[{"product_id":"1","product_name":"Kona Site Defender","description":"Comprehensive Web Application and API Protection","hyperlink":"https:\/\/www.akamai.com\/us\/en\/products\/security\/kona-site-defender.jsp","td_contact":"akamaius@techdata.com","td_extension":"(800)-237-8931 x5540426","vendor_id":"1","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Akamai","region":"","solutions_practice":"","category_1":"Application Security","sub_category_1":"Other","sub_category_2":"Other","category_2":"Web Security"},{"product_id":"2","product_name":"Web Application Protector","description":"Powerfully simple website protection against DDoS and web application attacks","hyperlink":"https:\/\/www.akamai.com\/us\/en\/products\/security\/web-application-protector-enterprise-waf-firewall-ddos-protection.jsp","td_contact":"akamaius@techdata.com","td_extension":"(800)-237-8931 x5540426","vendor_id":"1","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Akamai","region":"","solutions_practice":"","category_2":"Application Security","sub_category_1":"DoS and DDoS","category_1":"Network Security","sub_category_2":"Other","sub_category_4":"Web Application Firewall","sub_category_3":"Web Application Protection","category_3":"Web Security","category_4":"Web Security"},{"product_id":"3","product_name":"Client Reputation","description":"Stop malicious clients before they can attack, based on Akamai\u2019s visibility into prior behavior of individual IP addresses","hyperlink":"https:\/\/www.akamai.com\/us\/en\/products\/security\/client-reputation.jsp","td_contact":"akamaius@techdata.com","td_extension":"(800)-237-8931 x5540426","vendor_id":"1","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Akamai","region":"","solutions_practice":"","category_1":"Application Security","sub_category_1":"Other","sub_category_2":"Other","category_2":"Web Security"},{"product_id":"4","product_name":"Enterprise Application Access","description":"Application Access Redefined: Secure, Simple, Fast","hyperlink":"https:\/\/www.akamai.com\/us\/en\/products\/security\/enterprise-application-access.jsp","td_contact":"akamaius@techdata.com","td_extension":"(800)-237-8931 x5540426","vendor_id":"1","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Akamai","region":"","solutions_practice":"","category_1":"Application Security","category_2":"Identity and Access","sub_category_1":"Other","sub_category_2":"Other"},{"product_id":"5","product_name":"Enterprise Threat Protector","description":"Proactive protection against zero-day malware and phishing","hyperlink":"https:\/\/www.akamai.com\/us\/en\/products\/security\/enterprise-threat-protector.jsp","td_contact":"akamaius@techdata.com","td_extension":"(800)-237-8931 x5540426","vendor_id":"1","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Akamai","region":"","solutions_practice":"","category_1":"Cloud Security","sub_category_1":"Other"},{"product_id":"6","product_name":"Prolexic Routed","description":"Fastest DDoS Mitigation of Terabit Scale Attacks","hyperlink":"https:\/\/www.akamai.com\/us\/en\/products\/security\/prolexic-solutions.jsp","td_contact":"akamaius@techdata.com","td_extension":"(800)-237-8931 x5540426","vendor_id":"1","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Akamai","region":"","solutions_practice":"","sub_category_1":"DoS and DDoS","category_1":"Network Security"},{"product_id":"7","product_name":"Zero Trust Security","description":"Users, devices, applications, and data are moving outside of the enterprise perimeter and zone of control","hyperlink":"https:\/\/www.akamai.com\/us\/en\/solutions\/security\/zero-trust-security-model.jsp","td_contact":"akamaius@techdata.com","td_extension":"(800)-237-8931 x5540426","vendor_id":"1","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Akamai","region":"","solutions_practice":"","category_1":"Application Security","sub_category_1":"Other","sub_category_2":"Other","category_2":"Web Security"},{"product_id":"8","product_name":"Fast DNS","description":"Cloud-based DNS for improved performance, availability and resiliency against DDoS attacks","hyperlink":"https:\/\/www.akamai.com\/us\/en\/products\/security\/fast-dns.jsp","td_contact":"akamaius@techdata.com","td_extension":"(800)-237-8931 x5540426","vendor_id":"1","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Akamai","region":"","solutions_practice":"","category_1":"Cloud Security","sub_category_1":"Other"},{"product_id":"9","product_name":"Kona DDoS Defender","description":"Managed DDoS protection service for critical websites and web applications","hyperlink":"https:\/\/www.akamai.com\/us\/en\/products\/security\/kona-ddos-defender.jsp","td_contact":"akamaius@techdata.com","td_extension":"(800)-237-8931 x5540426","vendor_id":"1","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Akamai","region":"","solutions_practice":"","sub_category_1":"DoS and DDoS","category_1":"Network Security"},{"product_id":"10","product_name":"Site Shield","description":"Origin defense by cloaking websites and web infrastructure","hyperlink":"https:\/\/www.akamai.com\/us\/en\/products\/security\/site-shield.jsp","td_contact":"akamaius@techdata.com","td_extension":"(800)-237-8931 x5540426","vendor_id":"1","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Akamai","region":"","solutions_practice":"","category_1":"Application Security","sub_category_1":"Dynamic Vulnerability Analysis"},{"product_id":"11","product_name":"DNS Security and Services","description":"You rely on your DNS for business and customer transactions, we help you make it fast, resilient and secure","hyperlink":"https:\/\/www.akamai.com\/us\/en\/solutions\/security\/dns-security-services.jsp","td_contact":"akamaius@techdata.com","td_extension":"(800)-237-8931 x5540426","vendor_id":"1","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Akamai","region":"","solutions_practice":"","category_1":"Cloud Security","sub_category_1":"Other"},{"product_id":"12","product_name":"API Capabilities","description":"Scale, protect, and manage API's","hyperlink":"https:\/\/www.akamai.com\/us\/en\/solutions\/performance\/apis.jsp","td_contact":"akamaius@techdata.com","td_extension":"(800)-237-8931 x5540426","vendor_id":"1","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Akamai","region":"","solutions_practice":"","category_1":"Application Security","sub_category_1":"Other"},{"product_id":"13","product_name":"Bot Manager","description":"Stop the most sophisticated bots","hyperlink":"https:\/\/www.akamai.com\/us\/en\/products\/security\/bot-manager.jsp","td_contact":"akamaius@techdata.com","td_extension":"(800)-237-8931 x5540426","vendor_id":"1","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Akamai","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"Other"},{"product_id":"14","product_name":"Scalable Cloud Security","description":"Deliver flawless and uninterrupted viewing experiences, with secure content, applications, sites and data","hyperlink":"https:\/\/www.akamai.com\/us\/en\/campaign\/scalable-cloud-security-neutralize-threats.jsp","td_contact":"akamaius@techdata.com","td_extension":"(800)-237-8931 x5540426","vendor_id":"1","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Akamai","region":"","solutions_practice":"","category_1":"Cloud Security","sub_category_1":"Other"},{"product_id":"15","product_name":"Identity Cloud","description":"Mission-critical customer identity and access management to provide trusted digital experiences for end users","hyperlink":"https:\/\/www.akamai.com\/us\/en\/products\/security\/identity-cloud.jsp","td_contact":"akamaius@techdata.com","td_extension":"(800)-237-8931 x5540426","vendor_id":"1","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Akamai","region":"","solutions_practice":"","category_2":"Cloud Security","category_1":"Identity and Access","sub_category_1":"Other","sub_category_2":"Other"},{"product_id":"16","product_name":"ActiveWatch","description":"ActiveWatch Managed Detection and Response Services combine managed security services such as threat detection analytics, 24x7x365 threat monitoring, and WAF tuning with ongoing development of scanning, detection and blocking logic deployed through Alert Logic software-as-a-service solutions.","hyperlink":"https:\/\/www.alertlogic.com\/solutions\/activewatch-managed-detection-and-response\/","td_contact":"enterprisecloudsales@techdata.com","td_extension":"","vendor_id":"2","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Alert Logic","region":"","solutions_practice":"","category_1":"Cloud Security","sub_category_1":"Other"},{"product_id":"17","product_name":"Cloud Defender","description":"Cloud Defender is an integrated suite of managed infrastructure and workload security and compliance controls for the cloud, on-premises, hosted, and hybrid infrastructures.","hyperlink":"https:\/\/www.alertlogic.com\/solutions\/managed-cloud-security-solution\/","td_contact":"enterprisecloudsales@techdata.com","td_extension":"","vendor_id":"2","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Alert Logic","region":"","solutions_practice":"","category_1":"Cloud Security","sub_category_1":"Other"},{"product_id":"18","product_name":"Cloud Insight Essentials","description":"Cloud Insight Essentials provides a real-time inventory of your AWS resources with auto-discovery. It creates an interactive topology map so you'll understand the impact of exposures. And, you can search the inventory by AMI, Instance ID & Type, IP range, Availability Zone, Tags and Keywords.","hyperlink":"https:\/\/www.alertlogic.com\/solutions\/aws-vulnerability-scanning-and-assessment\/","td_contact":"enterprisecloudsales@techdata.com","td_extension":"","vendor_id":"2","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Alert Logic","region":"","solutions_practice":"","category_1":"Cloud Security","sub_category_1":"Other"},{"product_id":"19","product_name":"Threat Manager","description":"Threat Manager protects your hybrid infrastructure, applications and cloud workloads by combining a network intrusion detection system (IDS) with vulnerability management","hyperlink":"https:\/\/www.alertlogic.com\/solutions\/network-intrusion-detection-system-ids\/","td_contact":"enterprisecloudsales@techdata.com","td_extension":"","vendor_id":"2","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Alert Logic","region":"","solutions_practice":"","category_1":"Cloud Security","category_2":"Cloud Security","sub_category_1":"Other","sub_category_2":"Other"},{"product_id":"20","product_name":"Unified Log Management and Review","description":"Collect, aggregate, and search log data from cloud, server, application, security, and network assets across your environments and clouds\u2014managed 24x7","hyperlink":"https:\/\/www.alertlogic.com\/solutions\/log-management-software\/","td_contact":"enterprisecloudsales@techdata.com","td_extension":"","vendor_id":"2","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Alert Logic","region":"","solutions_practice":"","category_2":"Cloud Security","sub_category_1":"Log Management","sub_category_2":"Other","category_1":"Security Intelligence"},{"product_id":"21","product_name":"Web Security Manager Premier","description":"Highly tunable, enterprise-grade, cloud based web application firewall (WAF) that comes with your own security experts to eliminate management overhead and complexity.","hyperlink":"https:\/\/www.alertlogic.com\/solutions\/web-application-firewall\/","td_contact":"enterprisecloudsales@techdata.com","td_extension":"","vendor_id":"2","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Alert Logic","region":"","solutions_practice":"","category_2":"Cloud Security","sub_category_2":"Other","sub_category_1":"Web Application Firewall","category_1":"Web Security"},{"product_id":"22","product_name":"Essentials","description":"Vulnerability and Asset Visibility with Extended Endpoint Protection, remediation intelligence, and 24\/7 support","hyperlink":"","td_contact":"enterprisecloudsales@techdata.com","td_extension":"","vendor_id":"2","service_tiering":"No Tiering. Monthly subscription based on node count","partner_benefits":"
\u2022 Visibility & protection across all customer environments: On-premise, hosted, cloud, hybrid<\/p>\n
\u2022 Ability to Cross-sell other security Products<\/p>\n
\u2022 Provides insights to customers, which partners can then provide services and offering around them.<\/p>\n
\u2022 Provides opportunities for partners to wrap additional services around these insights.<\/p>","typeof_service":"
Managed Security Services Turn-Key Solution: <\/strong> People, Processes and Technology (An MSP can plug this solution into their offerings without much effort or investment)<\/p>","end_user_benefits":" Security Platform<\/strong><\/p>\n \u2022 Asset discovery<\/p>\n \u2022 Vulnerability Scanning<\/p>\n \u2022 Cloud configuration checks<\/p>\n \u2022 Extended endpoint protection<\/p>\n Threat Intelligence<\/strong><\/p>\n \u2022 Threat Risk Index<\/p>\n \u2022 Remediation intelligence<\/p>\n \u2022 Prioritization and next steps guidance<\/p>\n \u2022 Comprehensive vulnerability library<\/p>\n Expert Defenders<\/strong><\/p>\n \u2022 24\/7 email and phone support<\/p>\n \u2022 CI scanning and ASV support<\/p>\n \u2022 Service health monitoring<\/p>","mssp_available":"0","org_id":"1","vendor_name":"Alert Logic","region":"","solutions_practice":"","category_2":"Cloud Security","category_1":"Endpoint Security","category_3":"Managed Security Service","sub_category_3":"Turn-Key Solution","sub_category_1":"Turn-Key Solution","sub_category_2":"Turn-Key Solution"},{"product_id":"23","product_name":"Professional","description":"Essentials + Threat Detection & Incident Management, including 24\/7 security monitoring and threat intelligence","hyperlink":"","td_contact":"enterprisecloudsales@techdata.com","td_extension":"","vendor_id":"2","service_tiering":"No Tiering. Monthly subscription based on node count","partner_benefits":" \u2022 Expands your portfolio capability with innovative threat detection and response, as a service: platform, intelligence, experts<\/p>\n \u2022 Cross-sell other security Product<\/p>\n \u2022 Wrap 24\/7 threat detection, monitoring and response into your service offering to help resource-constrained customers improve their security and compliance posture <\/p>\n \u2022 24\/7 SOC services \u2013 customer SLA 15 minutes or augment your own soc services<\/p>\n \u2022 Predictable, recurring revenue model with high margin contribution<\/p>","typeof_service":" Managed Security Services Turn-Key Solution: <\/strong> People, Processes and Technology (An MSP can plug this solution into their offerings without much effort or investment)<\/p>","end_user_benefits":" Security Platform<\/strong><\/p>\n \u2022 Threat monitoring and visibility<\/p>\n \u2022 Intrusion detection<\/p>\n \u2022 Security analytics<\/p>\n \u2022 Log collection and monitoring<\/p>\n \u2022 Office 365 log collection and search<\/p>\n \u2022 Azure Event Hubs integration<\/p>\n \u2022 AWS user behavior anomaly detection<\/p>\n Threat Intelligence<\/strong><\/p>\n \u2022 Security analytics<\/p>\n \u2022 Event insights and analysis<\/p>\n \u2022 Threat frequency, severity, and status intelligence<\/p>\n \u2022 Attack prevention capabilities<\/p>\n \u2022 Continuously advancing intelligence informed by machine and behavioral analytics<\/p>\n Expert Defenders<\/strong><\/p>\n \u2022 24\/7 SOC with incident management, escalation, and response support<\/p>","mssp_available":"0","org_id":"1","vendor_name":"Alert Logic","region":"","solutions_practice":"","category_2":"Cloud Security","category_1":"Endpoint Security","category_3":"Managed Security Service","sub_category_3":"Turn-Key Solution","sub_category_1":"Turn-Key Solution","sub_category_2":"Turn-Key Solution"},{"product_id":"24","product_name":"Enterprise","description":"All the Benefits of Essentials and Professional + WAF and Threat Hunting Analyst options","hyperlink":"","td_contact":"enterprisecloudsales@techdata.com","td_extension":"","vendor_id":"2","service_tiering":"No Tiering. Monthly subscription based on node count","partner_benefits":" \u2022 Expands your portfolio capability with innovative threat detection and response, as a service: platform, intelligence, experts<\/p>\n \u2022 Cross-sell other security Product<\/p>\n \u2022 Wrap 24\/7 threat detection, monitoring and response into your service offering to help resource-constrained customers improve their security and compliance posture <\/p>\n \u2022 24\/7 SOC services \u2013 customer SLA 15 minutes or augment your own soc services<\/p>\n \u2022 Predictable, recurring revenue model with high margin contribution<\/p>","typeof_service":" Managed Security Services Turn-Key Solution: <\/strong> People, Processes and Technology (An MSP can plug this solution into their offerings without much effort or investment)<\/p>","end_user_benefits":" Security Platform<\/strong><\/p>\n \u2022 Always-on Managed WAF Defense (option)<\/p>\n \u2022 Intrusion Detection<\/p>\n \u2022 Log Collection and Monitoring<\/p>\n Threat Intelligence<\/strong><\/p>\n \u2022 Dark Web Scanning<\/p>\n Security Analytics<\/p>\n Expert Defenders<\/strong><\/p>\n \u2022 24\/7 Incident Monitoring & Management<\/p>\n \u2022 Security Event Insights and Analysis<\/p>\n \u2022 Assigned SOC Analyst with Threat Hunting (option)<\/p>","mssp_available":"0","org_id":"1","vendor_name":"Alert Logic","region":"","solutions_practice":"","category_2":"Cloud Security","category_4":"Cloud Security","category_1":"Endpoint Security","category_3":"Managed Security Service","sub_category_4":"Other","sub_category_1":"Turn-Key Solution","sub_category_2":"Turn-Key Solution","sub_category_3":"Turn-Key Solution","sub_category_5":"Turn-Key Solution","category_5":"Web Security"},{"product_id":"25","product_name":"THRICOTM Third-Party Cyber Risk Scoring","description":"Chronic vendor cybersecurity vulnerabilities and weaknesses plague even the most capable of organizations. Arx Nimbus utilizes the Thrivaca SaaS platform, driven by an optimized regulatory-based mathematical algorithm, to provide the most complete third-party risk profile available today. The Thrico(c) Score goes beyond superficial web-based scans and provides actionable and auditable risk profiles based on validated standards to get you and your vendors the results you need in a form regulators, shareholders and risk professionals can validate and accept.","hyperlink":"https:\/\/www.arxnimbus.com\/","td_contact":"arxnimbus@techdata.com","td_extension":"","vendor_id":"3","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Arx Nimbus","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Vulnerability Management\/Patching"},{"product_id":"26","product_name":"THRIVACA SaaS Analytical Platform","description":"Starting with a complete, standards-based core structure comprising Threats, Risks, Vulnerabilities and Capabilities, Thrivaca creates a disciplined architecture for analysis of these key dimensions of cybersecurity practice. Using mathematical standards derived from proven actuarial methods, Thrivaca's proprietary algorithm provides a quantitatively advanced basis for incorporating newly emerging data sources to better inform probability and impact of cyber risks. Because Thrivaca(c) is not based on older, conventional methods and is not inherently dependent on the \"professional judgement\" of individuals, it provides an objective, regulator-friendly rendering of actual cyber risk across the entire spectrum of cyber capabilities.","hyperlink":"https:\/\/www.arxnimbus.com\/","td_contact":"arxnimbus@techdata.com","td_extension":"","vendor_id":"3","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Arx Nimbus","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"Other","sub_category_2":"Web Application Firewall","category_2":"Web Security"},{"product_id":"27","product_name":"Barracuda Backup","description":"Barracuda Backup makes it easier and more cost-effective than ever for you to protect all your data from cybercriminals, natural disasters, hardware failures, and more. Physical, virtual, cloud, and SaaS \u2014 a single, integrated solution keeps all your data safe.","hyperlink":"https:\/\/www.barracuda.com\/products\/backup","td_contact":"barracuda@Techdata.com","td_extension":"(800)-237-8931 x5540427","vendor_id":"4","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Barracuda","region":"","solutions_practice":"","sub_category_1":"Backup, Restore, and Recovery","category_1":"Data Security","category_2":"Endpoint Security","sub_category_2":"Other"},{"product_id":"28","product_name":"CloudGen Firewall","description":"Barracuda's Cloud Generation Firewalls redefine the role of the Firewall from a perimeter security solution to a distributed network optimization solution that scales across any number of locations and applications, connects on-premises and cloud infrastructures, and helps organizations transform their business.","hyperlink":"https:\/\/www.barracuda.com\/products\/nextgenfirewall_f","td_contact":"barracuda@Techdata.com","td_extension":"(800)-237-8931 x5540427","vendor_id":"4","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Barracuda","region":"","solutions_practice":"","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security","category_2":"Network Security","sub_category_2":"Other"},{"product_id":"29","product_name":"Email Security Gateway","description":"The Barracuda Email Security Gateway is an email security gateway that manages and filters all inbound and outbound email traffic to protect organizations from email-borne threats and data leaks. As a complete email management solution, the Barracuda Email Security Gateway lets organizations encrypt messages and leverage the cloud to spool email if mail servers become unavailable.","hyperlink":"https:\/\/www.barracuda.com\/products\/emailsecuritygateway","td_contact":"barracuda@Techdata.com","td_extension":"(800)-237-8931 x5540427","vendor_id":"4","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Barracuda","region":"","solutions_practice":"","sub_category_2":"Backup, Restore, and Recovery","category_2":"Data Security","sub_category_1":"Email Security\/Gateway","category_1":"Network Security"},{"product_id":"30","product_name":"Barracuda Web Application Firewall","description":"The Barracuda Web Application Firewall defeats today\u2019s most sophisticated, complex threats with advanced inspection capabilities that do not impact throughput. It improves overall app performance with built-in application delivery features including SSL offloading, load balancing, and content caching.","hyperlink":"https:\/\/www.barracuda.com\/products\/webapplicationfirewall","td_contact":"barracuda@Techdata.com","td_extension":"(800)-237-8931 x5540427","vendor_id":"4","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Barracuda","region":"","solutions_practice":"","sub_category_2":"Gateway Firewall\/UTM","category_2":"Network Security","sub_category_1":"Web Application Firewall","category_1":"Web Security"},{"product_id":"31","product_name":"Phishline","description":"With PhishLine, you guard against every facet of social-engineering threats with continuous simulation and training for employees. Expose them to the latest attack techniques, and teach them to recognize the subtle clues and help stop email fraud, data loss, and brand damage. Embed learning into your everyday business processes with customized simulations that test and reinforce good behavior.\n\nPhishLine helps you guard against a range of threats with patented, highly-variable attack simulations for multiple vectors, including phishing, smishing, vishing, and found physical media.","hyperlink":"https:\/\/www.barracuda.com\/products\/phishline","td_contact":"barracuda@Techdata.com","td_extension":"(800)-237-8931 x5540427","vendor_id":"4","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Barracuda","region":"","solutions_practice":"","sub_category_1":"Education","sub_category_2":"Security Awareness Training","category_1":"Security Strategy","category_2":"Security Strategy"},{"product_id":"32","product_name":"Sentinel","description":"Sentinel uses AI to outsmart the attackers and protect your business and data. Sentinel learns your business\u2019s unique communication patterns to detect personalized fraud in real-time to protect against business email compromise and account takeover.","hyperlink":"https:\/\/www.barracuda.com\/products\/sentinel","td_contact":"barracuda@Techdata.com","td_extension":"(800)-237-8931 x5540427","vendor_id":"4","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Barracuda","region":"","solutions_practice":"","sub_category_1":"Email Security\/Gateway","category_1":"Network Security"},{"product_id":"33","product_name":"Web Security Gateway","description":"The Barracuda Web Security Gateway lets organizations benefit from online applications and tools without exposure to web-borne malware and viruses, lost user productivity, and misused bandwidth. As a comprehensive solution for web security and management, it unites award-winning spyware, malware, and virus protection with a powerful policy and reporting engine. Advanced features ensure that organizations adapt to emerging requirements like social-network regulation, remote filtering, and visibility into SSL-encrypted traffic.","hyperlink":"https:\/\/www.barracuda.com\/products\/websecuritygateway","td_contact":"barracuda@Techdata.com","td_extension":"(800)-237-8931 x5540427","vendor_id":"4","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Barracuda","region":"","solutions_practice":"","sub_category_2":"Email Security\/Gateway","category_1":"Network Security","category_2":"Network Security","sub_category_1":"URL Filtering\/Web Gateway"},{"product_id":"34","product_name":"Barracuda Backup","description":"Barracuda Backup makes it easier and more cost-effective than ever for you to protect all your data from cybercriminals, natural disasters, hardware failures, and more. Physical, virtual, cloud, and SaaS \u2014 a single, integrated solution keeps all your data safe.","hyperlink":"https:\/\/www.barracuda.com\/products\/backup","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"4","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Barracuda","region":"","solutions_practice":"","sub_category_1":"Backup, Restore, and Recovery","category_1":"Data Security","category_2":"Endpoint Security","sub_category_2":"Other"},{"product_id":"35","product_name":"CloudGen Firewall","description":"Barracuda's Cloud Generation Firewalls redefine the role of the Firewall from a perimeter security solution to a distributed network optimization solution that scales across any number of locations and applications, connects on-premises and cloud infrastructures, and helps organizations transform their business.","hyperlink":"https:\/\/www.barracuda.com\/products\/nextgenfirewall_f","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"4","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Barracuda","region":"","solutions_practice":"","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security","category_2":"Network Security","sub_category_2":"Other"},{"product_id":"36","product_name":"Email Security Gateway","description":"The Barracuda Email Security Gateway is an email security gateway that manages and filters all inbound and outbound email traffic to protect organizations from email-borne threats and data leaks. As a complete email management solution, the Barracuda Email Security Gateway lets organizations encrypt messages and leverage the cloud to spool email if mail servers become unavailable.","hyperlink":"https:\/\/www.barracuda.com\/products\/emailsecuritygateway","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"4","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Barracuda","region":"","solutions_practice":"","sub_category_2":"Backup, Restore, and Recovery","category_2":"Data Security","sub_category_1":"Email Security\/Gateway","category_1":"Network Security"},{"product_id":"37","product_name":"Barracuda Web Application Firewall","description":"The Barracuda Web Application Firewall defeats today\u2019s most sophisticated, complex threats with advanced inspection capabilities that do not impact throughput. It improves overall app performance with built-in application delivery features including SSL offloading, load balancing, and content caching.","hyperlink":"https:\/\/www.barracuda.com\/products\/webapplicationfirewall","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"4","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Barracuda","region":"","solutions_practice":"","sub_category_2":"Gateway Firewall\/UTM","category_2":"Network Security","sub_category_1":"Web Application Firewall","category_1":"Web Security"},{"product_id":"38","product_name":"Web Security Gateway","description":"The Barracuda Web Security Gateway lets organizations benefit from online applications and tools without exposure to web-borne malware and viruses, lost user productivity, and misused bandwidth. As a comprehensive solution for web security and management, it unites award-winning spyware, malware, and virus protection with a powerful policy and reporting engine. Advanced features ensure that organizations adapt to emerging requirements like social-network regulation, remote filtering, and visibility into SSL-encrypted traffic.","hyperlink":"https:\/\/www.barracuda.com\/products\/websecuritygateway","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"4","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Barracuda","region":"","solutions_practice":"","sub_category_2":"Email Security\/Gateway","category_1":"Network Security","category_2":"Network Security","sub_category_1":"URL Filtering\/Web Gateway"},{"product_id":"39","product_name":"DNS Edge","description":"Edge adds a much-needed layer of visibility, control, and detection for corporate networks under siege from an explosion of malware attacks that exploit DNS.\nEdge gives network and IT teams unprecedented access to DNS query data with which they can establish smarter policies, optimize traffic and meet stringent compliance and logging requirements.\n\nEdge reduces your attack surface.\nFor security architects and IT staff that need to limit access to sensitive data and lock down critical systems like cloud apps and services, Edge makes it easy to ingest threat intelligence to block access to well-known bad domains.\n\nEdge detects malicious behavior hidden in millions of DNS queries and response activities.\nCybersecurity teams seeking to detect and stop data exfiltration like tunneling, beaconing to C2 servers, or evasive techniques like DGA, use Edge's smart analytics developed by BlueCat's decades of DNS expertise to spot malicious behavior among all DNS queries across their network.\n\nEdge reduces time to respond and remediate breaches.\nFor incident response teams faced with the challenge of uncovering the lateral spread of an infection and rooting out patient zero in a cyberattack, Edge makes it easy to pinpoint the origin and review the internal and external DNS activity surrounding an incident to reduce the time to resolution.","hyperlink":"https:\/\/bluecatnetworks.com\/resources\/bluecat-dns-edge-solution-overview\/","td_contact":"BluecatUS@techdata.com","td_extension":"727-539-7429 ext 5540423","vendor_id":"5","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Bluecat","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"Other"},{"product_id":"40","product_name":"Core Network Services","description":"Unify your DDI services and get centralized visibility across all your DDI data \u2014 establishing a reliable network foundation that fuels innovation and growth. Most businesses don\u2019t take notice of their DDI infrastructure until something goes wrong. Which means while everything\u2019s running smoothly, that infrastructure gets taken for granted, and that\u2019s a shame \u2013 because with the right DDI infrastructure, you can do some pretty awesome things. For example \u2013 with Adaptive DNS all your critical DDI infrastructure will be united under one intelligent roof, giving you centralized visibility and control of all of your DNS traffic, round the clock.","hyperlink":"https:\/\/bluecatnetworks.com\/adaptive-dns\/ddi\/","td_contact":"BluecatUS@techdata.com","td_extension":"727-539-7429 ext 5540423","vendor_id":"5","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Bluecat","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"Other"},{"product_id":"41","product_name":"Hybrid Cloud Management","description":"Accelerate initiatives, make life easier for DevOps and NetOps, and get a single source of truth across your entire hybrid-cloud estate. We\u2019re all trying to move at the speed of business now. That goes double for DevOps. To be effective, they need to be able to move workloads, spin up and tear down servers at breakneck speed. Hybrid cloud facilitates that \u2014 but there\u2019s a catch\u2026\n\nOnce DevOps teams start standing up DNS resources across hybrid cloud environments, NetOps teams end up in a time-wasting battle against compounding network complexity, instead of focusing their efforts on innovation and growth.\n\nEnter Hybrid Cloud Management \u2013 the cloud DNS solution that puts an end to this costly, outdated paradox.","hyperlink":"https:\/\/bluecatnetworks.com\/adaptive-dns\/cloud-dns\/","td_contact":"BluecatUS@techdata.com","td_extension":"727-539-7429 ext 5540423","vendor_id":"5","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Bluecat","region":"","solutions_practice":"","category_1":"Cloud Security","sub_category_1":"Other"},{"product_id":"42","product_name":"Network Automation","description":"Eliminate manual tasks and harness zero-touch DNS automation to lower network costs, drive rapid innovation, and provide users with a seamless network experience.\nNetworks are getting bigger and more complex every day. So why are 95% of network changes still performed manually?\n\nWay too many network managers have their hands on keyboards, performing repetitive, error-prone network configuration and provisioning tasks.\n\nThat\u2019s why we decided to go all in on network automation, empowering your IT and end users while reducing systemic risk.\n\nOur Adaptive Plug-Ins help you get the most out of your existing infrastructure investments, integrating critical DDI services with applications you use every day.","hyperlink":"https:\/\/bluecatnetworks.com\/adaptive-dns\/network-automation\/","td_contact":"BluecatUS@techdata.com","td_extension":"727-539-7429 ext 5540423","vendor_id":"5","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Bluecat","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"Other"},{"product_id":"43","product_name":"BlackBerry 2FA\u00a0","description":"High-security user authentication that safeguards cloud and standards-based services \u2013 while still protecting your existing VPN","hyperlink":"BlackBerry 2FA","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"6","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Blackberry","region":"","solutions_practice":"","category_1":"Identity and Access","category_2":"Identity and Access","category_3":"Identity and Access","sub_category_3":"MultiFactor and Advanced Authentication","sub_category_1":"MultiFactor and Advanced Authentication","sub_category_2":"MultiFactor and Advanced Authentication"},{"product_id":"44","product_name":"BlackBerry Access\u00a0","description":"Secure Mobile Browser and Remote Access to Web Apps and Intranet","hyperlink":"BlackBerry Access","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"6","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Blackberry","region":"","solutions_practice":"","category_1":"Application Security","sub_category_1":"Other"},{"product_id":"45","product_name":"BlackBerry AtHoc\u00a0","description":"Crisis Communications System","hyperlink":"BlackBerry AtHoc","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"6","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Blackberry","region":"","solutions_practice":"","category_1":"Governance, Risk, Compliance","sub_category_1":"Governance, Risk, Compliance"},{"product_id":"46","product_name":"BBM Enterprise\u00a0","description":"BBM\u00ae Enterprise offers secure text, voice, video, group chat and conferencing on any device, including smartphones and desktops","hyperlink":"BBM Enterprise","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"6","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Blackberry","region":"","solutions_practice":"","category_1":"Application Security","sub_category_1":"Other"},{"product_id":"47","product_name":"BlackBerry Connect\u00a0","description":"Secure Instant Messaging & Collaboration","hyperlink":"BlackBerry Connect","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"6","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Blackberry","region":"","solutions_practice":"","category_1":"Application Security","sub_category_1":"Other"},{"product_id":"48","product_name":"Cylance Smart Antivirus (consumer)\u00a0","description":"Hassle-free, intelligent protection","hyperlink":"Cylance Smart Antivirus (consumer)","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"6","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Blackberry","region":"","solutions_practice":"","category_1":"Application Security","sub_category_1":"Hybrid Scanning Correlation"},{"product_id":"49","product_name":"CylanceOPTICS\u00a0","description":"AI-Powered Endpoint Detection and Response","hyperlink":"CylanceOPTICS","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"6","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Blackberry","region":"","solutions_practice":"","category_1":"Application Security","sub_category_1":"Other"},{"product_id":"50","product_name":"CylancePERSONA\u00a0","description":"Adaptive Security and AI to Protect Mobile Endpoints","hyperlink":"CylancePERSONA","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"6","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Blackberry","region":"","solutions_practice":"","category_1":"Mobile Security","sub_category_1":"Other"},{"product_id":"51","product_name":"CylancePROTECT\u00a0","description":"AI-Native Cybersecurity Solutions for Any Situation","hyperlink":"CylancePROTECT","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"6","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Blackberry","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Other"},{"product_id":"52","product_name":"CylancePROTECT Mobile for BlackBerry UEM\u00a0","description":"Mobile Threat Defense (MTD) Powered by AI and Integrated with BlackBerry UEM","hyperlink":"CylancePROTECT Mobile for BlackBerry UEM","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"6","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Blackberry","region":"","solutions_practice":"","category_1":"Mobile Security","sub_category_1":"Other"},{"product_id":"53","product_name":"BlackBerry Digital Workplace\u00a0","description":"Simple and Secure Access to PIM, Desktops, Apps and Files from Any Device","hyperlink":"BlackBerry Digital Workplace","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"6","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Blackberry","region":"","solutions_practice":"","category_1":"Mobile Security","sub_category_1":"Turn-Key Solution"},{"product_id":"54","product_name":"BlackBerry Dynamics Apps\u00a0","description":"A Full Suite of Mobile Apps","hyperlink":"BlackBerry Dynamics Apps","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"6","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Blackberry","region":"","solutions_practice":"","category_2":"Cloud Security","category_1":"Data Security","sub_category_1":"File, Folder and\/or Email Encryption","category_3":"Mobile Security","sub_category_3":"Mobility Security","sub_category_2":"Turn-Key Solution"},{"product_id":"55","product_name":"BlackBerry Dynamics Platform\u00a0","description":"BlackBerry\u00ae Dynamics offers an advanced, mature and tested container for mobile apps.","hyperlink":"BlackBerry Dynamics Platform","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"6","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Blackberry","region":"","solutions_practice":"","category_1":"Application Security","sub_category_3":"Building Block Solution","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","category_2":"Endpoint Security","category_3":"Mobile Security"},{"product_id":"56","product_name":"BlackBerry Edit\u00a0","description":"BlackBerry\u00ae Edit is an all-in-one enterprise document solution that streamlines mobile editing","hyperlink":"BlackBerry Edit","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"6","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Blackberry","region":"","solutions_practice":"","category_1":"Application Security","sub_category_2":"Building Block Solution","category_2":"Cloud Security","category_3":"Mobile Security","sub_category_3":"Mobility Security","sub_category_1":"Turn-Key Solution"},{"product_id":"57","product_name":"BlackBerry Enterprise BRIDGE\u00a0","description":"BlackBerry\u00ae Enterprise BRIDGE provides