Secret Server is fast to deploy, easy to use and scalable for the enterprise.","hyperlink":"https:\/\/www.ibm.com\/us-en\/marketplace\/secret-server","td_contact":"West: Rick.Marshall@techdata.com\n

East: Karen.Bailey@techdata.com<\/p>","td_extension":"West: (480) 254-4420\n

East: (678) 642-3446<\/p>","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,5,7,10,11,13,15,17,85,86,87,88,90,91"},{"product_id":"1555","product_name":"Security Solutions for IBM i\u00a0","description":"Provides easy compliance auditing and real-time protection for IBM iSeries systems","hyperlink":"https:\/\/www.netiq.com\/products\/ibmi\/","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"665","product_name":"Security Suite for Virtual Desktop Infrastructure","description":"McAfee Security Suite for Virtual Desktop Infrastructure (VDI) provides a scalable security solution specifically designed to manage and optimize security for VDI.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/data-center-security-suite-for-vdi.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"549","product_name":"Security Training","description":"Comprehensive training programs covering digital forensics, malware analysis and incident response topics","hyperlink":"https:\/\/www.kaspersky.com\/enterprise-security\/security-assessment","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,9,10,39,51,60"},{"product_id":"61","product_name":"SecuSUITE\u00a0","description":"High Security Voice and Messaging for iOS and Android","hyperlink":"SecuSUITE","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"6","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,64,69,70,73,82,84"},{"product_id":"1556","product_name":"Self Service Password Reset\u00a0","description":"Enables users to reset their passwords without the help of IT","hyperlink":"https:\/\/www.netiq.com\/products\/self-service-password-reset\/","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"32","product_name":"Sentinel","description":"Sentinel uses AI to outsmart the attackers and protect your business and data. Sentinel learns your business\u2019s unique communication patterns to detect personalized fraud in real-time to protect against business email compromise and account takeover.","hyperlink":"https:\/\/www.barracuda.com\/products\/sentinel","td_contact":"barracuda@Techdata.com","td_extension":"(800)-237-8931 x5540427","vendor_id":"4","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,85,87"},{"product_id":"713","product_name":"Sentinel\u00a0","description":"A fully-featured, adaptable solution that simplifies the day-to-day use of SIEM","hyperlink":"https:\/\/www.netiq.com\/products\/sentinel\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,63,65,67,68,69,70,71,74,75,76,77,80,81,84"},{"product_id":"1620","product_name":"Sepio Solution","description":"Sepio\u2019s security suite is currently the first solution available that identifies and blocks malicious hardware devices before they can cause any harm. The suite stops rogue hardware before it damages normal operations or degrades system performance","hyperlink":"https:\/\/www.sepio.systems\/","td_contact":"sepio@techdata.com","td_extension":"","vendor_id":"54","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"862","product_name":"Serv-U File Transfer Protocol Server","description":"Simple, affordable, easy-to-use FTP server software","hyperlink":"https:\/\/www.solarwinds.com\/ftp-server-software","td_contact":"solarwindssoftware@techdata.com","td_extension":"1-800-237-8931 ext. 5540493","vendor_id":"55","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61"},{"product_id":"863","product_name":"Serv-U Managed File Transfer Server","description":"Enhance security and control over file transfers in and outside your organization","hyperlink":"https:\/\/www.solarwinds.com\/serv-u-managed-file-transfer-server","td_contact":"solarwindssoftware@techdata.com","td_extension":"1-800-237-8931 ext. 5540493","vendor_id":"55","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61"},{"product_id":"459","product_name":"Server Breach Detection System (sBDS)","description":"Post-Breach Detection to Protect Critical Servers from Advanced Threats","hyperlink":"https:\/\/www.hillstonenet.com\/products\/hillstone-breach-detection-system-i-series\/","td_contact":"eduardo.araujo@techdata.com","td_extension":"55-11-31912870 x-5222870","vendor_id":"33","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"4","country_name":"LATIN AMERICA","parint_id":"0","type":"0","country":"4,7,9,10,11,12,13,14,15,16,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60"},{"product_id":"992","product_name":"Server Management Suite","description":"Provision, control, automate, and monitor physical and virtual servers from a central console across a wide array of platforms.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/endpoint\/management\/server-management-suite","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"666","product_name":"Server Security Suite Advanced","description":"McAfee Server Security Suite Advanced delivers comprehensive server protection and management for physical, virtual, and cloud deployments. It discovers, protects, and expands workloads into the cloud, and includes whitelisting and change control technologies to help ensure regulatory compliance.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/server-security-suite-advanced.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1511","product_name":"Server Security Suite Essentials","description":"McAfee Server Security Suite Essentials provides foundational server security protection and management for physical, virtual, and cloud deployments, enabling customers to discover, protect, and expand workloads into the cloud with automatic provisioning of security policies.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/server-security-suite-essentials.html","td_contact":"Tech Data: mcafee@techdata.com\n

DLT: spi@dlt.com<\/p>","td_extension":"Tech Data: 800-237-8931\n

DLT: 703-773-9231<\/p>","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1282","product_name":"Server VM Edition for Service Providers","description":"Hypervisor-based, local and cloud backup, and DR","hyperlink":"","td_contact":"carbonite@techdata.com \n(727) 539-7429 x-71458","td_extension":"800-237-8931 x5540414","vendor_id":"10","service_tiering":"No Tiering.\u00a0 Monthly subscription based upon VM or per TB of compressed data.","partner_benefits":"

\u2022  Scalable management back-end to accommodate growing customer footprint, up to thousands of VMs<\/p>\n

\u2022   Remote, multi-tenant management from a single centralized portal<\/p>\n

\u2022   White label capabilities to align with your go-to-market plans and branding<\/p>\n

\u2022   Built to integrate with the complete Carbonite platform for data protection over time<\/p>","typeof_service":"

Managed Security Service Building Block Solution:<\/strong>  Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":"

\u2022   Multiple restore options including full VM, granular file\/folder, and cross-hypervisor restores, as well as VM mount and download<\/p>\n

\u2022   RTO and RPO in minutes, with fully configurable backup and retention scheduling<\/p>\n

\u2022   Easily scale across SAN, NAS, and DAS for improved performance; consolidate unused storage across multiple systems<\/p>\n

\u2022   Scalable management back-end to accommodate growing customer footprint<\/p>\n

\u2022   AES 256-bit encryption in flight and at rest <\/p>","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"993","product_name":"ServiceDesk","description":"Automate incident response and resolution to reduce service interruptions, accelerate restoration, and correct systemic problems.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/endpoint\/management\/service-desk","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"915","product_name":"SG UTM","description":"Sophos UTM drives threat prevention to unmatched levels. The artificial intelligence built into Sophos Sandstorm is a deep learning neural network, an advanced form of machine learning, that detects both known and unknown malware without relying on signatures.","hyperlink":"https:\/\/www.sophos.com\/en-us\/products\/unified-threat-management.aspx","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"57","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,65,66,69,71,72,75,76,78,79,81"},{"product_id":"933","product_name":"ShadowProtect","description":"ShadowProtect delivers continuous, airtight image-based backups. This makes recovery from disaster a breeze. Access, migrate, and restore your data with remote management.","hyperlink":"https:\/\/www.storagecraft.com\/data-availability-products","td_contact":"storagecraft@techdata.com","td_extension":"800-237-8931 x71458","vendor_id":"58","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1646","product_name":"ShadowProtect IT Edition","description":"This tool available via subscription lets your system admin back up, restore, and migrate machines without needing to install software.","hyperlink":"https:\/\/www.storagecraft.com\/data-availability-products","td_contact":"storagecraft@techdata.com","td_extension":"800-237-8931 x71458","vendor_id":"58","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"994","product_name":"Shared Service Provider PKI: Federal and Non-Federal","description":"Achieve Federal agency compliance with FIPS 201 and HSPD-12 requirements through our highly scalable cloud-based PKI Service.","hyperlink":"https:\/\/community.broadcom.com\/symantecenterprise\/communities\/community-home\/librarydocuments\/viewdocument?DocumentKey=ca689f42-70a8-41f6-8a00-1ff13812bf08&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab=librarydocuments","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1381","product_name":"Shield for Secure Browsing","description":"Ericom Shield adds a powerful layer to your defense-in-depth strategy by isolating malware, ransomware and other threats where they can\u2019t harm your network and user devices. Empower end users with full, transparent Internet use, including file downloads, while reducing risk, costs and operational burden on your IT staff.","hyperlink":"https:\/\/www.ericom.com\/solutions\/browser-isolation\/","td_contact":"Daniel.Roehrer@techdata.com","td_extension":"215-390-7116","vendor_id":"25","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1657","product_name":"SIEM-as-a-Service","description":"StratoZen\u2019s SIEM-as-a-Service is designed to provide MSPs all the benefits needed from a security information and event management system without any of the headache or capital investment. The offering is a comprehensive SIEM-as-a-Service solution, fully hosted in our secure and compliant cloud to manage and monitor your critical systems regardless of where they may be.","hyperlink":"https:\/\/stratozen.com\/siem-as-a-service\/","td_contact":"","td_extension":"800-237-8931 x5540508","vendor_id":"60","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"70","product_name":"SIEMStorm","description":"SIEMStorm is the premier network security solution for cloud service providers and other MSSPs. A single appliance gives you flexible threat visualization and mitigation tools across distributed networks and other multi-tenant environments. Easy to set up right out of the box, SIEMStorm integrates with your existing network and security hardware to provide advanced features.","hyperlink":"https:\/\/www.blackstratus.com\/siem-storm\/","td_contact":"cybershark@techdata.com","td_extension":"800-237-8931 x5540413","vendor_id":"8","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"1394","product_name":"Silverline DDoS Protection","description":"Silverline detects and mitigates even the largest of volumetric DDoS attacks at layer 3-7, before they reach your network.","hyperlink":"https:\/\/www.f5.com\/products\/security\/silverline\/ddos-protection","td_contact":"f5@techdata.com","td_extension":"(480) 643-5064","vendor_id":"26","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"364","product_name":"Silverline Web App Firewall","description":"Available as a fully-managed service or an express self-service option, Silverline protects web apps and data, while ensuring compliance with PCI DSS.","hyperlink":"https:\/\/www.f5.com\/products\/security\/silverline\/web-application-firewall","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"26","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"10","country_name":"CENTRAL AMERICA","parint_id":"0","type":"0","country":"10"},{"product_id":"1998","product_name":"SimpleDB","description":"A highly available NoSQL data store that offloads the work of database administration. Developers simply store and query data items via web services requests and SimpleDB does the rest","hyperlink":"https:\/\/aws.amazon.com\/simpledb\/","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"110","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1923","product_name":"Single Sign-on","description":"Adaptive SSO enables a secure and frictionless sign-in experience for both internal and external users that adjusts based on risk. Users sign into a portal using existing corporate credentials to access all their assigned applications from one place.","hyperlink":"https:\/\/www.idaptive.com\/product\/single-sign-on\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"99","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1245","product_name":"Site Shield","description":"Origin defense by cloaking websites and web infrastructure","hyperlink":"https:\/\/www.akamai.com\/us\/en\/products\/security\/site-shield.jsp","td_contact":"akamaius@techdata.com","td_extension":"(800)-237-8931 x5540426","vendor_id":"1","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"668","product_name":"SiteAdvisor Enterprise","description":"McAfee SiteAdvisor allows you to surf and search the web safely, avoiding online threats such as spyware, adware, and phishing scams.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/siteadvisor-enterprise.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1513","product_name":"Skyhigh Security Cloud","description":"McAfee Skyhigh Security Cloud is a cloud access security broker (CASB) that protects enterprise data and users across all cloud services, including SaaS, PaaS, and IaaS.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/skyhigh-security-cloud.html","td_contact":"Tech Data: mcafee@techdata.com\n

DLT: spi@dlt.com<\/p>","td_extension":"Tech Data: 800-237-8931\n

DLT: 703-773-9231<\/p>","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"560","product_name":"Small Office","description":"Designed for small businesses using computers, file servers, laptops and mobile devices. Protects Mac and Window PCs\/file servers. Ransomware protection, System Watcher, with rollback feature. File encryption and backup for extra layers of protection. Offer Safe Money and Password Manager.","hyperlink":"","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"Monthly subscription based on band levels up to 49 nodes.","partner_benefits":"

\u2022   Increase sales revenue and net new customers <\/p>\n

\u2022  Access to volume-based pricing<\/p>\n

\u2022   Monthly licensing belongs to the partner not the end user<\/p>\n

\u2022  Product and sales trainings and certification <\/p>\n

\u2022  Standard and premium technical support <\/p>\n

\u2022  Sales and marketing materials<\/p>\n

\u2022  Five premium incidents are included for technical support.  <\/p>\n

\u2022  Reduces IT costs and frees up resources.  <\/p>","typeof_service":"

Managed Security Services Building Block Solution:<\/strong>  Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":"

\u2022  Designed for small business.  <\/p>\n

\u2022  Installs in under 10 minutes. <\/p>\n

\u2022  Manage anywhere via online portal ksos.kaspersky.com<\/p>","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,9,10,39,51,60"},{"product_id":"822","product_name":"Social Media Compliance","description":"Proofpoint helps bridge the gap between social media compliance and marketing practices to help users comply with the current social media regulations.","hyperlink":"https:\/\/www.proofpoint.com\/us\/products\/archiving-and-compliance","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 647","vendor_id":"48","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,65,71"},{"product_id":"1949","product_name":"Software Composition Analysis (SCA)","description":"Veracode SCA scans open source dependencies for known vulnerabilities and makes recommendations on version updating. SCA integrates into the pipeline through a simple command-line scan agent and delivers results in seconds. Teams can even use the same agent directly in their IDE to get feedback earlier.","hyperlink":"https:\/\/www.veracode.com\/products\/software-composition-analysis","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"104","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1835","product_name":"Software security platform","description":"Integrates with DevOps and provides static and interactive application security testing, software composition analysis and application security training and skills development to reduce and remediate risk from software vulnerabilitie","hyperlink":"https:\/\/www.checkmarx.com\/products\/software-security-platform","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"77","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1627","product_name":"Sonicwall Advanced Threat Protection","description":"Revolutionizes advanced threat detection and sandboxing with a cloud-based, multi-engine solution for stopping unknown and zero-day attacks at the gateway, and with automated remediation. Leverages the RTDMI engine which proactively blocks mass-market, zero-day threats and unknown malware accurately utilizing real-time memory-based inspection techniques.","hyperlink":"https:\/\/www.sonicwall.com\/en-us\/products\/firewalls\/security-services\/capture-advanced-threat-protection","td_contact":"sonicwall@techdata.com","td_extension":"800-237-8931 x5545032","vendor_id":"56","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"880","product_name":"Sonicwall Application Control","description":"Helps administrators control and manage both business and non\u2010business related applications with granular, application\u2010specific policies providing application classification and policy enforcement.","hyperlink":"https:\/\/www.sonicwall.com\/en-us\/products\/firewalls\/security-services\/total-secure-bundle","td_contact":"sonicwall@techdata.com","td_extension":"800-237-8931 x5545032","vendor_id":"56","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1633","product_name":"Sonicwall Hosted Email Security","description":"Deploy a cloud-based security solution to protect your organization from email-borne threats such as ransomware, zero-day threats, spear phishing and business email compromise (BEC) \u2500 while meeting email compliance and regulatory mandates. Our solution includes email continuity to minimize business impact during planned and unplanned outages to your email servers. Get the scalability you need with no upfront costs and predictable subscription rates.","hyperlink":"https:\/\/www.sonicwall.com\/en-us\/products\/secure-email\/cloud-email-security","td_contact":"sonicwall@techdata.com","td_extension":"800-237-8931 x5545032","vendor_id":"56","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"905","product_name":"SonicWall Security-as-a-Service Program","description":"SonicWall's SECaaS is a monthly subscription pricing model (OPEX) with no upfront costs.\u00a0 This business model is very popular with the MSP\/MSSP partner community, or any sales scenario where a monthly subscription price is the preferred purchasing mechanism for the end-customer.\u00a0\u00a0\u00a0","hyperlink":"","td_contact":"sonicwall@techdata.com","td_extension":"800-237-8931 x5545032","vendor_id":"56","service_tiering":"Flexible quarter or monthly billing","partner_benefits":"