a highly secure option for seamlessly using native Microsoft\u00ae mobile apps on iOS and Android\u2122.","hyperlink":"BlackBerry Enterprise BRIDGE","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"6","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Blackberry","region":"","solutions_practice":"","category_1":"Application Security","category_2":"Cloud Security","sub_category_1":"Other","sub_category_2":"Turn-Key Solution"},{"product_id":"58","product_name":"BlackBerry Enterprise Identity\u00a0","description":"Single Sign-on to Cloud Services","hyperlink":"BlackBerry Enterprise Identity","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"6","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Blackberry","region":"","solutions_practice":"","category_2":"Application Security","category_3":"Data Security","sub_category_3":"Encyption Key Management","category_1":"Identity and Access","sub_category_1":"Identity Governance","sub_category_2":"Other"},{"product_id":"59","product_name":"BlackBerry Hub+\u00a0","description":"Up your game with BlackBerry apps on your Android phone","hyperlink":"BlackBerry Hub+","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"6","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Blackberry","region":"","solutions_practice":"","category_1":"Application Security","sub_category_1":"Other"},{"product_id":"60","product_name":"BlackBerry Notes\u00a0","description":"BlackBerry\u00ae Notes is the secure note-taking solution designed for mobile enterprise users.","hyperlink":"BlackBerry Notes","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"6","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Blackberry","region":"","solutions_practice":"","category_1":"Application Security","sub_category_1":"Other"},{"product_id":"61","product_name":"SecuSUITE\u00a0","description":"High Security Voice and Messaging for iOS and Android","hyperlink":"SecuSUITE","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"6","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Blackberry","region":"","solutions_practice":"","category_1":"Application Security","sub_category_2":"Device and Sensor","category_2":"IoT","category_3":"Mobile Security","sub_category_3":"Other","sub_category_1":"Other"},{"product_id":"62","product_name":"BlackBerry Secure UEM & Productivity Suites\u00a0","description":"Enabling people to be more productive than ever, while securing and managing all endpoints.","hyperlink":"BlackBerry Secure UEM & Productivity Suites","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"6","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Blackberry","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Endpoint Security Management"},{"product_id":"63","product_name":"BlackBerry Spark Communications Services\u00a0","description":"Embed Secure Communication Capabilities into Apps and Smart Devices with CPaaS","hyperlink":"BlackBerry Spark Communications Services","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"6","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Blackberry","region":"","solutions_practice":"","sub_category_1":"Building Block Solution","category_1":"Mobile Security"},{"product_id":"64","product_name":"BlackBerry Tasks\u00a0","description":"BlackBerry\u00ae Tasks allows users to securely create, open and prioritize tasks synchronized with Microsoft\u00ae Exchange.","hyperlink":"BlackBerry Tasks","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"6","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Blackberry","region":"","solutions_practice":"","category_1":"Application Security","sub_category_1":"Building Block Solution","category_2":"Cloud Security","sub_category_2":"Other"},{"product_id":"65","product_name":"BlackBerry UEM\u00a0","description":"Unified Endpoint Management with Industry-leading Security","hyperlink":"BlackBerry UEM","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"6","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Blackberry","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Endpoint Security Management"},{"product_id":"66","product_name":"BlackBerry Work\u00a0","description":"BlackBerry\u00ae Work combines enterprise email, calendar, contacts, presence, document access, document editing and more.","hyperlink":"BlackBerry Work","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"6","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Blackberry","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Endpoint Security Management"},{"product_id":"67","product_name":"BlackBerry Workspaces\u00a0","description":"BlackBerry\u00ae Workspaces is the best choice for secure file storage, synchronization and sharing","hyperlink":"BlackBerry Workspaces","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"6","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Blackberry","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Endpoint Security Management"},{"product_id":"68","product_name":"CyberShark SOC Service","description":"CyberShark takes its proven security and compliance platform, trusted by thousands of customers, and delivers it at a fraction of the cost in the cloud.","hyperlink":"https:\/\/www.blackstratus.com\/cybershark\/","td_contact":"cybershark@techdata.com","td_extension":"800-237-8931 x5540413","vendor_id":"7","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"CyberShark","region":"","solutions_practice":"","category_3":"Application Security","sub_category_3":"Hybrid Scanning Correlation","category_1":"Security Intelligence","sub_category_1":"SIEM","sub_category_2":"Web Application Firewall","category_2":"Web Security"},{"product_id":"69","product_name":"LOGStorm","description":"LOGStorm is a cost-effective, powerful and flexible log management and log monitoring solution that combines complete log management with powerful correlation technology, real-time event log correlation and log monitoring, and an integrated incident response system \u2013 all on one appliance.","hyperlink":"https:\/\/www.blackstratus.com\/log-storm\/","td_contact":"cybershark@techdata.com","td_extension":"800-237-8931 x5540413","vendor_id":"8","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"BlackStratus","region":"","solutions_practice":"","sub_category_1":"Log Management","category_2":"Network Security","category_1":"Security Intelligence","sub_category_2":"URL Filtering\/Web Gateway"},{"product_id":"70","product_name":"SIEMStorm","description":"SIEMStorm is the premier network security solution for cloud service providers and other MSSPs. A single appliance gives you flexible threat visualization and mitigation tools across distributed networks and other multi-tenant environments. Easy to set up right out of the box, SIEMStorm integrates with your existing network and security hardware to provide advanced features.","hyperlink":"https:\/\/www.blackstratus.com\/siem-storm\/","td_contact":"cybershark@techdata.com","td_extension":"800-237-8931 x5540413","vendor_id":"8","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"BlackStratus","region":"","solutions_practice":"","category_1":"Security Intelligence","category_2":"Security Intelligence","sub_category_1":"SIEM","sub_category_2":"SIEM"},{"product_id":"71","product_name":"Carbon Black Cloud","description":"The VMware Carbon Black Cloud is a cloud-native endpoint protection platform (EPP) that provides what you need to secure your endpoints, using a single lightweight agent and an easy to use console","hyperlink":"https:\/\/www.carbonblack.com\/products\/vmware-carbon-black-cloud\/","td_contact":"carbonblackus@techdata.com","td_extension":"800-237-8931 x5545048","vendor_id":"9","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Carbon Black (VMware)","region":"","solutions_practice":"","category_1":"Cloud Security","sub_category_2":"Endpoint Anti-Virus\/Anti-Malware","category_2":"Endpoint Security","sub_category_1":"Other"},{"product_id":"72","product_name":"Carbonite Availability","description":"Continuous replication for physical, virtual and cloud workloads with push-button failover for keeping critical systems online all the time.","hyperlink":"https:\/\/www.carbonite.com\/products\/high-availability\/","td_contact":"carbonite@techdata.com","td_extension":"800-237-8931 x5540414","vendor_id":"10","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Carbonite","region":"","solutions_practice":"","sub_category_1":"Backup, Restore, and Recovery","category_1":"Data Security"},{"product_id":"73","product_name":"Carbonite Cloud Backup","description":"Automatic cloud backup for business data, featuring flexible retention options\u2014up to 7 years.","hyperlink":"https:\/\/www.carbonite.com\/products\/cloud-backup\/","td_contact":"carbonite@techdata.com","td_extension":"800-237-8931 x5540414","vendor_id":"10","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Carbonite","region":"","solutions_practice":"","sub_category_1":"Backup, Restore, and Recovery","category_1":"Data Security"},{"product_id":"74","product_name":"Carbonite Endpoint Protection","description":"Automatic, secure data protection for endpoints\u2013with deployment flexibility for large, distributed organizations.","hyperlink":"https:\/\/www.carbonite.com\/products\/carbonite-endpoint-protection\/","td_contact":"carbonite@techdata.com","td_extension":"800-237-8931 x5540414","vendor_id":"10","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Carbonite","region":"","solutions_practice":"","sub_category_1":"Backup, Restore, and Recovery","category_1":"Data Security"},{"product_id":"75","product_name":"Carbonite Hybrid Backup","description":"Automatic, flexible business backup that combines the speed of local data recovery with the added protection of cloud backup.","hyperlink":"https:\/\/www.carbonite.com\/products\/hybrid-backup-solutions\/","td_contact":"carbonite@techdata.com","td_extension":"800-237-8931 x5540414","vendor_id":"10","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Carbonite","region":"","solutions_practice":"","sub_category_1":"Backup, Restore, and Recovery","category_1":"Data Security"},{"product_id":"76","product_name":"Carbonite Migrate","description":"Structured, repeatable data migration from any source to any target with no data loss and no disruption in service.","hyperlink":"https:\/\/www.carbonite.com\/products\/cloud-migration\/","td_contact":"carbonite@techdata.com","td_extension":"800-237-8931 x5540414","vendor_id":"10","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Carbonite","region":"","solutions_practice":"","sub_category_1":"Backup, Restore, and Recovery","category_1":"Data Security"},{"product_id":"77","product_name":"Carbonite Onsite Backup","description":"Automatic backup for business data that enables rapid recovery of files, folders and complete systems.","hyperlink":"https:\/\/www.carbonite.com\/products\/onsite-backup-software\/","td_contact":"carbonite@techdata.com","td_extension":"800-237-8931 x5540414","vendor_id":"10","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Carbonite","region":"","solutions_practice":"","sub_category_1":"Backup, Restore, and Recovery","category_1":"Data Security"},{"product_id":"78","product_name":"Carbonite Recover","description":"Keep a secondary copy of any system in the cloud for instant failover in the event of an outage.","hyperlink":"https:\/\/www.carbonite.com\/products\/carbonite-recover\/","td_contact":"carbonite@techdata.com","td_extension":"800-237-8931 x5540414","vendor_id":"10","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Carbonite","region":"","solutions_practice":"","sub_category_1":"Backup, Restore, and Recovery","category_1":"Data Security"},{"product_id":"79","product_name":"Endpoint for Service Providers","description":"Enterprise-grade protection and management for customer desktops, laptops, tablets, and mobile devices","hyperlink":"","td_contact":"carbonite@techdata.com \n(727) 539-7429 x-71458","td_extension":"800-237-8931 x5540414","vendor_id":"10","service_tiering":"No Tiering.\u00a0 Monthly subscription based upon device count.","partner_benefits":" \u2022 Fixed monthly pricing that include product, support and services for a 3,4 or 5 year commitment<\/p>\n \u2022 Check Point\u2019s full offering, both software and physical, ranging from SMB to high end<\/p>\n \u2022 Co-MSP Support that includes 24x7 support SLA with affordable costs <\/p>\n \u2022 All equipment & licensing in MSSP deals is owned by Check Point throughout the agreement period, therefore, no assets are on the books, eliminating related expenses <\/p>\n \u2022 E14Flexible delivery methods to suit you and your customers\u2019 needs. This includes both on & offpremise solutions, along with mobile, endpoint and mailbox protection<\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 Centrally managed, policy-controlled backups with no disruption<\/p>\n \u2022 Optional QuickCache technology manages bandwidth consumption across distributed networks<\/p>\n \u2022 Global deduplication reduces storage footprint and cost<\/p>\n \u2022 Secure, remote data access from any device, anywhere, anytime <\/p>\n \u2022 Global location tracking and remote data wipe options<\/p>","mssp_available":"0","org_id":"1","vendor_name":"Carbonite","region":"","solutions_practice":"","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","category_1":"Data Security","category_2":"Managed Security Service"},{"product_id":"80","product_name":"Migrate for Service Providers","description":"Migrate workloads to your cloud with minimal risk and near-zero downtime","hyperlink":"","td_contact":"carbonite@techdata.com \n(727) 539-7429 x-71458","td_extension":"800-237-8931 x5540414","vendor_id":"10","service_tiering":"No Tiering. Monthly subscription per active migration.","partner_benefits":" \u2022 Structured, repeatable migrations with near-zero downtime<\/p>\n \u2022 Simplified customer on-boarding process<\/p>\n \u2022 One self-service portal to manage all migration projects and customer billing<\/p>\n \u2022 No upfront cost or order fulfillment process<\/p>\n \u2022 No need to reorder licenses if your migration project runs longer than expected<\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 Any-to-any migrations between physical, virtual, and cloud platforms<\/p>\n \u2022 No lock-in to a specific hypervisor or hardware<\/p>\n \u2022 Efficient, real-time migration with minimal downtime<\/p>\n \u2022 Non-disruptive testing of target systems before cutover<\/p>\n \u2022 Simple, low-impact, automated migrations from a central console<\/p>\n \u2022 Built-in AES 256-bit encryption in flight and at rest <\/p>","mssp_available":"0","org_id":"1","vendor_name":"Carbonite","region":"","solutions_practice":"","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","category_1":"Data Security","category_2":"Managed Security Service"},{"product_id":"81","product_name":"Recover for Service Providers","description":"Disaster recovery in the cloud for key systems","hyperlink":"","td_contact":"carbonite@techdata.com \n(727) 539-7429 x-71458","td_extension":"800-237-8931 x5540414","vendor_id":"10","service_tiering":"Tiered pricing. Monthly subscription per connection.","partner_benefits":" \u2022 Minimal customization needs<\/p>\n \u2022 Centralized, web-based console<\/p>\n \u2022 Built-in multi-tenancy<\/p>\n \u2022 Push button reverse back to original or replacement server<\/p>\n \u2022 Lower TCO:<\/p>\n - N:1 \u2013 only target appliance running during protection<\/p>\n - Allows for customer self-service<\/p>\n - More automation for discovery, installs, and provisioning<\/p>\n \u2022 White label capabilities to align with your go-to-market plans and branding<\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 Continuous replication for failover of customer workloads<\/p>\n \u2022 Orchestration for multi-tier applications, with boot order and script points<\/p>\n \u2022 Automated discovery of systems in customer environments and non-disruptive testing<\/p>\n \u2022 Automated provisioning eliminates the need to manually build\/install OS and applications on recovery servers<\/p>\n \u2022 Efficiency\u2014bandwidth optimization, volume-level exclusion rules, simplified DNS management<\/p>\n \u2022 N:1 topology lowers costs by keeping target servers offline until they are needed<\/p>\n \u2022 Straightforward administration with a single console, role-based access controls, and enhanced reporting<\/p>\n \u2022 Built-in 256-bit encryption in flight and at rest<\/p>","mssp_available":"0","org_id":"1","vendor_name":"Carbonite","region":"","solutions_practice":"","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","category_1":"Data Security","category_2":"Managed Security Service"},{"product_id":"82","product_name":"Server VM Edition for Service Providers","description":"Hypervisor-based, local and cloud backup, and DR","hyperlink":"","td_contact":"carbonite@techdata.com \n(727) 539-7429 x-71458","td_extension":"800-237-8931 x5540414","vendor_id":"10","service_tiering":"No Tiering.\u00a0 Monthly subscription based upon VM or per TB of compressed data.","partner_benefits":" \u2022 Scalable management back-end to accommodate growing customer footprint, up to thousands of VMs<\/p>\n \u2022 Remote, multi-tenant management from a single centralized portal<\/p>\n \u2022 White label capabilities to align with your go-to-market plans and branding<\/p>\n \u2022 Built to integrate with the complete Carbonite platform for data protection over time<\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 Multiple restore options including full VM, granular file\/folder, and cross-hypervisor restores, as well as VM mount and download<\/p>\n \u2022 RTO and RPO in minutes, with fully configurable backup and retention scheduling<\/p>\n \u2022 Easily scale across SAN, NAS, and DAS for improved performance; consolidate unused storage across multiple systems<\/p>\n \u2022 Scalable management back-end to accommodate growing customer footprint<\/p>\n \u2022 AES 256-bit encryption in flight and at rest <\/p>","mssp_available":"0","org_id":"1","vendor_name":"Carbonite","region":"","solutions_practice":"","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","category_1":"Data Security","category_2":"Managed Security Service"},{"product_id":"83","product_name":"Privileged Access Service","description":"Cloud-ready Zero Trust Privilege is designed to handle the rudimentary use case of privileged access management (PAM), which lies in granting access to privileged user accounts via a shared account, password or applications password and secrets vault, as well as securing remote access. Centrify Privileged Access Service allows for all the above as well as secure administrative access via jump box, workflow-driven access requests and approvals as well as multi-factor-authentication (MFA) at the vault.","hyperlink":"https:\/\/www.centrify.com\/privileged-access-management\/privileged-access-service\/","td_contact":"centrify@techdata.com","td_extension":"800-237-8931 x5540424","vendor_id":"11","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Centrify","region":"","solutions_practice":"","category_1":"Identity and Access","category_2":"Identity and Access","sub_category_2":"Other","sub_category_1":"Privileged Access Management"},{"product_id":"84","product_name":"Authentication Service","description":"Cloud-ready Zero Trust Privilege is designed to handle requesters that are not only human but also machines, services and APIs. There will still be shared accounts, but for increased assurance, best practices now recommend individual identities, not shared accounts, where least privilege can be applied. Centrify Authentication Service allows properly verifying who requests privileged access. This can be achieved by leveraging enterprise directory identities, eliminating local accounts and decreasing the overall number of accounts and passwords, therefore reducing the attack surface.","hyperlink":"","td_contact":"centrify@techdata.com","td_extension":"800-237-8931 x5540424","vendor_id":"11","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Centrify","region":"","solutions_practice":"","category_2":"Identity and Access","category_3":"Identity and Access","category_4":"Identity and Access","sub_category_4":"Identity Governance","sub_category_3":"MultiFactor and Advanced Authentication","sub_category_2":"Other","sub_category_1":"Other","category_1":"Security Strategy"},{"product_id":"85","product_name":"Privilege Elevation Service","description":"Centrify Privilege Elevation Service minimizes the risk exposure to cyber-attacks caused by individuals with too much privilege. The service allows customers to implement just enough, just-in-time privileged access best practices and in turn limiting potential damage from security breaches.","hyperlink":"","td_contact":"centrify@techdata.com","td_extension":"800-237-8931 x5540424","vendor_id":"11","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Centrify","region":"","solutions_practice":"","category_1":"Identity and Access","category_2":"Identity and Access","sub_category_2":"Identity Governance","sub_category_1":"Privileged Access Management"},{"product_id":"86","product_name":"Audit And Monitoring Service","description":"For privileged sessions it is best practice to audit everything. With a documented record of all actions performed it not only can be used in forensic analysis to find exactly the issue and attribute it to a specific user and session. Because these sessions are so critical it is also best practice to keep a video recording of the session that can be reviewed or used as evidence for your most critical assets or in highly regulated industries. With the Centrify Audit and Monitoring Service monitoring and session recording can be achieved through either a gateway-based and\/or host-based technique. Advanced monitoring capabilities even allow for process launch and file integrity monitoring.","hyperlink":"","td_contact":"centrify@techdata.com","td_extension":"800-237-8931 x5540424","vendor_id":"11","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Centrify","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"Other"},{"product_id":"87","product_name":"Privilege Threat Analytics Service","description":"Cyber adversaries are getting more and more sophisticated and therefore it is best practice to apply multiple security layers when protecting against privileged access abuse. Today\u2019s threatscape requires security controls to be adaptive to the risk-context and to use machine learning to carefully analyze a privileged user\u2019s behavior. Leveraging Centrify Privilege Threat Analytics Service can make the difference between falling victim to a breach or stopping it in its tracks.","hyperlink":"","td_contact":"centrify@techdata.com","td_extension":"800-237-8931 x5540424","vendor_id":"11","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Centrify","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"MultiFactor and Advanced Authentication"},{"product_id":"88","product_name":"Anti-Spam & Email Security Software Blade","description":"Check Point Anti-Spam & Email Security provides comprehensive protection for messaging infrastructure. A multidimensional approach protects email infrastructure, provides highly accurate anti-spam coverage and defends organizations from a wide variety of virus and malware threats delivered within email.","hyperlink":"https:\/\/www.checkpoint.com\/products\/anti-spam-email-security-software-blade\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Check Point","region":"","solutions_practice":"","sub_category_1":"Email Security\/Gateway","category_1":"Network Security"},{"product_id":"89","product_name":"Capsule Cloud","description":"Your employees expect to do their work whenever and wherever it\u2019s convenient, but their use of laptops and online behaviors can put your corporate network at risk. Check Point Capsule Cloud solves this security dilemma by using a cloud based mobile security container to enforce your in-network security policy on laptops used outside of the corporate network.","hyperlink":"https:\/\/www.checkpoint.com\/products\/capsule-cloud\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Check Point","region":"","solutions_practice":"","category_1":"Mobile Security","sub_category_1":"Other"},{"product_id":"90","product_name":"Data Loss Prevention Software Blade","description":"Check Point Data Loss Prevention (DLP) combines technology and processes to revolutionize DLP, helping businesses to pre-emptively protect sensitive information from unintentional loss, educating users on proper data handling policies and empowering them to remediate incidents in real-time.","hyperlink":"https:\/\/www.checkpoint.com\/products\/dlp-software-blade\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Check Point","region":"","solutions_practice":"","sub_category_1":"Data Loss Prevention","category_1":"Data Security"},{"product_id":"91","product_name":"DDoS Protector","description":"Check Point DDoS Protector\u2122Appliances block Denial of Service attacks within seconds with multi-layered protection and up to 40 Gbps of performance.\nModern DDoS attacks use new techniques to exploit areas where traditional security solutions are not equipped to protect. These attacks can cause serious network downtime to businesses who rely on networks and Web services to operate. DDoS Protectors extend company\u2019s security perimeters to block destructive DDoS attacks before they cause damage.","hyperlink":"https:\/\/www.checkpoint.com\/products\/ddos-protector\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Check Point","region":"","solutions_practice":"","sub_category_1":"DoS and DDoS","category_1":"Network Security"},{"product_id":"92","product_name":"Identity Awareness Software Blade","description":"Check Point Identity Awareness provides granular visibility of users, groups and machines, providing unmatched application and access control through the creation of accurate, identity-based policies. Centralized management and monitoring allows for policies to be managed from a single, unified console.","hyperlink":"https:\/\/www.checkpoint.com\/products\/identity-awareness-software-blade\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Check Point","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"Other"},{"product_id":"93","product_name":"CheckPoint Incident Response","description":"When the worst happens and you get attacked, trust Check Point to mitigate your risk with our Incident Response Service. Just call our dedicated hotline anytime you experience a security threat and our 24\u00d77 experts will instantly respond to help you contain the threat, minimize your losses and return to business as usual. Our Incident Response service will also help you mitigate future risks with post-incident reports and security best practices advisement.","hyperlink":"https:\/\/www.checkpoint.com\/support-services\/threatcloud-incident-response\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Check Point","region":"","solutions_practice":"","sub_category_1":"Incident Response","category_1":"Security Intelligence"},{"product_id":"94","product_name":"Intrusion Prevention System Software Blade","description":"The Check Point Intrusion Prevention System (IPS) Software Blade combines industry-leading IPS protection with breakthrough performance at a lower cost than traditional, stand-alone IPS software solutions. The IPS Software Blade delivers complete and proactive intrusion prevention \u2013 all with the deployment and management advantages of a unified and extensible next-generation firewall solution.","hyperlink":"https:\/\/www.checkpoint.com\/products\/ips-software-blade\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Check Point","region":"","solutions_practice":"","category_2":"Cloud Security","sub_category_1":"Intrusion Detection and Prevention","category_1":"Network Security","sub_category_2":"Other"},{"product_id":"95","product_name":"IPSec VPN Software Blade","description":"IPsec VPN provides secure connectivity to corporate networks for remote and mobile users, branch offices and business partners. IPsec integrates access control, authentication and encryption to guarantee the security of network connections over the public Internet.","hyperlink":"https:\/\/www.checkpoint.com\/products\/ipsec-vpn-software-blade\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Check Point","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"VPN Concentrator"},{"product_id":"96","product_name":"Next Generation Data Protection","description":"Next Generation Data Protection solutions encompass all facets of protecting content from getting into the wrong hands. Data Loss Prevention (DLP) is an integral part of a data protection solution, however to fully protect data, multiple layers must be put into place. Check Point combines these layers into a complete solution protecting against confidential data inadvertently leaving the organization.","hyperlink":"https:\/\/www.checkpoint.com\/products\/next-generation-data-protection\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Check Point","region":"","solutions_practice":"","sub_category_1":"Data Loss Prevention","category_1":"Data Security","sub_category_2":"Intrusion Detection and Prevention","category_2":"Network Security"},{"product_id":"97","product_name":"Next Generation Firewall","description":"Check Point provides customers of all sizes with the latest data and network security protection in an integrated next generation firewall platform, reducing complexity and lowering the total cost of ownership. Whether you need next-generation security for your data center, enterprise, small business or home office, Check Point has a solution for you.","hyperlink":"https:\/\/www.checkpoint.com\/products-solutions\/next-generation-firewalls\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Check Point","region":"","solutions_practice":"","category_3":"Cloud Security","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security","category_2":"Network Security","sub_category_3":"Other","sub_category_2":"VPN Concentrator"},{"product_id":"98","product_name":"Next Generation Secure Web Gateway","description":"Embracing the current paradigm shift from simple URL filtering to comprehensive malware protection, the Check Point Secure Web Gateway provides an intuitive solution that enables secure use of Web 2.0 with real time multi-layered protection against web-borne malware, largest application coverage in the industry, advanced granular control, intuitive centralized management, and essential end-user education functionality.","hyperlink":"https:\/\/www.checkpoint.com\/products\/next-generation-secure-web-gateway\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Check Point","region":"","solutions_practice":"","sub_category_2":"Data Loss Prevention","category_2":"Data Security","category_1":"Network Security","sub_category_1":"URL Filtering\/Web Gateway"},{"product_id":"99","product_name":"Private ThreatCloud","description":"Check Point Private ThreatCloud\u2122 enables organizations to maintain the highest security posture in air-gapped environments by providing real-time product updates and access to intelligence feeds. This system ensures absolute privacy with one-way data syncing, ensuring no data or queries exit the defined perimeter.","hyperlink":"https:\/\/www.checkpoint.com\/products\/private-threatcloud\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Check Point","region":"","solutions_practice":"","sub_category_2":"Gateway Firewall\/UTM","category_2":"Network Security","category_1":"Security Intelligence","sub_category_1":"Threat Intelligence"},{"product_id":"100","product_name":"SandBlast Threat Emulation (Sandboxing)","description":"As part of the Check Point SandBlast Zero-Day Protection solution, Threat Emulation prevents infections from new malware and targeted attacks. This innovative zero-day threat sandboxing capability within the SandBlast solution delivers the best possible catch rate for threats, and is virtually immune to attackers\u2019 evasion techniques.","hyperlink":"https:\/\/www.checkpoint.com\/products\/threat-emulation-sandboxing\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Check Point","region":"","solutions_practice":"","category_1":"Network Security","category_2":"Network Security","sub_category_1":"Sandboxing and APT Protection","sub_category_2":"URL Filtering\/Web Gateway"},{"product_id":"101","product_name":"URL Filtering Software Blade","description":"Check Point URL Filtering provides optimized web security through full integration in the gateway to prevent bypass through external proxies. Integration of policy enforcement with Application Control means enhanced Web and Web 2.0 protection, and UserCheck technology empowers and educates users on web usage policy in real time.","hyperlink":"https:\/\/www.checkpoint.com\/products\/url-filtering-software-blade\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Check Point","region":"","solutions_practice":"","category_1":"Network Security","category_2":"Security Intelligence","sub_category_2":"Threat Intelligence","sub_category_1":"URL Filtering\/Web Gateway"},{"product_id":"102","product_name":"Advanced Endpoint Threat Prevention","description":"Protect endpoints against advanced 5th generation cyber attacks and zero-day threats, enabling a deep understanding of security events for rapid response and quick remediation of attacks.","hyperlink":"https:\/\/www.checkpoint.com\/products\/sandblast-agent\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Check Point","region":"","solutions_practice":"","sub_category_1":"Advanced Malware Protection","sub_category_2":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security","category_2":"Endpoint Security","category_3":"Endpoint Security","sub_category_3":"VPN"},{"product_id":"103","product_name":"Check Point MSSP Program","description":"The Check Point Managed Security Service Provider (MSSP) program is based on Check Points 5th Generation security architecture and enables you as an MSP to offer your customers the best security available from the entire Check Point portfolio. CP MSP program provides for a scalable fully integrated security solution based on custmer needs and allows the MSP to manage customer gateways; physical, virtual, and hybrid all from one platform. With the MSP program you have a cost-effective and predictable expense projection to help you remain competitive in the security services industry while operating a value-added business","hyperlink":"","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"12","service_tiering":"No tiering. Customers pay monthly for the appliances or services they need. Support is included in the monthly cost. The MSP partner provides all front line support and management.","partner_benefits":" Check Point\u2019s MSSP Program allows you to lower the TCO and control the cash flow thanks to: <\/p>\n \u2022 Minimal upfront investment <\/p>\n \u2022 Easy & efficient management, reducing man hours & expenses <\/p>\n \u2022 Special Co-MSP support <\/p>\n \u2022 No assets on the book <\/p>\n \u2022 Complete Check Point offering available through MSSP program providing flexibility in partners MSSP offerings <\/p>\n \u2022 Check Point MSSP partners receive gold standard, software based, scalable, management platform (MDM) <\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 Fixed monthly pricing that include product, support and services for a 3,4 or 5 year commitment<\/p>\n \u2022 Check Point\u2019s full offering, both software and physical, ranging from SMB to high end<\/p>\n \u2022 Co-MSP Support that includes 24x7 support SLA with affordable costs <\/p>\n \u2022 All equipment & licensing in MSSP deals is owned by Check Point throughout the agreement period, therefore, no assets are on the books, eliminating related expenses <\/p>\n \u2022 E14Flexible delivery methods to suit you and your customers\u2019 needs. This includes both on & offpremise solutions, along with mobile, endpoint and mailbox protection<\/p>","mssp_available":"0","org_id":"1","vendor_name":"Check Point","region":"","solutions_practice":"","sub_category_6":"Building Block Solution","sub_category_7":"Building Block Solution","sub_category_8":"Building Block Solution","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","sub_category_3":"Building Block Solution","sub_category_4":"Building Block Solution","sub_category_5":"Building Block Solution","category_3":"Cloud Security","category_5":"Data Security","category_2":"Endpoint Security","category_6":"Identity and Access","category_1":"Managed Security Service","category_7":"Mobile Security","category_8":"Network Security","category_4":"Security Intelligence"},{"product_id":"104","product_name":"Anti-Spam & Email Security Software Blade","description":"Check Point Anti-Spam & Email Security provides comprehensive protection for messaging infrastructure. A multidimensional approach protects email infrastructure, provides highly accurate anti-spam coverage and defends organizations from a wide variety of virus and malware threats delivered within email.","hyperlink":"https:\/\/www.checkpoint.com\/products\/anti-spam-email-security-software-blade\/","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Check Point","region":"","solutions_practice":"","sub_category_1":"Email Security\/Gateway","category_1":"Network Security"},{"product_id":"105","product_name":"Capsule Cloud","description":"Your employees expect to do their work whenever and wherever it\u2019s convenient, but their use of laptops and online behaviors can put your corporate network at risk. Check Point Capsule Cloud solves this security dilemma by using a cloud based mobile security container to enforce your in-network security policy on laptops used outside of the corporate network.","hyperlink":"https:\/\/www.checkpoint.com\/products\/capsule-cloud\/","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Check Point","region":"","solutions_practice":"","category_1":"Mobile Security","sub_category_1":"Other"},{"product_id":"106","product_name":"Data Loss Prevention Software Blade","description":"Check Point Data Loss Prevention (DLP) combines technology and processes to revolutionize DLP, helping businesses to pre-emptively protect sensitive information from unintentional loss, educating users on proper data handling policies and empowering them to remediate incidents in real-time.","hyperlink":"https:\/\/www.checkpoint.com\/products\/dlp-software-blade\/","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Check Point","region":"","solutions_practice":"","sub_category_1":"Data Loss Prevention","category_1":"Data Security"},{"product_id":"107","product_name":"DDoS Protector","description":"Check Point DDoS Protector\u2122Appliances block Denial of Service attacks within seconds with multi-layered protection and up to 40 Gbps of performance.