\u2022  Available from SonicWall exclusively for the SonicWall partner community, this monthly pricing option includes the hardware.  <\/p>\n

\u2022  Pass OpEx flexbility to their clients  <\/p>\n

\u2022  Win more business at higher margins<\/p>","typeof_service":"

Managed Security Services Building Block Solution:<\/strong>  Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":"

\u2022  SonicWall Next-Generation Firewall that delivers all of these services bundled with the security services needed for comprehensive network protection from a wide range of advanced threats.<\/p>\n

\u2022  All-in-One network protection that combines gateway anti-virus, anti-spyware, intrusion prevention, application intelligence and control, content filtering, firmware updates, and 24x7 support delivered through a high-performance, deep-packet inspection firewall.<\/p>\n

\u2022  Access to the Global Management System, a powerful and intuitive solution to rapidly deploy and centrally manage SonicWall firewalls, email security, and secure mobile access solutions. <\/p>","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,6,8,9,10,12,14,16,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61"},{"product_id":"1641","product_name":"Sophos Cloud Optix","description":"Public Cloud Visibility and Threat Response. Detect, respond, and prevent the cloud security and compliance gaps leaving you exposed","hyperlink":"https:\/\/www.sophos.com\/en-us\/products\/cloud-optix.aspx","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"57","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"910","product_name":"Sophos Email Security","description":"Smarter Email Security with AI. Today\u2019s email threats move fast, and growing businesses need predictive email security \u2013 defeating today\u2019s threats with an eye on tomorrow.","hyperlink":"https:\/\/www.sophos.com\/en-us\/products\/sophos-email.aspx","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"57","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,65,66,69,71,72,75,76,78,79,81"},{"product_id":"907","product_name":"Sophos Mobile","description":"Sophos Mobile is a secure Unified Endpoint Management (UEM) solution that helps businesses spend less time and effort to manage and secure traditional and mobile endpoints. The only UEM solution that integrates natively with a leading next-gen endpoint security platform, Sophos Mobile supports management of Windows 10, macOS, iOS, and Android devices.","hyperlink":"https:\/\/www.sophos.com\/en-us\/products\/mobile-control.aspx","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"57","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,65,66,69,71,72,75,76,78,79,81"},{"product_id":"911","product_name":"Sophos Phish Threat","description":"Phishing is big business. Attacks have shown record growth in recent years, and a solid security awareness program is an integral part of any defense-in-depth strategy. Sophos Phish Threat educates and tests your end users through automated attack simulations, quality security awareness training, and actionable reporting metrics. \nPhish Threat provides you with the flexibility and customization that your organization needs to facilitate a positive security awareness culture.","hyperlink":"https:\/\/www.sophos.com\/en-us\/products\/phish-threat.aspx","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"57","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,65,66,69,71,72,75,76,78,79,81"},{"product_id":"916","product_name":"Sophos Wireless","description":"Sophos Wireless is easy to deploy and manage, so your wireless networks are up and running in no time.","hyperlink":"https:\/\/www.sophos.com\/en-us\/products\/secure-wifi.aspx","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"57","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,65,66,69,71,72,75,76,78,79,81"},{"product_id":"1823","product_name":"spamBlocker","description":"Real-time, continuous, and highly reliable protection from spam and phishing attempts. WatchGuard spamBlocker is so fast and effective, it can review up to 4 billion messages per day, while providing effective protection regardless of the language, format, or content of the message","hyperlink":"https:\/\/www.watchguard.com\/wgrd-products\/security-services\/spam-prevention","td_contact":"watchguard@techdata.com","td_extension":"800-237-8931 x5545033","vendor_id":"71","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1168","product_name":"Spanning Backup for O365 Backup","description":"Spanning Backup for Office 365 - Microsoft Exchange Online, SharePoint Online, and OneDrive for Business.","hyperlink":"www.unitrends.com\/products","td_contact":"pmunitrends@techdata.com","td_extension":"800-237-8931 x71478","vendor_id":"67","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,10,17"},{"product_id":"526","product_name":"Spotlight Secure Threat Intelligence Platform","description":"As the threat landscape continues to accelerate and evolve, the security industry continues to respond with a variety of disparate new detection technologies. Unfortunately, this approach results in customers struggling to manage a patchwork of uncoordinated security tools, leaving a gap between detection and enforcement at the firewall. Many next-generation firewalls (NGFWs) include integrated capabilities, such as intrusion prevention system (IPS), antivirus signatures, and proprietary reputation feeds, but they are closed systems that are not capable of taking full advantage of the highly diverse third-party and custom feeds utilized by customers, specific to their industry.","hyperlink":"https:\/\/www.juniper.net\/us\/en\/products-services\/security\/spotlight\/","td_contact":"","td_extension":"","vendor_id":"38","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"85","country_name":"ASIA PACIFIC","parint_id":"0","type":"0","country":"85,86"},{"product_id":"2029","product_name":"SPSS (Predictive Analytics","description":"Includes SPSS Statistics for in-depth statistical analysis and reporting, and SPSS Modeler for predictive modeling and optimizing how rules and models drive operational decisions. Also includes SPSS Analytic Server for accessing big data from sources such as Hadoop to broaden analytical possibilities","hyperlink":"https:\/\/www.ibm.com\/products\/spss-predictive-analytics-enterprise","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1993","product_name":"SQL Server","description":"A relational database management system designed and built to manage and store information. The system supports various business intelligence operations, analytics operations, and transaction processing","hyperlink":"https:\/\/www.microsoft.com\/en-us\/sql-server","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"43","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1979","product_name":"SQL Server Integration Services (SSIS)","description":"A component of the Microsoft SQL Server database software that can be used to perform a broad range of data migration tasks. SSIS is a platform for data integration and workflow applications. It features a data warehousing tool used for data extraction, transformation, and loading","hyperlink":"https:\/\/docs.microsoft.com\/en-us\/sql\/integration-services\/sql-server-integration-services?view=sql-server-ver15","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"43","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"524","product_name":"SRX Series Services Gateways","description":"Provides advanced, next-generation defense against known and unknown threats, with a comprehensive suite of layered security services both on-premises and in the cloud. All SRX Series gateways are built for resiliency, scalability, and availability to secure data centers or the enterprise edge against the broadest spectrum of threats.","hyperlink":"https:\/\/www.juniper.net\/us\/en\/products-services\/security\/srx-series\/","td_contact":"","td_extension":"","vendor_id":"38","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"85","country_name":"ASIA PACIFIC","parint_id":"0","type":"0","country":"85,86"},{"product_id":"357","product_name":"SSL Orchestrator","description":"Provides high-performance decryption and encryption of outbound SSL\/TLS traffic and supports dynamic, policy-based management and steering of traffic to security devices.","hyperlink":"https:\/\/f5.com\/products\/security\/ssl-orchestrator","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"26","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"10","country_name":"CENTRAL AMERICA","parint_id":"0","type":"0","country":"10"},{"product_id":"1948","product_name":"Static Analysis (SAST)","description":"Provides fast, automated security feedback in the IDE and the pipeline, and conducts a full policy scan before deployment. It then provides clear guidance on what issues to focus on and how to fix them faster.","hyperlink":"https:\/\/www.veracode.com\/products\/binary-static-analysis-sast","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"104","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"523","product_name":"Steel-Belted Radius CarrierSteel-Belted Radius Carrier","description":"SBR Carrier is a standards-based AAA server that enables service providers to integrate their business intelligence into the network infrastructure.","hyperlink":"https:\/\/www.juniper.net\/us\/en\/products-services\/ipc\/sbr-carrier\/","td_contact":"","td_extension":"","vendor_id":"38","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"85","country_name":"ASIA PACIFIC","parint_id":"0","type":"0","country":"85,86"},{"product_id":"2073","product_name":"Sterling B2B","description":"Designed to support high volume electronic message exchange, according to your business rules. It excels at complex routing, translation, and provides the flexibility you need to easily interact with multiple internal systems and external trading partners","hyperlink":"https:\/\/www.ibm.com\/products\/supply-chain-insights","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2086","product_name":"Sterling Order Management","description":"A comprehensive software solution that brokers orders across many disparate systems, orchestrates and automates cross-channel selling and fulfillment processes, and provides a global view of supply and demand across the supply chain","hyperlink":"https:\/\/www.ibm.com\/products\/order-management","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"995","product_name":"Storage Protection","description":"Scalable, high-performance malware detection and prevention for cloud services, NAS devices, and SharePoint servers.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/endpoint\/hybrid-cloud\/protection-engine","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1650","product_name":"Stormshield Endpoint Security","description":"Stormshield Endpoint Security offers a complementary layer of security \nto compensate weaknesses by ensuring continuous control over \nbehaviors on servers, workstations, and terminal devices according to \nfine-grained security policies put in place by the administrator.","hyperlink":"https:\/\/www.stormshield.com\/products-services\/products\/endpoint-security\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"59","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"2013","product_name":"Streaming Data Platform, Pentaho","description":"Used for Processing and Visualizing Streaming Data","hyperlink":"https:\/\/community.hitachivantara.com\/s\/article\/processing-and-visualizing-streaming-data-using-pentaho","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"107","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2011","product_name":"Streams","description":"Provides a runtime platform, programming model, and tools for applications that are required to process continuous data streams","hyperlink":"https:\/\/www.ibm.com\/cloud\/streaming-analytics","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1886","product_name":"SumoLogic Security Platform","description":"- More than 150 applications and integrations aggregate data across stack\n - Real-time analytics rapidly identify and resolve potential cyber attacks, detect and prevent breaches, and reduce compliance costs\n - Customizable dashboards enable visualizing logs, metrics and performance data \n - Machine-learning algorithms work 24\/7 and alert you if there\u2019s an important event or problem to fix","hyperlink":"https:\/\/www.sumologic.com\/security\/platform-security\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"89","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2072","product_name":"Supply Chain Analytics","description":"Enable organizations to compare purchase orders to inventory levels on a near real-time basis. By comparing this to sales order data, organizations can optimize inventory levels by ensuring that adequate supply exists to meet customer orders without unnecessarily tying up working capital","hyperlink":"https:\/\/www.oracle.com\/business-analytics\/analytics-cloud-for-supply-chain.html","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"46","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1888","product_name":"Swimlane SOAR Platform","description":"Swimlane\u2019s SOAR platform helps organizations manage the growing volume of alerts more efficiently by automating time-consuming incident response processes. The solution collects security alert data from virtually any security platform with minimal effort and then automatically responds to alerts using automated workflows and playbooks","hyperlink":"https:\/\/swimlane.com\/platform\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"91","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"908","product_name":"Synchronized Encryption","description":"Sophos SafeGuard encrypts content as soon as it\u2019s created. And with the encryption always on, you can enjoy seamless secure collaboration. Synchronized Encryption proactively protects your data by continuously validating the user, application, and security integrity of a device before allowing access to encrypted data.","hyperlink":"https:\/\/www.sophos.com\/en-us\/products\/safeguard-encryption.aspx","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"57","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,65,66,69,71,72,75,76,78,79,81"},{"product_id":"1989","product_name":"Syncsort ETL Hadoop Solution","description":"Everything you need for Hadoop ETL \u2013 no coding, no tuning and a smarter approach to Hadoop ETL, turning your Hadoop environment into a highly scalable, affordable, and easy-to-use data integration environment.","hyperlink":"https:\/\/www.cloudera.com\/partners\/solutions\/dell-emc.html","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"109","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"801","product_name":"Targeted Attack Protection (TAP)","description":"Protect your people against ransomware and advanced threats in email","hyperlink":"https:\/\/www.proofpoint.com\/us\/products\/advanced-threat-protection\/targeted-attack-protection","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 626","vendor_id":"48","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,65,71"},{"product_id":"1742","product_name":"Tech Data Delivered AppScan Implementation Services","description":"Tech Data time and materials implementation services that help customers with architecture, deployment, customization, tuning, and operation services for IBM AppScan. Other available services includes managed services to support IBM AppScan.","hyperlink":"https:\/\/tdcontent.techdata.com\/techsolutions\/security\/Services.aspx","td_contact":"SecurityServices@TechData.com","td_extension":"800-237-8931 ext. 5540508","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1098","product_name":"Tech Data Delivered BigFix Implementation Services","description":"Tech Data time and materials implementation services that help customers with architecture, deployment, customization, tuning, and operation services for IBM BigFix Other available services includes managed services to support IBM BigFix","hyperlink":"https:\/\/tdcontent.techdata.com\/techsolutions\/security\/Services.aspx","td_contact":"SecurityServices@TechData.com","td_extension":"800-237-8931 ext. 5540508","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1737","product_name":"Tech Data Delivered Carbon Black Implementation Services","description":"Tech Data time and materials implementation services that help customers with architecture, deployment, and operation services for Carbon Black.","hyperlink":"https:\/\/tdcontent.techdata.com\/techsolutions\/security\/Services.aspx","td_contact":"SecurityServices@TechData.com","td_extension":"800-237-8931 ext. 5540508","vendor_id":"9","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1093","product_name":"Tech Data Delivered Check Point Implementation Services","description":"Tech Data specialized Check Point consulting services that help provide end-to-end security from the enterprise, to the cloud, to mobile workers' personal devices.","hyperlink":"https:\/\/tdcontent.techdata.com\/techsolutions\/security\/Services.aspx","td_contact":"SecurityServices@TechData.com","td_extension":"800-237-8931 ext. 5540508","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1739","product_name":"Tech Data Delivered Cisco Implementation Services","description":"Tech Data time and materials implementation services that help customers with architecture, deployment, and operation services for Cisco products","hyperlink":"https:\/\/tdcontent.techdata.com\/techsolutions\/security\/Services.aspx","td_contact":"SecurityServices@TechData.com","td_extension":"800-237-8931 ext. 5540508","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1095","product_name":"Tech Data Delivered F5 Implementation Services","description":"Tech Data time and materials implementation services that help customers with architecture, deployment, and operation services for F5 BIG-IP Local Traffic Manager (LTM) or Global Traffic Manager (GTM)","hyperlink":"https:\/\/tdcontent.techdata.com\/techsolutions\/security\/Services.aspx","td_contact":"SecurityServices@TechData.com","td_extension":"800-237-8931 ext. 5540508","vendor_id":"26","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1741","product_name":"Tech Data Delivered Fortinet Implementation Services","description":"Tech Data time and materials implementation services that help customers with architecture, deployment, and operation services for Fortinet Products","hyperlink":"https:\/\/tdcontent.techdata.com\/techsolutions\/security\/Services.aspx","td_contact":"SecurityServices@TechData.com","td_extension":"800-237-8931 ext. 5540508","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1099","product_name":"Tech Data Delivered Guardium Implementation Services","description":"Tech Data time and materials implementation services that help customers with architecture, deployment, customization, tuning, and operation services for IBM Gaurdium. Other available services includes managed services to support the Gaurdium and Big Data Security apps together.","hyperlink":"https:\/\/tdcontent.techdata.com\/techsolutions\/security\/Services.aspx","td_contact":"SecurityServices@TechData.com","td_extension":"800-237-8931 ext. 5540508","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1745","product_name":"Tech Data Delivered Identity and Access Management Implementation Services","description":"Tech Data time and materials implementation services that help customers with architecture, deployment, customization, tuning, and operation services for IBM Identity and Access Management, which also includes ISIM, ISDI, and ISIGI.","hyperlink":"https:\/\/tdcontent.techdata.com\/techsolutions\/security\/Services.aspx","td_contact":"SecurityServices@TechData.com","td_extension":"800-237-8931 ext. 5540508","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1107","product_name":"Tech Data Delivered McAfee DLP Deployment - One Week    <\/span>NEW!","description":"This is a basic DLP deployment and configuration task. A pre-engagement call will be used to determine specific needs and set expectations. Generally, the client is expected to have ePO deployed and some number of managed clients. This will include initial installation, baseline configuration, policies, and reporting in line with vendor best practices. Additional time can be added if required using the general McAfee Professional Services SKU.","hyperlink":"https:\/\/tdcontent.techdata.com\/techsolutions\/security\/Services.aspx","td_contact":"SecurityServices@TechData.com","td_extension":"800-237-8931 ext. 5540508","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1753","product_name":"Tech Data Delivered McAfee Endpoint Security Deployment - One Week    <\/span>NEW!","description":"This is a basic ENS deployment and configuration task. A pre-engagement call will be used to determine specific needs and set expectations. Generally, the client is expected to have ePO deployed and some number of managed clients. This will include initial installation, baseline configuration, policies, and reporting in line with vendor best practices. Additional time can be added if required using the general McAfee Professional Services SKU.","hyperlink":"https:\/\/tdcontent.techdata.com\/techsolutions\/security\/Services.aspx","td_contact":"SecurityServices@TechData.com","td_extension":"800-237-8931 ext. 5540508","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1106","product_name":"Tech Data Delivered McAfee ePO Deployment - One Week    <\/span>NEW!","description":"This is a basic ePO deployment and configuration task. A pre-engagement call will be used to determine specific needs and set expectations. Generally, the client is expected to have host server(s) ready for product installation in accordance with the terms discussed on the pre-engagement call. This will include initial installation, baseline configuration, policies, and reporting in line with vendor best practices. Additional time can be added if required using the general McAfee Professional Services SKU.","hyperlink":"https:\/\/tdcontent.techdata.com\/techsolutions\/security\/Services.aspx","td_contact":"SecurityServices@TechData.com","td_extension":"800-237-8931 ext. 5540508","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1750","product_name":"Tech Data Delivered McAfee ePO Health Check - Standard    <\/span>NEW!","description":"This is an interactive review of the ePO configuration and infrastructure as well as baseline product policies for up to five products from the list above. This analysis will cover client task assignment details, discussion of system tree layout and sorting, and a review of server task details where there are indications of problems. The client will be left with specific advice for corrections and example solution implementation changes as appropriate. An in-depth review of one set of policies for each product (the organization baseline policy) with specific recommendations for improvement will be included.","hyperlink":"https:\/\/tdcontent.techdata.com\/techsolutions\/security\/Services.aspx","td_contact":"SecurityServices@TechData.com","td_extension":"800-237-8931 ext. 5540508","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1104","product_name":"Tech Data Delivered McAfee Implementation Services","description":"Tech Data time and materials implementation services that help customers with architecture, deployment, and operation services for McAfee's Security Portfolio's products. Other available services includes managed services to support McAfee.","hyperlink":"https:\/\/tdcontent.techdata.com\/techsolutions\/security\/Services.aspx","td_contact":"SecurityServices@TechData.com","td_extension":"800-237-8931 ext. 5540508","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1109","product_name":"Tech Data Delivered Palo Alto Implementation Services","description":"Tech Data time and materials implementation services that help customers with architecture, deployment, and operation services for Palo Alto Products","hyperlink":"https:\/\/tdcontent.techdata.com\/techsolutions\/security\/Services.aspx","td_contact":"SecurityServices@TechData.com","td_extension":"800-237-8931 ext. 5540508","vendor_id":"63","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1746","product_name":"Tech Data Delivered QRadar Implementation Services","description":"Tech Data time and materials implementation services that help customers with architecture, deployment, customization, tuning, and operation services for IBM QRadar Other available services includes managed services to support IBM QRadar.","hyperlink":"https:\/\/tdcontent.techdata.com\/techsolutions\/security\/Services.aspx","td_contact":"SecurityServices@TechData.com","td_extension":"800-237-8931 ext. 5540508","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1102","product_name":"Tech Data Delivered Resilient Implementation Services","description":"Tech Data time and materials implementation services that help customers with architecture, deployment, customization, tuning, and operation services for IBM Resilient Other available services includes managed services to support IBM Resilient","hyperlink":"https:\/\/tdcontent.techdata.com\/techsolutions\/security\/Services.aspx","td_contact":"SecurityServices@TechData.com","td_extension":"800-237-8931 ext. 5540508","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1748","product_name":"Tech Data Delivered SKLM Implementation Services","description":"Tech Data time and materials implementation services that help customers with architecture, deployment, customization, tuning, and operation services forIBM Secure Key Life-cycle Manager (SKLM)","hyperlink":"https:\/\/tdcontent.techdata.com\/techsolutions\/security\/Services.aspx","td_contact":"SecurityServices@TechData.com","td_extension":"800-237-8931 ext. 5540508","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1113","product_name":"Tech Data Delivered Sonicwall Implementation Services","description":"Tech Data time and materials implementation services that help customers with architecture, deployment, and operation services for Sonicwall Products","hyperlink":"https:\/\/tdcontent.techdata.com\/techsolutions\/security\/Services.aspx","td_contact":"SecurityServices@TechData.com","td_extension":"800-237-8931 ext. 5540508","vendor_id":"56","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1755","product_name":"Tech Data Delivered Splunk Implementation Services","description":"Tech Data time and materials implementation services that help customers with architecture, deployment, and operation services for Splunk Products","hyperlink":"https:\/\/tdcontent.techdata.com\/techsolutions\/security\/Services.aspx","td_contact":"SecurityServices@TechData.com","td_extension":"800-237-8931 ext. 5540508","vendor_id":"64","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1111","product_name":"Tech Data Delivered Symantec Implementation Services","description":"Tech Data time and materials implementation services that help customers with architecture, deployment, and operation services for Symantec","hyperlink":"https:\/\/tdcontent.techdata.com\/techsolutions\/security\/Services.aspx","td_contact":"SecurityServices@TechData.com","td_extension":"800-237-8931 ext. 5540508","vendor_id":"65","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1757","product_name":"Tech Data Delivered Trend Micro Implementation Services","description":"Tech Data time and materials implementation services that help customers with architecture, deployment, and operation services for Trend Micro Products","hyperlink":"https:\/\/tdcontent.techdata.com\/techsolutions\/security\/Services.aspx","td_contact":"SecurityServices@TechData.com","td_extension":"800-237-8931 ext. 5540508","vendor_id":"66","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1749","product_name":"Tech Data McAfee Delivered Implementation Services","description":"Tech Data time and materials implementation services that help customers with architecture, deployment, and operation services for McAfee's Security Portfolio's products. Other available services includes managed services to support McAfee.","hyperlink":"https:\/\/tdcontent.techdata.com\/techsolutions\/security\/Services.aspx","td_contact":"SecurityServices@TechData.com","td_extension":"800-237-8931 ext. 5540508","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1465","product_name":"Test Data Management","description":"Employ secure, automated provisioning of non-production data sets to meet development and testing needs.","hyperlink":"https:\/\/www.informatica.com\/products\/data-security\/test-data-management.html#fbid=UeeCmkL0Wl1","td_contact":"spi@dlt.com","td_extension":"703-708-9654","vendor_id":"37","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"550","product_name":"Threat Hunting","description":"Hands-on detection of advanced threats by our security analysts","hyperlink":"https:\/\/www.kaspersky.com\/enterprise-security\/threat-hunting","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,9,10,39,51,60"},{"product_id":"1161","product_name":"Threat Intelligence","description":"Keep ahead of the latest threats and protect your critical data with ongoing threat prevention and analysis","hyperlink":"https:\/\/www.trendmicro.com\/en_us\/business\/products\/network\/intrusion-prevention\/threat-intelligence.html","td_contact":"trendmicro@techdata.com","td_extension":"800-237-8931 ext. 5545035","vendor_id":"66","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,85,86,88,89"},{"product_id":"551","product_name":"Threat Intelligence","description":"Evidence-based knowledge, including context and actionable recommendations, regarding cyberthreats","hyperlink":"https:\/\/www.kaspersky.com\/enterprise-security\/incident-response","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,9,10,39,51,60"},{"product_id":"1514","product_name":"Threat Intelligence Exchange","description":"McAfee Threat Intelligence Exchange optimizes threat prevention by narrowing the gap from malware encounter to containment from days, weeks, and months down to milliseconds.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/threat-intelligence-exchange.html","td_contact":"Tech Data: mcafee@techdata.com\n

DLT: spi@dlt.com<\/p>","td_extension":"Tech Data: 800-237-8931\n

DLT: 703-773-9231<\/p>","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"552","product_name":"Threat Management and Defense","description":"Kaspersky Threat Management and Defense delivers a unique combination of leading technologies and services which support the implementation of an Adaptive Security Strategy - helping your security team to Prevent most attacks, Detect unique new threats rapidly, Respond to live incidents and Predict future threats.","hyperlink":"https:\/\/www.kaspersky.com\/enterprise-security\/security-training","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,9,10,39,51,60"},{"product_id":"1254","product_name":"Threat Manager","description":"Threat Manager protects your hybrid infrastructure, applications and cloud workloads by combining a network intrusion detection system (IDS) with vulnerability management","hyperlink":"https:\/\/www.alertlogic.com\/solutions\/network-intrusion-detection-system-ids\/","td_contact":"Tech Data: enterprisecloudsales@techdata.com\n

DLT: spi@dlt.com<\/p>","td_extension":"DLT: 703-773-9239","vendor_id":"2","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"804","product_name":"Threat Response","description":"Threat Response orchestrates several key phases of the incident response process","hyperlink":"https:\/\/www.proofpoint.com\/us\/products\/advanced-threat-protection\/threat-response","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 629","vendor_id":"48","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,65,71"},{"product_id":"1913","product_name":"Threat Response and Readiness","description":"A subscription service that helps companies prepare for, as well as quickly assess and respond to, a ransomware or cyber extortion attack. Research combines technology, unmatched multilingual intelligence analyst expertise, and a Professional Service team.","hyperlink":"https:\/\/www.flashpoint-intel.com\/alerting\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"97","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"798","product_name":"Threat Response Auto-Pull (TRAP)","description":"Quarantine malicious email post-delivery and get reports on quarantine attempts","hyperlink":"https:\/\/www.proofpoint.com\/us\/products\/email-protection\/threat-response-auto-pull","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 623","vendor_id":"48","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,65,71"},{"product_id":"342","product_name":"Threat-Based Third Party Risk (3PR)","description":"If you are looking to work with a new partner or client that will access your IT resources, be used as a component in a technology product, or whose cloud-delivered service can disrupt your business if it is attacked then you need to understand the threats to those third parties. CYR3CON\u2122 Threat-Based Third Party risk provides an assessment of your third-parties based on what the malicious hackers are saying about them on the deepweb and darkweb. This provides true threat perspective and not dependent on (yet complementary to) the traditional questionnaires offered to third parties. CYR3CON\u2122 Threat-Based Third Party Risk helps customers identify their most risky third parties, and drives decisions on controls, obligations, and audits.","hyperlink":"https:\/\/www.cyr3con.ai\/Home","td_contact":"cyr3con@techdata.com","td_extension":"","vendor_id":"21","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"25","product_name":"THRICOTM Third-Party Cyber Risk Scoring","description":"Chronic vendor cybersecurity vulnerabilities and weaknesses plague even the most capable of organizations. Arx Nimbus utilizes the Thrivaca SaaS platform, driven by an optimized regulatory-based mathematical algorithm, to provide the most complete third-party risk profile available today. The Thrico(c) Score goes beyond superficial web-based scans and provides actionable and auditable risk profiles based on validated standards to get you and your vendors the results you need in a form regulators, shareholders and risk professionals can validate and accept.","hyperlink":"https:\/\/www.arxnimbus.com\/","td_contact":"arxnimbus@techdata.com","td_extension":"","vendor_id":"3","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"26","product_name":"THRIVACA SaaS Analytical Platform","description":"Starting with a complete, standards-based core structure comprising Threats, Risks, Vulnerabilities and Capabilities, Thrivaca creates a disciplined architecture for analysis of these key dimensions of cybersecurity practice. Using mathematical standards derived from proven actuarial methods, Thrivaca's proprietary algorithm provides a quantitatively advanced basis for incorporating newly emerging data sources to better inform probability and impact of cyber risks. Because Thrivaca(c) is not based on older, conventional methods and is not inherently dependent on the \"professional judgement\" of individuals, it provides an objective, regulator-friendly rendering of actual cyber risk across the entire spectrum of cyber capabilities.","hyperlink":"https:\/\/www.arxnimbus.com\/","td_contact":"arxnimbus@techdata.com","td_extension":"","vendor_id":"3","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1162","product_name":"TippingPoint Threat Protection System","description":"Go beyond next-gen IPS without compromising security or performance","hyperlink":"https:\/\/www.trendmicro.com\/en_us\/business\/products\/network\/intrusion-prevention\/tipping-point-threat-protection-system.html","td_contact":"trendmicro@techdata.com","td_extension":"800-237-8931 ext. 5545035","vendor_id":"66","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,85,86,88,89"},{"product_id":"1891","product_name":"Titus Accelerator for Privacy","description":"Titus Accelerator for Privacy can help you find personally identifiable information (PII) within unstructured data and can offer suggestions for, or even automatically determine, its categorization.","hyperlink":"https:\/\/titus.com\/products\/accelerator-for-privacy","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"92","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1890","product_name":"Titus Classification Suite","description":"Data classification tools to clearly inform people and your policies on what information should be secured and how to handle it.\n- Promote awareness and accountability\n- Comply with regulations and policies\n- Leverage metadata to enhance downstream solutions\n- Automatically trigger VERA protection based on the classification of a file\n- Supports PDFs, videos, images, ZIP files, and design documents","hyperlink":"https:\/\/titus.com\/products\/data-classification-suite","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"92","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1892","product_name":"Titus Data Identification","description":"Titus Data Identification prevents sensitive data from being sent via email. It is a cloud-based email data protection solution that uses the multi-pronged Titus Data Detection Engine and pre-configured cloud-based libraries to evaluate data in context and accurately identify sensitive data \u2013 before users send it to unauthorized recipients.","hyperlink":"https:\/\/titus.com\/products\/data-identification-service","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"92","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1889","product_name":"Titus Illuminate","description":"Illuminate scans locations where you store data, including on-premise shares, Box, Dropbox, OneDrive, and Microsoft SharePoint and SharePoint Online.\n\nIt examines and automatically classifies the files it discovers, ensuring appropriate data protection is applied.\n\nAnd, as it scans files, Illuminate gathers extensive information about each file, building a data inventory for you to run analytics to identify risk areas.","hyperlink":"https:\/\/titus.com\/products\/titus-illuminate-data-protection","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"92","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1515","product_name":"Total Protection for Data Loss Prevention","description":"McAfee Total Protection for Data Loss Prevention (DLP) enables you to be proactive about data protection, and ensures that you create effective information protection policies.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/total-protection-for-data-loss-prevention.html","td_contact":"Tech Data: mcafee@techdata.com\n