\nModern DDoS attacks use new techniques to exploit areas where traditional security solutions are not equipped to protect. These attacks can cause serious network downtime to businesses who rely on networks and Web services to operate. DDoS Protectors extend company\u2019s security perimeters to block destructive DDoS attacks before they cause damage.","hyperlink":"https:\/\/www.checkpoint.com\/products\/ddos-protector\/","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Check Point","region":"","solutions_practice":"","sub_category_1":"DoS and DDoS","category_1":"Network Security"},{"product_id":"108","product_name":"Identity Awareness Software Blade","description":"Check Point Identity Awareness provides granular visibility of users, groups and machines, providing unmatched application and access control through the creation of accurate, identity-based policies. Centralized management and monitoring allows for policies to be managed from a single, unified console.","hyperlink":"https:\/\/www.checkpoint.com\/products\/identity-awareness-software-blade\/","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Check Point","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"Other"},{"product_id":"109","product_name":"CheckPoint Incident Response","description":"When the worst happens and you get attacked, trust Check Point to mitigate your risk with our Incident Response Service. Just call our dedicated hotline anytime you experience a security threat and our 24\u00d77 experts will instantly respond to help you contain the threat, minimize your losses and return to business as usual. Our Incident Response service will also help you mitigate future risks with post-incident reports and security best practices advisement.","hyperlink":"https:\/\/www.checkpoint.com\/support-services\/threatcloud-incident-response\/","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Check Point","region":"","solutions_practice":"","sub_category_1":"Incident Response","category_1":"Security Intelligence"},{"product_id":"110","product_name":"Intrusion Prevention System Software Blade","description":"The Check Point Intrusion Prevention System (IPS) Software Blade combines industry-leading IPS protection with breakthrough performance at a lower cost than traditional, stand-alone IPS software solutions. The IPS Software Blade delivers complete and proactive intrusion prevention \u2013 all with the deployment and management advantages of a unified and extensible next-generation firewall solution.","hyperlink":"https:\/\/www.checkpoint.com\/products\/ips-software-blade\/","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Check Point","region":"","solutions_practice":"","category_2":"Cloud Security","sub_category_1":"Intrusion Detection and Prevention","category_1":"Network Security","sub_category_2":"Other"},{"product_id":"111","product_name":"IPSec VPN Software Blade","description":"IPsec VPN provides secure connectivity to corporate networks for remote and mobile users, branch offices and business partners. IPsec integrates access control, authentication and encryption to guarantee the security of network connections over the public Internet.","hyperlink":"https:\/\/www.checkpoint.com\/products\/ipsec-vpn-software-blade\/","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Check Point","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"VPN Concentrator"},{"product_id":"112","product_name":"Next Generation Data Protection","description":"Next Generation Data Protection solutions encompass all facets of protecting content from getting into the wrong hands. Data Loss Prevention (DLP) is an integral part of a data protection solution, however to fully protect data, multiple layers must be put into place. Check Point combines these layers into a complete solution protecting against confidential data inadvertently leaving the organization.","hyperlink":"https:\/\/www.checkpoint.com\/products\/next-generation-data-protection\/","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Check Point","region":"","solutions_practice":"","sub_category_1":"Data Loss Prevention","category_1":"Data Security","sub_category_2":"Intrusion Detection and Prevention","category_2":"Network Security"},{"product_id":"113","product_name":"Next Generation Firewall","description":"Check Point provides customers of all sizes with the latest data and network security protection in an integrated next generation firewall platform, reducing complexity and lowering the total cost of ownership. Whether you need next-generation security for your data center, enterprise, small business or home office, Check Point has a solution for you.","hyperlink":"https:\/\/www.checkpoint.com\/products-solutions\/next-generation-firewalls\/","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Check Point","region":"","solutions_practice":"","category_3":"Cloud Security","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security","category_2":"Network Security","sub_category_3":"Other","sub_category_2":"VPN Concentrator"},{"product_id":"114","product_name":"Next Generation Secure Web Gateway","description":"Embracing the current paradigm shift from simple URL filtering to comprehensive malware protection, the Check Point Secure Web Gateway provides an intuitive solution that enables secure use of Web 2.0 with real time multi-layered protection against web-borne malware, largest application coverage in the industry, advanced granular control, intuitive centralized management, and essential end-user education functionality.","hyperlink":"https:\/\/www.checkpoint.com\/products\/next-generation-secure-web-gateway\/","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Check Point","region":"","solutions_practice":"","sub_category_2":"Data Loss Prevention","category_2":"Data Security","category_1":"Network Security","sub_category_1":"URL Filtering\/Web Gateway"},{"product_id":"115","product_name":"Private ThreatCloud","description":"Check Point Private ThreatCloud\u2122 enables organizations to maintain the highest security posture in air-gapped environments by providing real-time product updates and access to intelligence feeds. This system ensures absolute privacy with one-way data syncing, ensuring no data or queries exit the defined perimeter.","hyperlink":"https:\/\/www.checkpoint.com\/products\/private-threatcloud\/","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Check Point","region":"","solutions_practice":"","sub_category_2":"Gateway Firewall\/UTM","category_2":"Network Security","category_1":"Security Intelligence","sub_category_1":"Threat Intelligence"},{"product_id":"116","product_name":"SandBlast Threat Emulation (Sandboxing)","description":"As part of the Check Point SandBlast Zero-Day Protection solution, Threat Emulation prevents infections from new malware and targeted attacks. This innovative zero-day threat sandboxing capability within the SandBlast solution delivers the best possible catch rate for threats, and is virtually immune to attackers\u2019 evasion techniques.","hyperlink":"https:\/\/www.checkpoint.com\/products\/threat-emulation-sandboxing\/","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Check Point","region":"","solutions_practice":"","category_1":"Network Security","category_2":"Network Security","sub_category_1":"Sandboxing and APT Protection","sub_category_2":"URL Filtering\/Web Gateway"},{"product_id":"117","product_name":"URL Filtering Software Blade","description":"Check Point URL Filtering provides optimized web security through full integration in the gateway to prevent bypass through external proxies. Integration of policy enforcement with Application Control means enhanced Web and Web 2.0 protection, and UserCheck technology empowers and educates users on web usage policy in real time.","hyperlink":"https:\/\/www.checkpoint.com\/products\/url-filtering-software-blade\/","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Check Point","region":"","solutions_practice":"","category_1":"Network Security","category_2":"Security Intelligence","sub_category_2":"Threat Intelligence","sub_category_1":"URL Filtering\/Web Gateway"},{"product_id":"118","product_name":"Advanced Endpoint Threat Prevention","description":"Protect endpoints against advanced 5th generation cyber attacks and zero-day threats, enabling a deep understanding of security events for rapid response and quick remediation of attacks.","hyperlink":"https:\/\/www.checkpoint.com\/products\/sandblast-agent\/","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Check Point","region":"","solutions_practice":"","sub_category_1":"Advanced Malware Protection","sub_category_2":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security","category_2":"Endpoint Security","category_3":"Endpoint Security","sub_category_3":"VPN"},{"product_id":"119","product_name":"Check Point MSSP Program","description":"The Check Point Managed Security Service Provider (MSSP) program is based on Check Points 5th Generation security architecture and enables you as an MSP to offer your customers the best security available from the entire Check Point portfolio. CP MSP program provides for a scalable fully integrated security solution based on custmer needs and allows the MSP to manage customer gateways; physical, virtual, and hybrid all from one platform. With the MSP program you have a cost-effective and predictable expense projection to help you remain competitive in the security services industry while operating a value-added business","hyperlink":"","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"12","service_tiering":"No tiering. Customers pay monthly for the appliances or services they need. Support is included in the monthly cost. The MSP partner provides all front line support and management.","partner_benefits":" Check Point\u2019s MSSP Program allows you to lower the TCO and control the cash flow thanks to: <\/p>\n \u2022 Minimal upfront investment <\/p>\n \u2022 Easy & efficient management, reducing man hours & expenses <\/p>\n \u2022 Special Co-MSP support <\/p>\n \u2022 No assets on the book <\/p>\n \u2022 Complete Check Point offering available through MSSP program providing flexibility in partners MSSP offerings <\/p>\n \u2022 Check Point MSSP partners receive gold standard, software based, scalable, management platform (MDM) <\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 Fixed monthly pricing that include product, support and services for a 3,4 or 5 year commitment<\/p>\n \u2022 Check Point\u2019s full offering, both software and physical, ranging from SMB to high end<\/p>\n \u2022 Co-MSP Support that includes 24x7 support SLA with affordable costs <\/p>\n \u2022 All equipment & licensing in MSSP deals is owned by Check Point throughout the agreement period, therefore, no assets are on the books, eliminating related expenses <\/p>\n \u2022 E14Flexible delivery methods to suit you and your customers\u2019 needs. This includes both on & offpremise solutions, along with mobile, endpoint and mailbox protection<\/p>","mssp_available":"0","org_id":"1","vendor_name":"Check Point","region":"","solutions_practice":"","sub_category_6":"Building Block Solution","sub_category_7":"Building Block Solution","sub_category_8":"Building Block Solution","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","sub_category_3":"Building Block Solution","sub_category_4":"Building Block Solution","sub_category_5":"Building Block Solution","category_3":"Cloud Security","category_5":"Data Security","category_2":"Endpoint Security","category_6":"Identity and Access","category_1":"Managed Security Service","category_7":"Mobile Security","category_8":"Network Security","category_4":"Security Intelligence"},{"product_id":"120","product_name":"Anti-Spam & Email Security Software Blade","description":"Check Point Anti-Spam & Email Security provides comprehensive protection for messaging infrastructure. A multidimensional approach protects email infrastructure, provides highly accurate anti-spam coverage and defends organizations from a wide variety of virus and malware threats delivered within email.","hyperlink":"https:\/\/www.checkpoint.com\/products\/anti-spam-email-security-software-blade\/","td_contact":"checkpoint@techdata.com","td_extension":"800-237-8931 x5545036","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Check Point","region":"","solutions_practice":"","sub_category_1":"Email Security\/Gateway","category_1":"Network Security"},{"product_id":"121","product_name":"Capsule Cloud","description":"Your employees expect to do their work whenever and wherever it\u2019s convenient, but their use of laptops and online behaviors can put your corporate network at risk. Check Point Capsule Cloud solves this security dilemma by using a cloud based mobile security container to enforce your in-network security policy on laptops used outside of the corporate network.","hyperlink":"https:\/\/www.checkpoint.com\/products\/capsule-cloud\/","td_contact":"checkpoint@techdata.com","td_extension":"800-237-8931 x5545036","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Check Point","region":"","solutions_practice":"","category_1":"Mobile Security","sub_category_1":"Other"},{"product_id":"122","product_name":"Data Loss Prevention Software Blade","description":"Check Point Data Loss Prevention (DLP) combines technology and processes to revolutionize DLP, helping businesses to pre-emptively protect sensitive information from unintentional loss, educating users on proper data handling policies and empowering them to remediate incidents in real-time.","hyperlink":"https:\/\/www.checkpoint.com\/products\/dlp-software-blade\/","td_contact":"checkpoint@techdata.com","td_extension":"800-237-8931 x5545036","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Check Point","region":"","solutions_practice":"","sub_category_1":"Data Loss Prevention","category_1":"Data Security"},{"product_id":"123","product_name":"DDoS Protector","description":"Check Point DDoS Protector\u2122Appliances block Denial of Service attacks within seconds with multi-layered protection and up to 40 Gbps of performance.\nModern DDoS attacks use new techniques to exploit areas where traditional security solutions are not equipped to protect. These attacks can cause serious network downtime to businesses who rely on networks and Web services to operate. DDoS Protectors extend company\u2019s security perimeters to block destructive DDoS attacks before they cause damage.","hyperlink":"https:\/\/www.checkpoint.com\/products\/ddos-protector\/","td_contact":"checkpoint@techdata.com","td_extension":"800-237-8931 x5545036","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Check Point","region":"","solutions_practice":"","sub_category_1":"DoS and DDoS","category_1":"Network Security"},{"product_id":"124","product_name":"Identity Awareness Software Blade","description":"Check Point Identity Awareness provides granular visibility of users, groups and machines, providing unmatched application and access control through the creation of accurate, identity-based policies. Centralized management and monitoring allows for policies to be managed from a single, unified console.","hyperlink":"https:\/\/www.checkpoint.com\/products\/identity-awareness-software-blade\/","td_contact":"checkpoint@techdata.com","td_extension":"800-237-8931 x5545036","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Check Point","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"Other"},{"product_id":"125","product_name":"CheckPoint Incident Response","description":"When the worst happens and you get attacked, trust Check Point to mitigate your risk with our Incident Response Service. Just call our dedicated hotline anytime you experience a security threat and our 24\u00d77 experts will instantly respond to help you contain the threat, minimize your losses and return to business as usual. Our Incident Response service will also help you mitigate future risks with post-incident reports and security best practices advisement.","hyperlink":"https:\/\/www.checkpoint.com\/support-services\/threatcloud-incident-response\/","td_contact":"checkpoint@techdata.com","td_extension":"800-237-8931 x5545036","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Check Point","region":"","solutions_practice":"","sub_category_1":"Incident Response","category_1":"Security Intelligence"},{"product_id":"126","product_name":"Intrusion Prevention System Software Blade","description":"The Check Point Intrusion Prevention System (IPS) Software Blade combines industry-leading IPS protection with breakthrough performance at a lower cost than traditional, stand-alone IPS software solutions. The IPS Software Blade delivers complete and proactive intrusion prevention \u2013 all with the deployment and management advantages of a unified and extensible next-generation firewall solution.","hyperlink":"https:\/\/www.checkpoint.com\/products\/ips-software-blade\/","td_contact":"checkpoint@techdata.com","td_extension":"800-237-8931 x5545036","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Check Point","region":"","solutions_practice":"","category_2":"Cloud Security","sub_category_1":"Intrusion Detection and Prevention","category_1":"Network Security","sub_category_2":"Other"},{"product_id":"127","product_name":"IPSec VPN Software Blade","description":"IPsec VPN provides secure connectivity to corporate networks for remote and mobile users, branch offices and business partners. IPsec integrates access control, authentication and encryption to guarantee the security of network connections over the public Internet.","hyperlink":"https:\/\/www.checkpoint.com\/products\/ipsec-vpn-software-blade\/","td_contact":"checkpoint@techdata.com","td_extension":"800-237-8931 x5545036","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Check Point","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"VPN Concentrator"},{"product_id":"128","product_name":"Next Generation Data Protection","description":"Next Generation Data Protection solutions encompass all facets of protecting content from getting into the wrong hands. Data Loss Prevention (DLP) is an integral part of a data protection solution, however to fully protect data, multiple layers must be put into place. Check Point combines these layers into a complete solution protecting against confidential data inadvertently leaving the organization.","hyperlink":"https:\/\/www.checkpoint.com\/products\/next-generation-data-protection\/","td_contact":"checkpoint@techdata.com","td_extension":"800-237-8931 x5545036","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Check Point","region":"","solutions_practice":"","sub_category_1":"Data Loss Prevention","category_1":"Data Security","sub_category_2":"Intrusion Detection and Prevention","category_2":"Network Security"},{"product_id":"129","product_name":"Next Generation Firewall","description":"Check Point provides customers of all sizes with the latest data and network security protection in an integrated next generation firewall platform, reducing complexity and lowering the total cost of ownership. Whether you need next-generation security for your data center, enterprise, small business or home office, Check Point has a solution for you.","hyperlink":"https:\/\/www.checkpoint.com\/products-solutions\/next-generation-firewalls\/","td_contact":"checkpoint@techdata.com","td_extension":"800-237-8931 x5545036","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Check Point","region":"","solutions_practice":"","category_3":"Cloud Security","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security","category_2":"Network Security","sub_category_3":"Other","sub_category_2":"VPN Concentrator"},{"product_id":"130","product_name":"Next Generation Secure Web Gateway","description":"Embracing the current paradigm shift from simple URL filtering to comprehensive malware protection, the Check Point Secure Web Gateway provides an intuitive solution that enables secure use of Web 2.0 with real time multi-layered protection against web-borne malware, largest application coverage in the industry, advanced granular control, intuitive centralized management, and essential end-user education functionality.","hyperlink":"https:\/\/www.checkpoint.com\/products\/next-generation-secure-web-gateway\/","td_contact":"checkpoint@techdata.com","td_extension":"800-237-8931 x5545036","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Check Point","region":"","solutions_practice":"","sub_category_2":"Data Loss Prevention","category_2":"Data Security","category_1":"Network Security","sub_category_1":"URL Filtering\/Web Gateway"},{"product_id":"131","product_name":"Private ThreatCloud","description":"Check Point Private ThreatCloud\u2122 enables organizations to maintain the highest security posture in air-gapped environments by providing real-time product updates and access to intelligence feeds. This system ensures absolute privacy with one-way data syncing, ensuring no data or queries exit the defined perimeter.","hyperlink":"https:\/\/www.checkpoint.com\/products\/private-threatcloud\/","td_contact":"checkpoint@techdata.com","td_extension":"800-237-8931 x5545036","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Check Point","region":"","solutions_practice":"","sub_category_2":"Gateway Firewall\/UTM","category_2":"Network Security","category_1":"Security Intelligence","sub_category_1":"Threat Intelligence"},{"product_id":"132","product_name":"SandBlast Threat Emulation (Sandboxing)","description":"As part of the Check Point SandBlast Zero-Day Protection solution, Threat Emulation prevents infections from new malware and targeted attacks. This innovative zero-day threat sandboxing capability within the SandBlast solution delivers the best possible catch rate for threats, and is virtually immune to attackers\u2019 evasion techniques.","hyperlink":"https:\/\/www.checkpoint.com\/products\/threat-emulation-sandboxing\/","td_contact":"checkpoint@techdata.com","td_extension":"800-237-8931 x5545036","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Check Point","region":"","solutions_practice":"","category_1":"Network Security","category_2":"Network Security","sub_category_1":"Sandboxing and APT Protection","sub_category_2":"URL Filtering\/Web Gateway"},{"product_id":"133","product_name":"URL Filtering Software Blade","description":"Check Point URL Filtering provides optimized web security through full integration in the gateway to prevent bypass through external proxies. Integration of policy enforcement with Application Control means enhanced Web and Web 2.0 protection, and UserCheck technology empowers and educates users on web usage policy in real time.","hyperlink":"https:\/\/www.checkpoint.com\/products\/url-filtering-software-blade\/","td_contact":"checkpoint@techdata.com","td_extension":"800-237-8931 x5545036","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Check Point","region":"","solutions_practice":"","category_1":"Network Security","category_2":"Security Intelligence","sub_category_2":"Threat Intelligence","sub_category_1":"URL Filtering\/Web Gateway"},{"product_id":"134","product_name":"Advanced Endpoint Threat Prevention","description":"Protect endpoints against advanced 5th generation cyber attacks and zero-day threats, enabling a deep understanding of security events for rapid response and quick remediation of attacks.","hyperlink":"https:\/\/www.checkpoint.com\/products\/sandblast-agent\/","td_contact":"checkpoint@techdata.com \n(727) 539-7429 x-82127","td_extension":"800-237-8931 x5545036","vendor_id":"12","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Check Point","region":"","solutions_practice":"","sub_category_1":"Advanced Malware Protection","sub_category_2":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security","category_2":"Endpoint Security","category_3":"Endpoint Security","sub_category_3":"VPN"},{"product_id":"135","product_name":"Check Point MSSP Program","description":"The Check Point Managed Security Service Provider (MSSP) program is based on Check Points 5th Generation security architecture and enables you as an MSP to offer your customers the best security available from the entire Check Point portfolio. CP MSP program provides for a scalable fully integrated security solution based on custmer needs and allows the MSP to manage customer gateways; physical, virtual, and hybrid all from one platform. With the MSP program you have a cost-effective and predictable expense projection to help you remain competitive in the security services industry while operating a value-added business","hyperlink":"","td_contact":"checkpoint@techdata.com \n(727) 539-7429 x-82127","td_extension":"800-237-8931 x5545036","vendor_id":"12","service_tiering":"No tiering. Customers pay monthly for the appliances or services they need. Support is included in the monthly cost. The MSP partner provides all front line support and management.","partner_benefits":" Check Point\u2019s MSSP Program allows you to lower the TCO and control the cash flow thanks to: <\/p>\n \u2022 Minimal upfront investment <\/p>\n \u2022 Easy & efficient management, reducing man hours & expenses <\/p>\n \u2022 Special Co-MSP support <\/p>\n \u2022 No assets on the book <\/p>\n \u2022 Complete Check Point offering available through MSSP program providing flexibility in partners MSSP offerings <\/p>\n \u2022 Check Point MSSP partners receive gold standard, software based, scalable, management platform (MDM) <\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 Fixed monthly pricing that include product, support and services for a 3,4 or 5 year commitment<\/p>\n \u2022 Check Point\u2019s full offering, both software and physical, ranging from SMB to high end<\/p>\n \u2022 Co-MSP Support that includes 24x7 support SLA with affordable costs <\/p>\n \u2022 All equipment & licensing in MSSP deals is owned by Check Point throughout the agreement period, therefore, no assets are on the books, eliminating related expenses <\/p>\n \u2022 E14Flexible delivery methods to suit you and your customers\u2019 needs. This includes both on & offpremise solutions, along with mobile, endpoint and mailbox protection<\/p>","mssp_available":"0","org_id":"1","vendor_name":"Check Point","region":"","solutions_practice":"","sub_category_6":"Building Block Solution","sub_category_7":"Building Block Solution","sub_category_8":"Building Block Solution","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","sub_category_3":"Building Block Solution","sub_category_4":"Building Block Solution","sub_category_5":"Building Block Solution","category_3":"Cloud Security","category_5":"Data Security","category_2":"Endpoint Security","category_6":"Identity and Access","category_1":"Managed Security Service","category_7":"Mobile Security","category_8":"Network Security","category_4":"Security Intelligence"},{"product_id":"136","product_name":"Cisco 3000 Series Industrial Security Appliances (ISA)","description":"Gain the proven security protection of the Cisco ASA FirePOWER services. Our ruggedized 3000 appliance currently provides the industry's widest range of OT specific access control, threat detection, and application visibility for the harshest and most demanding of environments. It offers four high-performance Ethernet data links in a DIN rail or rack-mount form factor.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/industrial-security-appliance-isa\/index.html","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security"},{"product_id":"137","product_name":"Cisco 4000 Series Integrated Services Routers","description":"The 4000 Series offers secure WAN connectivity, application experience, unified communications, network automation, virtualization, and branch and direct Internet access security solutions in one platform.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/routers\/4000-series-integrated-services-routers-isr\/index.html","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security","category_2":"Network Security","sub_category_2":"URL Filtering\/Web Gateway"},{"product_id":"138","product_name":"Cisco Adaptive Security Applicance (ASA) Software","description":"Cisco Adaptive Security Appliance (ASA) Software is the core operating system for the Cisco ASA Family. It delivers enterprise-class firewall capabilities for ASA devices in an array of form factors - standalone appliances, blades, and virtual appliances - for any distributed network environment. ASA Software also integrates with other critical security technologies to deliver comprehensive solutions that meet continuously evolving security needs.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/adaptive-security-appliance-asa-software\/index.html","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security"},{"product_id":"139","product_name":"Cisco Adaptive Security Device Manager","description":"Use a local, web-based interface to manage the Cisco ASA 5500 Series, 5500-X Series, Cisco AnyConnect Secure Mobility Client, and legacy Cisco IDS\/IPS sensors.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/security-management\/index.html","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Management","category_1":"Security Intelligence"},{"product_id":"140","product_name":"Cisco Adaptive Security Virtual Appliance (ASAv)","description":"The Adaptive Security Virtual Appliance is a virtualized network security solution. It supports both traditional and next-generation software-defined networks (SDN), as well as Cisco Application Centric Infrastructure (ACI) environments. The ASAv provides policy enforcement and threat inspection across heterogeneous, multisite environments.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/virtual-adaptive-security-appliance-firewall\/index.html","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"Other"},{"product_id":"141","product_name":"Cisco Advanced Malware Protection (AMP)","description":"Get global threat intelligence, advanced sandboxing, and real-time malware blocking to prevent breaches with Cisco Advanced Malware Protection (AMP). But because you can\u2019t rely on prevention alone, AMP also continuously analyzes file activity across your extended network, so you can quickly detect, contain, and remove advanced malware.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/advanced-malware-protection\/index.html","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"Sandboxing and APT Protection"},{"product_id":"142","product_name":"Cisco Advanced Phishing Protection","description":"Cyber attackers are continuously finding new ways to infiltrate your network. BEC and other identity deception\u2013based threats are examples of new ways attackers are breaching organizations successfully. Business Email Compromise (BEC) has cost companies $5.3 billion globally according to the FBI1 . Organizations need more layers of protection to defend users from fraudulent senders.\nCisco Advanced Phishing Protection further augments sender authentication and BEC detection capabilities already available in Cisco Email Security. It integrates machine learning that combines local identity and relationship modeling with behavior analytics to protect against identity deception\u2013based threats. It models trusted email behavior, within organizations and between individuals. This identity intelligence continuously adapts to drive a real-time understanding of senders and prevent costly breaches.","hyperlink":"https:\/\/www.cisco.com\/c\/dam\/en\/us\/products\/collateral\/security\/cloud-email-security\/at-a-glance-c45-740894.pdf","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Email Security\/Gateway","category_1":"Network Security"},{"product_id":"143","product_name":"Cisco AMP for Endpoints","description":"Cisco AMP for Endpoints is a next-generation endpoint security solution that prevents, detects, and responds to advanced threats.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/amp-for-endpoints\/index.html","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Advanced Malware Protection","category_1":"Endpoint Security"},{"product_id":"144","product_name":"Cisco AnyConnect Network Visibility Module","description":"The Cisco AnyConnect\u00ae Network Visibility Module helps you see user and endpoint behavior both on and off premises. It collects standard flows from endpoints (laptops, for example) along with context like user, application, device, location, and destination information. IT administrators can collect and analyze this rich data. They can then better defend the organization against potential security threats as well as address a wide range of network operations challenges.","hyperlink":"https:\/\/www.cisco.com\/c\/dam\/en\/us\/products\/collateral\/security\/anyconnect-secure-mobility-client\/at-a-glance-c45-736671.pdf","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Other","sub_category_2":"Other","category_2":"Security Intelligence"},{"product_id":"145","product_name":"Cisco AnyConnect Secure Mobility Client","description":"Empower your employees to work from anywhere, on company laptops or personal mobile devices, at any time. AnyConnect simplifies secure endpoint access and provides the security necessary to help keep your organization safe and protected.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/anyconnect-secure-mobility-client\/index.html","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Mobile Security","sub_category_1":"Mobility Management"},{"product_id":"146","product_name":"Cisco ASA 5500-X with FirePOWER Services","description":"Beat sophisticated cyber attacks with a superior security appliance. We offer the industry\u2019s first threat-focused next-generation firewall (NGFW), the ASA 5500-X Series.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/asa-firepower-services\/index.html","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_3":"Email Security\/Gateway","sub_category_1":"Gateway Firewall\/UTM","sub_category_4":"Intrusion Detection and Prevention","category_1":"Network Security","category_2":"Network Security","category_3":"Network Security","category_4":"Network Security","sub_category_2":"URL Filtering\/Web Gateway"},{"product_id":"147","product_name":"Cisco Cloudlock","description":"Cisco Cloudlock is a cloud-native cloud access security broker (CASB) that helps you move to the cloud safely. It protects your cloud users, data, and apps. Cloudlock's simple, open, and automated approach uses APIs to manage the risks in your cloud app ecosystem. With Cloudlock you can more easily combat data breaches while meeting compliance regulations.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/cloudlock\/index.html","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"CASB","category_1":"Cloud Security"},{"product_id":"148","product_name":"Cisco Cognitive Threat Analytics","description":"Today\u2019s attacks are more effective than ever. And organizations struggle to secure their rapidly changing networks against them. But you can detect even the most sophisticated attacks with Cognitive Threat Analytics. Deployed by more than 5 million users, it requires no additional hardware or software. And it integrates with several Cisco security solutions.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/cognitive-threat-analytics\/index.html","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_2":"Predictive Analytics","category_1":"Security Intelligence","category_2":"Security Intelligence","sub_category_1":"Threat Intelligence"},{"product_id":"149","product_name":"Cisco Content Security Management Appliance","description":"Centrally manage Cisco Email Security and Web Security Appliances.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/security-management\/index.html","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"Other"},{"product_id":"150","product_name":"Cisco Defense Orchestrator","description":"Manage security policy from the cloud, simply and consistently. Works across a range of Cisco security products, including ASA firewalls, Cisco ASA with FIrePOWER Services, Umbrella cloud web security, and Web Security Appliances.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/security-management\/index.html","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"Other"},{"product_id":"151","product_name":"Cisco Domain Protection","description":"DMARC is a technology that makes it easier for email senders and receivers to determine if a message is from a legitimate sender. Identifying all legitimate senders can be challenging because\nof the complexity of an organization\u2019s email ecosystem. This process can be time consuming and difficult to implement without the right tools, processes, and knowledge.","hyperlink":"https:\/\/www.cisco.com\/c\/dam\/en\/us\/products\/collateral\/security\/cloud-email-security\/at-a-glance-c45-740937.pdf","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Email Security\/Gateway","category_1":"Network Security"},{"product_id":"152","product_name":"Cisco Duo","description":"For organizations of all sizes that need to protect sensitive data at scale, Duo is the user-friendly zero-trust security platform for all users, all devices and all applications.\n\nMFA is the foundation for zero trust. Duo verifies that your users are who they say they are, before they access your data \u2014 and with multiple second-factor options, including one-touch Duo Push, users can easily authenticate in seconds. Monitor the health of every device across your organization in real-time, whether it's corporate-managed or not. With Duo's device trust features, you can customize access requirements at the device level, and because it's a cloud-based solution, you'll stay ahead of the latest security threats. Grant your users just the right amount of access. Duo's advanced policy enforcement capabilities let you define security requirements at the user, device, and application level, based on contextual factors like location and update status. Enable your mobile workforce without compromising your company's data. Duo provides modern remote access solutions and protects existing IT infrastructure, making it easy to onboard new employees and contractors and allowing employees to work on the go. Finally, Duo's SSO (Single Sign-On) grants users secure access to all protected applications (on-premises or cloud-based) through a uniform, frictionless interface that's accessible from anywhere.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/adaptive-multi-factor-authentication.html","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"MultiFactor and Advanced Authentication"},{"product_id":"153","product_name":"Cisco Dynamic Multipoint VPN (DMVPN)","description":"Dynamic Multipoint VPN (DMVPN) is a Cisco IOS Software solution for building scalable IPsec Virtual Private Networks (VPNs). Cisco DMVPN uses a centralized architecture to provide easier implementation and management for deployments that require granular access controls for diverse user communities, including mobile workers, telecommuters, and extranet users.\n\nCisco DMVPN allows branch locations to communicate directly with each other over the public WAN or Internet, such as when using voice over IP (VOIP) between two branch offices, but doesn't require a permanent VPN connection between sites. It enables zero-touch deployment of IPsec VPNs and improves network performance by reducing latency and jitter, while optimizing head office bandwidth utilization.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/dynamic-multipoint-vpn-dmvpn\/index.html","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"VPN"},{"product_id":"154","product_name":"Cisco Email Encryption","description":"Despite the rise in text messaging, instant messaging, social networking, and other forms of communication, email continues to be the predominant business collaboration tool. The unsecured nature of email, however, has caused the inadvertent and malicious exposure of sensitive information.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/email-encryption\/index.html","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Email Security\/Gateway","category_1":"Network Security"},{"product_id":"155","product_name":"Cisco Email Security","description":"Your cloud email needs an additional layer of protection against threats like ransomware, business email compromise, phishing, and more. Cisco provides you with intelligence from one of the largest threat detection teams in the world, along with the robust features you need to protect your users. Microsoft Office 365 and Cisco Email Security are simply better together.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/email-security\/office-365.html","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Email Security\/Gateway","category_1":"Network Security"},{"product_id":"156","product_name":"Cisco Firepower 2100 Series","description":"Gain business resiliency through superior security with sustained performance. The Firepower 2100 Series has an innovative dual multicore CPU architecture that optimizes firewall, cryptographic, and threat inspection functions simultaneously. Now, achieving security doesn\u2019t come at the expense of network performance.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/firepower-2100-series\/index.html","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_3":"Email Security\/Gateway","sub_category_1":"Gateway Firewall\/UTM","sub_category_4":"Intrusion Detection and Prevention","category_1":"Network Security","category_2":"Network Security","category_3":"Network Security","category_4":"Network Security","sub_category_2":"URL Filtering\/Web Gateway"},{"product_id":"157","product_name":"Cisco Firepower 4100 Series","description":"Stop more threats with our fully integrated next-generation firewall (NGFW) appliance. The 4100 Series\u2019 1-rack-unit size is ideal at the Internet edge and in high-performance environments. It shows you what\u2019s happening on your network, detects attacks earlier so you can act faster, and reduces management complexity.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/firepower-4100-series\/index.html","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_3":"Email Security\/Gateway","sub_category_1":"Gateway Firewall\/UTM","sub_category_4":"Intrusion Detection and Prevention","category_1":"Network Security","category_2":"Network Security","category_3":"Network Security","category_4":"Network Security","sub_category_2":"URL Filtering\/Web Gateway"},{"product_id":"158","product_name":"Cisco Firepower 9000 Series","description":"This carrier-grade next-generation firewall (NGFW) is ideal for data centers and other high-performance settings that require low latency and high throughput. Deliver scalable, consistent security to workloads and data flows across physical, virtual, and cloud environments. With tightly integrated services, the Firepower 9000 Series lowers costs and supports open, programmable networks.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/firepower-9000-series\/index.html","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_3":"Email Security\/Gateway","sub_category_1":"Gateway Firewall\/UTM","sub_category_4":"Intrusion Detection and Prevention","category_1":"Network Security","category_2":"Network Security","category_3":"Network Security","category_4":"Network Security","sub_category_2":"URL Filtering\/Web Gateway"},{"product_id":"159","product_name":"Cisco Firepower Device Manager","description":"Manage a small-scale Firepower NGFW deployment locally, using the web. Available on the new Cisco Firepower 2100 Series and select ASA 5500-X models.