DLT: spi@dlt.com<\/p>","td_extension":"Tech Data: 800-237-8931\n

DLT: 703-773-9231<\/p>","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1164","product_name":"Trend Micro MSP Program","description":"With Trend Micro, you can take your cybersecurity strategy beyond the endpoint, build out new recurring revenue streams, and break down silos. Built by passionate people who live and breathe cybersecurity, Trend Micro helps your business become more resilient.","hyperlink":"","td_contact":"trendmicro@techdata.com","td_extension":"800-237-8931 ext. 5545035","vendor_id":"66","service_tiering":"Monthly consumption-based subscription model","partner_benefits":"

\u2022   Earn more margin as you grow your monthly consumption with customer aggregate <\/p>\n

\u2022   TrendSetters rebate program - earn $$$ as monthly consumption increases <\/p>\n

\u2022   Simplify and improve security management with centralized & multitenant tool<\/p>\n

\u2022   3rd party RMM & PSA integration<\/p>","typeof_service":"

Managed Security Services Building Block Solution:<\/strong>  Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":"

\u2022   Connected Threat sharing &mitigation across multiple security protection points<\/p>\n

\u2022   Automated detection & response<\/p>\n

\u2022   SaaS based Security services<\/p>","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1860","product_name":"Tripwire Configuration Manager","description":"Monitor and enforce secure configuration policies across your multi-cloud environment. Automated enforcement, prioritized risk scoring, multi-cloud support","hyperlink":"https:\/\/www.tripwire.com\/products\/tripwire-configuration-manager","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"82","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1854","product_name":"Tripwire Enterprise","description":"Tripwire Enterprise is a security configuration management (SCM)\nsuite that provides fully integrated solutions for policy, file integrity\nand remediation management. Organizations can use these solutions\ntogether for a complete end-to-end SCM solution, or use its file integrity\nmonitoring or policy management solutions on their own to address\nsecurity and compliance challenges.","hyperlink":"https:\/\/www.tripwire.com\/products\/tripwire-enterprise","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"82","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1859","product_name":"Tripwire ExpertOps","description":"ExpertOps merges the industry-leading security and compliance functionality Tripwire is known for with your DevOps workflows. This comprehensive security SaaS solution that runs both static and dynamic analysis on container images for vulnerabilities in a sandboxed cloud environment to equip DevOps teams with a complete security assessment of new application builds as they move through the CI\/CD toolchain from development to production.","hyperlink":"https:\/\/www.tripwire.com\/products\/tripwire-expertops","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"82","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1855","product_name":"Tripwire File Integrity Manager","description":"Tripwire File Integrity Monitoring (FIM) reduces noise by providing multiple ways of determining low-risk change from high-risk change so IT has more time to investigate changes that may truly impact security and introduce risk. Tripwire uses agents to continuously capture detailed who, what, and when details in real time, to ensure that you detect all change, capture details about each one, and use those details to determine the security risk or non-compliance.","hyperlink":"https:\/\/www.tripwire.com\/products\/tripwire-file-integrity-manager","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"82","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1856","product_name":"Tripwire Industrial Visibility","description":"Deciphers over 40 of the most common industrial protocols\u2014more than any other ICS visibility solution. Passive scanning and agentless monitoring. Virtual network segmentation for protocol-specific deep packet inspection firewall rules.","hyperlink":"https:\/\/www.tripwire.com\/products\/tripwire-industrial-visibility","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"82","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1857","product_name":"Tripwire IP360","description":"Tripwire IP360\n9.0 provides agent-based vulnerability\nmanagement (ABVM) for organizations\nand agencies with the most granular\nrisk prioritization visibility on the\nmarket. \n\nProvides granular risk\nprioritization reporting \n- For use in on-premises,\ncloud and hybrid\nenvironments\n- Overall footprint <100 MB\n- Consumes <2% of CPU\nresources","hyperlink":"https:\/\/www.tripwire.com\/products\/tripwire-ip360","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"82","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1858","product_name":"Tripwire Log Center","description":"Tripwire Log Center's correlation engine automatically identifies and responds to events of interest. Actions can include creating a work ticket, sending a notification email, or running a command. It also integrates with Tripwire Enterprise and Tripwire IP360 to detect and respond to anomalies and suspicious activities.","hyperlink":"https:\/\/www.tripwire.com\/products\/tripwire-log-center","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"82","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2075","product_name":"Tririga","description":"An integrated workplace management solution (IWMS) that includes modules designed to accommodate the needs of operational, financial and environmental performance. Key features include environment and energy management, capital project management, lease accounting and facility management","hyperlink":"https:\/\/www.ibm.com\/products\/tririga","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1708","product_name":"Trust Center Account for Enterprise","description":"Manage your enterprise website security and SSL certificates from a single sign-on, cloud-based platform with 100 percent uptime.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/vpat-symantec-trust-center-for-enterprise-en","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"997","product_name":"Trusted Mobile Device Security Service","description":"Symantec\u2019s cloud-delivered Mobile Device Security Service brings enterprise-grade threat protection and policy controls to mobile devices, no matter where your employees are using them","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/web-and-email\/gateway\/trusted-mobile-device-security-service","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1446","product_name":"Trusteer","description":"IBM\u00ae Trusteer helps organizations seamlessly establish identity trust across the omnichannel customer journey. Through cloud-based intelligence, backed by AI and patented machine learning, Trusteer provides a holistic approach to identifying new and existing customers, without negatively impacting user experience. Over 500 leading organizations rely on Trusteer to help enable and secure their customers\u2019 digital journey and support business growth. In doing so, Trusteer runs over 40 billion application accesses monthly and over 1 billion monthly user sessions.","hyperlink":"https:\/\/www.ibm.com\/security\/fraud-protection\/trusteer","td_contact":"West: Rick.Marshall@techdata.com\n

East: Karen.Bailey@techdata.com<\/p>","td_extension":"West: (480) 254-4420\n

East: (678) 642-3446<\/p>","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1894","product_name":"Tychon Automated DoD Cyber Hygiene Scorecard","description":"Interactive dashboards, which display real-time enterprise compliance metrics for up-to-date situational awareness of network risk. Vital reports with details on privileged users, Web PKI and DMZ, asset inventory, system authorization, HBSS\/ESS Services, patching and overall organization software compliance.","hyperlink":"https:\/\/tychon.io\/products\/cyber-scorecard-csc\/","td_contact":"spi@dlt.com","td_extension":"703-773-9239","vendor_id":"93","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1893","product_name":"Tychon Enterprise Endpoint Management Platform","description":"Tychon\u2019s Enterprise Endpoint Management Platform delivers situational awareness across the enterprise by providing real-time endpoint visibility and the capability to proactively monitor, manage, and validate Cyber Hygiene compliance. Tychon delivers this through dynamic products that allow organizations to validate security settings at the endpoint in real-time and query specific system(s), remediate vulnerabilities, add\/remove software, quarantine systems, update patches and more all from a single console. Tychon\u2019s proactive compliance validation decreases the enterprise attack surface and expands your organization\u2019s defense-in-depth and operational resilience.","hyperlink":"https:\/\/tychon.io\/products\/enterprise-endpoint-management-platform\/","td_contact":"spi@dlt.com","td_extension":"703-773-9239","vendor_id":"93","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1895","product_name":"Tychon Tactical Tychon","description":"Tactical Tychon (tTYCHON) is a derivative of Tychon specifically developed for maritime and land based deployed forces and enables the HBSS\/ESS infrastructure to operate in low, limited, or no bandwidth environments for incident response and systems management. Tychon is a dynamic enterprise endpoint management platform, built for the DoD and fully integrated into the McAfee security stack. Tychon provides real-time endpoint visibility across the enterprise, provides customizable real-time data feeds, fully automates the DoD Cyber Hygiene Scorecard and offers a flexible asset management query & response tool that gives incident responders complete control of their systems from any ePO server inside the DODIN.","hyperlink":"https:\/\/tychon.io\/products\/tactical-tychon\/","td_contact":"spi@dlt.com","td_extension":"703-773-9239","vendor_id":"93","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1947","product_name":"Ubiq SDK","description":"Ubiq developed and patented an asynchronous multithreading technique, which allows us to exploit available compute on a system, without impacting system performance. We then leverage this technique with our data security model, which involves a 4-step-process to secure any data type:\n1. Fragmentation\n2. Disassociation\n3. Encryption\n4. Dispersion","hyperlink":"https:\/\/www.ubiqsecurity.com\/sdk","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"103","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"387","product_name":"UEBA Behavioral Analytics","description":"AI-fueled behavior analytics to identify real entity risk","hyperlink":"https:\/\/www.forcepoint.com\/product\/ueba-user-entity-behavior-analytics","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"28","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,80"},{"product_id":"20","product_name":"Unified Log Management and Review","description":"Collect, aggregate, and search log data from cloud, server, application, security, and network assets across your environments and clouds\u2014managed 24x7","hyperlink":"https:\/\/www.alertlogic.com\/solutions\/log-management-software\/","td_contact":"enterprisecloudsales@techdata.com","td_extension":"","vendor_id":"2","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,6,8,9,10,12,14,16,18,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61"},{"product_id":"1169","product_name":"Unitrends Backup Software","description":"Unitrends Backup is a full-featured virtual appliance that runs on your choice of hypervisor or cloud.","hyperlink":"www.unitrends.com\/products","td_contact":"pmunitrends@techdata.com","td_extension":"800-237-8931 x71478","vendor_id":"67","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,10,17"},{"product_id":"1781","product_name":"Unitrends Free","description":"Full-featured backup & recovery for up to 1TB - for VMware, Hyper-V, & Windows","hyperlink":"www.unitrends.com\/products","td_contact":"pmunitrends@techdata.com","td_extension":"800-237-8931 x71478","vendor_id":"67","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1301","product_name":"URL Filtering Software Blade","description":"Check Point URL Filtering provides optimized web security through full integration in the gateway to prevent bypass through external proxies. Integration of policy enforcement with Application Control means enhanced Web and Web 2.0 protection, and UserCheck technology empowers and educates users on web usage policy in real time.","hyperlink":"https:\/\/www.checkpoint.com\/products\/url-filtering-software-blade\/","td_contact":"checkpoint@techdata.com","td_extension":"800-237-8931 x5545036","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"864","product_name":"User Device Tracker","description":"Locate users and devices on your network with User Device Tracker","hyperlink":"https:\/\/www.solarwinds.com\/user-device-tracker","td_contact":"solarwindssoftware@techdata.com","td_extension":"1-800-237-8931 ext. 5540493","vendor_id":"55","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61"},{"product_id":"1842","product_name":"UserXDR","description":"User entity behavioral analytics (UEBA) solution","hyperlink":"https:\/\/logrhythm.com\/products\/logrhythm-user-xdr\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"78","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1710","product_name":"VDI Security - Endpoint Protection For VDI","description":"Boost the performance of your VDI and keep a high level of security with agentless anti-malware and complete threat protection.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/endpoint-protection-vdi-en","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2097","product_name":"Vendor Access Manager","description":"Access request, org management, access review","hyperlink":"https:\/\/saviynt.com\/vendor-access-management\/","td_contact":"SaviyntUS@techdata.com","td_extension":"800-237-8931 x 5540529","vendor_id":"124","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1175","product_name":"Veritas Backup & Recovery- Backup Exec","description":"A fast, cost-effective, unified backup and recovery solution for cloud-ready organizations.","hyperlink":"https:\/\/www.veritas.com\/solution\/cloud","td_contact":"veritas@techdata.com","td_extension":"800-237-8931 x71424","vendor_id":"69","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,4,9,10,51"},{"product_id":"1784","product_name":"Veritas Backup & Recovery- Desktop & Laptop Option","description":"Automated file backup and recovery for data stored on desktops or laptops.","hyperlink":"https:\/\/www.veritas.com\/solution\/cloud","td_contact":"Tech Data: veritas@techdata.com\n

DLT: spi@dlt.com<\/p>","td_extension":"Tech Data: 800-237-8931 x71424\n

DLT: 703-773-1160<\/p>","vendor_id":"69","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1177","product_name":"Veritas Backup & Recovery- Flex Appliance","description":"Beyond hyper-converged: information-defined microservices.","hyperlink":"https:\/\/www.veritas.com\/solution\/cloud","td_contact":"veritas@techdata.com","td_extension":"800-237-8931 x71424","vendor_id":"69","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,4,9,10,51"},{"product_id":"1786","product_name":"Veritas Backup & Recovery- NetBackup","description":"Enterprise data backup and recovery optimized for the multi-cloud.","hyperlink":"https:\/\/www.veritas.com\/solution\/cloud","td_contact":"Tech Data: veritas@techdata.com\n

DLT: spi@dlt.com<\/p>","td_extension":"Tech Data: 800-237-8931 x71424\n

DLT: 703-773-1160<\/p>","vendor_id":"69","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1179","product_name":"Veritas Backup & Recovery- NetBackup Appliances","description":"Simple and efficient backup, storage and deduplication on a single device.","hyperlink":"https:\/\/www.veritas.com\/solution\/cloud","td_contact":"veritas@techdata.com","td_extension":"800-237-8931 x71424","vendor_id":"69","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,4,9,10,51"},{"product_id":"1788","product_name":"Veritas Backup & Recovery- SaaS Backup","description":"A backup and recovery hosted service for SaaS application protection, scalable from small business to enterprise.","hyperlink":"https:\/\/www.veritas.com\/solution\/cloud","td_contact":"Tech Data: veritas@techdata.com\n

DLT: spi@dlt.com<\/p>","td_extension":"Tech Data: 800-237-8931 x71424\n

DLT: 703-773-1160<\/p>","vendor_id":"69","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1181","product_name":"Veritas Backup & Recovery- System Recovery","description":"Image-based backup and disaster recovery for servers, desktops and laptops","hyperlink":"https:\/\/www.veritas.com\/solution\/cloud","td_contact":"veritas@techdata.com","td_extension":"800-237-8931 x71424","vendor_id":"69","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,4,9,10,51"},{"product_id":"1790","product_name":"Veritas Backup & Recovery- Velocity","description":"Provide rapid, self-service access to the right data at the right time.","hyperlink":"https:\/\/www.veritas.com\/solution\/cloud","td_contact":"Tech Data: veritas@techdata.com\n

DLT: spi@dlt.com<\/p>","td_extension":"Tech Data: 800-237-8931 x71424\n

DLT: 703-773-1160<\/p>","vendor_id":"69","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1183","product_name":"Veritas Business Continuity- Cloud Mobility","description":"Cloud Mobility is a migration tool for migrating on-premises workloads to the public cloud. The tool supports migrating workloads to AWS as well as Azure. Cloud Mobility also supports migrations between cloud providers to avoid vendor lock-in.","hyperlink":"https:\/\/www.veritas.com\/solution\/cloud","td_contact":"veritas@techdata.com","td_extension":"800-237-8931 x71424","vendor_id":"69","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,4,9,10,51"},{"product_id":"1792","product_name":"Veritas Business Continuity- InfoScale Availability","description":"Avoid unwanted downtime with resilient high availability and disaster recovery.","hyperlink":"https:\/\/www.veritas.com\/solution\/cloud","td_contact":"Tech Data: veritas@techdata.com\n