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/security-management\/index.html","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Management","category_1":"Security Intelligence"},{"product_id":"160","product_name":"Cisco Firepower Management Center","description":"Centrally manage events and policies. Analyze threats. Works with Cisco network security solutions such as ASA with FirePOWER services, Cisco Firepower NGFWs, Firepower NGIPS, FirePOWER AMP, and FirePOWER Threat Defense for ISR.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/security-management\/index.html","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Management","category_1":"Security Intelligence"},{"product_id":"161","product_name":"Cisco Group Encrypted Transport VPN","description":"Networks today need to support all forms of media-including data, voice, and video-to enhance business communications and lower operating costs. Voice and video applications are accelerating the need for instantaneous, branch-to-branch communications, while network security risks are increasing. Regulatory compliance has become essential. To solve these pressing challenges, your organization needs an intelligent network that securely integrates applications in a way that is easy to manage.\n\nCisco Group Encrypted Transport VPN, eliminates the need for compromise between network intelligence and data privacy in private WAN environments. Service providers can finally offer managed encryption without a provisioning and management nightmare since GET VPN simplifies the provisioning and management of VPN. GET VPN defines a new category of VPN, one that does not use tunnels.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/group-encrypted-transport-vpn\/index.html","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"VPN Concentrator"},{"product_id":"162","product_name":"Cisco Identity Services Engine","description":"Next-generation secure network access...\nGain awareness of everything hitting your network. Provide access consistently and efficiently. Relieve the stress of complex access management.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/identity-services-engine\/index.html","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"Identity Governance"},{"product_id":"163","product_name":"Cisco IOS Easy VPN","description":"Give your employees great flexibility in performing their job functions with anytime, anyplace network access. Cisco IOS Easy VPN supports employees who need network access from home after hours and weekends to perform business functions such as answering email or using networked applications. VPN technology helps your company increase productivity by improving response times and enabling work without interruptions common in an office environment.\n\nUsing standards-based IPsec technology, Cisco IOS Easy VPN greatly simplifies VPN deployment with centralized VPN management across all Cisco VPN devices. It supports integration of a variety of remote devices within a single deployment and with a consistent policy and key management method, which simplifies remote side administration.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/ios-easy-vpn\/index.html","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"VPN Concentrator"},{"product_id":"164","product_name":"Cisco IOS Firewall","description":"Cisco IOS Firewall helps ensure your network's availability and the security of your company's resources by protecting the network infrastructure against network- and application-layer attacks, viruses, and worms. It protects unified communications by guarding Session Initiation Protocol (SIP) endpoints and call-control resources. Cisco IOS Firewall is a stateful firewall solution, certified by Common Criteria (EAL4).","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/ios-firewall\/index.html","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security"},{"product_id":"165","product_name":"Cisco IOS Flexible Packet Matching (FPM)","description":"Protect against existing and emerging threats at all network entry points with Cisco IOS Flexible Packet Matching (FPM). Cisco FPM uses flexible and granular Layer 2-7 pattern matching deep within the packet header or payload to provide a rapid first line of defense against network threats and notable worms and viruses.\n\nA key component of the Cisco IOS Integrated Threat Control framework, Cisco FPM complements the Cisco IOS Intrusion Prevention System (IPS) by supporting custom filters that can be defined and deployed more rapidly than IPS signatures or antivirus patterns can be updated. It gives network security administrators powerful tools to identify miscreant traffic and immediately drop or log it for audit purposes.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/ios-flexible-packet-matching-fpm\/index.html","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security"},{"product_id":"166","product_name":"Cisco IOS FlexVPN","description":"Large customers deploying IPSec VPN over IP networks are faced with high complexity and high cost of deploying multiple types of VPN to meet different types of connectivity requirements. Customers often have to learn different types of VPNs to manage and operate different types of network. And once a technology is selected for a deployment, migrating or adding functionality to enhance the VPN is often avoided. FlexVPN was created to simplify the deployment of VPNs, to address the complexity of multiple solutions, and as a unified ecosystem to cover all types of VPN: remote access, teleworker, site to site, mobility, managed security services, and others.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/collateral\/routers\/asr-1000-series-aggregation-services-routers\/data_sheet_c78-704277.html","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"VPN Concentrator"},{"product_id":"167","product_name":"Cisco IOS Intrusion Prevention System (IPS)","description":"Cisco IOS Intrusion Prevention System (IPS) is an inline, deep-packet inspection feature that effectively mitigates a wide range of network attacks. A component of the Cisco IOS Integrated Threat Control framework and complemented by Cisco IOS Flexible Packet Matching feature, Cisco IOS IPS provides your network with the intelligence to accurately identify, classify, and stop or block malicious traffic in real time.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/ios-intrusion-prevention-system-ips\/index.html","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Intrusion Detection and Prevention","category_1":"Network Security"},{"product_id":"168","product_name":"Cisco IOS Network Address Translation (NAT)","description":"Cisco IOS Network Address Translation (NAT) is primarily designed for IP address conservation and network design simplification, but it also serves as a security mechanism by hiding a host's IP address and ports as part of a private network. The application enables a private network that uses unregistered (private) IP addresses to connect to the Internet and allows overlapping addressing schemes to communicate with each other.\n\nPart of the Cisco IOS Integrated Threat Control framework, NAT operates on routers and switches by connecting two network segments and translating the private addresses in the internal network to the public address on the external network. It can be configured to show to the outside world only one address for the entire network.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/ios-network-address-translation-nat\/index.html","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security"},{"product_id":"169","product_name":"Cisco IOS Network Foundation Protection (NFP)","description":"Connecting to the Internet is essential for many organizations, but it exposes the network infrastructure to a myriad of threats and risks. It is critical to secure the network foundation by protecting network elements and their communications. Cisco Network Foundation Protection (NFP) combines a number of security features and techniques to secure routers themselves, helping to ensure the availability of the network even when it is under attack.\n\nPart of the Cisco IOS Integrated Threat Control framework, Cisco NFP provides infrastructure protection with a series of IOS features designed specifically to protect the device control plane by \"locking down\" services and routing protocols; the device data plane from malicious traffic; and the device management plane.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/ios-network-foundation-protection-nfp\/index.html","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"Other"},{"product_id":"170","product_name":"Cisco IOS SSL VPN","description":"Securely widen your network's reach to wherever employees need access. Cisco IOS SSL VPN, the industry's first router-based Secure Sockets Layer VPN solution, offers \"anywhere\" connectivity not only from company-managed resources but also from employee-owned PCs, contractor or business partner desktops, and Internet kiosks. Cisco Secure Desktop, a component of SSL VPN, provides data theft prevention even on noncorporate devices.\n\nSSL VPNs offers remote-access connectivity from almost any Internet-enabled location using a standard Web browser and its native SSL encryption. Required software is dynamically downloaded on an as-needed basis, thereby minimizing desktop software maintenance. Cisco IOS SSL VPN supports clientless access to applications such as intranet content, email, network file shares, and Citrix. The Cisco SSL VPN Client enables full network access remotely to virtually any application.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/ios-sslvpn\/index.html","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"VPN"},{"product_id":"171","product_name":"Cisco Meraki Cloud Managed MDM","description":"Unify management and control of thousands of mobile and desktop devices in the secure, browser-based Meraki dashboard. Drive your organization\u2019s mobility initiatives by seamlessly onboarding new devices and automating application of security policies.","hyperlink":"https:\/\/meraki.cisco.com\/products\/systems-manager","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_2":"Cloud Security","category_1":"Mobile Security","sub_category_1":"Mobility Management","sub_category_2":"Other"},{"product_id":"172","product_name":"Cisco Meraki Cloud Managed Security Appliances","description":"Every Meraki Security Appliance supports several features, like a stateful firewall and integrated Sourcefire intrusion prevention (IPS) engine, to keep networks secure. Threat definitions and filter lists are seamlessly updated, ensuring every site has bleeding-edge protection from the latest vulnerabilities and troublesome websites.","hyperlink":"https:\/\/meraki.cisco.com\/products\/appliances\/","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_2":"Cloud Security","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security","sub_category_2":"Other"},{"product_id":"173","product_name":"Cisco Network Visibility and Segmentation","description":"Networks are ever more complex. And devices are proliferating by the minute. It\u2019s harder to see what\u2019s on the network, and it\u2019s harder to spot a threat. Our Network Visibility and Segmentation solution combines Cisco Stealthwatch Enterprise, the Cisco Identity Services Engine, and Cisco TrustSec technology. You get fast threat detection, highly secure access, and software-defined segmentation.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/network-visibility-segmentation\/index.html","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Management","category_1":"Security Intelligence"},{"product_id":"174","product_name":"Cisco Next-Generation Firewall Cloud Solutions","description":"Build your virtual security solution on the trusted physical Cisco Next-Generation Firewalls. Protect your virtual and physical data center workloads as they expand, contract, or shift location over time, and securely connect web, data center, and applications workstreams with VPN as a service in virtual domains or private cloud environments.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/solutions\/security\/next-generation-firewall-cloud-solutions\/index.html","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_2":"Cloud Security","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security","sub_category_2":"Other"},{"product_id":"175","product_name":"Cisco Next-Generation Firewalls","description":"Block more threats and quickly mitigate those that do breach your defenses with the industry\u2019s first threat-focused NGFW. Our Cisco Firepower NGFW hardware and software options combine our proven network firewall with the industry\u2019s most effective next-gen IPS and advanced malware protection. All so you can get more visibility, be more flexible, save more, and protect better.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/firewalls\/index.html","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security"},{"product_id":"176","product_name":"Cisco Next-Generation Intrusion Prevention System (NGIPS)","description":"NGIPS receives new policy rules and signatures every two hours, so your security is always up to date. Cisco Talos leverages the world\u2019s largest threat detection network to bring security effectiveness to every Cisco security product. This industry-leading threat intelligence works as an early-warning system that constantly updates with new threats.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/ngips\/index.html","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Intrusion Detection and Prevention","category_1":"Network Security"},{"product_id":"177","product_name":"Cisco Registered Envelope Service","description":"Registered Envelope Service changes your email experience with more control, including read receipts, email recall, email expiration, and control over forward and reply capabilities, in your favorite email client. Registered Envelope Service removes the complexity of encryption and key management, so you can send and receive secure messages as easily as unencrypted emails. Cisco offers unique smartphone support to deliver the same experience to mobile users.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/registered-envelope-service\/index.html","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Email Security\/Gateway","category_1":"Network Security"},{"product_id":"178","product_name":"Cisco Router Security - WAN and Network Protection","description":"Protect your data from malware, intrusions, denial-of-service attacks, and advanced threats. Cisco routers work together to extend corporate security to your branch and WAN to defend your entire network. With integrated network security, you get protection against sophisticated threats while maintaining outstanding performance and lowering costs.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/router-security\/index.html","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security"},{"product_id":"179","product_name":"Cisco Security Awareness","description":"Cisco Security Awareness provides flexibility and support to effectively deploy your phishing\nsimulations, awareness training \u2014 or both \u2014 and measure and report results. Empower your security\noperations team with the ability to focus on real time threats and not end user mitigation. Our product\nprovides the education that helps employees to work smarter and safer.\nHigh-quality content is central to any security awareness program and a pre-requisite to provide\na training experience that is fun, compelling and relevant. Our content is developed by a team of\nexperts using a proven pedagogical approach and methodology for adult learning that ensures the\nhighest degree of engagement. Your users will learn about cyber security in a way that expands user\nknowledge and increases their affinity for your organization to help protect it.","hyperlink":"https:\/\/www.cisco.com\/c\/dam\/en\/us\/products\/se\/2020\/1\/Collateral\/security-awareness-aag.pdf","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Education","sub_category_2":"Security Awareness Training","category_1":"Security Strategy","category_2":"Security Strategy"},{"product_id":"180","product_name":"Cisco Security Connector","description":"Although iOS is secure, the Internet is not. But you can now protect your business as it grows through mobility, thanks to the Cisco Security Connector. For the first time, you\u2019ll get visibility into network traffic on iOS devices and can block connections to malicious sites, anywhere users go.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/security-connector\/index.html","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Management","category_1":"Security Intelligence"},{"product_id":"181","product_name":"Cisco Security Management Portfolio","description":"Security Management Your Way\nLocal, cloud-based or centralized solutions to fit your specific needs.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/security-management\/index.html","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Management","category_1":"Security Intelligence"},{"product_id":"182","product_name":"Cisco Security Manager","description":"Centrally manage Cisco ASA firewalls, Cisco AnyConnect Secure Mobility Client, and legacy Cisco IDS\/IPS sensors.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/security-management\/index.html","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Management","category_1":"Security Intelligence"},{"product_id":"183","product_name":"Cisco Snort for the 4000 Series ISRs","description":"Based on the open-source Snort IPS, the Cisco Snort IPS is a costeffective, industry-recognized approach to safeguarding your branch connections and data. You simply maintain the Snort IPS engine on your 4000 Series routers by downloading rule set updates from the Cisco Talos Security Intelligence and Research Group. Cisco Talos network security experts work around the clock to proactively discover, assess, and respond to the latest trends in hacking activities, intrusion attempts, malware, and vulnerabilities. Snort IPS complements other integrated security features on the 4000 Series routers such as VPNs, firewalls, and Cisco Cloud Web Security for a cost-effective yet secure network infrastructure solution.","hyperlink":"https:\/\/www.cisco.com\/c\/dam\/en\/us\/products\/collateral\/security\/router-security\/at-a-glance-c45-735895.pdf","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Intrusion Detection and Prevention","category_1":"Network Security"},{"product_id":"184","product_name":"Cisco Stealthwatch Cloud","description":"Improve security and incident response across the distributed network, from the office to the public cloud. Detect threats in real time. Reduce false positives. Gain actionable security intelligence to make your security team more efficient. And do it all while lowering costs.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/stealthwatch-cloud\/index.html","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Cloud Security","sub_category_1":"Other","category_2":"Security Intelligence","sub_category_2":"Threat Intelligence"},{"product_id":"185","product_name":"Cisco Stealthwatch Endpoint License","description":"With the Cisco Stealthwatch\u2122 Endpoint License you can conduct in-depth, context-rich investigations into endpoints that exhibit suspicious behavior. Security professionals need to see into the applications and processes that occur at the network edge, down to remote devices. The Cisco Stealthwatch endpoint solution permits security professionals to conduct more efficient, context-rich investigations into user machines that are exhibiting suspicious behavior. Tightly integrated with the Cisco AnyConnect\u00ae Network Visibility Module, the Stealthwatch Endpoint solution provides greater network visibility while enhancing the investigation of endpoints. It offers easy access to endpoint applications and information that security analysts need to speed incident response and remediate policy violations.","hyperlink":"https:\/\/www.cisco.com\/c\/dam\/en\/us\/solutions\/collateral\/security\/stealthwatch-datasheet.pdf","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Advanced Malware Protection","category_1":"Endpoint Security","category_2":"Endpoint Security","sub_category_2":"Other","category_3":"Security Intelligence","sub_category_3":"Threat Intelligence"},{"product_id":"186","product_name":"Cisco Stealthwatch Enterprise","description":"Scalable visibility and security analytics across your business...\nOutsmart emerging threats in your digital business with industry-leading machine learning and behavioral modeling. Know who is on the network and what they are doing using telemetry from your network infrastructure. Detect advanced threats and respond to them quickly. Protect critical data with smarter network segmentation. And do it all with a solution that grows with your business.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/stealthwatch\/index.html","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Security Intelligence","sub_category_1":"Threat Intelligence"},{"product_id":"187","product_name":"Cisco Tetration","description":"Cisco Tetration offers holistic workload protection for multicloud data centers by enabling a zero-trust model using segmentation. This approach allows you to identify security incidents faster, contain lateral movement and reduce your attack surface. Its infrastructure-agnostic approach supports both on-premises and public cloud workloads.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/data-center-analytics\/tetration-analytics\/index.html","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"Other"},{"product_id":"188","product_name":"Cisco TrustSec technology","description":"Software-defined segmentation...\nYou need to segment your network to protect critical business assets. But traditional approaches are complex. Cisco TrustSec software-defined segmentation is simpler to enable than VLAN-based segmentation. Policy is defined through security groups. It is open through IETF, available within OpenDaylight, and supported on third-party and Cisco platforms.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/solutions\/enterprise-networks\/trustsec\/index.html","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"Other"},{"product_id":"189","product_name":"Cisco Umbrella","description":"Cisco Umbrella is a cloud-delivered platform that provides visibility and enforcement both on and off the corporate network, and serves as your first line of defense against threats. Because it is cloud-delivered, it uses live threat intelligence versus static feeds that are limited by appliance processing power. So, you get the protection you need to defend against malware infections and breaches over all ports and protocols for the most comprehensive coverage. \n\nAs the industry\u2019s first Secure Internet Gateway in the cloud, Cisco Umbrella provides the first line of defense against threats on the internet. Because Umbrella is delivered from the cloud, it is the easiest way to protect all of your users in minutes.","hyperlink":"https:\/\/info.umbrella.com\/happily-ever-after.html?utm_medium=web-referral&utm_source=homepage&utm_campaign=happy-ever-after-homepage","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Cloud Security","sub_category_1":"Other"},{"product_id":"190","product_name":"Cisco Umbrella Branch","description":"Cisco Umbrella Branch is a cloud-delivered security service for the Cisco Integrated Services Router (ISR). It provides the first layer of defense against threats at branch offices. And it offers the simplest, fastest way to protect every device on your branch network. You gain visibility and enforcement at the DNS layer, so you can block requests to malicious domains and IPs before a connection is ever made.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/router-security\/umbrella-branch.html","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Cloud Security","sub_category_1":"Other"},{"product_id":"191","product_name":"Cisco VPN Internal Service Module for ISR G2","description":"The Cisco VPN Internal Service Module (VPN ISM) is a compact, versatile high-performance VPN blade for the Cisco Integrated Services Routers Generation 2 (ISR G2). It provides up to three times better performance for IPsec VPN encrypted traffic.\n\nThe VPN ISM multicore processor operates independently of other ISR G2 resources. This helps to ensure maximum concurrent VPN performance while maintaining performance for other business-critical branch router services.\n\nThe Cisco VPN acceleration module supports the latest encryption standards, including stronger National Security Agency (NSA) regulated encryption algorithms such as SUITE-B. Next-generation cryptography helps you provide strong data authentication and confidentiality, entity authentication services, and anti-replay services across branch office sites.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/interfaces-modules\/vpn-internal-service-module-isr-g2\/index.html","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"VPN"},{"product_id":"192","product_name":"Cisco Web Security","description":"Nasty advanced threats can hide in plain sight on legitimate websites or in enticing pop-up ads. Employees or guests may put your organization at risk by clicking where they shouldn\u2019t. Cisco Web Security Appliance (WSA), powered by Cisco Talos, protects you by automatically blocking risky sites and testing unknown sites before allowing users to link to them, helping with compliance.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/web-security-appliance\/index.html","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"URL Filtering\/Web Gateway"},{"product_id":"193","product_name":"ZixGateway with Cisco Technology (ZCT)","description":"In October 2015 Cisco and ZixCorp\u00ae introduced ZixGateway with Cisco Technology (ZCT), an email encryption appliance that delivers simple, secure management of email encryption services. Completely on-site, the ZixGateway with Cisco Technology solution works in conjunction with Cisco Email Security Appliance by using its content filtering to identify messages requiring encryption.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/zixgateway-cisco-technology\/index.html","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Data Security","sub_category_2":"Email Security\/Gateway","sub_category_1":"File, Folder and\/or Email Encryption","category_2":"Network Security"},{"product_id":"194","product_name":"Cisco Adaptive Security Appliance Virtual (ASAv)","description":"The Adaptive Security Virtual Appliance is a virtualized network security solution. It supports both traditional and next-generation software-defined networks (SDN), as well as\u00a0Cisco Application Centric Infrastructure\u00a0(ACI) environments. The ASAv provides policy enforcement and threat inspection across heterogeneous, multisite environments.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/virtual-adaptive-security-appliance-firewall\/index.html","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"No Tiering. Monthly subscription based upon stateful inspection throughput","partner_benefits":" \u2022 Monthly OPEX post-paid utility licensing model<\/p>\n \u2022 Low Risk: No buying up-front<\/p>\n \u2022 Flexible and Scalable-No shelfware or stranded licensing<\/p>\n \u2022 Operationally Efficient: One contract for all products, no term tracking, P.O.s not required on every opportunity<\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 Purpose-built for Data Center Security<\/p>\n \u2022 Fully Integrated ACI Security<\/p>\n \u2022 Management Options to Fit Your Needs<\/p>","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","category_2":"Managed Security Service","category_1":"Network Security"},{"product_id":"195","product_name":"Cisco AMP for Endpoints","description":"AMP for Endpoints is a cloud-based advanced malware analysis and protection solution that allows Service Provider and its End Users to conduct metadata File analysis to detect malware and cyber threats. Cryptographic hashes of Files are collected and transmitted to a Cisco-managed cloud server where File reputation analysis is performed and a disposition is made as to whether the File is good, bad or unknown","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/amp-for-endpoints\/index.html","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"Tiered, volume-based offering with Basic program (no minimum volume commitment) or Premium program (Volume commitment with reduced pricing)","partner_benefits":" \u2022 Monthly OPEX post-paid utility licensing model<\/p>\n \u2022 Low Risk: No buying up-front<\/p>\n \u2022 Flexible and Scalable-No shelfware or stranded licensing<\/p>\n \u2022 Operationally Efficient: One contract for all products, no term tracking, P.O.s not required on every opportunity<\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 Cisco Advanced Malware Protection (AMP) for Endpoints prevents threats at point of entry, then continuously tracks every file it lets onto your endpoints. <\/p>\n \u2022 AMP can uncover even the most advanced threats--including fileless malware and ransomware--in hours, not days or months.<\/p>","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","category_1":"Endpoint Security","category_2":"Managed Security Service"},{"product_id":"196","product_name":"Cisco Next Generation Firewall Virtual (NGFWv)","description":"Prevent breaches, get deep visibility to detect and stop threats fast, and automate your network and security operations to save time and work smarter.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/collateral\/security\/firepower-ngfw-virtual\/datasheet-c78-742858.html","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"No Tiering. Monthly subscription based upon features and throughput","partner_benefits":" \u2022 Monthly OPEX post-paid utility licensing model<\/p>\n \u2022 Low Risk: No buying up-front<\/p>\n \u2022 Flexible and Scalable-No shelfware or stranded licensing<\/p>\n \u2022 Operationally Efficient: One contract for all products, no term tracking, P.O.s not required on every opportunity<\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 Stop more threats-Contain known and unknown malware with leading Cisco\u00ae Advanced Malware Protection (AMP) and sandboxing.<\/p>\n \u2022 Gain more insight-Gain superior visibility into your environment with Cisco Firepower next-gen IPS. Automated risk rankings and impact flags identify priorities for your team.<\/p>\n \u2022 Detect earlier, act faster-The Cisco Annual Security Report identifies a 100-day median time from infection to detection, across enterprises. Reduce this time to less than a day.<\/p>\n \u2022 Reduce complexity-Get unified management and automated threat correlation across tightly integrated security functions, including application firewalling, NGIPS, and AMP.<\/p>\n \u2022 Get more from your network-Enhance security, and take advantage of your existing investments, with optional integration of other Cisco and third-party networking and security solutions.<\/p>","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","category_2":"Managed Security Service","category_1":"Network Security"},{"product_id":"197","product_name":"Cisco Stealthwatch Cloud","description":"Stealthwatch Cloud technology provides cloud-based dynamic behavioral modeling of entities on the network; it provides Service Provider with the ability to gain real-time situational awareness of users, IP connected assets and traffic on the network, in the data center or the cloud. Its cloud-native, machine learning techniques help Service Provider to identify insider and external threats through modeling algorithms that detect changes in behavior","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/collateral\/security\/stealthwatch\/datasheet-c78-739619.html","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"Tiered, volume-based offering with Basic program (no minimum volume commitment) or Premium program (Volume commitment with reduced pricing)","partner_benefits":" \u2022 Monthly OPEX post-paid utility licensing model<\/p>\n \u2022 Low Risk: No buying up-front<\/p>\n \u2022 Flexible and Scalable-No shelfware or stranded licensing<\/p>\n \u2022 Operationally Efficient: One contract for all products, no term tracking, P.O.s not required on every opportunity<\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 Improve security and incident response across the distributed network, from the office to the public cloud. <\/p>\n \u2022 Detect threats in real time. <\/p>\n \u2022 Reduce false positives. <\/p>\n \u2022 Gain actionable security intelligence to make your security team more efficient. And do it all while lowering costs.<\/p>","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_3":"Building Block Solution","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","category_1":"Cloud Security","category_3":"Managed Security Service","category_2":"Security Intelligence"},{"product_id":"198","product_name":"Cisco Umbrella MSLA Insights, Easy Protect, Mobile Protect","description":"Umbrella Easy Protect is a cloud-based security platform at the DNS (domain name system) layer that provides the first line of defense against threats on the Internet by blocking requests to malicious destinations (domains, IPs, URLs) before a connection is established. It provides protection against threats over all ports and protocols, and can protect Internet access across all devices on Your network, all office locations, and roaming users","hyperlink":"https:\/\/www.cisco.com\/c\/dam\/en\/us\/products\/collateral\/security\/cloud-security\/mssp-overview.pdf","td_contact":"ciscoteamlatam@techdata.com","td_extension":"305-718-3063","vendor_id":"13","service_tiering":"Tiered, volume-based offering, priced per seat (insights), per SIM (Mobile Protect) or per circuit (Easy Protect) per month","partner_benefits":" \u2022 Monthly OPEX post-paid utility licensing model<\/p>\n \u2022 Low Risk: No buying up-front<\/p>\n \u2022 Flexible and Scalable-No shelfware or stranded licensing<\/p>\n \u2022 Operationally Efficient: One contract for all products, no term tracking, P.O.s not required on every opportunity<\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" As the industry\u2019s first Secure Internet Gateway in the cloud, Cisco Umbrella provides the first line of defense against threats on the internet. Because Umbrella is delivered from the cloud, it is the easiest way to protect all of your users in minutes.<\/p>\n \u2022 Learn-Intelligence to uncover current and emerging threats.<\/p>\n \u2022 See-Visibility for activity across all devices and ports, anywhere.<\/p>\n \u2022 Block-Stop phishing, malware, and ransomware earlier.<\/p>","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","category_1":"Cloud Security","category_2":"Managed Security Service"},{"product_id":"199","product_name":"Cisco 3000 Series Industrial Security Appliances (ISA)","description":"Gain the proven security protection of the Cisco ASA FirePOWER services. Our ruggedized 3000 appliance currently provides the industry's widest range of OT specific access control, threat detection, and application visibility for the harshest and most demanding of environments. It offers four high-performance Ethernet data links in a DIN rail or rack-mount form factor.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/industrial-security-appliance-isa\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security"},{"product_id":"200","product_name":"Cisco 4000 Series Integrated Services Routers","description":"The 4000 Series offers secure WAN connectivity, application experience, unified communications, network automation, virtualization, and branch and direct Internet access security solutions in one platform.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/routers\/4000-series-integrated-services-routers-isr\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security","category_2":"Network Security","sub_category_2":"URL Filtering\/Web Gateway"},{"product_id":"201","product_name":"Cisco Adaptive Security Applicance (ASA) Software","description":"Cisco Adaptive Security Appliance (ASA) Software is the core operating system for the Cisco ASA Family. It delivers enterprise-class firewall capabilities for ASA devices in an array of form factors - standalone appliances, blades, and virtual appliances - for any distributed network environment. ASA Software also integrates with other critical security technologies to deliver comprehensive solutions that meet continuously evolving security needs.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/adaptive-security-appliance-asa-software\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security"},{"product_id":"202","product_name":"Cisco Adaptive Security Device Manager","description":"Use a local, web-based interface to manage the Cisco ASA 5500 Series, 5500-X Series, Cisco AnyConnect Secure Mobility Client, and legacy Cisco IDS\/IPS sensors.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/security-management\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Management","category_1":"Security Intelligence"},{"product_id":"203","product_name":"Cisco Adaptive Security Virtual Appliance (ASAv)","description":"The Adaptive Security Virtual Appliance is a virtualized network security solution. It supports both traditional and next-generation software-defined networks (SDN), as well as Cisco Application Centric Infrastructure (ACI) environments. The ASAv provides policy enforcement and threat inspection across heterogeneous, multisite environments.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/virtual-adaptive-security-appliance-firewall\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"Other"},{"product_id":"204","product_name":"Cisco Advanced Malware Protection (AMP)","description":"Get global threat intelligence, advanced sandboxing, and real-time malware blocking to prevent breaches with Cisco Advanced Malware Protection (AMP). But because you can\u2019t rely on prevention alone, AMP also continuously analyzes file activity across your extended network, so you can quickly detect, contain, and remove advanced malware.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/advanced-malware-protection\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"Sandboxing and APT Protection"},{"product_id":"205","product_name":"Cisco Advanced Phishing Protection","description":"Cyber attackers are continuously finding new ways to infiltrate your network. BEC and other identity deception\u2013based threats are examples of new ways attackers are breaching organizations successfully. Business Email Compromise (BEC) has cost companies $5.3 billion globally according to the FBI1 . Organizations need more layers of protection to defend users from fraudulent senders.\nCisco Advanced Phishing Protection further augments sender authentication and BEC detection capabilities already available in Cisco Email Security. It integrates machine learning that combines local identity and relationship modeling with behavior analytics to protect against identity deception\u2013based threats. It models trusted email behavior, within organizations and between individuals. This identity intelligence continuously adapts to drive a real-time understanding of senders and prevent costly breaches.","hyperlink":"https:\/\/www.cisco.com\/c\/dam\/en\/us\/products\/collateral\/security\/cloud-email-security\/at-a-glance-c45-740894.pdf","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Email Security\/Gateway","category_1":"Network Security"},{"product_id":"206","product_name":"Cisco AMP for Endpoints","description":"Cisco AMP for Endpoints is a next-generation endpoint security solution that prevents, detects, and responds to advanced threats.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/amp-for-endpoints\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Advanced Malware Protection","category_1":"Endpoint Security"},{"product_id":"207","product_name":"Cisco AnyConnect Network Visibility Module","description":"The Cisco AnyConnect\u00ae Network Visibility Module helps you see user and endpoint behavior both on and off premises. It collects standard flows from endpoints (laptops, for example) along with context like user, application, device, location, and destination information. IT administrators can collect and analyze this rich data. They can then better defend the organization against potential security threats as well as address a wide range of network operations challenges.","hyperlink":"https:\/\/www.cisco.com\/c\/dam\/en\/us\/products\/collateral\/security\/anyconnect-secure-mobility-client\/at-a-glance-c45-736671.pdf","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Other","sub_category_2":"Other","category_2":"Security Intelligence"},{"product_id":"208","product_name":"Cisco AnyConnect Secure Mobility Client","description":"Empower your employees to work from anywhere, on company laptops or personal mobile devices, at any time. AnyConnect simplifies secure endpoint access and provides the security necessary to help keep your organization safe and protected.