DLT: spi@dlt.com<\/p>","td_extension":"Tech Data: 800-237-8931 x71424\n

DLT: 703-773-1160<\/p>","vendor_id":"69","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1185","product_name":"Veritas Business Continuity- Managed Continuity Service","description":"Ensure business continuity with managed disaster recovery as a service.","hyperlink":"https:\/\/www.veritas.com\/solution\/cloud","td_contact":"veritas@techdata.com","td_extension":"800-237-8931 x71424","vendor_id":"69","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,4,9,10,51"},{"product_id":"1794","product_name":"Veritas Business Continuity- Resiliency Platform","description":"Predictable disaster recovery and resilience for the modern enterprise.","hyperlink":"https:\/\/www.veritas.com\/product\/business-continuity\/resiliency-platform","td_contact":"Tech Data: veritas@techdata.com\n

DLT: spi@dlt.com<\/p>","td_extension":"Tech Data: 800-237-8931 x71424\n

DLT: 703-773-1160<\/p>","vendor_id":"69","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1187","product_name":"Veritas Information Governance- Data Insight","description":"Reduce risk and improve accountability by analyzing and classifying your data.","hyperlink":"https:\/\/www.veritas.com\/solution\/cloud","td_contact":"veritas@techdata.com","td_extension":"800-237-8931 x71424","vendor_id":"69","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,4,9,10,51"},{"product_id":"1796","product_name":"Veritas Information Governance- eDiscovery Platform","description":"Respond quickly and easily to legal, regulatory and discovery requests.","hyperlink":"https:\/\/www.veritas.com\/solution\/cloud","td_contact":"Tech Data: veritas@techdata.com\n

DLT: spi@dlt.com<\/p>","td_extension":"Tech Data: 800-237-8931 x71424\n

DLT: 703-773-1160<\/p>","vendor_id":"69","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1189","product_name":"Veritas Information Governance- Enterprise Vault","description":"Veritas Enterprise Vault: our purpose-built retention management platform lets you execute diverse strategies to quickly and easily meet business and regulatory information retention requirements","hyperlink":"https:\/\/www.veritas.com\/product\/information-governance\/enterprise-vault","td_contact":"veritas@techdata.com","td_extension":"800-237-8931 x71424","vendor_id":"69","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,4,9,10,51"},{"product_id":"1798","product_name":"Veritas Information Governance- Enterprise Vault Cloud","description":"Cloud-based archiving service for data governance requirements.","hyperlink":"https:\/\/www.veritas.com\/product\/information-governance\/enterprise-vault-cloud","td_contact":"Tech Data: veritas@techdata.com\n

DLT: spi@dlt.com<\/p>","td_extension":"Tech Data: 800-237-8931 x71424\n

DLT: 703-773-1160<\/p>","vendor_id":"69","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1191","product_name":"Veritas Information Governance- Information Map","description":"Information Map provides multi-cloud data visibility to help organizations better understand and control their fragmented data estate.","hyperlink":"https:\/\/www.veritas.com\/product\/information-governance\/information-map","td_contact":"veritas@techdata.com","td_extension":"800-237-8931 x71424","vendor_id":"69","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,4,9,10,51"},{"product_id":"1800","product_name":"Veritas Multi-Cloud Data Mgmt- Cloud Mobility","description":"Simple, quick and automated migration to your public cloud of choice.","hyperlink":"https:\/\/www.veritas.com\/solution\/cloud","td_contact":"Tech Data: veritas@techdata.com\n

DLT: spi@dlt.com<\/p>","td_extension":"Tech Data: 800-237-8931 x71424\n

DLT: 703-773-1160<\/p>","vendor_id":"69","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1193","product_name":"Veritas Multi-Cloud Data Mgmt- CloudPoint","description":"Backup reimagined and built for the multi-cloud digital enterprise.","hyperlink":"https:\/\/www.veritas.com\/solution\/cloud","td_contact":"veritas@techdata.com","td_extension":"800-237-8931 x71424","vendor_id":"69","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,4,9,10,51"},{"product_id":"1802","product_name":"Veritas Multi-Cloud Data Mgmt- Enterprise Vault","description":"Enterprise archiving to centralize and automate the retention of data.","hyperlink":"https:\/\/www.veritas.com\/solution\/cloud","td_contact":"Tech Data: veritas@techdata.com\n

DLT: spi@dlt.com<\/p>","td_extension":"Tech Data: 800-237-8931 x71424\n

DLT: 703-773-1160<\/p>","vendor_id":"69","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1195","product_name":"Veritas Multi-Cloud Data Mgmt- Information Map","description":"Unstructured Data Analytics & Cloud Governance.","hyperlink":"https:\/\/www.veritas.com\/solution\/cloud","td_contact":"veritas@techdata.com","td_extension":"800-237-8931 x71424","vendor_id":"69","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,4,9,10,51"},{"product_id":"1804","product_name":"Veritas Multi-Cloud Data Mgmt- Resiliency Platform","description":"Predictable disaster recovery and resilience for the modern enterprise.","hyperlink":"https:\/\/www.veritas.com\/solution\/cloud","td_contact":"Tech Data: veritas@techdata.com\n

DLT: spi@dlt.com<\/p>","td_extension":"Tech Data: 800-237-8931 x71424\n

DLT: 703-773-1160<\/p>","vendor_id":"69","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1711","product_name":"VIP","description":"Prevent unauthorized access to networks, applications, and the cloud with easy to use multi-factor and risk-based authentication.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/symantec-vip-en","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1000","product_name":"VIP Access Manager","description":"Protect your enterprise\u2019s data through Single Sign-On (SSO) with strong authentication, access control, and user management.","hyperlink":"https:\/\/www.broadcom.com\/info\/symantec\/vip-access-manager","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1649","product_name":"Virtual appliances","description":"Stormshield Elastic Virtual Appliances offers companies proven security \nthat is proactive in the face of future threats, guaranteeing real \nprotection against internal and external threats. These solutions secure\n both employee productivity and business servers in virtual \nenvironments. It is available for Amazon Web Services and Microsoft Azure.","hyperlink":"https:\/\/www.stormshield.com\/products\/virtual-appliances\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"59","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"889","product_name":"Virtual Firewalls","description":"Secure your public, private or hybrid cloud environment with virtualized versions of SonicWall next-generation firewalls and simplify administration with common management across your virtual and physical infrastructure.","hyperlink":"https:\/\/www.sonicwall.com\/en-us\/products\/firewalls\/nsv-series","td_contact":"sonicwall@techdata.com","td_extension":"800-237-8931 x5545032","vendor_id":"56","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"672","product_name":"Virtual Network Security Platform","description":"With support for network virtualization, VMware NSX, and Amazon Web Services (AWS), McAfee Virtual Network Security Platform enables the flexibility to quickly scale security based upon the changing dynamics of virtualized workloads.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/virtual-network-security-platform.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1713","product_name":"Virtual Secure Web Gateway","description":"Symantec\u2019s award-winning Secure Web Gateway in a virtual appliance form factor for VMWare, Hyper-V and AWS environments","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/web-and-email\/gateway","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1939","product_name":"Virtual Traffic Manager","description":"vADC- vTM, WAF, and load balancing-virtualized Application Delivery Controller for fast, reliable application delivery across virtual and cloud platforms with flexible on demand licensing (1\/2 cost AND 2x plus the performance and optimization)","hyperlink":"https:\/\/www.pulsesecure.net\/products\/virtual-traffic-manager\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"101","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1940","product_name":"Virtual Web Application Firewall","description":"vADC- vTM, WAF, and load balancing-virtualized Application Delivery Controller for fast, reliable application delivery across virtual and cloud platforms with flexible on demand licensing (1\/2 cost AND 2x plus the performance and optimization)","hyperlink":"https:\/\/www.pulsesecure.net\/products\/vwaf\/","td_contact":"spi@dlt.com","td_extension":"703-773-9231","vendor_id":"101","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1517","product_name":"VirusScan Enterprise","description":"Upgrade from McAfee VirusScan Enterprise to McAfee Endpoint Security, our newest security solution that offers comprehensive antivirus, anti-malware, desktop firewall, and web control.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/virusscan-enterprise.html","td_contact":"Tech Data: mcafee@techdata.com\n

DLT: spi@dlt.com<\/p>","td_extension":"Tech Data: 800-237-8931\n

DLT: 703-773-9231<\/p>","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"674","product_name":"VirusScan Enterprise for Linux","description":"McAfee VirusScan Enterprise for Linux keeps viruses and other malware off Linux systems with a scalable and easy-to-manage solution.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/virusscan-enterprise-for-linux.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1519","product_name":"VirusScan Enterprise for Storage","description":"McAfee VirusScan Enterprise for Storage blocks and removes malware from network-attached (NAS) storage devices.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/virusscan-enterprise-for-storage.html","td_contact":"Tech Data: mcafee@techdata.com\n

DLT: spi@dlt.com<\/p>","td_extension":"Tech Data: 800-237-8931\n

DLT: 703-773-9231<\/p>","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1171","product_name":"VM Backup Essentials (vBE)","description":"VM Backup Essentials (vBE) is all-in-one Backup and Continuity Solution for VMware Environments","hyperlink":"www.unitrends.com\/products","td_contact":"pmunitrends@techdata.com","td_extension":"800-237-8931 x71478","vendor_id":"67","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,10,17"},{"product_id":"1558","product_name":"Voltage SecureData Enterprise\u00a0","description":"Format-preserving encryption, tokenization, data masking, and key management","hyperlink":"https:\/\/software.microfocus.com\/en-us\/software\/voltage-data-encryption-security","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"715","product_name":"Voltage SecureData for Payments\u00a0","description":"Omni-channel PCI compliance and data protection for end-to-end payments security","hyperlink":"https:\/\/software.microfocus.com\/en-us\/products\/omnichannel-payment-security\/overview","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,63,65,67,68,69,70,71,74,75,76,77,80,81,84"},{"product_id":"1560","product_name":"Voltage SecureMail Cloud\u00a0","description":"SaaS cloud email encryption to protect information on Office 365","hyperlink":"https:\/\/software.microfocus.com\/en-us\/products\/cloud-email-encryption\/overview","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"717","product_name":"Voltage SecureMail On-Premises\u00a0","description":"Email, file, and Office 365 protection for PII, PHI, and Intellectual Property","hyperlink":"https:\/\/software.microfocus.com\/en-us\/products\/email-encryption-security\/overview","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,63,65,67,68,69,70,71,74,75,76,77,80,81,84"},{"product_id":"1562","product_name":"Voltage SecureMail\u00a0","description":"Scalable, end-to-end encrypted email solution for desktop, cloud, and mobile","hyperlink":"https:\/\/software.microfocus.com\/en-us\/software\/secure-email-encryption","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"1815","product_name":"vSAN","description":"Say goodbye to the cost and complexity of traditional storage and take the easiest path to hyperconverged infrastructure and hybrid cloud with VMware vSAN. As the only vSphere-native storage, vSAN makes it easy to extend your existing virtualization investments. Evolve to an integrated, hyperconverged infrastructure (HCI) solution with vSAN to improve business agility while managing complexity, cost, and risk.","hyperlink":"https:\/\/www.vmware.com\/products\/vsan.html","td_contact":"vmware@techdata.com","td_extension":"800-237-8931 x5545048","vendor_id":"70","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1209","product_name":"vSphere","description":"Unleash a powerful, flexible, and secure foundation for business agility that accelerates your digital transformation to hybrid cloud. vSphere is the industry-leading server virtualization software and the heart of a modern SDDC, helping you run, manage, connect, and secure your applications in a common operating environment across clouds. New advanced security capabilities, fully integrated into the hypervisor and powered by machine learning, provide better visibility, protection, and response times for security incidences. With vSphere, you can support new workloads and use cases while keeping pace with the growing needs and complexity of your infrastructure.","hyperlink":"https:\/\/www.vmware.com\/products\/vsphere.html","td_contact":"","td_extension":"800-237-8931 x5545048","vendor_id":"70","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,5,10,17,85,87"},{"product_id":"527","product_name":"vSRX Virtual Firewall","description":"The vSRX offers the same features as our physical SRX Series firewalls but in a virtualized form factor for delivering security services that scale to match network demand. It offers the same features as the SRX appliance, including core firewall, robust networking, full next-gen capabilities, and automated life-cycle management. Handling speeds up to 100 Gbps, the vSRX is the industry\u2019s fastest virtual firewall.","hyperlink":"https:\/\/www.juniper.net\/us\/en\/products-services\/security\/srx-series\/vsrx\/","td_contact":"","td_extension":"","vendor_id":"38","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"85","country_name":"ASIA PACIFIC","parint_id":"0","type":"0","country":"85,86"},{"product_id":"343","product_name":"Vulnerability Assessment","description":"Every enterprise has open vulnerabilities \u2013 the truth is that patching is a time consuming process \u2013 patches have to be tested and deployed. With constrained resources, teams tasked with vulnerability and patch management make choices on what to patch. CYR3CON\u2122 provides the only proven solution to prioritize vulnerabilities based on which ones hackers are most likely to exploit. The patented CyRating\u2122 for each vulnerability tells the enterprise the likelihood that it will be used in an attack \u2013 even before the exploit becomes available. Relying on data gathered from deepweb\/darkweb hacker communities along with cutting-edge machine learning, Vulnerability Assessment allows the enterprise to decide what to patch based on what the hackers are getting ready to attack \u2013 no other method provides proven insight into what to patch based on the adversary.","hyperlink":"https:\/\/www.cyr3con.ai\/Home","td_contact":"cyr3con@techdata.com","td_extension":"","vendor_id":"21","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1082","product_name":"Vulnerability Assessments","description":"This service identifies how susceptible a customer's network is to a cyber-attack. We leverage best-in-class scanning toolsets and techniques to identify detailed vulnerability findings, the results are reviewed by our Security Experts, then a detailed report is generated for the customer. This is designed to help End Customer\u2019s reach a superior security posture as it identifies where they have risks and exposures in order to secure their network from advanced cyber threats.","hyperlink":"https:\/\/tdcontent.techdata.com\/techsolutions\/security\/Services.aspx","td_contact":"SecurityServices@TechData.com","td_extension":"800-237-8931 ext. 5540508","vendor_id":"62","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1520","product_name":"Vulnerability Manager for Databases","description":"McAfee Vulnerability Manager for Databases conducts more than 4,700 vulnerability checks against leading database systems such as Oracle, Microsoft SQL Server, IBM DB2, and MySQL.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/vulnerability-manager-databases.html","td_contact":"Tech Data: mcafee@techdata.com\n

DLT: spi@dlt.com<\/p>","td_extension":"Tech Data: 800-237-8931\n

DLT: 703-773-9231<\/p>","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1811","product_name":"WAN Connectivity Services","description":"VMware NSX SD-WAN by VeloCloud assures enterprise and cloud application performance over Internet and hybrid WAN while simplifying deployments and reducing costs.","hyperlink":"https:\/\/www.vmware.com\/products\/nsx-sd-wan-by-velocloud.html","td_contact":"vmware@techdata.com","td_extension":"800-237-8931 x5545048","vendor_id":"70","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1231","product_name":"WatchGuard MSSP \n\n(Network Security, Secure Wireless, and Multi-Factor Authentication)","description":"WatchGuard provides a complete portfolio of security solutions that enable both proactive and reactive security services with simplified management, intelligent protection, and actionable visibility. The Watchguard product portfolio - consisting of Network Security, Secure Wireless, and Multi-Factor Authentication products - was designed and developed to enable a comprehensive set of managed security services that empower the MSSP to do more with less.","hyperlink":"","td_contact":"SEWatchGuard@techdata.com","td_extension":"800-237-8931 x5545033","vendor_id":"71","service_tiering":"No tiering. Cost of hardware + security services. Monthly services are procurred using flexible points. Points usage per month depends on the service level and Firebox model.","partner_benefits":"

\u2022  Flexible Payment Options<\/p>\n

\u2022  Simplicity - Easy to Sell, Deploy, & Manage<\/p>\n

\u2022  Security Automation & Threat Correlation<\/p>\n

\u2022  Visibility & Control: Multi-Tier & Multi-Tenant Platform<\/p>\n

\u2022   Seamless Integration with PSA & RMM tools<\/p>","typeof_service":"

Managed Security Services Building Block Solution:  <\/strong>Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":"

\u2022  Robust security solutions at an affordable cost.<\/p>\n

\u2022  Layered protection - prevention, detection, & response services for the most advanced & evasive threats.<\/p>\n

\u2022  Better interoperability in your IT environments.<\/p>\n

\u2022  Meet all compliancy requirements for your organization.<\/p>","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"2054","product_name":"Waterline\/Hitachi Content Intelligence","description":"A robust solution framework for comprehensive discovery and fast exploration of critical business data and storage operations. Whether on premises, off premises, in the cloud, structured or unstructured","hyperlink":"https:\/\/www.hitachivantara.com\/en-us\/products\/data-management-analytics\/lumada-data-services\/content-intelligence.html","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"107","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2040","product_name":"Watson APIs","description":"Allow you to process speech, text, and images in an easy and natural way. They also allow you to further train services with your own custom data to provide context-specific analysis","hyperlink":"https:\/\/cloud.ibm.com\/apidocs\/discovery","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2049","product_name":"Watson Assistant","description":"IBM's AI product that lets you build, train, and deploy conversational interactions into any application, device, or channel. It knows when to search for an answer from a knowledge base, when to ask for clarity and when to direct users to a human","hyperlink":"https:\/\/www.ibm.com\/cloud\/watson-assistant\/","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2039","product_name":"Watson Discovery","description":"An enterprise search and AI search technology that breaks open data silos and retrieves specific answers to your questions while analyzing trends and relationships buried in enterprise data. Watson Discovery can be deployed on any cloud or on-premises environment","hyperlink":"https:\/\/www.ibm.com\/cloud\/watson-discovery","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2076","product_name":"Watson IoT Platform","description":"A secure IoT platform with the power of Watson's cognitive engine. The Watson IoT Platform is a fully managed, cloud-hosted service on IBM Bluemix\u00ae designed to simplify Internet of Things development so you can derive more value from your IoT data","hyperlink":"https:\/\/www.ibm.com\/internet-of-things","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2028","product_name":"Watson Machine Learning","description":"A full-service IBM Cloud offering that makes it easy for developers and data scientists to work together to integrate predictive capabilities with their applications","hyperlink":"https:\/\/www.ibm.com\/cloud\/machine-learning","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"2027","product_name":"Watson Studio","description":"An integrated environment designed to make it easy to develop, train, manage models, and deploy AI-powered applications and is a SaaS solution delivered on the IBM Cloud","hyperlink":"https:\/\/www.ibm.com\/cloud\/watson-studio","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1638","product_name":"Web Application Firewall","description":"SonicWall WAF Series features advanced web security tools and services to keep compliance data unexposed and web properties safe, undisrupted and in peak performance. It applies Layer-7 application delivery capabilities that enable application-aware load balancing, SSL offloading and acceleration for resilience and an enhanced digital engagement and experience.","hyperlink":"https:\/\/www.sonicwall.com\/en-us\/products\/web-application-firewall","td_contact":"sonicwall@techdata.com","td_extension":"800-237-8931 x5545032","vendor_id":"56","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1002","product_name":"Web Application Firewall and Reverse Proxy","description":"Built on the industry-leading ProxySG platform, Symantec Web Application Firewall offers full protection with advanced policy, control, accountability, and performance features.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/web-and-email\/gateway\/web-application-firewall-reverse-proxy","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1237","product_name":"Web Application Protector","description":"Powerfully simple website protection against DDoS and web application attacks","hyperlink":"https:\/\/www.akamai.com\/us\/en\/products\/security\/web-application-protector-enterprise-waf-firewall-ddos-protection.jsp","td_contact":"akamaius@techdata.com","td_extension":"(800)-237-8931 x5540426","vendor_id":"1","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"1521","product_name":"Web Gateway","description":"McAfee Web Gateway is a high-performance secure web gateway with best-in-class threat protection in one unified appliance software architecture.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/web-gateway.html","td_contact":"Tech Data: mcafee@techdata.com\n

DLT: spi@dlt.com<\/p>","td_extension":"Tech Data: 800-237-8931\n

DLT: 703-773-9231<\/p>","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"678","product_name":"Web Gateway Cloud Service","description":"McAfee Web Gateway Cloud Service is a cloud-delivered web security service built with best-in-class threat protection available to organizations around the world.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/web-gateway-cloud-service.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1715","product_name":"Web Isolation","description":"Symantec Web Isolation prevents malware and phishing threats while allowing broad web access through the isolation of uncategorized and potentially risky traffic.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/web-and-email\/gateway\/web-isolation","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1523","product_name":"Web Protection","description":"McAfee Web Protection delivers best-in-class internet threat protection for devices, users, and locations everywhere.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/web-protection.html","td_contact":"Tech Data: mcafee@techdata.com\n

DLT: spi@dlt.com<\/p>","td_extension":"Tech Data: 800-237-8931\n

DLT: 703-773-9231<\/p>","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"389","product_name":"Web Security","description":"Next-generation web security for\ntomorrow's global workforce","hyperlink":"https:\/\/www.forcepoint.com\/product\/web-security","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"28","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,80"},{"product_id":"33","product_name":"Web Security Gateway","description":"The Barracuda Web Security Gateway lets organizations benefit from online applications and tools without exposure to web-borne malware and viruses, lost user productivity, and misused bandwidth. As a comprehensive solution for web security and management, it unites award-winning spyware, malware, and virus protection with a powerful policy and reporting engine. Advanced features ensure that organizations adapt to emerging requirements like social-network regulation, remote filtering, and visibility into SSL-encrypted traffic.","hyperlink":"https:\/\/www.barracuda.com\/products\/websecuritygateway","td_contact":"barracuda@Techdata.com","td_extension":"(800)-237-8931 x5540427","vendor_id":"4","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,85,87"},{"product_id":"1256","product_name":"Web Security Manager Premier","description":"Highly tunable, enterprise-grade, cloud based web application firewall (WAF) that comes with your own security experts to eliminate management overhead and complexity.","hyperlink":"https:\/\/www.alertlogic.com\/solutions\/web-application-firewall\/","td_contact":"Tech Data: enterprisecloudsales@techdata.com\n

DLT: spi@dlt.com<\/p>","td_extension":"DLT: 703-773-9239","vendor_id":"2","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1004","product_name":"Web Security Service","description":"Symantec's advanced cloud delivered network security service enforces consistent web and cloud application security, and compliance policies, for all users regardless of location and device.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/web-and-email\/gateway\/web-security-service","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1717","product_name":"Web Security.cloud","description":"Protect your organization from web-based threats and enforce acceptable use policies with our cloud-based application.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/web-and-email\/gateway\/web-security-service","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1824","product_name":"WebBlocker","description":"You can quickly find yourself in bad places while surfing the Internet, exposing your network to malware that can cause massive problems for your organization. Leaving users free to roam the Internet can also lead to lost productivity, reduced bandwidth, and even worse, legal liability. With WatchGuard\u2019s WebBlocker, you get a powerful and easy-to-use solution for controlling and monitoring web activity across your entire organization.","hyperlink":"https:\/\/www.watchguard.com\/wgrd-products\/security-services\/webblocker-url-filtering","td_contact":"watchguard@techdata.com","td_extension":"800-237-8931 x5545033","vendor_id":"71","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1006","product_name":"WebFilter \/ Intelligence Services","description":"Proven solutions that enable IT managers to deliver effective, real-time web protection with security categorization, web application control, and threat risk levels.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/web-and-email\/gateway\/webfilter-intelligent-services","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1976","product_name":"webMethods.io","description":"A powerful integration platform as a service (iPaaS) that enables you to automate tasks by connecting apps and services, such as Marketo, Salesforce, Evernote, and Gmail. It lets your favorite apps exchange data and talk to each other seamlessly, and eliminates the need to hire expensive developers","hyperlink":"https:\/\/www.softwareag.com\/us\/products\/webmethods_integration\/default.html","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"106","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1831","product_name":"Webroot BrightCloud","description":"Webroot BrightCloud\u00ae threat intelligence, the most powerful threat intelligence architecture in the world. Trusted by top network and security vendors, like Cisco, Citrix, HPE, and more, our cloud-based platform uses context and reputations to stop never-before-seen threats","hyperlink":"https:\/\/www.webroot.com\/us\/en\/business","td_contact":"webroot@techdata.com","td_extension":"800-237-8931 x1472415","vendor_id":"72","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1391","product_name":"Websafe Anti-Fraud","description":"Financial institutions have the most high-profile, high-value assets on the Internet: millions of bank accounts. The global nature of the Internet means that these assets attract ambitious attackers all around the world. Broadly known as fraud, these online criminal activities are a constant and persistent reality for the banking industry. To effectively combat the perils of fraud, organizations that offer financial services over the Internet must defend their businesses with a combination of security technologies. The F5 Web Fraud Protection solution provides both the breadth and depth of coverage financial services organizations need to gain a full defense against asset loss due to fraud.","hyperlink":"https:\/\/f5.com\/solutions\/enterprise\/reference-architectures\/web-fraud-protection","td_contact":"f5@techdata.com","td_extension":"(480) 643-5064","vendor_id":"26","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"779","product_name":"Windows Defender Security Center","description":"Security threats are some of the leading concerns our customers have with technology today and that\u2019s why we\u2019ve built Windows 10 to be the most secure version of Windows ever. With comprehensive, built-in security features, Windows 10 provides protection from viruses and malware threats including ransomware, safer authentication with Windows Hello using your smile or fingerprint to login and ongoing security updates delivered monthly through Windows Update, to name a few.","hyperlink":"https:\/\/blogs.windows.com\/windowsexperience\/2017\/01\/23\/introducing-windows-defender-security-center\/","td_contact":"microsoft@techdata.com","td_extension":"800-237-8931 x5545006","vendor_id":"43","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"2041","product_name":"Windows Speech Recognition","description":"Speech recognition that enables voice commands to control the desktop user interface; dictate text in electronic documents and email; navigate websites; perform keyboard shortcuts; and to operate the mouse cursor","hyperlink":"https:\/\/www.windowscentral.com\/how-set-speech-recognition-windows-10","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"43","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1197","product_name":"Workspace One (Airwatch)","description":"Workspace ONE powered by VMware AirWatch is the unified digital workspace platform that simplifies and secures app access and IT management for the modern workforce.","hyperlink":"","td_contact":"","td_extension":"800-237-8931 x5545048","vendor_id":"70","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,5,10,17,85,87"},{"product_id":"475","product_name":"X-Force Exchange","description":"Provides a cloud-based threat intelligence sharing platform that enables users to research threats, collaborate with peers and take action","hyperlink":"https:\/\/www.ibm.com\/us-en\/marketplace\/ibm-xforce-exchange","td_contact":"West: Rick.Marshall@techdata.com\n