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/anyconnect-secure-mobility-client\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Mobile Security","sub_category_1":"Mobility Management"},{"product_id":"209","product_name":"Cisco ASA 5500-X with FirePOWER Services","description":"Beat sophisticated cyber attacks with a superior security appliance. We offer the industry\u2019s first threat-focused next-generation firewall (NGFW), the ASA 5500-X Series.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/asa-firepower-services\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_3":"Email Security\/Gateway","sub_category_1":"Gateway Firewall\/UTM","sub_category_4":"Intrusion Detection and Prevention","category_1":"Network Security","category_2":"Network Security","category_3":"Network Security","category_4":"Network Security","sub_category_2":"URL Filtering\/Web Gateway"},{"product_id":"210","product_name":"Cisco Cloudlock","description":"Cisco Cloudlock is a cloud-native cloud access security broker (CASB) that helps you move to the cloud safely. It protects your cloud users, data, and apps. Cloudlock's simple, open, and automated approach uses APIs to manage the risks in your cloud app ecosystem. With Cloudlock you can more easily combat data breaches while meeting compliance regulations.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/cloudlock\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"CASB","category_1":"Cloud Security"},{"product_id":"211","product_name":"Cisco Cognitive Threat Analytics","description":"Today\u2019s attacks are more effective than ever. And organizations struggle to secure their rapidly changing networks against them. But you can detect even the most sophisticated attacks with Cognitive Threat Analytics. Deployed by more than 5 million users, it requires no additional hardware or software. And it integrates with several Cisco security solutions.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/cognitive-threat-analytics\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_2":"Predictive Analytics","category_1":"Security Intelligence","category_2":"Security Intelligence","sub_category_1":"Threat Intelligence"},{"product_id":"212","product_name":"Cisco Content Security Management Appliance","description":"Centrally manage Cisco Email Security and Web Security Appliances.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/security-management\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"Other"},{"product_id":"213","product_name":"Cisco Defense Orchestrator","description":"Manage security policy from the cloud, simply and consistently. Works across a range of Cisco security products, including ASA firewalls, Cisco ASA with FIrePOWER Services, Umbrella cloud web security, and Web Security Appliances.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/security-management\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"Other"},{"product_id":"214","product_name":"Cisco Domain Protection","description":"DMARC is a technology that makes it easier for email senders and receivers to determine if a message is from a legitimate sender. Identifying all legitimate senders can be challenging because\nof the complexity of an organization\u2019s email ecosystem. This process can be time consuming and difficult to implement without the right tools, processes, and knowledge.","hyperlink":"https:\/\/www.cisco.com\/c\/dam\/en\/us\/products\/collateral\/security\/cloud-email-security\/at-a-glance-c45-740937.pdf","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Email Security\/Gateway","category_1":"Network Security"},{"product_id":"215","product_name":"Cisco Duo","description":"For organizations of all sizes that need to protect sensitive data at scale, Duo is the user-friendly zero-trust security platform for all users, all devices and all applications.\n\nMFA is the foundation for zero trust. Duo verifies that your users are who they say they are, before they access your data \u2014 and with multiple second-factor options, including one-touch Duo Push, users can easily authenticate in seconds. Monitor the health of every device across your organization in real-time, whether it's corporate-managed or not. With Duo's device trust features, you can customize access requirements at the device level, and because it's a cloud-based solution, you'll stay ahead of the latest security threats. Grant your users just the right amount of access. Duo's advanced policy enforcement capabilities let you define security requirements at the user, device, and application level, based on contextual factors like location and update status. Enable your mobile workforce without compromising your company's data. Duo provides modern remote access solutions and protects existing IT infrastructure, making it easy to onboard new employees and contractors and allowing employees to work on the go. Finally, Duo's SSO (Single Sign-On) grants users secure access to all protected applications (on-premises or cloud-based) through a uniform, frictionless interface that's accessible from anywhere.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/adaptive-multi-factor-authentication.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"MultiFactor and Advanced Authentication"},{"product_id":"216","product_name":"Cisco Dynamic Multipoint VPN (DMVPN)","description":"Dynamic Multipoint VPN (DMVPN) is a Cisco IOS Software solution for building scalable IPsec Virtual Private Networks (VPNs). Cisco DMVPN uses a centralized architecture to provide easier implementation and management for deployments that require granular access controls for diverse user communities, including mobile workers, telecommuters, and extranet users.\n\nCisco DMVPN allows branch locations to communicate directly with each other over the public WAN or Internet, such as when using voice over IP (VOIP) between two branch offices, but doesn't require a permanent VPN connection between sites. It enables zero-touch deployment of IPsec VPNs and improves network performance by reducing latency and jitter, while optimizing head office bandwidth utilization.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/dynamic-multipoint-vpn-dmvpn\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"VPN"},{"product_id":"217","product_name":"Cisco Email Encryption","description":"Despite the rise in text messaging, instant messaging, social networking, and other forms of communication, email continues to be the predominant business collaboration tool. The unsecured nature of email, however, has caused the inadvertent and malicious exposure of sensitive information.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/email-encryption\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Email Security\/Gateway","category_1":"Network Security"},{"product_id":"218","product_name":"Cisco Email Security","description":"Your cloud email needs an additional layer of protection against threats like ransomware, business email compromise, phishing, and more. Cisco provides you with intelligence from one of the largest threat detection teams in the world, along with the robust features you need to protect your users. Microsoft Office 365 and Cisco Email Security are simply better together.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/email-security\/office-365.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Email Security\/Gateway","category_1":"Network Security"},{"product_id":"219","product_name":"Cisco Firepower 2100 Series","description":"Gain business resiliency through superior security with sustained performance. The Firepower 2100 Series has an innovative dual multicore CPU architecture that optimizes firewall, cryptographic, and threat inspection functions simultaneously. Now, achieving security doesn\u2019t come at the expense of network performance.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/firepower-2100-series\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_3":"Email Security\/Gateway","sub_category_1":"Gateway Firewall\/UTM","sub_category_4":"Intrusion Detection and Prevention","category_1":"Network Security","category_2":"Network Security","category_3":"Network Security","category_4":"Network Security","sub_category_2":"URL Filtering\/Web Gateway"},{"product_id":"220","product_name":"Cisco Firepower 4100 Series","description":"Stop more threats with our fully integrated next-generation firewall (NGFW) appliance. The 4100 Series\u2019 1-rack-unit size is ideal at the Internet edge and in high-performance environments. It shows you what\u2019s happening on your network, detects attacks earlier so you can act faster, and reduces management complexity.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/firepower-4100-series\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_3":"Email Security\/Gateway","sub_category_1":"Gateway Firewall\/UTM","sub_category_4":"Intrusion Detection and Prevention","category_1":"Network Security","category_2":"Network Security","category_3":"Network Security","category_4":"Network Security","sub_category_2":"URL Filtering\/Web Gateway"},{"product_id":"221","product_name":"Cisco Firepower 9000 Series","description":"This carrier-grade next-generation firewall (NGFW) is ideal for data centers and other high-performance settings that require low latency and high throughput. Deliver scalable, consistent security to workloads and data flows across physical, virtual, and cloud environments. With tightly integrated services, the Firepower 9000 Series lowers costs and supports open, programmable networks.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/firepower-9000-series\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_3":"Email Security\/Gateway","sub_category_1":"Gateway Firewall\/UTM","sub_category_4":"Intrusion Detection and Prevention","category_1":"Network Security","category_2":"Network Security","category_3":"Network Security","category_4":"Network Security","sub_category_2":"URL Filtering\/Web Gateway"},{"product_id":"222","product_name":"Cisco Firepower Device Manager","description":"Manage a small-scale Firepower NGFW deployment locally, using the web. Available on the new Cisco Firepower 2100 Series and select ASA 5500-X models.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/security-management\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Management","category_1":"Security Intelligence"},{"product_id":"223","product_name":"Cisco Firepower Management Center","description":"Centrally manage events and policies. Analyze threats. Works with Cisco network security solutions such as ASA with FirePOWER services, Cisco Firepower NGFWs, Firepower NGIPS, FirePOWER AMP, and FirePOWER Threat Defense for ISR.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/security-management\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Management","category_1":"Security Intelligence"},{"product_id":"224","product_name":"Cisco Group Encrypted Transport VPN","description":"Networks today need to support all forms of media-including data, voice, and video-to enhance business communications and lower operating costs. Voice and video applications are accelerating the need for instantaneous, branch-to-branch communications, while network security risks are increasing. Regulatory compliance has become essential. To solve these pressing challenges, your organization needs an intelligent network that securely integrates applications in a way that is easy to manage.\n\nCisco Group Encrypted Transport VPN, eliminates the need for compromise between network intelligence and data privacy in private WAN environments. Service providers can finally offer managed encryption without a provisioning and management nightmare since GET VPN simplifies the provisioning and management of VPN. GET VPN defines a new category of VPN, one that does not use tunnels.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/group-encrypted-transport-vpn\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"VPN Concentrator"},{"product_id":"225","product_name":"Cisco Identity Services Engine","description":"Next-generation secure network access...\nGain awareness of everything hitting your network. Provide access consistently and efficiently. Relieve the stress of complex access management.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/identity-services-engine\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"Identity Governance"},{"product_id":"226","product_name":"Cisco IOS Easy VPN","description":"Give your employees great flexibility in performing their job functions with anytime, anyplace network access. Cisco IOS Easy VPN supports employees who need network access from home after hours and weekends to perform business functions such as answering email or using networked applications. VPN technology helps your company increase productivity by improving response times and enabling work without interruptions common in an office environment.\n\nUsing standards-based IPsec technology, Cisco IOS Easy VPN greatly simplifies VPN deployment with centralized VPN management across all Cisco VPN devices. It supports integration of a variety of remote devices within a single deployment and with a consistent policy and key management method, which simplifies remote side administration.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/ios-easy-vpn\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"VPN Concentrator"},{"product_id":"227","product_name":"Cisco IOS Firewall","description":"Cisco IOS Firewall helps ensure your network's availability and the security of your company's resources by protecting the network infrastructure against network- and application-layer attacks, viruses, and worms. It protects unified communications by guarding Session Initiation Protocol (SIP) endpoints and call-control resources. Cisco IOS Firewall is a stateful firewall solution, certified by Common Criteria (EAL4).","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/ios-firewall\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security"},{"product_id":"228","product_name":"Cisco IOS Flexible Packet Matching (FPM)","description":"Protect against existing and emerging threats at all network entry points with Cisco IOS Flexible Packet Matching (FPM). Cisco FPM uses flexible and granular Layer 2-7 pattern matching deep within the packet header or payload to provide a rapid first line of defense against network threats and notable worms and viruses.\n\nA key component of the Cisco IOS Integrated Threat Control framework, Cisco FPM complements the Cisco IOS Intrusion Prevention System (IPS) by supporting custom filters that can be defined and deployed more rapidly than IPS signatures or antivirus patterns can be updated. It gives network security administrators powerful tools to identify miscreant traffic and immediately drop or log it for audit purposes.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/ios-flexible-packet-matching-fpm\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security"},{"product_id":"229","product_name":"Cisco IOS FlexVPN","description":"Large customers deploying IPSec VPN over IP networks are faced with high complexity and high cost of deploying multiple types of VPN to meet different types of connectivity requirements. Customers often have to learn different types of VPNs to manage and operate different types of network. And once a technology is selected for a deployment, migrating or adding functionality to enhance the VPN is often avoided. FlexVPN was created to simplify the deployment of VPNs, to address the complexity of multiple solutions, and as a unified ecosystem to cover all types of VPN: remote access, teleworker, site to site, mobility, managed security services, and others.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/collateral\/routers\/asr-1000-series-aggregation-services-routers\/data_sheet_c78-704277.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"VPN Concentrator"},{"product_id":"230","product_name":"Cisco IOS Intrusion Prevention System (IPS)","description":"Cisco IOS Intrusion Prevention System (IPS) is an inline, deep-packet inspection feature that effectively mitigates a wide range of network attacks. A component of the Cisco IOS Integrated Threat Control framework and complemented by Cisco IOS Flexible Packet Matching feature, Cisco IOS IPS provides your network with the intelligence to accurately identify, classify, and stop or block malicious traffic in real time.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/ios-intrusion-prevention-system-ips\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Intrusion Detection and Prevention","category_1":"Network Security"},{"product_id":"231","product_name":"Cisco IOS Network Address Translation (NAT)","description":"Cisco IOS Network Address Translation (NAT) is primarily designed for IP address conservation and network design simplification, but it also serves as a security mechanism by hiding a host's IP address and ports as part of a private network. The application enables a private network that uses unregistered (private) IP addresses to connect to the Internet and allows overlapping addressing schemes to communicate with each other.\n\nPart of the Cisco IOS Integrated Threat Control framework, NAT operates on routers and switches by connecting two network segments and translating the private addresses in the internal network to the public address on the external network. It can be configured to show to the outside world only one address for the entire network.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/ios-network-address-translation-nat\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security"},{"product_id":"232","product_name":"Cisco IOS Network Foundation Protection (NFP)","description":"Connecting to the Internet is essential for many organizations, but it exposes the network infrastructure to a myriad of threats and risks. It is critical to secure the network foundation by protecting network elements and their communications. Cisco Network Foundation Protection (NFP) combines a number of security features and techniques to secure routers themselves, helping to ensure the availability of the network even when it is under attack.\n\nPart of the Cisco IOS Integrated Threat Control framework, Cisco NFP provides infrastructure protection with a series of IOS features designed specifically to protect the device control plane by \"locking down\" services and routing protocols; the device data plane from malicious traffic; and the device management plane.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/ios-network-foundation-protection-nfp\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"Other"},{"product_id":"233","product_name":"Cisco IOS SSL VPN","description":"Securely widen your network's reach to wherever employees need access. Cisco IOS SSL VPN, the industry's first router-based Secure Sockets Layer VPN solution, offers \"anywhere\" connectivity not only from company-managed resources but also from employee-owned PCs, contractor or business partner desktops, and Internet kiosks. Cisco Secure Desktop, a component of SSL VPN, provides data theft prevention even on noncorporate devices.\n\nSSL VPNs offers remote-access connectivity from almost any Internet-enabled location using a standard Web browser and its native SSL encryption. Required software is dynamically downloaded on an as-needed basis, thereby minimizing desktop software maintenance. Cisco IOS SSL VPN supports clientless access to applications such as intranet content, email, network file shares, and Citrix. The Cisco SSL VPN Client enables full network access remotely to virtually any application.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/ios-sslvpn\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"VPN"},{"product_id":"234","product_name":"Cisco Meraki Cloud Managed MDM","description":"Unify management and control of thousands of mobile and desktop devices in the secure, browser-based Meraki dashboard. Drive your organization\u2019s mobility initiatives by seamlessly onboarding new devices and automating application of security policies.","hyperlink":"https:\/\/meraki.cisco.com\/products\/systems-manager","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_2":"Cloud Security","category_1":"Mobile Security","sub_category_1":"Mobility Management","sub_category_2":"Other"},{"product_id":"235","product_name":"Cisco Meraki Cloud Managed Security Appliances","description":"Every Meraki Security Appliance supports several features, like a stateful firewall and integrated Sourcefire intrusion prevention (IPS) engine, to keep networks secure. Threat definitions and filter lists are seamlessly updated, ensuring every site has bleeding-edge protection from the latest vulnerabilities and troublesome websites.","hyperlink":"https:\/\/meraki.cisco.com\/products\/appliances\/","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_2":"Cloud Security","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security","sub_category_2":"Other"},{"product_id":"236","product_name":"Cisco Network Visibility and Segmentation","description":"Networks are ever more complex. And devices are proliferating by the minute. It\u2019s harder to see what\u2019s on the network, and it\u2019s harder to spot a threat. Our Network Visibility and Segmentation solution combines Cisco Stealthwatch Enterprise, the Cisco Identity Services Engine, and Cisco TrustSec technology. You get fast threat detection, highly secure access, and software-defined segmentation.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/network-visibility-segmentation\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Management","category_1":"Security Intelligence"},{"product_id":"237","product_name":"Cisco Next-Generation Firewall Cloud Solutions","description":"Build your virtual security solution on the trusted physical Cisco Next-Generation Firewalls. Protect your virtual and physical data center workloads as they expand, contract, or shift location over time, and securely connect web, data center, and applications workstreams with VPN as a service in virtual domains or private cloud environments.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/solutions\/security\/next-generation-firewall-cloud-solutions\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_2":"Cloud Security","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security","sub_category_2":"Other"},{"product_id":"238","product_name":"Cisco Next-Generation Firewalls","description":"Block more threats and quickly mitigate those that do breach your defenses with the industry\u2019s first threat-focused NGFW. Our Cisco Firepower NGFW hardware and software options combine our proven network firewall with the industry\u2019s most effective next-gen IPS and advanced malware protection. All so you can get more visibility, be more flexible, save more, and protect better.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/firewalls\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security"},{"product_id":"239","product_name":"Cisco Next-Generation Intrusion Prevention System (NGIPS)","description":"NGIPS receives new policy rules and signatures every two hours, so your security is always up to date. Cisco Talos leverages the world\u2019s largest threat detection network to bring security effectiveness to every Cisco security product. This industry-leading threat intelligence works as an early-warning system that constantly updates with new threats.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/ngips\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Intrusion Detection and Prevention","category_1":"Network Security"},{"product_id":"240","product_name":"Cisco Registered Envelope Service","description":"Registered Envelope Service changes your email experience with more control, including read receipts, email recall, email expiration, and control over forward and reply capabilities, in your favorite email client. Registered Envelope Service removes the complexity of encryption and key management, so you can send and receive secure messages as easily as unencrypted emails. Cisco offers unique smartphone support to deliver the same experience to mobile users.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/registered-envelope-service\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Email Security\/Gateway","category_1":"Network Security"},{"product_id":"241","product_name":"Cisco Router Security - WAN and Network Protection","description":"Protect your data from malware, intrusions, denial-of-service attacks, and advanced threats. Cisco routers work together to extend corporate security to your branch and WAN to defend your entire network. With integrated network security, you get protection against sophisticated threats while maintaining outstanding performance and lowering costs.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/router-security\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security"},{"product_id":"242","product_name":"Cisco Security Awareness","description":"Cisco Security Awareness provides flexibility and support to effectively deploy your phishing\nsimulations, awareness training \u2014 or both \u2014 and measure and report results. Empower your security\noperations team with the ability to focus on real time threats and not end user mitigation. Our product\nprovides the education that helps employees to work smarter and safer.\nHigh-quality content is central to any security awareness program and a pre-requisite to provide\na training experience that is fun, compelling and relevant. Our content is developed by a team of\nexperts using a proven pedagogical approach and methodology for adult learning that ensures the\nhighest degree of engagement. Your users will learn about cyber security in a way that expands user\nknowledge and increases their affinity for your organization to help protect it.","hyperlink":"https:\/\/www.cisco.com\/c\/dam\/en\/us\/products\/se\/2020\/1\/Collateral\/security-awareness-aag.pdf","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Education","sub_category_2":"Security Awareness Training","category_1":"Security Strategy","category_2":"Security Strategy"},{"product_id":"243","product_name":"Cisco Security Connector","description":"Although iOS is secure, the Internet is not. But you can now protect your business as it grows through mobility, thanks to the Cisco Security Connector. For the first time, you\u2019ll get visibility into network traffic on iOS devices and can block connections to malicious sites, anywhere users go.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/security-connector\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Management","category_1":"Security Intelligence"},{"product_id":"244","product_name":"Cisco Security Management Portfolio","description":"Security Management Your Way\nLocal, cloud-based or centralized solutions to fit your specific needs.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/security-management\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Management","category_1":"Security Intelligence"},{"product_id":"245","product_name":"Cisco Security Manager","description":"Centrally manage Cisco ASA firewalls, Cisco AnyConnect Secure Mobility Client, and legacy Cisco IDS\/IPS sensors.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/security-management\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Management","category_1":"Security Intelligence"},{"product_id":"246","product_name":"Cisco Snort for the 4000 Series ISRs","description":"Based on the open-source Snort IPS, the Cisco Snort IPS is a costeffective, industry-recognized approach to safeguarding your branch connections and data. You simply maintain the Snort IPS engine on your 4000 Series routers by downloading rule set updates from the Cisco Talos Security Intelligence and Research Group. Cisco Talos network security experts work around the clock to proactively discover, assess, and respond to the latest trends in hacking activities, intrusion attempts, malware, and vulnerabilities. Snort IPS complements other integrated security features on the 4000 Series routers such as VPNs, firewalls, and Cisco Cloud Web Security for a cost-effective yet secure network infrastructure solution.","hyperlink":"https:\/\/www.cisco.com\/c\/dam\/en\/us\/products\/collateral\/security\/router-security\/at-a-glance-c45-735895.pdf","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Intrusion Detection and Prevention","category_1":"Network Security"},{"product_id":"247","product_name":"Cisco Stealthwatch Cloud","description":"Improve security and incident response across the distributed network, from the office to the public cloud. Detect threats in real time. Reduce false positives. Gain actionable security intelligence to make your security team more efficient. And do it all while lowering costs.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/stealthwatch-cloud\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Cloud Security","sub_category_1":"Other","category_2":"Security Intelligence","sub_category_2":"Threat Intelligence"},{"product_id":"248","product_name":"Cisco Stealthwatch Endpoint License","description":"With the Cisco Stealthwatch\u2122 Endpoint License you can conduct in-depth, context-rich investigations into endpoints that exhibit suspicious behavior. Security professionals need to see into the applications and processes that occur at the network edge, down to remote devices. The Cisco Stealthwatch endpoint solution permits security professionals to conduct more efficient, context-rich investigations into user machines that are exhibiting suspicious behavior. Tightly integrated with the Cisco AnyConnect\u00ae Network Visibility Module, the Stealthwatch Endpoint solution provides greater network visibility while enhancing the investigation of endpoints. It offers easy access to endpoint applications and information that security analysts need to speed incident response and remediate policy violations.","hyperlink":"https:\/\/www.cisco.com\/c\/dam\/en\/us\/solutions\/collateral\/security\/stealthwatch-datasheet.pdf","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Advanced Malware Protection","category_1":"Endpoint Security","category_2":"Endpoint Security","sub_category_2":"Other","category_3":"Security Intelligence","sub_category_3":"Threat Intelligence"},{"product_id":"249","product_name":"Cisco Stealthwatch Enterprise","description":"Scalable visibility and security analytics across your business...\nOutsmart emerging threats in your digital business with industry-leading machine learning and behavioral modeling. Know who is on the network and what they are doing using telemetry from your network infrastructure. Detect advanced threats and respond to them quickly. Protect critical data with smarter network segmentation. And do it all with a solution that grows with your business.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/stealthwatch\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Security Intelligence","sub_category_1":"Threat Intelligence"},{"product_id":"250","product_name":"Cisco Tetration","description":"Cisco Tetration offers holistic workload protection for multicloud data centers by enabling a zero-trust model using segmentation. This approach allows you to identify security incidents faster, contain lateral movement and reduce your attack surface. Its infrastructure-agnostic approach supports both on-premises and public cloud workloads.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/data-center-analytics\/tetration-analytics\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"Other"},{"product_id":"251","product_name":"Cisco TrustSec technology","description":"Software-defined segmentation...\nYou need to segment your network to protect critical business assets. But traditional approaches are complex. Cisco TrustSec software-defined segmentation is simpler to enable than VLAN-based segmentation. Policy is defined through security groups. It is open through IETF, available within OpenDaylight, and supported on third-party and Cisco platforms.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/solutions\/enterprise-networks\/trustsec\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"Other"},{"product_id":"252","product_name":"Cisco Umbrella","description":"Cisco Umbrella is a cloud-delivered platform that provides visibility and enforcement both on and off the corporate network, and serves as your first line of defense against threats. Because it is cloud-delivered, it uses live threat intelligence versus static feeds that are limited by appliance processing power. So, you get the protection you need to defend against malware infections and breaches over all ports and protocols for the most comprehensive coverage. \n\nAs the industry\u2019s first Secure Internet Gateway in the cloud, Cisco Umbrella provides the first line of defense against threats on the internet. Because Umbrella is delivered from the cloud, it is the easiest way to protect all of your users in minutes.","hyperlink":"https:\/\/info.umbrella.com\/happily-ever-after.html?utm_medium=web-referral&utm_source=homepage&utm_campaign=happy-ever-after-homepage","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Cloud Security","sub_category_1":"Other"},{"product_id":"253","product_name":"Cisco Umbrella Branch","description":"Cisco Umbrella Branch is a cloud-delivered security service for the Cisco Integrated Services Router (ISR). It provides the first layer of defense against threats at branch offices. And it offers the simplest, fastest way to protect every device on your branch network. You gain visibility and enforcement at the DNS layer, so you can block requests to malicious domains and IPs before a connection is ever made.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/router-security\/umbrella-branch.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Cloud Security","sub_category_1":"Other"},{"product_id":"254","product_name":"Cisco VPN Internal Service Module for ISR G2","description":"The Cisco VPN Internal Service Module (VPN ISM) is a compact, versatile high-performance VPN blade for the Cisco Integrated Services Routers Generation 2 (ISR G2). It provides up to three times better performance for IPsec VPN encrypted traffic.\n\nThe VPN ISM multicore processor operates independently of other ISR G2 resources. This helps to ensure maximum concurrent VPN performance while maintaining performance for other business-critical branch router services.\n\nThe Cisco VPN acceleration module supports the latest encryption standards, including stronger National Security Agency (NSA) regulated encryption algorithms such as SUITE-B. Next-generation cryptography helps you provide strong data authentication and confidentiality, entity authentication services, and anti-replay services across branch office sites.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/interfaces-modules\/vpn-internal-service-module-isr-g2\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"VPN"},{"product_id":"255","product_name":"Cisco Web Security","description":"Nasty advanced threats can hide in plain sight on legitimate websites or in enticing pop-up ads. Employees or guests may put your organization at risk by clicking where they shouldn\u2019t. Cisco Web Security Appliance (WSA), powered by Cisco Talos, protects you by automatically blocking risky sites and testing unknown sites before allowing users to link to them, helping with compliance.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/web-security-appliance\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"URL Filtering\/Web Gateway"},{"product_id":"256","product_name":"ZixGateway with Cisco Technology (ZCT)","description":"In October 2015 Cisco and ZixCorp\u00ae introduced ZixGateway with Cisco Technology (ZCT), an email encryption appliance that delivers simple, secure management of email encryption services. Completely on-site, the ZixGateway with Cisco Technology solution works in conjunction with Cisco Email Security Appliance by using its content filtering to identify messages requiring encryption.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/zixgateway-cisco-technology\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Data Security","sub_category_2":"Email Security\/Gateway","sub_category_1":"File, Folder and\/or Email Encryption","category_2":"Network Security"},{"product_id":"257","product_name":"Cisco Adaptive Security Appliance Virtual (ASAv)","description":"The Adaptive Security Virtual Appliance is a virtualized network security solution. It supports both traditional and next-generation software-defined networks (SDN), as well as\u00a0Cisco Application Centric Infrastructure\u00a0(ACI) environments. The ASAv provides policy enforcement and threat inspection across heterogeneous, multisite environments.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/virtual-adaptive-security-appliance-firewall\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"No Tiering. Monthly subscription based upon stateful inspection throughput","partner_benefits":" \u2022 Monthly OPEX post-paid utility licensing model<\/p>\n \u2022 Low Risk: No buying up-front<\/p>\n \u2022 Flexible and Scalable-No shelfware or stranded licensing<\/p>\n \u2022 Operationally Efficient: One contract for all products, no term tracking, P.O.s not required on every opportunity<\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 Purpose-built for Data Center Security<\/p>\n \u2022 Fully Integrated ACI Security<\/p>\n \u2022 Management Options to Fit Your Needs<\/p>","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","category_2":"Managed Security Service","category_1":"Network Security"},{"product_id":"258","product_name":"Cisco AMP for Endpoints","description":"AMP for Endpoints is a cloud-based advanced malware analysis and protection solution that allows Service Provider and its End Users to conduct metadata File analysis to detect malware and cyber threats. Cryptographic hashes of Files are collected and transmitted to a Cisco-managed cloud server where File reputation analysis is performed and a disposition is made as to whether the File is good, bad or unknown","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/amp-for-endpoints\/index.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"Tiered, volume-based offering with Basic program (no minimum volume commitment) or Premium program (Volume commitment with reduced pricing)","partner_benefits":" \u2022 Monthly OPEX post-paid utility licensing model<\/p>\n \u2022 Low Risk: No buying up-front<\/p>\n \u2022 Flexible and Scalable-No shelfware or stranded licensing<\/p>\n \u2022 Operationally Efficient: One contract for all products, no term tracking, P.O.s not required on every opportunity<\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 Cisco Advanced Malware Protection (AMP) for Endpoints prevents threats at point of entry, then continuously tracks every file it lets onto your endpoints. <\/p>\n \u2022 AMP can uncover even the most advanced threats--including fileless malware and ransomware--in hours, not days or months.<\/p>","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","category_1":"Endpoint Security","category_2":"Managed Security Service"},{"product_id":"259","product_name":"Cisco Next Generation Firewall Virtual (NGFWv)","description":"Prevent breaches, get deep visibility to detect and stop threats fast, and automate your network and security operations to save time and work smarter.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/collateral\/security\/firepower-ngfw-virtual\/datasheet-c78-742858.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"No Tiering. Monthly subscription based upon features and throughput","partner_benefits":" \u2022 Monthly OPEX post-paid utility licensing model<\/p>\n \u2022 Low Risk: No buying up-front<\/p>\n \u2022 Flexible and Scalable-No shelfware or stranded licensing<\/p>\n \u2022 Operationally Efficient: One contract for all products, no term tracking, P.O.s not required on every opportunity<\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 Stop more threats-Contain known and unknown malware with leading Cisco\u00ae Advanced Malware Protection (AMP) and sandboxing.<\/p>\n \u2022 Gain more insight-Gain superior visibility into your environment with Cisco Firepower next-gen IPS. Automated risk rankings and impact flags identify priorities for your team.<\/p>\n \u2022 Detect earlier, act faster-The Cisco Annual Security Report identifies a 100-day median time from infection to detection, across enterprises. Reduce this time to less than a day.<\/p>\n \u2022 Reduce complexity-Get unified management and automated threat correlation across tightly integrated security functions, including application firewalling, NGIPS, and AMP.<\/p>\n \u2022 Get more from your network-Enhance security, and take advantage of your existing investments, with optional integration of other Cisco and third-party networking and security solutions.<\/p>","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","category_2":"Managed Security Service","category_1":"Network Security"},{"product_id":"260","product_name":"Cisco Stealthwatch Cloud","description":"Stealthwatch Cloud technology provides cloud-based dynamic behavioral modeling of entities on the network; it provides Service Provider with the ability to gain real-time situational awareness of users, IP connected assets and traffic on the network, in the data center or the cloud. Its cloud-native, machine learning techniques help Service Provider to identify insider and external threats through modeling algorithms that detect changes in behavior","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/collateral\/security\/stealthwatch\/datasheet-c78-739619.html","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"Tiered, volume-based offering with Basic program (no minimum volume commitment) or Premium program (Volume commitment with reduced pricing)","partner_benefits":" \u2022 Monthly OPEX post-paid utility licensing model<\/p>\n \u2022 Low Risk: No buying up-front<\/p>\n \u2022 Flexible and Scalable-No shelfware or stranded licensing<\/p>\n \u2022 Operationally Efficient: One contract for all products, no term tracking, P.O.s not required on every opportunity<\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 Improve security and incident response across the distributed network, from the office to the public cloud. <\/p>\n \u2022 Detect threats in real time. <\/p>\n \u2022 Reduce false positives. <\/p>\n \u2022 Gain actionable security intelligence to make your security team more efficient. And do it all while lowering costs.<\/p>","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_3":"Building Block Solution","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","category_1":"Cloud Security","category_3":"Managed Security Service","category_2":"Security Intelligence"},{"product_id":"261","product_name":"Cisco Umbrella MSLA Insights, Easy Protect, Mobile Protect","description":"Umbrella Easy Protect is a cloud-based security platform at the DNS (domain name system) layer that provides the first line of defense against threats on the Internet by blocking requests to malicious destinations (domains, IPs, URLs) before a connection is established. It provides protection against threats over all ports and protocols, and can protect Internet access across all devices on Your network, all office locations, and roaming users","hyperlink":"https:\/\/www.cisco.com\/c\/dam\/en\/us\/products\/collateral\/security\/cloud-security\/mssp-overview.pdf","td_contact":"CiscoSecurity@techdata.com...\nPartner should contact their Tech Data Sales Rep or their Tech Data Cisco Partner Account Manager. If you don't know who that is send an email to: CiscoSales@TechData.com","td_extension":"727-539-7429 Ext. 5684050","vendor_id":"13","service_tiering":"Tiered, volume-based offering, priced per seat (insights), per SIM (Mobile Protect) or per circuit (Easy Protect) per month","partner_benefits":" \u2022 Monthly OPEX post-paid utility licensing model<\/p>\n \u2022 Low Risk: No buying up-front<\/p>\n \u2022 Flexible and Scalable-No shelfware or stranded licensing<\/p>\n \u2022 Operationally Efficient: One contract for all products, no term tracking, P.O.s not required on every opportunity<\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" As the industry\u2019s first Secure Internet Gateway in the cloud, Cisco Umbrella provides the first line of defense against threats on the internet. Because Umbrella is delivered from the cloud, it is the easiest way to protect all of your users in minutes.<\/p>\n \u2022 Learn-Intelligence to uncover current and emerging threats.<\/p>\n \u2022 See-Visibility for activity across all devices and ports, anywhere.<\/p>\n \u2022 Block-Stop phishing, malware, and ransomware earlier.<\/p>","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","category_1":"Cloud Security","category_2":"Managed Security Service"},{"product_id":"262","product_name":"Cisco 3000 Series Industrial Security Appliances (ISA)","description":"Gain the proven security protection of the Cisco ASA FirePOWER services. Our ruggedized 3000 appliance currently provides the industry's widest range of OT specific access control, threat detection, and application visibility for the harshest and most demanding of environments. It offers four high-performance Ethernet data links in a DIN rail or rack-mount form factor.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/industrial-security-appliance-isa\/index.html","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security"},{"product_id":"263","product_name":"Cisco 4000 Series Integrated Services Routers","description":"The 4000 Series offers secure WAN connectivity, application experience, unified communications, network automation, virtualization, and branch and direct Internet access security solutions in one platform.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/routers\/4000-series-integrated-services-routers-isr\/index.html","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security","category_2":"Network Security","sub_category_2":"URL Filtering\/Web Gateway"},{"product_id":"264","product_name":"Cisco Adaptive Security Applicance (ASA) Software","description":"Cisco Adaptive Security Appliance (ASA) Software is the core operating system for the Cisco ASA Family. It delivers enterprise-class firewall capabilities for ASA devices in an array of form factors - standalone appliances, blades, and virtual appliances - for any distributed network environment. ASA Software also integrates with other critical security technologies to deliver comprehensive solutions that meet continuously evolving security needs.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/adaptive-security-appliance-asa-software\/index.html","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security"},{"product_id":"265","product_name":"Cisco Adaptive Security Device Manager","description":"Use a local, web-based interface to manage the Cisco ASA 5500 Series, 5500-X Series, Cisco AnyConnect Secure Mobility Client, and legacy Cisco IDS\/IPS sensors.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/security-management\/index.html","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Management","category_1":"Security Intelligence"},{"product_id":"266","product_name":"Cisco Adaptive Security Virtual Appliance (ASAv)","description":"The Adaptive Security Virtual Appliance is a virtualized network security solution. It supports both traditional and next-generation software-defined networks (SDN), as well as Cisco Application Centric Infrastructure (ACI) environments. The ASAv provides policy enforcement and threat inspection across heterogeneous, multisite environments.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/virtual-adaptive-security-appliance-firewall\/index.html","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"Other"},{"product_id":"267","product_name":"Cisco Advanced Malware Protection (AMP)","description":"Get global threat intelligence, advanced sandboxing, and real-time malware blocking to prevent breaches with Cisco Advanced Malware Protection (AMP). But because you can\u2019t rely on prevention alone, AMP also continuously analyzes file activity across your extended network, so you can quickly detect, contain, and remove advanced malware.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/advanced-malware-protection\/index.html","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"Sandboxing and APT Protection"},{"product_id":"268","product_name":"Cisco Advanced Phishing Protection","description":"Cyber attackers are continuously finding new ways to infiltrate your network. BEC and other identity deception\u2013based threats are examples of new ways attackers are breaching organizations successfully. Business Email Compromise (BEC) has cost companies $5.3 billion globally according to the FBI1 . Organizations need more layers of protection to defend users from fraudulent senders.\nCisco Advanced Phishing Protection further augments sender authentication and BEC detection capabilities already available in Cisco Email Security. It integrates machine learning that combines local identity and relationship modeling with behavior analytics to protect against identity deception\u2013based threats. It models trusted email behavior, within organizations and between individuals. This identity intelligence continuously adapts to drive a real-time understanding of senders and prevent costly breaches.","hyperlink":"https:\/\/www.cisco.com\/c\/dam\/en\/us\/products\/collateral\/security\/cloud-email-security\/at-a-glance-c45-740894.pdf","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Email Security\/Gateway","category_1":"Network Security"},{"product_id":"269","product_name":"Cisco AMP for Endpoints","description":"Cisco AMP for Endpoints is a next-generation endpoint security solution that prevents, detects, and responds to advanced threats.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/amp-for-endpoints\/index.html","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Advanced Malware Protection","category_1":"Endpoint Security"},{"product_id":"270","product_name":"Cisco AnyConnect Network Visibility Module","description":"The Cisco AnyConnect\u00ae Network Visibility Module helps you see user and endpoint behavior both on and off premises. It collects standard flows from endpoints (laptops, for example) along with context like user, application, device, location, and destination information. IT administrators can collect and analyze this rich data. They can then better defend the organization against potential security threats as well as address a wide range of network operations challenges.","hyperlink":"https:\/\/www.cisco.com\/c\/dam\/en\/us\/products\/collateral\/security\/anyconnect-secure-mobility-client\/at-a-glance-c45-736671.pdf","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Other","sub_category_2":"Other","category_2":"Security Intelligence"},{"product_id":"271","product_name":"Cisco AnyConnect Secure Mobility Client","description":"Empower your employees to work from anywhere, on company laptops or personal mobile devices, at any time. AnyConnect simplifies secure endpoint access and provides the security necessary to help keep your organization safe and protected.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/anyconnect-secure-mobility-client\/index.html","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Mobile Security","sub_category_1":"Mobility Management"},{"product_id":"272","product_name":"Cisco ASA 5500-X with FirePOWER Services","description":"Beat sophisticated cyber attacks with a superior security appliance. We offer the industry\u2019s first threat-focused next-generation firewall (NGFW), the ASA 5500-X Series.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/asa-firepower-services\/index.html","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_3":"Email Security\/Gateway","sub_category_1":"Gateway Firewall\/UTM","sub_category_4":"Intrusion Detection and Prevention","category_1":"Network Security","category_2":"Network Security","category_3":"Network Security","category_4":"Network Security","sub_category_2":"URL Filtering\/Web Gateway"},{"product_id":"273","product_name":"Cisco Cloudlock","description":"Cisco Cloudlock is a cloud-native cloud access security broker (CASB) that helps you move to the cloud safely. It protects your cloud users, data, and apps. Cloudlock's simple, open, and automated approach uses APIs to manage the risks in your cloud app ecosystem. With Cloudlock you can more easily combat data breaches while meeting compliance regulations.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/cloudlock\/index.html","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"CASB","category_1":"Cloud Security"},{"product_id":"274","product_name":"Cisco Cognitive Threat Analytics","description":"Today\u2019s attacks are more effective than ever. And organizations struggle to secure their rapidly changing networks against them. But you can detect even the most sophisticated attacks with Cognitive Threat Analytics. Deployed by more than 5 million users, it requires no additional hardware or software. And it integrates with several Cisco security solutions.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/cognitive-threat-analytics\/index.html","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_2":"Predictive Analytics","category_1":"Security Intelligence","category_2":"Security Intelligence","sub_category_1":"Threat Intelligence"},{"product_id":"275","product_name":"Cisco Content Security Management Appliance","description":"Centrally manage Cisco Email Security and Web Security Appliances.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/security-management\/index.html","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"Other"},{"product_id":"276","product_name":"Cisco Defense Orchestrator","description":"Manage security policy from the cloud, simply and consistently. Works across a range of Cisco security products, including ASA firewalls, Cisco ASA with FIrePOWER Services, Umbrella cloud web security, and Web Security Appliances.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/security-management\/index.html","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"Other"},{"product_id":"277","product_name":"Cisco Domain Protection","description":"DMARC is a technology that makes it easier for email senders and receivers to determine if a message is from a legitimate sender. Identifying all legitimate senders can be challenging because\nof the complexity of an organization\u2019s email ecosystem. This process can be time consuming and difficult to implement without the right tools, processes, and knowledge.","hyperlink":"https:\/\/www.cisco.com\/c\/dam\/en\/us\/products\/collateral\/security\/cloud-email-security\/at-a-glance-c45-740937.pdf","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Email Security\/Gateway","category_1":"Network Security"},{"product_id":"278","product_name":"Cisco Duo","description":"For organizations of all sizes that need to protect sensitive data at scale, Duo is the user-friendly zero-trust security platform for all users, all devices and all applications.\n\nMFA is the foundation for zero trust. Duo verifies that your users are who they say they are, before they access your data \u2014 and with multiple second-factor options, including one-touch Duo Push, users can easily authenticate in seconds. Monitor the health of every device across your organization in real-time, whether it's corporate-managed or not. With Duo's device trust features, you can customize access requirements at the device level, and because it's a cloud-based solution, you'll stay ahead of the latest security threats. Grant your users just the right amount of access. Duo's advanced policy enforcement capabilities let you define security requirements at the user, device, and application level, based on contextual factors like location and update status. Enable your mobile workforce without compromising your company's data. Duo provides modern remote access solutions and protects existing IT infrastructure, making it easy to onboard new employees and contractors and allowing employees to work on the go. Finally, Duo's SSO (Single Sign-On) grants users secure access to all protected applications (on-premises or cloud-based) through a uniform, frictionless interface that's accessible from anywhere.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/adaptive-multi-factor-authentication.html","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"MultiFactor and Advanced Authentication"},{"product_id":"279","product_name":"Cisco Dynamic Multipoint VPN (DMVPN)","description":"Dynamic Multipoint VPN (DMVPN) is a Cisco IOS Software solution for building scalable IPsec Virtual Private Networks (VPNs). Cisco DMVPN uses a centralized architecture to provide easier implementation and management for deployments that require granular access controls for diverse user communities, including mobile workers, telecommuters, and extranet users.\n\nCisco DMVPN allows branch locations to communicate directly with each other over the public WAN or Internet, such as when using voice over IP (VOIP) between two branch offices, but doesn't require a permanent VPN connection between sites. It enables zero-touch deployment of IPsec VPNs and improves network performance by reducing latency and jitter, while optimizing head office bandwidth utilization.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/dynamic-multipoint-vpn-dmvpn\/index.html","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"VPN"},{"product_id":"280","product_name":"Cisco Email Encryption","description":"Despite the rise in text messaging, instant messaging, social networking, and other forms of communication, email continues to be the predominant business collaboration tool. The unsecured nature of email, however, has caused the inadvertent and malicious exposure of sensitive information.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/email-encryption\/index.html","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Email Security\/Gateway","category_1":"Network Security"},{"product_id":"281","product_name":"Cisco Email Security","description":"Your cloud email needs an additional layer of protection against threats like ransomware, business email compromise, phishing, and more. Cisco provides you with intelligence from one of the largest threat detection teams in the world, along with the robust features you need to protect your users. Microsoft Office 365 and Cisco Email Security are simply better together.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/email-security\/office-365.html","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Email Security\/Gateway","category_1":"Network Security"},{"product_id":"282","product_name":"Cisco Firepower 2100 Series","description":"Gain business resiliency through superior security with sustained performance. The Firepower 2100 Series has an innovative dual multicore CPU architecture that optimizes firewall, cryptographic, and threat inspection functions simultaneously. Now, achieving security doesn\u2019t come at the expense of network performance.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/firepower-2100-series\/index.html","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_3":"Email Security\/Gateway","sub_category_1":"Gateway Firewall\/UTM","sub_category_4":"Intrusion Detection and Prevention","category_1":"Network Security","category_2":"Network Security","category_3":"Network Security","category_4":"Network Security","sub_category_2":"URL Filtering\/Web Gateway"},{"product_id":"283","product_name":"Cisco Firepower 4100 Series","description":"Stop more threats with our fully integrated next-generation firewall (NGFW) appliance. The 4100 Series\u2019 1-rack-unit size is ideal at the Internet edge and in high-performance environments. It shows you what\u2019s happening on your network, detects attacks earlier so you can act faster, and reduces management complexity.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/firepower-4100-series\/index.html","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_3":"Email Security\/Gateway","sub_category_1":"Gateway Firewall\/UTM","sub_category_4":"Intrusion Detection and Prevention","category_1":"Network Security","category_2":"Network Security","category_3":"Network Security","category_4":"Network Security","sub_category_2":"URL Filtering\/Web Gateway"},{"product_id":"284","product_name":"Cisco Firepower 9000 Series","description":"This carrier-grade next-generation firewall (NGFW) is ideal for data centers and other high-performance settings that require low latency and high throughput. Deliver scalable, consistent security to workloads and data flows across physical, virtual, and cloud environments. With tightly integrated services, the Firepower 9000 Series lowers costs and supports open, programmable networks.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/firepower-9000-series\/index.html","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_3":"Email Security\/Gateway","sub_category_1":"Gateway Firewall\/UTM","sub_category_4":"Intrusion Detection and Prevention","category_1":"Network Security","category_2":"Network Security","category_3":"Network Security","category_4":"Network Security","sub_category_2":"URL Filtering\/Web Gateway"},{"product_id":"285","product_name":"Cisco Firepower Device Manager","description":"Manage a small-scale Firepower NGFW deployment locally, using the web. Available on the new Cisco Firepower 2100 Series and select ASA 5500-X models.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/security-management\/index.html","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Management","category_1":"Security Intelligence"},{"product_id":"286","product_name":"Cisco Firepower Management Center","description":"Centrally manage events and policies. Analyze threats. Works with Cisco network security solutions such as ASA with FirePOWER services, Cisco Firepower NGFWs, Firepower NGIPS, FirePOWER AMP, and FirePOWER Threat Defense for ISR.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/security-management\/index.html","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Management","category_1":"Security Intelligence"},{"product_id":"287","product_name":"Cisco Group Encrypted Transport VPN","description":"Networks today need to support all forms of media-including data, voice, and video-to enhance business communications and lower operating costs. Voice and video applications are accelerating the need for instantaneous, branch-to-branch communications, while network security risks are increasing. Regulatory compliance has become essential. To solve these pressing challenges, your organization needs an intelligent network that securely integrates applications in a way that is easy to manage.\n\nCisco Group Encrypted Transport VPN, eliminates the need for compromise between network intelligence and data privacy in private WAN environments. Service providers can finally offer managed encryption without a provisioning and management nightmare since GET VPN simplifies the provisioning and management of VPN. GET VPN defines a new category of VPN, one that does not use tunnels.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/group-encrypted-transport-vpn\/index.html","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"VPN Concentrator"},{"product_id":"288","product_name":"Cisco Identity Services Engine","description":"Next-generation secure network access...\nGain awareness of everything hitting your network. Provide access consistently and efficiently. Relieve the stress of complex access management.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/identity-services-engine\/index.html","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"Identity Governance"},{"product_id":"289","product_name":"Cisco IOS Easy VPN","description":"Give your employees great flexibility in performing their job functions with anytime, anyplace network access. Cisco IOS Easy VPN supports employees who need network access from home after hours and weekends to perform business functions such as answering email or using networked applications. VPN technology helps your company increase productivity by improving response times and enabling work without interruptions common in an office environment.\n\nUsing standards-based IPsec technology, Cisco IOS Easy VPN greatly simplifies VPN deployment with centralized VPN management across all Cisco VPN devices. It supports integration of a variety of remote devices within a single deployment and with a consistent policy and key management method, which simplifies remote side administration.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/ios-easy-vpn\/index.html","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"VPN Concentrator"},{"product_id":"290","product_name":"Cisco IOS Firewall","description":"Cisco IOS Firewall helps ensure your network's availability and the security of your company's resources by protecting the network infrastructure against network- and application-layer attacks, viruses, and worms. It protects unified communications by guarding Session Initiation Protocol (SIP) endpoints and call-control resources. Cisco IOS Firewall is a stateful firewall solution, certified by Common Criteria (EAL4).","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/ios-firewall\/index.html","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security"},{"product_id":"291","product_name":"Cisco IOS Flexible Packet Matching (FPM)","description":"Protect against existing and emerging threats at all network entry points with Cisco IOS Flexible Packet Matching (FPM). Cisco FPM uses flexible and granular Layer 2-7 pattern matching deep within the packet header or payload to provide a rapid first line of defense against network threats and notable worms and viruses.\n\nA key component of the Cisco IOS Integrated Threat Control framework, Cisco FPM complements the Cisco IOS Intrusion Prevention System (IPS) by supporting custom filters that can be defined and deployed more rapidly than IPS signatures or antivirus patterns can be updated. It gives network security administrators powerful tools to identify miscreant traffic and immediately drop or log it for audit purposes.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/ios-flexible-packet-matching-fpm\/index.html","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security"},{"product_id":"292","product_name":"Cisco IOS FlexVPN","description":"Large customers deploying IPSec VPN over IP networks are faced with high complexity and high cost of deploying multiple types of VPN to meet different types of connectivity requirements. Customers often have to learn different types of VPNs to manage and operate different types of network. And once a technology is selected for a deployment, migrating or adding functionality to enhance the VPN is often avoided. FlexVPN was created to simplify the deployment of VPNs, to address the complexity of multiple solutions, and as a unified ecosystem to cover all types of VPN: remote access, teleworker, site to site, mobility, managed security services, and others.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/collateral\/routers\/asr-1000-series-aggregation-services-routers\/data_sheet_c78-704277.html","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"VPN Concentrator"},{"product_id":"293","product_name":"Cisco IOS Intrusion Prevention System (IPS)","description":"Cisco IOS Intrusion Prevention System (IPS) is an inline, deep-packet inspection feature that effectively mitigates a wide range of network attacks. A component of the Cisco IOS Integrated Threat Control framework and complemented by Cisco IOS Flexible Packet Matching feature, Cisco IOS IPS provides your network with the intelligence to accurately identify, classify, and stop or block malicious traffic in real time.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/ios-intrusion-prevention-system-ips\/index.html","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Intrusion Detection and Prevention","category_1":"Network Security"},{"product_id":"294","product_name":"Cisco IOS Network Address Translation (NAT)","description":"Cisco IOS Network Address Translation (NAT) is primarily designed for IP address conservation and network design simplification, but it also serves as a security mechanism by hiding a host's IP address and ports as part of a private network. The application enables a private network that uses unregistered (private) IP addresses to connect to the Internet and allows overlapping addressing schemes to communicate with each other.\n\nPart of the Cisco IOS Integrated Threat Control framework, NAT operates on routers and switches by connecting two network segments and translating the private addresses in the internal network to the public address on the external network. It can be configured to show to the outside world only one address for the entire network.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/ios-network-address-translation-nat\/index.html","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security"},{"product_id":"295","product_name":"Cisco IOS Network Foundation Protection (NFP)","description":"Connecting to the Internet is essential for many organizations, but it exposes the network infrastructure to a myriad of threats and risks. It is critical to secure the network foundation by protecting network elements and their communications. Cisco Network Foundation Protection (NFP) combines a number of security features and techniques to secure routers themselves, helping to ensure the availability of the network even when it is under attack.\n\nPart of the Cisco IOS Integrated Threat Control framework, Cisco NFP provides infrastructure protection with a series of IOS features designed specifically to protect the device control plane by \"locking down\" services and routing protocols; the device data plane from malicious traffic; and the device management plane.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/ios-network-foundation-protection-nfp\/index.html","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"Other"},{"product_id":"296","product_name":"Cisco IOS SSL VPN","description":"Securely widen your network's reach to wherever employees need access. Cisco IOS SSL VPN, the industry's first router-based Secure Sockets Layer VPN solution, offers \"anywhere\" connectivity not only from company-managed resources but also from employee-owned PCs, contractor or business partner desktops, and Internet kiosks. Cisco Secure Desktop, a component of SSL VPN, provides data theft prevention even on noncorporate devices.\n\nSSL VPNs offers remote-access connectivity from almost any Internet-enabled location using a standard Web browser and its native SSL encryption. Required software is dynamically downloaded on an as-needed basis, thereby minimizing desktop software maintenance. Cisco IOS SSL VPN supports clientless access to applications such as intranet content, email, network file shares, and Citrix. The Cisco SSL VPN Client enables full network access remotely to virtually any application.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/ios-sslvpn\/index.html","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"VPN"},{"product_id":"297","product_name":"Cisco Meraki Cloud Managed MDM","description":"Unify management and control of thousands of mobile and desktop devices in the secure, browser-based Meraki dashboard. Drive your organization\u2019s mobility initiatives by seamlessly onboarding new devices and automating application of security policies.","hyperlink":"https:\/\/meraki.cisco.com\/products\/systems-manager","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_2":"Cloud Security","category_1":"Mobile Security","sub_category_1":"Mobility Management","sub_category_2":"Other"},{"product_id":"298","product_name":"Cisco Meraki Cloud Managed Security Appliances","description":"Every Meraki Security Appliance supports several features, like a stateful firewall and integrated Sourcefire intrusion prevention (IPS) engine, to keep networks secure. Threat definitions and filter lists are seamlessly updated, ensuring every site has bleeding-edge protection from the latest vulnerabilities and troublesome websites.","hyperlink":"https:\/\/meraki.cisco.com\/products\/appliances\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_2":"Cloud Security","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security","sub_category_2":"Other"},{"product_id":"299","product_name":"Cisco Network Visibility and Segmentation","description":"Networks are ever more complex. And devices are proliferating by the minute. It\u2019s harder to see what\u2019s on the network, and it\u2019s harder to spot a threat. Our Network Visibility and Segmentation solution combines Cisco Stealthwatch Enterprise, the Cisco Identity Services Engine, and Cisco TrustSec technology. You get fast threat detection, highly secure access, and software-defined segmentation.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/network-visibility-segmentation\/index.html","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Management","category_1":"Security Intelligence"},{"product_id":"300","product_name":"Cisco Next-Generation Firewall Cloud Solutions","description":"Build your virtual security solution on the trusted physical Cisco Next-Generation Firewalls. Protect your virtual and physical data center workloads as they expand, contract, or shift location over time, and securely connect web, data center, and applications workstreams with VPN as a service in virtual domains or private cloud environments.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/solutions\/security\/next-generation-firewall-cloud-solutions\/index.html","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_2":"Cloud Security","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security","sub_category_2":"Other"},{"product_id":"301","product_name":"Cisco Next-Generation Firewalls","description":"Block more threats and quickly mitigate those that do breach your defenses with the industry\u2019s first threat-focused NGFW. Our Cisco Firepower NGFW hardware and software options combine our proven network firewall with the industry\u2019s most effective next-gen IPS and advanced malware protection. All so you can get more visibility, be more flexible, save more, and protect better.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/firewalls\/index.html","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security"},{"product_id":"302","product_name":"Cisco Next-Generation Intrusion Prevention System (NGIPS)","description":"NGIPS receives new policy rules and signatures every two hours, so your security is always up to date. Cisco Talos leverages the world\u2019s largest threat detection network to bring security effectiveness to every Cisco security product. This industry-leading threat intelligence works as an early-warning system that constantly updates with new threats.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/ngips\/index.html","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Intrusion Detection and Prevention","category_1":"Network Security"},{"product_id":"303","product_name":"Cisco Registered Envelope Service","description":"Registered Envelope Service changes your email experience with more control, including read receipts, email recall, email expiration, and control over forward and reply capabilities, in your favorite email client. Registered Envelope Service removes the complexity of encryption and key management, so you can send and receive secure messages as easily as unencrypted emails. Cisco offers unique smartphone support to deliver the same experience to mobile users.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/registered-envelope-service\/index.html","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Email Security\/Gateway","category_1":"Network Security"},{"product_id":"304","product_name":"Cisco Router Security - WAN and Network Protection","description":"Protect your data from malware, intrusions, denial-of-service attacks, and advanced threats. Cisco routers work together to extend corporate security to your branch and WAN to defend your entire network. With integrated network security, you get protection against sophisticated threats while maintaining outstanding performance and lowering costs.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/router-security\/index.html","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security"},{"product_id":"305","product_name":"Cisco Security Awareness","description":"Cisco Security Awareness provides flexibility and support to effectively deploy your phishing\nsimulations, awareness training \u2014 or both \u2014 and measure and report results. Empower your security\noperations team with the ability to focus on real time threats and not end user mitigation. Our product\nprovides the education that helps employees to work smarter and safer.\nHigh-quality content is central to any security awareness program and a pre-requisite to provide\na training experience that is fun, compelling and relevant. Our content is developed by a team of\nexperts using a proven pedagogical approach and methodology for adult learning that ensures the\nhighest degree of engagement. Your users will learn about cyber security in a way that expands user\nknowledge and increases their affinity for your organization to help protect it.","hyperlink":"https:\/\/www.cisco.com\/c\/dam\/en\/us\/products\/se\/2020\/1\/Collateral\/security-awareness-aag.pdf","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Education","sub_category_2":"Security Awareness Training","category_1":"Security Strategy","category_2":"Security Strategy"},{"product_id":"306","product_name":"Cisco Security Connector","description":"Although iOS is secure, the Internet is not. But you can now protect your business as it grows through mobility, thanks to the Cisco Security Connector. For the first time, you\u2019ll get visibility into network traffic on iOS devices and can block connections to malicious sites, anywhere users go.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/security-connector\/index.html","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Management","category_1":"Security Intelligence"},{"product_id":"307","product_name":"Cisco Security Management Portfolio","description":"Security Management Your Way\nLocal, cloud-based or centralized solutions to fit your specific needs.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/security-management\/index.html","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Management","category_1":"Security Intelligence"},{"product_id":"308","product_name":"Cisco Security Manager","description":"Centrally manage Cisco ASA firewalls, Cisco AnyConnect Secure Mobility Client, and legacy Cisco IDS\/IPS sensors.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/security-management\/index.html","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Management","category_1":"Security Intelligence"},{"product_id":"309","product_name":"Cisco Snort for the 4000 Series ISRs","description":"Based on the open-source Snort IPS, the Cisco Snort IPS is a costeffective, industry-recognized approach to safeguarding your branch connections and data. You simply maintain the Snort IPS engine on your 4000 Series routers by downloading rule set updates from the Cisco Talos Security Intelligence and Research Group. Cisco Talos network security experts work around the clock to proactively discover, assess, and respond to the latest trends in hacking activities, intrusion attempts, malware, and vulnerabilities. Snort IPS complements other integrated security features on the 4000 Series routers such as VPNs, firewalls, and Cisco Cloud Web Security for a cost-effective yet secure network infrastructure solution.","hyperlink":"https:\/\/www.cisco.com\/c\/dam\/en\/us\/products\/collateral\/security\/router-security\/at-a-glance-c45-735895.pdf","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Intrusion Detection and Prevention","category_1":"Network Security"},{"product_id":"310","product_name":"Cisco Stealthwatch Cloud","description":"Improve security and incident response across the distributed network, from the office to the public cloud. Detect threats in real time. Reduce false positives. Gain actionable security intelligence to make your security team more efficient. And do it all while lowering costs.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/stealthwatch-cloud\/index.html","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Cloud Security","sub_category_1":"Other","category_2":"Security Intelligence","sub_category_2":"Threat Intelligence"},{"product_id":"311","product_name":"Cisco Stealthwatch Endpoint License","description":"With the Cisco Stealthwatch\u2122 Endpoint License you can conduct in-depth, context-rich investigations into endpoints that exhibit suspicious behavior. Security professionals need to see into the applications and processes that occur at the network edge, down to remote devices. The Cisco Stealthwatch endpoint solution permits security professionals to conduct more efficient, context-rich investigations into user machines that are exhibiting suspicious behavior. Tightly integrated with the Cisco AnyConnect\u00ae Network Visibility Module, the Stealthwatch Endpoint solution provides greater network visibility while enhancing the investigation of endpoints. It offers easy access to endpoint applications and information that security analysts need to speed incident response and remediate policy violations.","hyperlink":"https:\/\/www.cisco.com\/c\/dam\/en\/us\/solutions\/collateral\/security\/stealthwatch-datasheet.pdf","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Advanced Malware Protection","category_1":"Endpoint Security","category_2":"Endpoint Security","sub_category_2":"Other","category_3":"Security Intelligence","sub_category_3":"Threat Intelligence"},{"product_id":"312","product_name":"Cisco Stealthwatch Enterprise","description":"Scalable visibility and security analytics across your business...