East: Karen.Bailey@techdata.com<\/p>","td_extension":"West: (480) 254-4420\n

East: (678) 642-3446<\/p>","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3,4,5,7,10,11,13,15,17,85,86,87,88,90,91"},{"product_id":"913","product_name":"XG Firewall","description":"Sophos XG Firewall provides unprecedented visibility into your network, users, and applications directly from the control center. You also get rich on-box reporting and the option to add Sophos iView for centralized reporting across multiple firewalls.","hyperlink":"https:\/\/www.sophos.com\/en-us\/products\/next-gen-firewall.aspx","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"57","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,65,66,69,71,72,75,76,78,79,81"},{"product_id":"328","product_name":"Xprotect for Endpoint Protection","description":"Xprotect, part of the ColorTokens Xtended ZeroTrust Platform, prevents attacks on endpoints, servers and legacy\/fixed-function systems with a robust, signature-less approach.","hyperlink":"https:\/\/colortokens.com\/xprotect-endpoint-protection\/","td_contact":"","td_extension":"","vendor_id":"15","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"85","country_name":"ASIA PACIFIC","parint_id":"0","type":"0","country":"85,87"},{"product_id":"327","product_name":"Xshield for Micro-segmentation and Workload Protection","description":"Quickly and easily micro-segment workloads in\nZeroTrust Zones\u2122. Xshield, part of the ColorTokens Xtended ZeroTrust Platform delivers unrivaled micro-segmentation, cloud workload protection and zero trust network access","hyperlink":"https:\/\/colortokens.com\/xshield-workload-protection\/","td_contact":"","td_extension":"","vendor_id":"15","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"85","country_name":"ASIA PACIFIC","parint_id":"0","type":"0","country":"85,87"},{"product_id":"326","product_name":"Xview for Visibility","description":"Xview, part of the ColorTokens Xtended ZeroTrust Platform, provides visibility of every communication in your hybrid datacenter environment","hyperlink":"https:\/\/colortokens.com\/xview-visibility\/","td_contact":"","td_extension":"","vendor_id":"15","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"85","country_name":"ASIA PACIFIC","parint_id":"0","type":"0","country":"85,87"},{"product_id":"2026","product_name":"Zementis Predictive Analytics","description":"Your IoT success floats on a properly managed data lake. Ingest and analyze data, stream analytics in real time and train machine learning models. Zementis establishes a common, standards-based framework to deliver intelligent solutions across all industries and applications","hyperlink":"https:\/\/www.softwareag.com\/us\/products\/data_analytics\/predictive_analytics\/default.html","td_contact":"iot.analytics@techdata.com","td_extension":"(727) 539-7429 ext. 66100","vendor_id":"106","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"3","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2"},{"product_id":"1563","product_name":"ZENworks Asset Management\u00a0","description":"Provides reports that integrate licensing, installation, and usage data","hyperlink":"https:\/\/www.microfocus.com\/products\/zenworks\/asset-management\/","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"720","product_name":"ZENworks Configuration Management\u00a0","description":"Provides automated endpoint management, software distribution, support, and more","hyperlink":"https:\/\/www.microfocus.com\/products\/zenworks\/configuration-management\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,63,65,67,68,69,70,71,74,75,76,77,80,81,84"},{"product_id":"1565","product_name":"ZENworks Desktop Containers\u00a0","description":"Package, test, and deploy containerized Windows apps quickly and easily","hyperlink":"https:\/\/www.microfocus.com\/products\/desktop-containers\/","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"722","product_name":"ZENworks Endpoint Security Management\u00a0","description":"Delivers identity-based protection for devices and features total protection","hyperlink":"https:\/\/www.microfocus.com\/products\/zenworks\/endpoint-security-management\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,63,65,67,68,69,70,71,74,75,76,77,80,81,84"},{"product_id":"1567","product_name":"ZENworks Full Disk Encryption\u00a0","description":"Proactive laptop and desktop data protection to automatically lock out threats","hyperlink":"https:\/\/www.microfocus.com\/products\/zenworks\/full-disk-encryption\/","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"724","product_name":"ZENworks Mobile Workspace\u00a0","description":"Enable users to securely access data while respecting privacy and device freedom","hyperlink":"https:\/\/www.microfocus.com\/products\/zenworks\/mobile-workspace\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,63,65,67,68,69,70,71,74,75,76,77,80,81,84"},{"product_id":"1569","product_name":"ZENworks Patch Management\u00a0","description":"Automates patch assessment and monitors patch compliance for security vulnerabilities","hyperlink":"https:\/\/www.microfocus.com\/products\/zenworks\/patch-management\/","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"726","product_name":"ZENworks Service Desk\u00a0","description":"Streamlines and automates the way you provide IT services to your business","hyperlink":"https:\/\/www.microfocus.com\/products\/service-desk\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,63,65,67,68,69,70,71,74,75,76,77,80,81,84"},{"product_id":"1571","product_name":"ZENworks Suite\u00a0","description":"Seven integrated products to help track, manage, and protect endpoint devices","hyperlink":"https:\/\/www.microfocus.com\/products\/zenworks\/","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"1242","product_name":"Zero Trust Security","description":"Users, devices, applications, and data are moving outside of the enterprise perimeter and zone of control","hyperlink":"https:\/\/www.akamai.com\/us\/en\/solutions\/security\/zero-trust-security-model.jsp","td_contact":"akamaius@techdata.com","td_extension":"(800)-237-8931 x5540426","vendor_id":"1","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"256","product_name":"ZixGateway with Cisco Technology (ZCT)","description":"In October 2015 Cisco and ZixCorp\u00ae introduced ZixGateway with Cisco Technology (ZCT), an email encryption appliance that delivers simple, secure management of email encryption services. Completely on-site, the ZixGateway with Cisco Technology solution works in conjunction with Cisco Email Security Appliance by using its content filtering to identify messages requiring encryption.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/zixgateway-cisco-technology\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"1","country_name":"NORTH AMERICA","parint_id":"0","type":"0","country":"1,2,3"},{"product_id":"1655","product_name":"\u00a0\u00a0 Breach Fighter","description":"Stormshield's Breach Fighter solution extends the capabilities of \nnext-generation Stormshield Network Security firewalls and guarantees \nreal-time protection from such attacks thanks to its unique technology \nbased on the Stormshield Endpoint Security behavioral analysis engine. Combines the high-level antivirus protection that the Kaspersky engine \nprovides with the protection of the patented IPS engine and Stormshield \nEndpoint Security's technology.It","hyperlink":"https:\/\/www.stormshield.com\/products\/breach-fighter\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"59","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null},{"product_id":"942","product_name":"\u00a0\u00a0 Data Connector","description":"Enable developers to integrate a data \nprotection feature into business applications. Encryption is carried out\n as closely to data processing as possible, thus alleviating the risk \nthat the solution will go unused","hyperlink":"https:\/\/www.stormshield.com\/products\/connector\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"59","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","country_id":"62","country_name":"EUROPE","parint_id":"0","type":"0","country":"62,64"},{"product_id":"1653","product_name":"\u00a0\u00a0 Data for Cloud and Mobility","description":"Keep control over the confidentiality of your sensitive data in an unsupervised cloud infrastructure by encrypting information contained on the computer and in the Cloud","hyperlink":"https:\/\/www.stormshield.com\/products\/cloud-and-mobility\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"59","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"2","country_id":null,"country_name":null,"parint_id":null,"type":null,"country":null}],"vendor":[{"vendor_id":"1","vendor_name":"Akamai","solutions_practice":"","region":""},{"vendor_id":"2","vendor_name":"Alert Logic","solutions_practice":"","region":""},{"vendor_id":"117","vendor_name":"Alteryx","solutions_practice":"","region":""},{"vendor_id":"110","vendor_name":"Amazon","solutions_practice":"","region":""},{"vendor_id":"123","vendor_name":"Area 1 Security","solutions_practice":"","region":""},{"vendor_id":"3","vendor_name":"Arx Nimbus","solutions_practice":"","region":""},{"vendor_id":"122","vendor_name":"AutoDesk","solutions_practice":"","region":""},{"vendor_id":"115","vendor_name":"Automation Anywhere","solutions_practice":"","region":""},{"vendor_id":"113","vendor_name":"AWS","solutions_practice":"","region":""},{"vendor_id":"120","vendor_name":"AXIS Communications","solutions_practice":"","region":""},{"vendor_id":"4","vendor_name":"Barracuda","solutions_practice":"","region":""},{"vendor_id":"94","vendor_name":"Beyond Trust","solutions_practice":"","region":""},{"vendor_id":"76","vendor_name":"BitSight","solutions_practice":"","region":""},{"vendor_id":"6","vendor_name":"Blackberry","solutions_practice":"","region":""},{"vendor_id":"8","vendor_name":"BlackStratus","solutions_practice":"","region":""},{"vendor_id":"5","vendor_name":"Bluecat","solutions_practice":"","region":""},{"vendor_id":"119","vendor_name":"Bosch","solutions_practice":"","region":""},{"vendor_id":"9","vendor_name":"Carbon Black (VMware)","solutions_practice":"","region":""},{"vendor_id":"10","vendor_name":"Carbonite","solutions_practice":"","region":""},{"vendor_id":"11","vendor_name":"Centrify","solutions_practice":"","region":""},{"vendor_id":"12","vendor_name":"Check Point","solutions_practice":"","region":""},{"vendor_id":"77","vendor_name":"Checkmarx","solutions_practice":"","region":""},{"vendor_id":"13","vendor_name":"Cisco","solutions_practice":"","region":""},{"vendor_id":"14","vendor_name":"Cloud Range","solutions_practice":"","region":""},{"vendor_id":"112","vendor_name":"Cloudera","solutions_practice":"","region":""},{"vendor_id":"15","vendor_name":"ColorTokens","solutions_practice":"","region":""},{"vendor_id":"16","vendor_name":"Commvault","solutions_practice":"","region":""},{"vendor_id":"17","vendor_name":"ConnnectWise    <\/span>NEW!","solutions_practice":"","region":""},{"vendor_id":"87","vendor_name":"Corsa","solutions_practice":"","region":""},{"vendor_id":"105","vendor_name":"Crowdstrike","solutions_practice":"","region":""},{"vendor_id":"18","vendor_name":"Cyber Bit","solutions_practice":"","region":""},{"vendor_id":"19","vendor_name":"Cyber Inc    <\/span>NEW!","solutions_practice":"","region":""},{"vendor_id":"7","vendor_name":"CyberShark","solutions_practice":"","region":""},{"vendor_id":"20","vendor_name":"Cynerio","solutions_practice":"","region":""},{"vendor_id":"21","vendor_name":"CYR3CON","solutions_practice":"","region":""},{"vendor_id":"22","vendor_name":"Dedrone","solutions_practice":"","region":""},{"vendor_id":"23","vendor_name":"Dell EMC","solutions_practice":"","region":""},{"vendor_id":"109","vendor_name":"Dell\/EMC","solutions_practice":"","region":""},{"vendor_id":"95","vendor_name":"Demisto","solutions_practice":"","region":""},{"vendor_id":"116","vendor_name":"Digitate","solutions_practice":"","region":""},{"vendor_id":"24","vendor_name":"Encryptics","solutions_practice":"","region":""},{"vendor_id":"25","vendor_name":"Ericom","solutions_practice":"","region":""},{"vendor_id":"30","vendor_name":"F-Secure","solutions_practice":"","region":""},{"vendor_id":"26","vendor_name":"F5","solutions_practice":"","region":""},{"vendor_id":"84","vendor_name":"Finalcode","solutions_practice":"","region":""},{"vendor_id":"96","vendor_name":"FireMon","solutions_practice":"","region":""},{"vendor_id":"97","vendor_name":"Flashpoint","solutions_practice":"","region":""},{"vendor_id":"27","vendor_name":"Fluency","solutions_practice":"","region":""},{"vendor_id":"28","vendor_name":"ForcePoint","solutions_practice":"","region":""},{"vendor_id":"29","vendor_name":"Fortinet","solutions_practice":"","region":""},{"vendor_id":"31","vendor_name":"Gemalto","solutions_practice":"","region":""},{"vendor_id":"98","vendor_name":"Glasswall","solutions_practice":"","region":""},{"vendor_id":"32","vendor_name":"Global Integrity","solutions_practice":"","region":""},{"vendor_id":"111","vendor_name":"Google","solutions_practice":"","region":""},{"vendor_id":"33","vendor_name":"Hillstone Networks","solutions_practice":"","region":""},{"vendor_id":"107","vendor_name":"Hitachi","solutions_practice":"","region":""},{"vendor_id":"34","vendor_name":"HP Inc.    <\/span>NEW!","solutions_practice":"","region":""},{"vendor_id":"35","vendor_name":"IBM","solutions_practice":"","region":""},{"vendor_id":"99","vendor_name":"Idaptive","solutions_practice":"","region":""},{"vendor_id":"36","vendor_name":"Ilantus    <\/span>NEW!","solutions_practice":"","region":""},{"vendor_id":"100","vendor_name":"Illumio","solutions_practice":"","region":""},{"vendor_id":"37","vendor_name":"Informatica","solutions_practice":"","region":""},{"vendor_id":"38","vendor_name":"Juniper","solutions_practice":"","region":""},{"vendor_id":"39","vendor_name":"Kaspersky","solutions_practice":"","region":""},{"vendor_id":"78","vendor_name":"LogRhythm","solutions_practice":"","region":""},{"vendor_id":"85","vendor_name":"LogZilla","solutions_practice":"","region":""},{"vendor_id":"40","vendor_name":"Malwarebytes","solutions_practice":"","region":""},{"vendor_id":"41","vendor_name":"McAfee","solutions_practice":"","region":""},{"vendor_id":"42","vendor_name":"MicroFocus","solutions_practice":"","region":""},{"vendor_id":"43","vendor_name":"Microsoft","solutions_practice":"","region":""},{"vendor_id":"79","vendor_name":"NETSCOUT","solutions_practice":"","region":""},{"vendor_id":"118","vendor_name":"NoviSystems","solutions_practice":"","region":""},{"vendor_id":"80","vendor_name":"NUIX","solutions_practice":"","region":""},{"vendor_id":"86","vendor_name":"ObserveIT","solutions_practice":"","region":""},{"vendor_id":"44","vendor_name":"One Identity","solutions_practice":"","region":""},{"vendor_id":"83","vendor_name":"OneLogin","solutions_practice":"","region":""},{"vendor_id":"45","vendor_name":"Opaq (Fortinet)","solutions_practice":"","region":""},{"vendor_id":"46","vendor_name":"Oracle","solutions_practice":"","region":""},{"vendor_id":"63","vendor_name":"Palo Alto","solutions_practice":"","region":""},{"vendor_id":"81","vendor_name":"Polyverse","solutions_practice":"","region":""},{"vendor_id":"48","vendor_name":"Proofpoint","solutions_practice":"","region":""},{"vendor_id":"101","vendor_name":"Pulse Secure","solutions_practice":"","region":""},{"vendor_id":"73","vendor_name":"Pwnie Express","solutions_practice":"","region":""},{"vendor_id":"47","vendor_name":"Pwnie Express (Outpost24)","solutions_practice":"","region":""},{"vendor_id":"74","vendor_name":"Quest","solutions_practice":"","region":""},{"vendor_id":"75","vendor_name":"Radware","solutions_practice":"","region":""},{"vendor_id":"49","vendor_name":"RangeForce    <\/span>NEW!","solutions_practice":"","region":""},{"vendor_id":"108","vendor_name":"Redhat","solutions_practice":"","region":""},{"vendor_id":"50","vendor_name":"Resec","solutions_practice":"","region":""},{"vendor_id":"51","vendor_name":"RSA","solutions_practice":"","region":""},{"vendor_id":"88","vendor_name":"SafeLogic","solutions_practice":"","region":""},{"vendor_id":"52","vendor_name":"Samsung Knox","solutions_practice":"","region":""},{"vendor_id":"124","vendor_name":"Saviynt","solutions_practice":"","region":""},{"vendor_id":"53","vendor_name":"Security Colony","solutions_practice":"","region":""},{"vendor_id":"54","vendor_name":"Sepio Systems","solutions_practice":"","region":""},{"vendor_id":"106","vendor_name":"Software AG","solutions_practice":"","region":""},{"vendor_id":"55","vendor_name":"Solarwinds","solutions_practice":"","region":""},{"vendor_id":"102","vendor_name":"Sonatype","solutions_practice":"","region":""},{"vendor_id":"56","vendor_name":"SonicWall","solutions_practice":"","region":""},{"vendor_id":"57","vendor_name":"Sophos","solutions_practice":"","region":""},{"vendor_id":"64","vendor_name":"Splunk","solutions_practice":"","region":""},{"vendor_id":"90","vendor_name":"SteelCloud","solutions_practice":"","region":""},{"vendor_id":"58","vendor_name":"StorageCraft","solutions_practice":"","region":""},{"vendor_id":"59","vendor_name":"Stormshield","solutions_practice":"","region":""},{"vendor_id":"60","vendor_name":"Stratozen","solutions_practice":"","region":""},{"vendor_id":"89","vendor_name":"Sumo Logic","solutions_practice":"","region":""},{"vendor_id":"91","vendor_name":"Swimlane","solutions_practice":"","region":""},{"vendor_id":"65","vendor_name":"Symantec","solutions_practice":"","region":""},{"vendor_id":"61","vendor_name":"Symantec (Broadcom)","solutions_practice":"","region":""},{"vendor_id":"62","vendor_name":"Tech Data","solutions_practice":"","region":""},{"vendor_id":"114","vendor_name":"Tech Data BSP for Cognos","solutions_practice":"","region":""},{"vendor_id":"121","vendor_name":"Thought Spot","solutions_practice":"","region":""},{"vendor_id":"92","vendor_name":"Titus","solutions_practice":"","region":""},{"vendor_id":"66","vendor_name":"Trend Micro","solutions_practice":"","region":""},{"vendor_id":"82","vendor_name":"Tripwire","solutions_practice":"","region":""},{"vendor_id":"93","vendor_name":"Tychon","solutions_practice":"","region":""},{"vendor_id":"103","vendor_name":"Ubiq