\nOutsmart emerging threats in your digital business with industry-leading machine learning and behavioral modeling. Know who is on the network and what they are doing using telemetry from your network infrastructure. Detect advanced threats and respond to them quickly. Protect critical data with smarter network segmentation. And do it all with a solution that grows with your business.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/stealthwatch\/index.html","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Security Intelligence","sub_category_1":"Threat Intelligence"},{"product_id":"313","product_name":"Cisco Tetration","description":"Cisco Tetration offers holistic workload protection for multicloud data centers by enabling a zero-trust model using segmentation. This approach allows you to identify security incidents faster, contain lateral movement and reduce your attack surface. Its infrastructure-agnostic approach supports both on-premises and public cloud workloads.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/data-center-analytics\/tetration-analytics\/index.html","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"Other"},{"product_id":"314","product_name":"Cisco TrustSec technology","description":"Software-defined segmentation...\nYou need to segment your network to protect critical business assets. But traditional approaches are complex. Cisco TrustSec software-defined segmentation is simpler to enable than VLAN-based segmentation. Policy is defined through security groups. It is open through IETF, available within OpenDaylight, and supported on third-party and Cisco platforms.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/solutions\/enterprise-networks\/trustsec\/index.html","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"Other"},{"product_id":"315","product_name":"Cisco Umbrella","description":"Cisco Umbrella is a cloud-delivered platform that provides visibility and enforcement both on and off the corporate network, and serves as your first line of defense against threats. Because it is cloud-delivered, it uses live threat intelligence versus static feeds that are limited by appliance processing power. So, you get the protection you need to defend against malware infections and breaches over all ports and protocols for the most comprehensive coverage. \n\nAs the industry\u2019s first Secure Internet Gateway in the cloud, Cisco Umbrella provides the first line of defense against threats on the internet. Because Umbrella is delivered from the cloud, it is the easiest way to protect all of your users in minutes.","hyperlink":"https:\/\/info.umbrella.com\/happily-ever-after.html?utm_medium=web-referral&utm_source=homepage&utm_campaign=happy-ever-after-homepage","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Cloud Security","sub_category_1":"Other"},{"product_id":"316","product_name":"Cisco Umbrella Branch","description":"Cisco Umbrella Branch is a cloud-delivered security service for the Cisco Integrated Services Router (ISR). It provides the first layer of defense against threats at branch offices. And it offers the simplest, fastest way to protect every device on your branch network. You gain visibility and enforcement at the DNS layer, so you can block requests to malicious domains and IPs before a connection is ever made.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/router-security\/umbrella-branch.html","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Cloud Security","sub_category_1":"Other"},{"product_id":"317","product_name":"Cisco VPN Internal Service Module for ISR G2","description":"The Cisco VPN Internal Service Module (VPN ISM) is a compact, versatile high-performance VPN blade for the Cisco Integrated Services Routers Generation 2 (ISR G2). It provides up to three times better performance for IPsec VPN encrypted traffic.\n\nThe VPN ISM multicore processor operates independently of other ISR G2 resources. This helps to ensure maximum concurrent VPN performance while maintaining performance for other business-critical branch router services.\n\nThe Cisco VPN acceleration module supports the latest encryption standards, including stronger National Security Agency (NSA) regulated encryption algorithms such as SUITE-B. Next-generation cryptography helps you provide strong data authentication and confidentiality, entity authentication services, and anti-replay services across branch office sites.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/interfaces-modules\/vpn-internal-service-module-isr-g2\/index.html","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"VPN"},{"product_id":"318","product_name":"Cisco Web Security","description":"Nasty advanced threats can hide in plain sight on legitimate websites or in enticing pop-up ads. Employees or guests may put your organization at risk by clicking where they shouldn\u2019t. Cisco Web Security Appliance (WSA), powered by Cisco Talos, protects you by automatically blocking risky sites and testing unknown sites before allowing users to link to them, helping with compliance.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/web-security-appliance\/index.html","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"URL Filtering\/Web Gateway"},{"product_id":"319","product_name":"ZixGateway with Cisco Technology (ZCT)","description":"In October 2015 Cisco and ZixCorp\u00ae introduced ZixGateway with Cisco Technology (ZCT), an email encryption appliance that delivers simple, secure management of email encryption services. Completely on-site, the ZixGateway with Cisco Technology solution works in conjunction with Cisco Email Security Appliance by using its content filtering to identify messages requiring encryption.","hyperlink":"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/zixgateway-cisco-technology\/index.html","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","category_1":"Data Security","sub_category_2":"Email Security\/Gateway","sub_category_1":"File, Folder and\/or Email Encryption","category_2":"Network Security"},{"product_id":"320","product_name":"Cisco Adaptive Security Appliance Virtual (ASAv)","description":"The Adaptive Security Virtual Appliance is a virtualized network security solution. It supports both traditional and next-generation software-defined networks (SDN), as well as\u00a0Cisco Application Centric Infrastructure\u00a0(ACI) environments. The ASAv provides policy enforcement and threat inspection across heterogeneous, multisite environments.","hyperlink":"","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"No Tiering. Monthly subscription based upon stateful inspection throughput","partner_benefits":" \u2022 Monthly OPEX post-paid utility licensing model<\/p>\n \u2022 Low Risk: No buying up-front<\/p>\n \u2022 Flexible and Scalable-No shelfware or stranded licensing<\/p>\n \u2022 Operationally Efficient: One contract for all products, no term tracking, P.O.s not required on every opportunity<\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 Purpose-built for Data Center Security<\/p>\n \u2022 Fully Integrated ACI Security<\/p>\n \u2022 Management Options to Fit Your Needs<\/p>","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","category_2":"Managed Security Service","category_1":"Network Security"},{"product_id":"321","product_name":"Cisco AMP for Endpoints","description":"AMP for Endpoints is a cloud-based advanced malware analysis and protection solution that allows Service Provider and its End Users to conduct metadata File analysis to detect malware and cyber threats. Cryptographic hashes of Files are collected and transmitted to a Cisco-managed cloud server where File reputation analysis is performed and a disposition is made as to whether the File is good, bad or unknown","hyperlink":"","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"Tiered, volume-based offering with Basic program (no minimum volume commitment) or Premium program (Volume commitment with reduced pricing)","partner_benefits":" \u2022 Monthly OPEX post-paid utility licensing model<\/p>\n \u2022 Low Risk: No buying up-front<\/p>\n \u2022 Flexible and Scalable-No shelfware or stranded licensing<\/p>\n \u2022 Operationally Efficient: One contract for all products, no term tracking, P.O.s not required on every opportunity<\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 Cisco Advanced Malware Protection (AMP) for Endpoints prevents threats at point of entry, then continuously tracks every file it lets onto your endpoints. <\/p>\n \u2022 AMP can uncover even the most advanced threats--including fileless malware and ransomware--in hours, not days or months.<\/p>","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","category_1":"Endpoint Security","category_2":"Managed Security Service"},{"product_id":"322","product_name":"Cisco Next Generation Firewall Virtual (NGFWv)","description":"Prevent breaches, get deep visibility to detect and stop threats fast, and automate your network and security operations to save time and work smarter.","hyperlink":"","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"No Tiering. Monthly subscription based upon features and throughput","partner_benefits":" \u2022 Monthly OPEX post-paid utility licensing model<\/p>\n \u2022 Low Risk: No buying up-front<\/p>\n \u2022 Flexible and Scalable-No shelfware or stranded licensing<\/p>\n \u2022 Operationally Efficient: One contract for all products, no term tracking, P.O.s not required on every opportunity<\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 Stop more threats-Contain known and unknown malware with leading Cisco\u00ae Advanced Malware Protection (AMP) and sandboxing.<\/p>\n \u2022 Gain more insight-Gain superior visibility into your environment with Cisco Firepower next-gen IPS. Automated risk rankings and impact flags identify priorities for your team.<\/p>\n \u2022 Detect earlier, act faster-The Cisco Annual Security Report identifies a 100-day median time from infection to detection, across enterprises. Reduce this time to less than a day.<\/p>\n \u2022 Reduce complexity-Get unified management and automated threat correlation across tightly integrated security functions, including application firewalling, NGIPS, and AMP.<\/p>\n \u2022 Get more from your network-Enhance security, and take advantage of your existing investments, with optional integration of other Cisco and third-party networking and security solutions.<\/p>","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","category_2":"Managed Security Service","category_1":"Network Security"},{"product_id":"323","product_name":"Cisco Stealthwatch Cloud","description":"Stealthwatch Cloud technology provides cloud-based dynamic behavioral modeling of entities on the network; it provides Service Provider with the ability to gain real-time situational awareness of users, IP connected assets and traffic on the network, in the data center or the cloud. Its cloud-native, machine learning techniques help Service Provider to identify insider and external threats through modeling algorithms that detect changes in behavior","hyperlink":"","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"Tiered, volume-based offering with Basic program (no minimum volume commitment) or Premium program (Volume commitment with reduced pricing)","partner_benefits":" \u2022 Monthly OPEX post-paid utility licensing model<\/p>\n \u2022 Low Risk: No buying up-front<\/p>\n \u2022 Flexible and Scalable-No shelfware or stranded licensing<\/p>\n \u2022 Operationally Efficient: One contract for all products, no term tracking, P.O.s not required on every opportunity<\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 Improve security and incident response across the distributed network, from the office to the public cloud. <\/p>\n \u2022 Detect threats in real time. <\/p>\n \u2022 Reduce false positives. <\/p>\n \u2022 Gain actionable security intelligence to make your security team more efficient. And do it all while lowering costs.<\/p>","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_3":"Building Block Solution","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","category_1":"Cloud Security","category_3":"Managed Security Service","category_2":"Security Intelligence"},{"product_id":"324","product_name":"Cisco Umbrella MSLA Insights, Easy Protect, Mobile Protect","description":"Umbrella Easy Protect is a cloud-based security platform at the DNS (domain name system) layer that provides the first line of defense against threats on the Internet by blocking requests to malicious destinations (domains, IPs, URLs) before a connection is established. It provides protection against threats over all ports and protocols, and can protect Internet access across all devices on Your network, all office locations, and roaming users","hyperlink":"http:\/\/www.cisco.com","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"13","service_tiering":"Tiered, volume-based offering, priced per seat (insights), per SIM (Mobile Protect) or per circuit (Easy Protect) per month","partner_benefits":" \u2022 Monthly OPEX post-paid utility licensing model<\/p>\n \u2022 Low Risk: No buying up-front<\/p>\n \u2022 Flexible and Scalable-No shelfware or stranded licensing<\/p>\n \u2022 Operationally Efficient: One contract for all products, no term tracking, P.O.s not required on every opportunity<\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" As the industry\u2019s first Secure Internet Gateway in the cloud, Cisco Umbrella provides the first line of defense against threats on the internet. Because Umbrella is delivered from the cloud, it is the easiest way to protect all of your users in minutes.<\/p>\n \u2022 Learn-Intelligence to uncover current and emerging threats.<\/p>\n \u2022 See-Visibility for activity across all devices and ports, anywhere.<\/p>\n \u2022 Block-Stop phishing, malware, and ransomware earlier.<\/p>","mssp_available":"0","org_id":"1","vendor_name":"Cisco","region":"","solutions_practice":"","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","category_1":"Cloud Security","category_2":"Managed Security Service"},{"product_id":"325","product_name":"Cyber Range","description":"Virtual Access or On Site Cyber Range Sessions and Training","hyperlink":"https:\/\/www.cloudrangecyber.com\/","td_contact":"cloudrangecyberUS@techdata.com","td_extension":"(800)-237-8931 x1477150","vendor_id":"14","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cloud Range","region":"","solutions_practice":"","sub_category_1":"Education","sub_category_2":"Security Awareness Training","category_1":"Security Strategy","category_2":"Security Strategy"},{"product_id":"326","product_name":"Xview for Visibility","description":"Xview, part of the ColorTokens Xtended ZeroTrust Platform, provides visibility of every communication in your hybrid datacenter environment","hyperlink":"https:\/\/colortokens.com\/xview-visibility\/","td_contact":"","td_extension":"","vendor_id":"15","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"ColorTokens","region":"","solutions_practice":"","sub_category_1":"Other","category_1":"Security Intelligence"},{"product_id":"327","product_name":"Xshield for Micro-segmentation and Workload Protection","description":"Quickly and easily micro-segment workloads in\nZeroTrust Zones\u2122. Xshield, part of the ColorTokens Xtended ZeroTrust Platform delivers unrivaled micro-segmentation, cloud workload protection and zero trust network access","hyperlink":"https:\/\/colortokens.com\/xshield-workload-protection\/","td_contact":"","td_extension":"","vendor_id":"15","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"ColorTokens","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"Other"},{"product_id":"328","product_name":"Xprotect for Endpoint Protection","description":"Xprotect, part of the ColorTokens Xtended ZeroTrust Platform, prevents attacks on endpoints, servers and legacy\/fixed-function systems with a robust, signature-less approach.","hyperlink":"https:\/\/colortokens.com\/xprotect-endpoint-protection\/","td_contact":"","td_extension":"","vendor_id":"15","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"ColorTokens","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"329","product_name":"Complete Backup and Recovery","description":"Fully featured, comprehensive backup and recovery platform. It covers all workloads: physical, virtual, applications, on-premises, cloud, and hybrid. In addition, all management features relative to backup and recovery are covered under Commvault Complete.","hyperlink":"https:\/\/www.commvault.com\/complete-backup","td_contact":"Software-Sales@techdata.com","td_extension":"(800)-237-8931 x5683326","vendor_id":"16","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Commvault","region":"","solutions_practice":"","category_3":"Application Security","sub_category_1":"Backup, Restore, and Recovery","category_2":"Cloud Security","category_1":"Data Security","category_4":"Endpoint Security","sub_category_4":"Endpoint Security Management","category_5":"Mobile Security","sub_category_2":"Other","sub_category_3":"Other","sub_category_5":"Other"},{"product_id":"330","product_name":"Activate","description":"Commvault Activate is an integrated toolset that includes file storage optimization, sensitive data governance, and compliance search and eDiscovery. It extends the value of data residing in secondary storage as it enables the indexing of backed up and archived data so that users can search, analyze, and use data in ways that usually require additional point products for each use case.","hyperlink":"https:\/\/www.commvault.com\/activate","td_contact":"Software-Sales@techdata.com","td_extension":"(800)-237-8931 x5683326","vendor_id":"16","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Commvault","region":"","solutions_practice":"","sub_category_1":"Data and Discovery Classification","category_1":"Data Security","sub_category_2":"Governance, Risk, Compliance, & Audit","category_2":"Security Intelligence"},{"product_id":"331","product_name":"HyperScale\u2122 Technology","description":"Commvault HyperScale is an add-on for Commvault Complete that enables partners to position and sell on-premises scale-out backup and recovery. HyperScale is delivered in two forms: 1) a Commvault-branded integrated appliance, or 2) as a software solution using your preferred hardware provider.","hyperlink":"https:\/\/www.commvault.com\/hyperscale","td_contact":"Software-Sales@techdata.com","td_extension":"(800)-237-8931 x5683326","vendor_id":"16","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Commvault","region":"","solutions_practice":"","sub_category_1":"Backup, Restore, and Recovery","category_1":"Data Security","category_2":"Data Security","sub_category_2":"Other"},{"product_id":"332","product_name":"Orchestrate","description":"Commvault Orchestrate allows customers to extend the value of their data sitting in secondary storage. Secondary copies of data can now be used for accelerating development\/test routines or performing data migrations. Operations that were previously manual can now be orchestrated and automated, saving valuable time and money.","hyperlink":"https:\/\/www.commvault.com\/orchestrate","td_contact":"Software-Sales@techdata.com","td_extension":"(800)-237-8931 x5683326","vendor_id":"16","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Commvault","region":"","solutions_practice":"","category_1":"Data Security","sub_category_1":"Other"},{"product_id":"333","product_name":"Perch Security","description":"Co-managed threat detection and response solution","hyperlink":"https:\/\/www.connectwise.com\/platform-integrations\/security\/perch","td_contact":"Connectwisesecurityus@techdata.com","td_extension":"(727) 539-7249 ext. 5540517","vendor_id":"17","service_tiering":"No tiering. Monthly subscription, based on user count. Including network threat detection, SIEM, O365 & GSuite Monitoring.","partner_benefits":" 1. <\/span>US Based SOC 24x7x365<\/p>\n 2. <\/span>Become an “MSSP” without the cost or lengthy implementation<\/p>\n 3. <\/span>Create a predictable revenue stream for you, and reliable cost structure for your client<\/p>\n 4. <\/span>Build loyalty: Use the threat activity Perch finds on customer networks as new opportunities to validate their investment in your services.<\/p>\n 5. <\/span>SIEM features: Perch’s log aggregation adds valuable context to network activity, and helps customers meet compliance requirements.<\/p>\n 6. <\/span>Protect your house:Install Perch and secure your own network <\/p>\n 7. <\/span>Integrations with ConnectWise, AWS, G Suite, Microsoft, Cisco, Webroot, Bitdefender, Carbon Black, and many more.<\/p>\n 8. <\/span>Perch is hosted in AWS in the US<\/p>\n 9. <\/span>Access to Security Analyst team any time of the day<\/p>\n 10. <\/span>Reoccurring alert reviews with SOC - Increase partners security skillset<\/p>\n 11. <\/span>Unlimited professional service hours<\/p>","typeof_service":"MSSP Turn-Key Solution: People, Processes and Technology (An MSP can plug this solution into their offerings without much effort or investment) and can also be purchased as an MSSP Building Block Solution: Component used by partner to build a Monthly Recurring Revenue (MRR) managed service.","end_user_benefits":" 1. <\/span>Reliable cost structure <\/p>\n 2. <\/span>Helps customers meet compliance requirements. (HIPAA, GLBA, NIST SP\/CSF) <\/p>\n 3. <\/span>Executive and compliance driven scheduled reporting - Compliance reports are mapped to specific standards<\/p>\n 4. <\/span>Unlimited log sources offers best practices <\/p>\n 5. <\/span>Automate threat intelligence<\/p>","mssp_available":"0","org_id":"1","vendor_name":"ConnnectWise <\/span>NEW!","region":"","solutions_practice":"","sub_category_10":"Building Block Solution","category_9":"Data Security","sub_category_9":"File Integrity Monitoring","sub_category_7":"Flow Analytics","sub_category_6":"Forensics","sub_category_8":"Intrusion Detection and Prevention","sub_category_5":"Log Management","category_8":"Network Security","sub_category_4":"Predictive Analytics","category_6":"Security Intelligence","category_7":"Security Intelligence","category_1":"Security Intelligence","category_2":"Security Intelligence","category_10":"Security Intelligence","category_3":"Security Intelligence","category_4":"Security Intelligence","category_5":"Security Intelligence","sub_category_1":"SIEM","sub_category_2":"Threat Intelligence","sub_category_3":"Turn-Key Solution"},{"product_id":"334","product_name":"Cyber Range","description":"Cyberbit Range is the most widely deployed Cyber Security Training and simulation platform","hyperlink":"https:\/\/www.cyberbit.com\/solutions\/cyber-range\/","td_contact":"","td_extension":"","vendor_id":"18","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cyber Bit","region":"","solutions_practice":"","sub_category_1":"Other","category_1":"Security Intelligence"},{"product_id":"335","product_name":"Security Automation and Orchestration","description":"SOC 3D is the first Security Automation and Orchestration (SOAR) platform combining automation, orchestration, and big-data powered investigation into a single and comprehensive incident response platform that triples SOC efficiency, provides unprecedented visibility and reduces time-to-respond by 90%","hyperlink":"https:\/\/www.cyberbit.com\/solutions\/security-operations-automation-orchestration\/","td_contact":"","td_extension":"","vendor_id":"18","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cyber Bit","region":"","solutions_practice":"","sub_category_1":"Other","category_1":"Security Intelligence"},{"product_id":"336","product_name":"ICS\/SCADA Security - SCADAShield","description":"Cyberbit SCADAShield is the world-leading OT security platform, chosen by critical infrastructure organizations to protect ICS\/SCADA networks, electric grids, transportation networks, manufacturing lines, smart buildings and data centers. SCADAShield provides unprecedented OT asset discovery and visibility, detects known OT threats, unknown OT threats and anomalies, as well as deviations from operational restrictions, by using 7-layer deep packet inspection (DPI).","hyperlink":"https:\/\/www.cyberbit.com\/solutions\/ics-scada-security-continuity\/","td_contact":"","td_extension":"","vendor_id":"18","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cyber Bit","region":"","solutions_practice":"","sub_category_1":"Other","category_1":"Security Intelligence"},{"product_id":"337","product_name":"Endpoint Detection and Response","description":"Cyberbit's Endpoint Detection and Response (EDR) detects advanced, unknown and evasive threats without relying on external sources or connectivity. As a result, it is the only EDR that can be deployed in isolated (air-gapped) environments with no impact on detection.","hyperlink":"https:\/\/www.cyberbit.com\/solutions\/endpoint-detection-response\/","td_contact":"","td_extension":"","vendor_id":"18","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cyber Bit","region":"","solutions_practice":"","sub_category_1":"Advanced Malware Protection","category_1":"Endpoint Security"},{"product_id":"338","product_name":"Isla Isolation Platform","description":"What if you could stop breaches before they happen? Isla does just that by proactively isolating all active code and returning it to you in the form of harmless pixels, simplifying your security strategy and delivering immediate protection","hyperlink":"https:\/\/cyberinc.com\/isla\/","td_contact":"CyberincUS@techdata.com","td_extension":"(800)-237-8931 x5540509","vendor_id":"19","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cyber Inc <\/span>NEW!","region":"","solutions_practice":"","sub_category_1":"Advanced Malware Protection","category_1":"Endpoint Security","sub_category_2":"Other","category_2":"Web Security"},{"product_id":"339","product_name":"Secure Web Gateway","description":"Set Policies. Manage Users. Isolate Threats.\nSimplify and strengthen your security by combining the power of Isla isolation with the Secure Web Gateway (SWG) function. Leverage the power of a single-source security platform built to provide the control you need with total protection for your users","hyperlink":"https:\/\/cyberinc.com\/secure-web-gateway\/","td_contact":"CyberincUS@techdata.com","td_extension":"(800)-237-8931 x5540509","vendor_id":"19","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cyber Inc <\/span>NEW!","region":"","solutions_practice":"","category_1":"Network Security","sub_category_2":"Other","sub_category_1":"URL Filtering\/Web Gateway","category_2":"Web Security"},{"product_id":"340","product_name":"Cynerio","description":"Connected medical devices are exposed to malware and cyber attacks that exploit weaknesses in their security and vulnerabilities of their outdated operating systems. Compromised medical devices act as a gateway for hackers to access patient medical data and expose the organization to potential service disruptions that could impact clinical care and patient safety.","hyperlink":"https:\/\/www.cyr3con.ai\/Home","td_contact":"CynerioUS@techdata.com","td_extension":"(800)-237-8931 x5540425","vendor_id":"20","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Cynerio","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"NAC"},{"product_id":"341","product_name":"Diligence","description":"Hackers routinely use the deepweb and darkweb to facilitate cyber attacks and exchange what was obtained in the outcome. CYR3CON\u2122 Diligence provides a snapshot of the most recent information hackers are discussing across hundreds of deepweb and darkweb sources relevant to an enterprise\u2019s brands, customers, domains, and employees (B-C-D-E). Upon receiving a standard set of customer inputs, CYR3CON\u2122 produces a customized report which allows the client to understand (1) active hacker discussions about their brand, (2) leaked customer data, (3) discussions on the client\u2019s domains by malicious hackers, and (4) evidence of employee corporate accounts and\/or email being compromised.","hyperlink":"https:\/\/www.cyr3con.ai\/Home","td_contact":"cyr3con@techdata.com","td_extension":"","vendor_id":"21","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"CYR3CON","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Vulnerability Management\/Patching"},{"product_id":"342","product_name":"Threat-Based Third Party Risk (3PR)","description":"If you are looking to work with a new partner or client that will access your IT resources, be used as a component in a technology product, or whose cloud-delivered service can disrupt your business if it is attacked then you need to understand the threats to those third parties. CYR3CON\u2122 Threat-Based Third Party risk provides an assessment of your third-parties based on what the malicious hackers are saying about them on the deepweb and darkweb. This provides true threat perspective and not dependent on (yet complementary to) the traditional questionnaires offered to third parties. CYR3CON\u2122 Threat-Based Third Party Risk helps customers identify their most risky third parties, and drives decisions on controls, obligations, and audits.","hyperlink":"https:\/\/www.cyr3con.ai\/Home","td_contact":"cyr3con@techdata.com","td_extension":"","vendor_id":"21","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"CYR3CON","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Vulnerability Management\/Patching"},{"product_id":"343","product_name":"Vulnerability Assessment","description":"Every enterprise has open vulnerabilities \u2013 the truth is that patching is a time consuming process \u2013 patches have to be tested and deployed. With constrained resources, teams tasked with vulnerability and patch management make choices on what to patch. CYR3CON\u2122 provides the only proven solution to prioritize vulnerabilities based on which ones hackers are most likely to exploit. The patented CyRating\u2122 for each vulnerability tells the enterprise the likelihood that it will be used in an attack \u2013 even before the exploit becomes available. Relying on data gathered from deepweb\/darkweb hacker communities along with cutting-edge machine learning, Vulnerability Assessment allows the enterprise to decide what to patch based on what the hackers are getting ready to attack \u2013 no other method provides proven insight into what to patch based on the adversary.","hyperlink":"https:\/\/www.cyr3con.ai\/Home","td_contact":"cyr3con@techdata.com","td_extension":"","vendor_id":"21","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"CYR3CON","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Vulnerability Management\/Patching"},{"product_id":"344","product_name":"Counter Drone Solution","description":"Sensors connect to DroneTracker software, which detects, classifies, and protects against drone threats, including localizing the drone.","hyperlink":"https:\/\/www.dedrone.com\/","td_contact":"BU-Security@techdata.com","td_extension":"+49 47003 2222","vendor_id":"22","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Dedrone","region":"","solutions_practice":"","category_2":"Identity and Access","category_1":"IoT","sub_category_2":"Other","sub_category_1":"Physical Security and Safety"},{"product_id":"345","product_name":"Data Domain","description":"The #1 purpose-built backup appliance,2 Data Domain is designed for the modern software-defined data center and is the only architecture capable of natively tiering deduplicated data to any cloud.3 From the largest Fortune 100 organizations to small startups, Data Domain offers simplicity and efficiency combined with high reliability.","hyperlink":"https:\/\/www.dellemc.com\/en-us\/data-protection\/index.htm#data-domain","td_contact":"EMC@techdata.com","td_extension":"800-237-8931 x5545042","vendor_id":"23","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Dell EMC","region":"","solutions_practice":"","sub_category_1":"Backup, Restore, and Recovery","category_1":"Data Security"},{"product_id":"346","product_name":"Data Protection Suite","description":"Best-in-class Dell EMC Data Protection software solutions accelerate backups up to 20x and recovery up to 10x for mission-critical applications.5 Our software covers a broad range of applications including everything from virtual machines to high IO\/change rate OLTP, and VMware workloads running on AWS.","hyperlink":"https:\/\/www.dellemc.com\/en-us\/data-protection\/index.htm#data-protection-suite","td_contact":"EMC@techdata.com","td_extension":"800-237-8931 x5545042","vendor_id":"23","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Dell EMC","region":"","solutions_practice":"","sub_category_1":"Backup, Restore, and Recovery","category_1":"Data Security"},{"product_id":"347","product_name":"Integrated Data Protection Appliance (IDPA)","description":"Get powerful data protection in a single appliance that is easy to deploy and manage \u2014 for a low cost-to-protect. The integrated appliance brings together protection storage and software, search, and analytics, plus centralized management and cloud readiness. The clean, intuitive interface of the IDPA System Manager provides a comprehensive view of data protection infrastructure from a single dashboard.","hyperlink":"https:\/\/www.dellemc.com\/en-us\/data-protection\/index.htm#integrated-appliances","td_contact":"EMC@techdata.com","td_extension":"800-237-8931 x5545042","vendor_id":"23","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Dell EMC","region":"","solutions_practice":"","sub_category_1":"Backup, Restore, and Recovery","category_1":"Data Security"},{"product_id":"348","product_name":"Encryptics for Email","description":"Encryptics for Email integrates seamlessly with Microsoft Outlook, iPhone, Android, and the Mac to secure all of your messages sent through internal or external networks. Your protected messages maintain the highest levels of security and control even when passed through unaffiliated clients or residing on anonymous email servers.","hyperlink":"https:\/\/www.encryptics.com\/solutions.aspx","td_contact":"","td_extension":"","vendor_id":"24","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Encryptics","region":"","solutions_practice":"","category_1":"Data Security","sub_category_1":"File, Folder and\/or Email Encryption"},{"product_id":"349","product_name":"Encryptics Data Protection API","description":"Build comprehensive data protection right into your own products and services with our lightweight, API-based tools.","hyperlink":"","td_contact":"","td_extension":"","vendor_id":"24","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Encryptics","region":"","solutions_practice":"","category_1":"Data Security","sub_category_1":"Other"},{"product_id":"350","product_name":"Shield for Secure Browsing","description":"Ericom Shield adds a powerful layer to your defense-in-depth strategy by isolating malware, ransomware and other threats where they can\u2019t harm your network and user devices. Empower end users with full, transparent Internet use, including file downloads, while reducing risk, costs and operational burden on your IT staff.","hyperlink":"https:\/\/www.ericom.com\/solutions\/browser-isolation\/","td_contact":"Daniel.Roehrer@techdata.com","td_extension":"215-390-7116","vendor_id":"25","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Ericom","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Other"},{"product_id":"351","product_name":"Access Policy Manager","description":"BIG-IP Access Policy Manager (APM) contextually secures, simplifies, and protects user access to apps and data, whether those resources are in a data center, the cloud, SaaS-based, or a hybrid environment","hyperlink":"https:\/\/f5.com\/products\/big-ip\/access-policy-manager-apm","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"26","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"F5","region":"","solutions_practice":"","category_2":"Cloud Security","category_1":"Identity and Access","sub_category_1":"Other","sub_category_2":"Other"},{"product_id":"352","product_name":"Advanced Firewall Manager","description":"With deep threat intelligence services and flexible mitigation options, BIG-IP Advanced Firewall Manager (AFM) defends against threats to network layers 3\u20134, stopping them before they reach your data center.