Security","solutions_practice":"","region":""},{"vendor_id":"67","vendor_name":"Unitrends","solutions_practice":"","region":""},{"vendor_id":"68","vendor_name":"Veeam","solutions_practice":"","region":""},{"vendor_id":"104","vendor_name":"Veracode","solutions_practice":"","region":""},{"vendor_id":"69","vendor_name":"Veritas","solutions_practice":"","region":""},{"vendor_id":"70","vendor_name":"VMware","solutions_practice":"","region":""},{"vendor_id":"71","vendor_name":"WatchGuard","solutions_practice":"","region":""},{"vendor_id":"72","vendor_name":"Webroot (Carbonite)","solutions_practice":"","region":""}],"parent_category":[{"category_id":"59","category_name":"Advanced Fraud Security","product_id":"534"},{"category_id":"102","category_name":"Analytic Data Management & Integration Platforms","product_id":"1970"},{"category_id":"1","category_name":"Application Security","product_id":"1"},{"category_id":"121","category_name":"Business Intelligence & Analytics Tools & Platforms","product_id":"2017"},{"category_id":"9","category_name":"Cloud Security","product_id":"8"},{"category_id":"17","category_name":"Data Security","product_id":"29"},{"category_id":"13","category_name":"Endpoint Security","product_id":"22"},{"category_id":"26","category_name":"Governance, Risk, Compliance","product_id":"45"},{"category_id":"8","category_name":"Identity and Access","product_id":"4"},{"category_id":"34","category_name":"IoT","product_id":"61"},{"category_id":"15","category_name":"Managed Security Service","product_id":"22"},{"category_id":"28","category_name":"Mobile Security","product_id":"50"},{"category_id":"4","category_name":"Network Security","product_id":"13"},{"category_id":"85","category_name":"NIST 800-53 R4","product_id":"1237"},{"category_id":"155","category_name":"Performance Management & Analytics Applications","product_id":"2068"},{"category_id":"11","category_name":"Security Intelligence","product_id":"20"},{"category_id":"21","category_name":"Security Strategy","product_id":"325"},{"category_id":"81","category_name":"Tech Data Professional Services","product_id":"1082"},{"category_id":"169","category_name":"Vertical Industry Specific Performance Management & Analytics Applications","product_id":"2079"},{"category_id":"3","category_name":"Web Security","product_id":"1"}],"sub_category":[{"category_id":"142","category_name":" Access-Combined Text Analysis, Clustering","category_parent_id":"121"},{"category_id":"172","category_name":" Admission\/Discharge & Transfer (Patients)","category_parent_id":"169"},{"category_id":"127","category_name":" Advanced & Predictive Analytics Tools","category_parent_id":"121"},{"category_id":"103","category_name":" Analytic Data Integration & Integrity Tools","category_parent_id":"102"},{"category_id":"113","category_name":" Analytics Data Management","category_parent_id":"102"},{"category_id":"150","category_name":" Artificial Intelligence Software Platform","category_parent_id":"121"},{"category_id":"136","category_name":" Audio & Voice\/Speech Recognition & Analytics","category_parent_id":"121"},{"category_id":"163","category_name":" Bill of Material (BOM)","category_parent_id":"155"},{"category_id":"182","category_name":" Budget, Planning & Forecasting","category_parent_id":"155"},{"category_id":"149","category_name":" Business Analysis","category_parent_id":"121"},{"category_id":"125","category_name":" Business Problems Modeling","category_parent_id":"121"},{"category_id":"143","category_name":" Categorization & Search","category_parent_id":"121"},{"category_id":"159","category_name":" Centric Analytics","category_parent_id":"155"},{"category_id":"171","category_name":" Claims Processing (Insurance)","category_parent_id":"169"},{"category_id":"190","category_name":" Collaborative Forecast Automation","category_parent_id":"155"},{"category_id":"141","category_name":" Comprehensive Information","category_parent_id":"121"},{"category_id":"134","category_name":" Content Analytics Tools","category_parent_id":"121"},{"category_id":"179","category_name":" Contingent Labor, Contractors & Consultants","category_parent_id":"155"},{"category_id":"111","category_name":" Continuous Analytics","category_parent_id":"102"},{"category_id":"154","category_name":" Continuous Automatic Learning","category_parent_id":"121"},{"category_id":"156","category_name":" Customer Relationship Analytics","category_parent_id":"155"},{"category_id":"157","category_name":" Customer-Facing Decision Making Processes","category_parent_id":"155"},{"category_id":"123","category_name":" Dashboards","category_parent_id":"121"},{"category_id":"110","category_name":" Data Access Infrastructure","category_parent_id":"102"},{"category_id":"109","category_name":" Data Frameworks","category_parent_id":"102"},{"category_id":"118","category_name":" Data Lake","category_parent_id":"102"},{"category_id":"115","category_name":" Data Marts","category_parent_id":"102"},{"category_id":"128","category_name":" Data Mining & Statistical Software","category_parent_id":"121"},{"category_id":"107","category_name":" Data Preparation","category_parent_id":"102"},{"category_id":"108","category_name":" Data Quality","category_parent_id":"102"},{"category_id":"124","category_name":" Data Visualization","category_parent_id":"121"},{"category_id":"131","category_name":" Decision Automation","category_parent_id":"121"},{"category_id":"170","category_name":" Decision Making Analytics","category_parent_id":"169"},{"category_id":"175","category_name":" Decision Support for Real Estate, Legal Services, Banking, Government, Social Services & Transportation","category_parent_id":"169"},{"category_id":"195","category_name":" Demand Expectation","category_parent_id":"155"},{"category_id":"193","category_name":" Demand Planning","category_parent_id":"155"},{"category_id":"116","category_name":" Dynamic Data Management","category_parent_id":"102"},{"category_id":"120","category_name":" Edge Analytics","category_parent_id":"102"},{"category_id":"178","category_name":" Employee\u2019s Corporate Relationship\/HR","category_parent_id":"155"},{"category_id":"122","category_name":" End User Query Reporting & Analytics Tools","category_parent_id":"121"},{"category_id":"174","category_name":" Energy Trading","category_parent_id":"169"},{"category_id":"181","category_name":" Enterprise Performance Management","category_parent_id":"155"},{"category_id":"104","category_name":" ETL\/ELT","category_parent_id":"102"},{"category_id":"184","category_name":" External Financial Reporting Compliance","category_parent_id":"155"},{"category_id":"185","category_name":" Financial Risk Assessment & Analysis","category_parent_id":"155"},{"category_id":"147","category_name":" Geographic Information System (GIS)","category_parent_id":"121"},{"category_id":"177","category_name":" Human Capital Management","category_parent_id":"155"},{"category_id":"137","category_name":" Image & Video Analytics","category_parent_id":"121"},{"category_id":"151","category_name":" Intelligent, Advisory & Cognitively Enabled Apps","category_parent_id":"121"},{"category_id":"183","category_name":" Internal Financial Policies Management","category_parent_id":"155"},{"category_id":"160","category_name":" Inventory Management","category_parent_id":"155"},{"category_id":"153","category_name":" Knowledge Curation","category_parent_id":"121"},{"category_id":"129","category_name":" Machine Learning","category_parent_id":"121"},{"category_id":"152","category_name":" Machine Learning Categorization","category_parent_id":"121"},{"category_id":"167","category_name":" Manufacturing Execution System (MES)","category_parent_id":"155"},{"category_id":"191","category_name":" Manufacturing Process Optimization","category_parent_id":"155"},{"category_id":"148","category_name":" Mapping\/Spatial Query","category_parent_id":"121"},{"category_id":"105","category_name":" Master Data Management","category_parent_id":"102"},{"category_id":"162","category_name":" Material & Capacity Requirements Planning (MRP)","category_parent_id":"155"},{"category_id":"106","category_name":" Meta Data Management","category_parent_id":"102"},{"category_id":"133","category_name":" Model Management","category_parent_id":"121"},{"category_id":"196","category_name":" Multi Site Spanning","category_parent_id":"155"},{"category_id":"117","category_name":" Non-relational Analytic Stores","category_parent_id":"102"},{"category_id":"126","category_name":" Packaged Data Marts","category_parent_id":"121"},{"category_id":"130","category_name":" Predictive Analytics","category_parent_id":"121"},{"category_id":"161","category_name":" Product Supply Chain-Specific Business Process","category_parent_id":"155"},{"category_id":"189","category_name":" Production Management","category_parent_id":"155"},{"category_id":"194","category_name":" Production Planning","category_parent_id":"155"},{"category_id":"186","category_name":" Profitability Measurement & Reporting","category_parent_id":"155"},{"category_id":"166","category_name":" Quality Control","category_parent_id":"155"},{"category_id":"114","category_name":" Relational Data Warehouse","category_parent_id":"102"},{"category_id":"187","category_name":" Risk & Financial Management","category_parent_id":"155"},{"category_id":"188","category_name":" Risk Adjusted Performance Management","category_parent_id":"155"},{"category_id":"132","category_name":" Scoring Engines","category_parent_id":"121"},{"category_id":"144","category_name":" Search & Conversational Analytics","category_parent_id":"121"},{"category_id":"138","category_name":" Search Systems","category_parent_id":"121"},{"category_id":"165","category_name":" Shop Floor Control","category_parent_id":"155"},{"category_id":"145","category_name":" Spatial & Location Analytics Tools","category_parent_id":"121"},{"category_id":"146","category_name":" Spatial Information Management (SIM)","category_parent_id":"121"},{"category_id":"119","category_name":" Streaming Analytics","category_parent_id":"102"},{"category_id":"112","category_name":" Streaming Integration","category_parent_id":"102"},{"category_id":"173","category_name":" Student Retention & Recruitment (Higher Ed)","category_parent_id":"169"},{"category_id":"180","category_name":" Supplier & Customer Employee HR","category_parent_id":"155"},{"category_id":"158","category_name":" Supply Chain & Product\/Asset Centric Analytics","category_parent_id":"155"},{"category_id":"192","category_name":" Supply Planning","category_parent_id":"155"},{"category_id":"135","category_name":" Text Analytics","category_parent_id":"121"},{"category_id":"139","category_name":" Text Base Search & Discovery","category_parent_id":"121"},{"category_id":"140","category_name":" Unified Information Access","category_parent_id":"121"},{"category_id":"164","category_name":" Work Order Generation & Reporting","category_parent_id":"155"},{"category_id":"176","category_name":" Workforce Analytics","category_parent_id":"155"},{"category_id":"89","category_name":"AC - Access Control","category_parent_id":"85"},{"category_id":"46","category_name":"Advanced Malware Protection","category_parent_id":"13"},{"category_id":"199","category_name":"Application Access Governance","category_parent_id":"9"},{"category_id":"82","category_name":"Assessment","category_parent_id":"81"},{"category_id":"91","category_name":"AU - Audit and Accountability","category_parent_id":"85"},{"category_id":"18","category_name":"Backup, Restore, and Recovery","category_parent_id":"17"},{"category_id":"31","category_name":"Building Block Solution","category_parent_id":"1"},{"category_id":"94","category_name":"CA - Security Assessment and Authorization","category_parent_id":"85"},{"category_id":"50","category_name":"CASB","category_parent_id":"9"},{"category_id":"96","category_name":"CM - Configuration Management","category_parent_id":"85"},{"category_id":"83","category_name":"Compliance","category_parent_id":"81"},{"category_id":"66","category_name":"Critical System Protection\/Application Whitelisting","category_parent_id":"13"},{"category_id":"198","category_name":"Data Access Governance","category_parent_id":"9"},{"category_id":"52","category_name":"Data and Discovery Classification","category_parent_id":"17"},{"category_id":"64","category_name":"Data Center Protection","category_parent_id":"4"},{"category_id":"40","category_name":"Data Loss Prevention","category_parent_id":"17"},{"category_id":"75","category_name":"Database Activity Monitoring","category_parent_id":"17"},{"category_id":"67","category_name":"Database Encryption","category_parent_id":"17"},{"category_id":"35","category_name":"Device and Sensor","category_parent_id":"34"},{"category_id":"76","category_name":"Device control","category_parent_id":"17"},{"category_id":"69","category_name":"Directory Management","category_parent_id":"8"},{"category_id":"78","category_name":"Documentation","category_parent_id":"21"},{"category_id":"5","category_name":"DoS and DDoS","category_parent_id":"4"},{"category_id":"10","category_name":"Dynamic Vulnerability Analysis","category_parent_id":"1"},{"category_id":"22","category_name":"Education","category_parent_id":"21"},{"category_id":"20","category_name":"Email Security\/Gateway","category_parent_id":"4"},{"category_id":"33","category_name":"Encyption Key Management","category_parent_id":"17"},{"category_id":"38","category_name":"Endpoint Anti-Virus\/Anti-Malware","category_parent_id":"13"},{"category_id":"63","category_name":"Endpoint Encryption","category_parent_id":"17"},{"category_id":"36","category_name":"Endpoint Security Management","category_parent_id":"13"},{"category_id":"56","category_name":"File Integrity Monitoring","category_parent_id":"17"},{"category_id":"29","category_name":"File, Folder and\/or Email Encryption","category_parent_id":"17"},{"category_id":"55","category_name":"Flow Analytics","category_parent_id":"11"},{"category_id":"54","category_name":"Forensics","category_parent_id":"11"},{"category_id":"19","category_name":"Gateway Firewall\/UTM","category_parent_id":"4"},{"category_id":"26","category_name":"Governance, Risk, Compliance","category_parent_id":"26"},{"category_id":"53","category_name":"Governance, Risk, Compliance, & Audit","category_parent_id":"11"},{"category_id":"27","category_name":"Hybrid Scanning Correlation","category_parent_id":"1"},{"category_id":"88","category_name":"IA - Identification and Authentication","category_parent_id":"85"},{"category_id":"32","category_name":"Identity Governance","category_parent_id":"8"},{"category_id":"197","category_name":"Identity Governance and Administration","category_parent_id":"9"},{"category_id":"84","category_name":"Implementation","category_parent_id":"81"},{"category_id":"41","category_name":"Incident Response","category_parent_id":"11"},{"category_id":"61","category_name":"Internet Resiliency","category_parent_id":"4"},{"category_id":"42","category_name":"Intrusion Detection and Prevention","category_parent_id":"4"},{"category_id":"90","category_name":"IR - Incident Response","category_parent_id":"85"},{"category_id":"72","category_name":"Lifecycle management","category_parent_id":"8"},{"category_id":"12","category_name":"Log Management","category_parent_id":"11"},{"category_id":"48","category_name":"Management","category_parent_id":"11"},{"category_id":"49","category_name":"Mobility Management","category_parent_id":"28"},{"category_id":"30","category_name":"Mobility Security","category_parent_id":"28"},{"category_id":"25","category_name":"MultiFactor and Advanced Authentication","category_parent_id":"8"},{"category_id":"57","category_name":"NAC","category_parent_id":"8"},{"category_id":"100","category_name":"Network and Edge","category_parent_id":"34"},{"category_id":"2","category_name":"Other","category_parent_id":"1"},{"category_id":"71","category_name":"Password Management","category_parent_id":"8"},{"category_id":"58","category_name":"Physical Security and Safety","category_parent_id":"34"},{"category_id":"97","category_name":"PM - Program Management","category_parent_id":"85"},{"category_id":"74","category_name":"Policy","category_parent_id":"11"},{"category_id":"51","category_name":"Predictive Analytics","category_parent_id":"11"},{"category_id":"39","category_name":"Privileged Access Management","category_parent_id":"8"},{"category_id":"95","category_name":"PS - Personnel Security","category_parent_id":"85"},{"category_id":"101","category_name":"RA - Risk Assessment","category_parent_id":"85"},{"category_id":"99","category_name":"SA - System and Services Acquisition","category_parent_id":"85"},{"category_id":"45","category_name":"Sandboxing and APT Protection","category_parent_id":"4"},{"category_id":"86","category_name":"SC - System and Communications Protection","category_parent_id":"85"},{"category_id":"23","category_name":"Security Awareness Training","category_parent_id":"21"},{"category_id":"65","category_name":"Security Management","category_parent_id":"4"},{"category_id":"68","category_name":"Server Encryption","category_parent_id":"17"},{"category_id":"168","category_name":"Services Operations Analytics (Vertical Industry Specific)","category_parent_id":"155"},{"category_id":"87","category_name":"SI - System and Information Integrity","category_parent_id":"85"},{"category_id":"37","category_name":"SIEM","category_parent_id":"11"},{"category_id":"77","category_name":"Static Source Code Scanning","category_parent_id":"1"},{"category_id":"44","category_name":"Threat Intelligence","category_parent_id":"11"},{"category_id":"14","category_name":"Turn-Key Solution","category_parent_id":"13"},{"category_id":"24","category_name":"URL Filtering\/Web Gateway","category_parent_id":"4"},{"category_id":"73","category_name":"User Provisioning","category_parent_id":"8"},{"category_id":"200","category_name":"Vendor Access Management\/Governance","category_parent_id":"9"},{"category_id":"47","category_name":"VPN","category_parent_id":"13"},{"category_id":"43","category_name":"VPN Concentrator","category_parent_id":"4"},{"category_id":"16","category_name":"Vulnerability Management\/Patching","category_parent_id":"13"},{"category_id":"7","category_name":"Web Application Firewall","category_parent_id":"3"},{"category_id":"6","category_name":"Web Application Protection","category_parent_id":"3"},{"category_id":"62","category_name":"Wireless & Access Management","category_parent_id":"8"},{"category_id":"60","category_name":"Wireless Security","category_parent_id":"4"}]}