\n\nSpecifically, BIG-IP AFM scales to shut down high-capacity DDoS attacks that can overwhelm load balancers, firewalls, and even networks. It automatically invokes mitigation, alerts security admins, and configures or adjusts DDoS thresholds as traffic patterns change and without affecting legitimate traffic.","hyperlink":"https:\/\/f5.com\/products\/big-ip\/advanced-firewall-manager-afm","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"26","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"F5","region":"","solutions_practice":"","sub_category_1":"Management","category_1":"Security Intelligence"},{"product_id":"353","product_name":"Advanced Web Application Firewall (WAF)","description":"F5 Advanced WAF Protects against the latest wave of attacks using behavioral analytics, proactive bot defense, and application-layer encryption of sensitive data, such as credentials","hyperlink":"https:\/\/f5.com\/products\/security\/advanced-waf","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"26","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"F5","region":"","solutions_practice":"","sub_category_1":"Web Application Firewall","category_1":"Web Security"},{"product_id":"354","product_name":"BIG-IP Application Security Manager","description":"BIG-IP Application Security Manager (ASM) is a powerful WAF that enables you to defeat sophisticated and complex threats while also improving app performance by offloading SSL.","hyperlink":"https:\/\/f5.com\/products\/big-ip\/application-security-manager-asm","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"26","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"F5","region":"","solutions_practice":"","sub_category_1":"Web Application Firewall","category_1":"Web Security"},{"product_id":"355","product_name":"BIG-IP Secure Web Gateway Services (Subscription Service)","description":"Secure Web Gateway Services, when paired with BIG-IP Access Policy Manager (APM), allows you to keep your company connected without putting your network, applications, or data at risk.Secure Web Gateway Services verifies endpoint integrity before and after users connect to the web. It\u2019s the only web access gateway to secure against both inbound and outbound malware.Actively manage web security by blocking access to certain sites. With powerful URL categorization and filters, you can allow, block, or confirm and continue access to sites and applications, on a user-by-user basis. It helps protect your network, apps, and data, without compromising employee productivity.","hyperlink":"https:\/\/f5.com\/products\/big-ip\/secure-web-gateway-services-swgs","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"26","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"F5","region":"","solutions_practice":"","category_2":"Identity and Access","sub_category_2":"Other","sub_category_1":"Web Application Protection","category_1":"Web Security"},{"product_id":"356","product_name":"DDoS Hybrid Defender","description":"Comprehensive DDoS threat coverage in a simple, dedicated appliance with native, cloud-based scrubbing services","hyperlink":"https:\/\/f5.com\/products\/security\/ddos-hybrid-defender","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"26","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"F5","region":"","solutions_practice":"","category_2":"Cloud Security","sub_category_1":"DoS and DDoS","category_1":"Network Security","sub_category_2":"Other"},{"product_id":"357","product_name":"SSL Orchestrator","description":"Provides high-performance decryption and encryption of outbound SSL\/TLS traffic and supports dynamic, policy-based management and steering of traffic to security devices.","hyperlink":"https:\/\/f5.com\/products\/security\/ssl-orchestrator","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"26","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"F5","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"VPN"},{"product_id":"358","product_name":"Application Security Manager","description":"A comprehensive web application firewall (WAF) that protects apps and data from known and unknown threats, defends against bots that bypass standard protections, and virtually patches app vulnerabilities.","hyperlink":"https:\/\/f5.com\/products\/big-ip\/application-security-manager-asm","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"26","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"F5","region":"","solutions_practice":"","category_1":"Application Security","sub_category_1":"Other"},{"product_id":"359","product_name":"BIG-IP DNS","description":"BIG-IP DNS improves the performance and availability of your global applications by sending users to the closest or best-performing physical, virtual, or cloud environment. It also hyperscales and secures your DNS infrastructure from DDoS attacks.","hyperlink":"https:\/\/www.f5.com\/products\/big-ip-services\/big-ip-dns","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"26","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"F5","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"Other"},{"product_id":"360","product_name":"Websafe Anti-Fraud","description":"Financial institutions have the most high-profile, high-value assets on the Internet: millions of bank accounts. The global nature of the Internet means that these assets attract ambitious attackers all around the world. Broadly known as fraud, these online criminal activities are a constant and persistent reality for the banking industry. To effectively combat the perils of fraud, organizations that offer financial services over the Internet must defend their businesses with a combination of security technologies. The F5 Web Fraud Protection solution provides both the breadth and depth of coverage financial services organizations need to gain a full defense against asset loss due to fraud.","hyperlink":"https:\/\/f5.com\/solutions\/enterprise\/reference-architectures\/web-fraud-protection","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"26","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"F5","region":"","solutions_practice":"","category_1":"Advanced Fraud Security","sub_category_1":"Other","sub_category_2":"Other","category_2":"Web Security"},{"product_id":"361","product_name":"IP Intelligence","description":"Having the ability to detect and block bad actors before they hit your data center provides a major advantage in your network protection scheme. By blocking malicious activity at the earliest point, F5 IP Intelligence Services significantly reduces risk and increases data center efficiency by eliminating the efforts spent processing bad traffic.","hyperlink":"https:\/\/f5.com\/products\/modules\/ip-intelligence-services","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"26","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"F5","region":"","solutions_practice":"","category_1":"Security Intelligence","sub_category_1":"Threat Intelligence"},{"product_id":"362","product_name":"F5 Secure Web Gateway","description":"Gain insight and control over web traffic.","hyperlink":"https:\/\/www.f5.com\/products\/security\/access-manager\/secure-web-gateway","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"26","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"F5","region":"","solutions_practice":"","sub_category_1":"Web Application Firewall","category_1":"Web Security"},{"product_id":"363","product_name":"Silverline DDoS Protection","description":"Silverline detects and mitigates even the largest of volumetric DDoS attacks at layer 3-7, before they reach your network.","hyperlink":"https:\/\/www.f5.com\/products\/security\/silverline\/ddos-protection","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"26","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"F5","region":"","solutions_practice":"","sub_category_1":"DoS and DDoS","category_1":"Network Security"},{"product_id":"364","product_name":"Silverline Web App Firewall","description":"Available as a fully-managed service or an express self-service option, Silverline protects web apps and data, while ensuring compliance with PCI DSS.","hyperlink":"https:\/\/www.f5.com\/products\/security\/silverline\/web-application-firewall","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"26","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"F5","region":"","solutions_practice":"","sub_category_1":"Web Application Firewall","category_1":"Web Security"},{"product_id":"365","product_name":"iWorkflow","description":"Manually deploying your applications and services is time-consuming and error-prone. iWorkflow is a virtual appliance that serves as a platform for deploying application delivery policies. Through highly configurable, administrator-defined L4\u2013L7 service templates (iApps), your deployments take place in minutes rather than days.","hyperlink":"https:\/\/www.f5.com\/products\/automation-and-orchestration\/iworkflow","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"26","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"F5","region":"","solutions_practice":"","category_1":"Application Security","sub_category_1":"Other"},{"product_id":"366","product_name":"Access Manager","description":"Access Manager secures, simplifies, and protects user access to apps and data, while delivering the most scalable access gateway on the market.","hyperlink":"https:\/\/www.f5.com\/products\/security\/access-manager","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"26","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"F5","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"Other"},{"product_id":"367","product_name":"Access Policy Manager","description":"BIG-IP Access Policy Manager (APM) contextually secures, simplifies, and protects user access to apps and data, whether those resources are in a data center, the cloud, SaaS-based, or a hybrid environment","hyperlink":"https:\/\/f5.com\/products\/big-ip\/access-policy-manager-apm","td_contact":"f5@techdata.com","td_extension":"(480) 643-5064","vendor_id":"26","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"F5","region":"","solutions_practice":"","category_2":"Cloud Security","category_1":"Identity and Access","sub_category_1":"Other","sub_category_2":"Other"},{"product_id":"368","product_name":"Advanced Firewall Manager","description":"With deep threat intelligence services and flexible mitigation options, BIG-IP Advanced Firewall Manager (AFM) defends against threats to network layers 3\u20134, stopping them before they reach your data center.\n\nSpecifically, BIG-IP AFM scales to shut down high-capacity DDoS attacks that can overwhelm load balancers, firewalls, and even networks. It automatically invokes mitigation, alerts security admins, and configures or adjusts DDoS thresholds as traffic patterns change and without affecting legitimate traffic.","hyperlink":"https:\/\/f5.com\/products\/big-ip\/advanced-firewall-manager-afm","td_contact":"f5@techdata.com","td_extension":"(480) 643-5064","vendor_id":"26","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"F5","region":"","solutions_practice":"","sub_category_1":"Management","category_1":"Security Intelligence"},{"product_id":"369","product_name":"Advanced Web Application Firewall (WAF)","description":"F5 Advanced WAF Protects against the latest wave of attacks using behavioral analytics, proactive bot defense, and application-layer encryption of sensitive data, such as credentials","hyperlink":"https:\/\/f5.com\/products\/security\/advanced-waf","td_contact":"f5@techdata.com","td_extension":"(480) 643-5064","vendor_id":"26","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"F5","region":"","solutions_practice":"","sub_category_1":"Web Application Firewall","category_1":"Web Security"},{"product_id":"370","product_name":"BIG-IP Application Security Manager","description":"BIG-IP Application Security Manager (ASM) is a powerful WAF that enables you to defeat sophisticated and complex threats while also improving app performance by offloading SSL.","hyperlink":"https:\/\/f5.com\/products\/big-ip\/application-security-manager-asm","td_contact":"f5@techdata.com","td_extension":"(480) 643-5064","vendor_id":"26","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"F5","region":"","solutions_practice":"","sub_category_1":"Web Application Firewall","category_1":"Web Security"},{"product_id":"371","product_name":"BIG-IP Secure Web Gateway Services (Subscription Service)","description":"Secure Web Gateway Services, when paired with BIG-IP Access Policy Manager (APM), allows you to keep your company connected without putting your network, applications, or data at risk.Secure Web Gateway Services verifies endpoint integrity before and after users connect to the web. It\u2019s the only web access gateway to secure against both inbound and outbound malware.Actively manage web security by blocking access to certain sites. With powerful URL categorization and filters, you can allow, block, or confirm and continue access to sites and applications, on a user-by-user basis. It helps protect your network, apps, and data, without compromising employee productivity.","hyperlink":"https:\/\/f5.com\/products\/big-ip\/secure-web-gateway-services-swgs","td_contact":"f5@techdata.com","td_extension":"(480) 643-5064","vendor_id":"26","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"F5","region":"","solutions_practice":"","category_2":"Identity and Access","sub_category_2":"Other","sub_category_1":"Web Application Protection","category_1":"Web Security"},{"product_id":"372","product_name":"DDoS Hybrid Defender","description":"Comprehensive DDoS threat coverage in a simple, dedicated appliance with native, cloud-based scrubbing services","hyperlink":"https:\/\/f5.com\/products\/security\/ddos-hybrid-defender","td_contact":"f5@techdata.com","td_extension":"(480) 643-5064","vendor_id":"26","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"F5","region":"","solutions_practice":"","category_2":"Cloud Security","sub_category_1":"DoS and DDoS","category_1":"Network Security","sub_category_2":"Other"},{"product_id":"373","product_name":"SSL Orchestrator","description":"Provides high-performance decryption and encryption of outbound SSL\/TLS traffic and supports dynamic, policy-based management and steering of traffic to security devices.","hyperlink":"https:\/\/f5.com\/products\/security\/ssl-orchestrator","td_contact":"f5@techdata.com","td_extension":"(480) 643-5064","vendor_id":"26","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"F5","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"VPN"},{"product_id":"374","product_name":"Application Security Manager","description":"A comprehensive web application firewall (WAF) that protects apps and data from known and unknown threats, defends against bots that bypass standard protections, and virtually patches app vulnerabilities.","hyperlink":"https:\/\/f5.com\/products\/big-ip\/application-security-manager-asm","td_contact":"f5@techdata.com","td_extension":"(480) 643-5064","vendor_id":"26","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"F5","region":"","solutions_practice":"","category_1":"Application Security","sub_category_1":"Other"},{"product_id":"375","product_name":"BIG-IP DNS","description":"BIG-IP DNS improves the performance and availability of your global applications by sending users to the closest or best-performing physical, virtual, or cloud environment. It also hyperscales and secures your DNS infrastructure from DDoS attacks.","hyperlink":"https:\/\/www.f5.com\/products\/big-ip-services\/big-ip-dns","td_contact":"f5@techdata.com","td_extension":"(480) 643-5064","vendor_id":"26","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"F5","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"Other"},{"product_id":"376","product_name":"Websafe Anti-Fraud","description":"Financial institutions have the most high-profile, high-value assets on the Internet: millions of bank accounts. The global nature of the Internet means that these assets attract ambitious attackers all around the world. Broadly known as fraud, these online criminal activities are a constant and persistent reality for the banking industry. To effectively combat the perils of fraud, organizations that offer financial services over the Internet must defend their businesses with a combination of security technologies. The F5 Web Fraud Protection solution provides both the breadth and depth of coverage financial services organizations need to gain a full defense against asset loss due to fraud.","hyperlink":"https:\/\/f5.com\/solutions\/enterprise\/reference-architectures\/web-fraud-protection","td_contact":"f5@techdata.com","td_extension":"(480) 643-5064","vendor_id":"26","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"F5","region":"","solutions_practice":"","category_1":"Advanced Fraud Security","sub_category_1":"Other","sub_category_2":"Other","category_2":"Web Security"},{"product_id":"377","product_name":"IP Intelligence","description":"Having the ability to detect and block bad actors before they hit your data center provides a major advantage in your network protection scheme. By blocking malicious activity at the earliest point, F5 IP Intelligence Services significantly reduces risk and increases data center efficiency by eliminating the efforts spent processing bad traffic.","hyperlink":"https:\/\/f5.com\/products\/modules\/ip-intelligence-services","td_contact":"f5@techdata.com","td_extension":"(480) 643-5064","vendor_id":"26","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"F5","region":"","solutions_practice":"","category_1":"Security Intelligence","sub_category_1":"Threat Intelligence"},{"product_id":"378","product_name":"F5 Secure Web Gateway","description":"Gain insight and control over web traffic.","hyperlink":"https:\/\/www.f5.com\/products\/security\/access-manager\/secure-web-gateway","td_contact":"f5@techdata.com","td_extension":"(480) 643-5064","vendor_id":"26","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"F5","region":"","solutions_practice":"","sub_category_1":"Web Application Firewall","category_1":"Web Security"},{"product_id":"379","product_name":"Silverline DDoS Protection","description":"Silverline detects and mitigates even the largest of volumetric DDoS attacks at layer 3-7, before they reach your network.","hyperlink":"https:\/\/www.f5.com\/products\/security\/silverline\/ddos-protection","td_contact":"f5@techdata.com","td_extension":"(480) 643-5064","vendor_id":"26","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"F5","region":"","solutions_practice":"","sub_category_1":"DoS and DDoS","category_1":"Network Security"},{"product_id":"380","product_name":"Silverline Web App Firewall","description":"Available as a fully-managed service or an express self-service option, Silverline protects web apps and data, while ensuring compliance with PCI DSS.","hyperlink":"https:\/\/www.f5.com\/products\/security\/silverline\/web-application-firewall","td_contact":"f5@techdata.com","td_extension":"(480) 643-5064","vendor_id":"26","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"F5","region":"","solutions_practice":"","sub_category_1":"Web Application Firewall","category_1":"Web Security"},{"product_id":"381","product_name":"iWorkflow","description":"Manually deploying your applications and services is time-consuming and error-prone. iWorkflow is a virtual appliance that serves as a platform for deploying application delivery policies. Through highly configurable, administrator-defined L4\u2013L7 service templates (iApps), your deployments take place in minutes rather than days.","hyperlink":"https:\/\/www.f5.com\/products\/automation-and-orchestration\/iworkflow","td_contact":"f5@techdata.com","td_extension":"(480) 643-5064","vendor_id":"26","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"F5","region":"","solutions_practice":"","category_1":"Application Security","sub_category_1":"Other"},{"product_id":"382","product_name":"Access Manager","description":"Access Manager secures, simplifies, and protects user access to apps and data, while delivering the most scalable access gateway on the market.","hyperlink":"https:\/\/www.f5.com\/products\/security\/access-manager","td_contact":"f5@techdata.com","td_extension":"(480) 643-5064","vendor_id":"26","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"F5","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"Other"},{"product_id":"383","product_name":"Log Management","description":"Fluency is network behavioral analysis built into a threat hunting & response platform. Fluency appliances collect network application flow data and correlate it with network, host and application logs. The results scored in real time, allowing the strongest threats to be alerted.","hyperlink":"https:\/\/fluencysecurity.com\/technology\/","td_contact":"fluency@techdata.com","td_extension":"","vendor_id":"27","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Fluency","region":"","solutions_practice":"","sub_category_1":"Log Management","category_1":"Security Intelligence"},{"product_id":"384","product_name":"Fluency Security for MSP and MSSP","description":"Fluency Security is a data hungry, high capacity next generation SIEM with built-in multi-tenant capability that that can run stand-alone or agument existing SIEM tools. We solve the problems of diversity, operations and analysis especially when businesses need to scale. Our advanced patented streaming database, correlation and risk scoring technology along with our ability to ingress all data sources ensures you aren't just getting notice of events but rather real actionable intelligent information that you can act on. Fluency has built-in pseudonymization for privacy (GDPR, CCPA & PIPEDA) regulations along with native IPv6 support and supports compliance regulations such as PCI-DSS with our 1 year storage, active user tracking and machine learning supporting compliance policies.","hyperlink":"","td_contact":"fluency@techdata.com\n(727) 539-7429 x-84008","td_extension":"","vendor_id":"27","service_tiering":"No Tiering. Quarterly or Annual Subscription","partner_benefits":" \u2022 Help clients solve streaming and capacity needs<\/p>\n \u2022 Help clients solve excessive storage fee costs<\/p>\n \u2022 Help clients meet Privacy needs<\/p>\n \u2022 Help clients meet Compliance needs (PCI-DSS)<\/p>\n \u2022 Substantially improve overall efficiencies and lower costs with no utility based pricing<\/p>\n \u2022 By helping to ingress all data sources (ground truth) you uncover upsell opportunities from endpoints to the system<\/p>\n \u2022 Opportunity to create services around Fluency for installation and L1 support<\/p>","typeof_service":" Managed Security Services Building Block Solution: <\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 Real-time situational awareness <\/p>\n \u2022 Reduction in Dwell Time<\/p>\n \u2022 Reduction in False Positives <\/p>\n \u2022 Unmatched scalability and capacity<\/p>\n \u2022 Increased SOC efficiencies<\/p>\n \u2022 Meet GDPR, CCPA and PIPEDA and industry compliance requirements for log management<\/p>\n \u2022 No installation, maintenance or L1-L3 fees<\/p>\n \u2022 Pricing based solely on daily ingress needs<\/p>\n \u2022 Standard try before you buy Proof of Concept<\/p>","mssp_available":"0","org_id":"1","vendor_name":"Fluency","region":"","solutions_practice":"","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","category_2":"Managed Security Service","category_1":"Security Intelligence"},{"product_id":"385","product_name":"CASB","description":"Cloud Access Security Broker\nComplete security for all cloud applications. Period.","hyperlink":"https:\/\/www.forcepoint.com\/product\/casb-cloud-access-security-broker","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"28","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"ForcePoint","region":"","solutions_practice":"","sub_category_1":"CASB","category_1":"Cloud Security"},{"product_id":"386","product_name":"Data Loss Prevention (DLP)","description":"DLP\nData Loss Prevention\nA single policy to protect your data, wherever it is","hyperlink":"https:\/\/www.forcepoint.com\/product\/dlp-data-loss-prevention","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"28","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"ForcePoint","region":"","solutions_practice":"","sub_category_1":"Data Loss Prevention","category_1":"Data Security"},{"product_id":"387","product_name":"UEBA Behavioral Analytics","description":"AI-fueled behavior analytics to identify real entity risk","hyperlink":"https:\/\/www.forcepoint.com\/product\/ueba-user-entity-behavior-analytics","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"28","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"ForcePoint","region":"","solutions_practice":"","sub_category_1":"Predictive Analytics","category_1":"Security Intelligence"},{"product_id":"388","product_name":"NGFW","description":"Next Generation Firewall- Enterprise SD-WAN meets the #1\nmost secure next gen firewal","hyperlink":"https:\/\/www.forcepoint.com\/product\/ngfw-next-generation-firewall","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"28","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"ForcePoint","region":"","solutions_practice":"","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security"},{"product_id":"389","product_name":"Web Security","description":"Next-generation web security for\ntomorrow's global workforce","hyperlink":"https:\/\/www.forcepoint.com\/product\/web-security","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"28","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"ForcePoint","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"URL Filtering\/Web Gateway"},{"product_id":"390","product_name":"Email Security","description":"Most complete email protection\nand visibility","hyperlink":"https:\/\/www.forcepoint.com\/product\/email-security","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"28","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"ForcePoint","region":"","solutions_practice":"","sub_category_1":"Email Security\/Gateway","category_1":"Network Security"},{"product_id":"391","product_name":"Insider Threat","description":"Deep collection and forensics for\nunrivaled visibility","hyperlink":"https:\/\/www.forcepoint.com\/product\/insider-threat","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"28","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"ForcePoint","region":"","solutions_practice":"","sub_category_1":"Forensics","category_1":"Security Intelligence"},{"product_id":"392","product_name":"FortiADC","description":"Fast layer 4, layer 7, and SSL throughput. All app delivery and security features needed in single solution","hyperlink":"https:\/\/www.fortinet.com\/products\/application-delivery-controller\/fortiadc.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Fortinet","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"Other"},{"product_id":"393","product_name":"FortiAnalyzer","description":"Centralized Loggingand Reporting solution.Fabric-based visibility reduces analysis complexity. Fabric Security Ratings assess how secure you are.Lack of visibility continues to extend breach and compromise events to an average of more than 100 days. For each day an organization is exposed, it\u2019s another opportunity for attackers to get to sensitive customer and confidential information.FortiAnalyzer is the NOC-SOC security analysis tool built with operations perspective. With action-oriented views and deep drill-down capabilities, FortiAnalyzer not only gives organizations critical insight into threats, but also accurately scopes risk across the attack surface, pinpointing where immediate response is required.","hyperlink":"https:\/\/www.fortinet.com\/products\/management\/fortianalyzer.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Fortinet","region":"","solutions_practice":"","sub_category_1":"Log Management","category_1":"Security Intelligence"},{"product_id":"394","product_name":"FortiAP","description":"Wireless Access Point. Highest Performing Access Points with the latest 802.11ac Wave 2 standard. Most secure Wi-Fi with UTM services integrated in the Access Points","hyperlink":"https:\/\/www.fortinet.com\/products\/secure-wifi\/access-points.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Fortinet","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"Wireless Security"},{"product_id":"395","product_name":"FortiAuthenticator","description":"User Identity Management Server. Offers a centralized user identity management solution that simplifies administration and the end user experience. Single Sign On capabilities for both internal and cloud networks","hyperlink":"https:\/\/www.fortinet.com\/products\/identity-access-management\/fortiauthenticator.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Fortinet","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"MultiFactor and Advanced Authentication"},{"product_id":"396","product_name":"FortiCASB","description":"Visibility and Control for SaaS Applications. On-demand scanning of data stored in cloud.User analytics and monitoring.Organizations are increasingly turning to SaaS applications for the agility and savings, but find that they don't have the visibility and control they require.\n\nFortiCASB is a cloud-native Cloud Access Security Broker (CASB) subscription service that is designed to provide visibility, compliance, data security, and threat protection for cloud-based services being used by an organization. With support for major SaaS service providers, FortiCASB provides insights into users, behaviors, and data stored in the cloud with comprehensive reporting tools. It also includes advanced controls to extend security policies from within the network perimeter to SaaS applications.","hyperlink":"https:\/\/www.fortinet.com\/products\/cloud-access-security-broker.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Fortinet","region":"","solutions_practice":"","sub_category_1":"CASB","category_1":"Cloud Security"},{"product_id":"397","product_name":"FortiClient","description":"Advanced Endpoint Protection.Endpoints are frequently the target of initial compromise or attacks. One recent study found that 30% of breaches involved malware being installed on endpoints. FortiClient strengthens endpoint security through integrated visibility, control, and proactive defense. With the ability to discover, monitor, and assess endpoint risks, you can ensure endpoint compliance, mitigate risks, and reduce exposure. FortiClient proactively defends against advanced attacks. Its tight integration with the Security Fabric enables policy-based automation to contain threats and control outbreaks. FortiClient is compatible with Fabric-Ready partners to further strengthen enterprises\u2019 security posture.","hyperlink":"https:\/\/www.fortinet.com\/products\/endpoint-security\/forticlient.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Fortinet","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security","category_2":"Mobile Security","sub_category_2":"Mobility Security"},{"product_id":"398","product_name":"FortiCloud","description":"FortiCloud can help with your security and wireless challenges in a number of ways. Our solution addresses common IT difficulties including time-consuming provisioning, high investment costs, complex management, vulnerability to advanced threats, and the need to easily scale with growth.","hyperlink":"https:\/\/www.fortinet.com\/products\/utm\/forticloud.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Fortinet","region":"","solutions_practice":"","category_1":"Cloud Security","sub_category_1":"Other"},{"product_id":"399","product_name":"FortiDDOS","description":"Hardware Accelerated DDOS Mitigator. Distributed Denial of Service (DDoS) attacks are ever-evolving and use a variety of technologies. To successfully combat these attacks, you need a dynamic, multi-layered security solution. FortiDDoS protects from both known and zero day attacks with very low latency. It\u2019s easy to deploy and manage, and includes comprehensive reporting and analysis tools.","hyperlink":"https:\/\/www.fortinet.com\/products\/ddos\/fortiddos.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Fortinet","region":"","solutions_practice":"","sub_category_1":"DoS and DDoS","category_1":"Network Security"},{"product_id":"400","product_name":"FortiExtender","description":"Establishing and maintaining Internet connectivity can be a critical requirement for business execution. To provide a secondary WAN connection, the FortiExtender appliance uses LTE connectivity with the cellular phone infrastructure to provide broadband speeds that can be used in a failover or load-balancing configuration. And for those locations without wired broadband options, FortiExtender can provide the primary Internet connection.","hyperlink":"https:\/\/www.fortinet.com\/products\/wireless-lan-fortiextender.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Fortinet","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"Other"},{"product_id":"401","product_name":"FortiExtender - Cloud","description":"Deploy, manage and optimize your LTE modem network with an easy to use, browser-based FortiExtender Cloud. This hosted service enables the management of an unlimited number of FortiExtender Appliances from anywhere you can connect to the Internet. With both free and paid service levels, FortiExtender Cloud offers inventory management, device configuration, carrier data consumption, and more for devices that can be spread around the country or around the world.","hyperlink":"https:\/\/www.fortinet.com\/products\/fortiextender-cloud.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Fortinet","region":"","solutions_practice":"","sub_category_1":"Management","category_1":"Security Intelligence"},{"product_id":"402","product_name":"Fortigate for Private Cloud","description":"Virtualization and SDN are rapidly transforming data centers into agile, innovative, and cost-effective private clouds. Unfortunately, if your security is an afterthought and can\u2019t keep up with these fast, flexible environments, there can be protection gaps or manual security processes that negate the advantages of network virtualization and SDN.\n\nOur SDN security framework delivers security built for these networks. It defines security evolution across the network architecture. It evolves network security in each conceptual layer of network architecture: the data plane, control plane, and management plane.","hyperlink":"https:\/\/www.fortinet.com\/solutions\/enterprise-midsize-business\/private-cloud-security-sdn.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Fortinet","region":"","solutions_practice":"","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security"},{"product_id":"403","product_name":"FortiGate for Public Cloud","description":"Public clouds provide elastic and scalable infrastructure for applications, storage, and data that changes the way the world does business.","hyperlink":"https:\/\/www.fortinet.com\/products\/cloud-firewall-security.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Fortinet","region":"","solutions_practice":"","category_2":"Cloud Security","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security","sub_category_2":"Other"},{"product_id":"404","product_name":"FortiGate IPS","description":"Fortinet, well known for its next-generation firewall (NGFW) solution, has built IPS technology as part of FortiGate firewalls for more than ten years. Fortinet customers expect and depend on high performance from FortiGate firewalls and FortiGate IPS benefits from this legacy, delivering pound-for-pound, the best IPS performance available in the market today. FortiGate IPS, following a different evolution path than traditional IPS, innovates in ways that other standalone IPS products do not.","hyperlink":"https:\/\/www.fortinet.com\/products\/ips.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Fortinet","region":"","solutions_practice":"","sub_category_1":"Intrusion Detection and Prevention","category_1":"Network Security"},{"product_id":"405","product_name":"Fortigate Network Security Platform-30 FW Appliances","description":"Fortinet\u2019s Security Fabric can intelligently protect a customer\u2019s entire network\u2014There are 30 FW\/UTM security appliances. Fortinet Product Matrix attached.","hyperlink":"https:\/\/www.fortinet.com\/products.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Fortinet","region":"","solutions_practice":"","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security"},{"product_id":"406","product_name":"Fortigate Next Gen Virtual Firewall","description":"FortiGate-VM is a virtualized form factor of our market leading, high performance FortiGate next-generation firewall that delivers advanced protection for north-south and east-west traffic in virtualized data centers and cloud.","hyperlink":"https:\/\/www.fortinet.com\/products\/virtualized-next-generation-firewall.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Fortinet","region":"","solutions_practice":"","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security"},{"product_id":"407","product_name":"FortiMail","description":"Messaging Security Server.According to analysts, email security solutions from multi-product vendors have lagged behind changes in the threat landscape and email threats bypass traditional threat prevention technologies. As a result, they recommend assessing the advanced threat defense capabilities of incumbent email security solutions, supplementing them or replacing them to fill gaps. In fact, according to Verizon\u2019s 2017 Data Breach Investigations Report, two-thirds of all malware leading to security incidents are initially delivered via email. That\u2019s why you need the powerful protection of FortiMail, as a high performance physical or virtual appliance in your data center, to help secure the dynamic enterprise attack surface with your Fortinet Security Fabric.","hyperlink":"https:\/\/www.fortinet.com\/products\/email-security\/fortimail.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Fortinet","region":"","solutions_practice":"","sub_category_1":"Email Security\/Gateway","category_1":"Network Security"},{"product_id":"408","product_name":"FortiManager","description":"Centralized Management Platform.As the cloud and IoT force networks to evolve, organizations struggle to keep ahead. Too many solutions with varying management tools strain already overworked security teams. A new approach is needed to short-circuit this challenge, one that combines the perspective of both operations and security. FortiManager is the NOC-SOC operations tool that was built with security perspective. It provides a single-pane-of-glass across the entire Fortinet Security Fabric.","hyperlink":"https:\/\/www.fortinet.com\/products\/management\/fortimanager.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Fortinet","region":"","solutions_practice":"","sub_category_1":"Management","category_1":"Security Intelligence"},{"product_id":"409","product_name":"FortiSandbox","description":"Advanced Threat Prevention System","hyperlink":"https:\/\/www.fortinet.com\/products\/sandbox\/fortisandbox.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Fortinet","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"Sandboxing and APT Protection"},{"product_id":"410","product_name":"FortiSIEM","description":"FortiSIEM provides organizations of all sizes with a comprehensive, and scalable solution to monitor IT and security systems, from IoT to the cloud.","hyperlink":"https:\/\/www.fortinet.com\/products\/siem\/fortisiem.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Fortinet","region":"","solutions_practice":"","category_1":"Security Intelligence","sub_category_1":"SIEM"},{"product_id":"411","product_name":"FortiToken","description":"Establishing identity through secure authentication is important for implementing an effective security policy. Many of today\u2019s most damaging security breaches have been due to users being provided with inappropriate levels of access, or worse\u2014compromised static passwords.","hyperlink":"https:\/\/www.fortinet.com\/products\/identity-access-management.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Fortinet","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"MultiFactor and Advanced Authentication"},{"product_id":"412","product_name":"FortiWeb","description":"Web Application Firewall. Unprotected web applications are the easiest point of entry for hackers and vulnerable to a number of attack types. FortiWeb\u2019s AI-enhanced and multi-layered approach protects your web apps from the OWASP Top 10 and more. When combined with our Web Application Security Service from FortiGuard Labs you\u2019re protected from the latest application vulnerabilities, bots, and suspicious URLs, and with dual machine learning detection engines your applications are safe from sophisticated threats such as SQL injection, cross-site scripting, buffer overflows, cookie poisoning, malicious sources, and DoS attacks.","hyperlink":"https:\/\/www.fortinet.com\/products\/web-application-firewall\/fortiweb.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Fortinet","region":"","solutions_practice":"","sub_category_1":"Web Application Firewall","category_1":"Web Security"},{"product_id":"413","product_name":"FortiWLC\/WLM","description":"Some wireless deployments require high mobility with high performance and the Fortinet Wireless Controller can provide enterprise-class Wi-Fi to deliver this in large and high-density environments.The Controller and Management platforms are available as appliances or as virtual machines, and when combined with enterprise-class 802.11ac Wave 2 access points, the controllers deliver seamless mobility, quick deployment, and easy capacity expansion with radio frequency virtualization.","hyperlink":"https:\/\/www.fortinet.com\/products\/secure-wifi\/wifi-controllers.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Fortinet","region":"","solutions_practice":"","sub_category_2":"Management","category_1":"Network Security","category_2":"Security Intelligence","sub_category_1":"Wireless Security"},{"product_id":"414","product_name":"Secure Web Gateway - SWG","description":"SWG protects against web attacks with URL filtering, visibility and control of encrypted web traffic via SSL inspection, and application of granular web application policies.","hyperlink":"https:\/\/www.fortinet.com\/products\/secure-web-gateway.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Fortinet","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"URL Filtering\/Web Gateway"},{"product_id":"415","product_name":"FortiSIEM- MSSP Licensing","description":"Accelerate your MSSP offerings with Pay-As-You-\u201cGrow\u201d\nLicensing from Fortinet. FortiSIEM-MSSP\nLicensing starts with an annual Program Fee that provides\na FortiSIEM-MSSP license. This license allows you to\nonboard customers and be billed only for what you use.","hyperlink":"","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"29","service_tiering":"Tiered Volume Discounting, All-Inclusive Per-Device Pricing, UNLIMITED EPS","partner_benefits":" \u2022 Low cost of entry: Minimal up-front investment ($4175 list) means you grow at your pace, while keeping costs aligned with revenue.<\/p>\n \u2022 Predictable Costs: Billing is based on managed devices, so there is no need to account for unknown EPS or ingest rates. Since devices can be added and removed at any time, there are no complex license processes to burden your business.<\/p>\n \u2022 All-Inclusive Licensing: Fortinet\u2019s Indicators Of Compromise (IOC) Service is included to protect your customers using the most current threat intelligence. Optional Advanced Agents for Windows & Linux provide additional monitoring capabilities. To simplify billing, maintenance and support is included with every license.<\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 Correlation of security events and device availability catch security incidents earlier than traditional log-only tools<\/p>\n \u2022 Embedded CMDB provides an up-to-date inventory ofcustomer assets<\/p>\n \u2022 Device health and availability monitoring eliminates the need for a separate tool<\/p>\n \u2022 Business Services monitors end-user experience by monitoring assets that are used to deliver that business application<\/p>\n \u2022 Advanced Agents for Windows & Linux provide additional capabilities including file integrity monitoring and registry change notification (Windows only)<\/p>\n \u2022 Please see the FortiSIEM datasheet for a complete list of features<\/p>","mssp_available":"0","org_id":"1","vendor_name":"Fortinet","region":"","solutions_practice":"","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","category_2":"Managed Security Service","category_1":"Security Intelligence"},{"product_id":"416","product_name":"FortiSIEM-as-a-Service","description":"Tech Data has partnered with StratoZen to offer SIEM-as-a-Service\u2013 a turnkey, multi-tenant SIEM environment, hosted and maintained by StratoZen and powered by Fortinet\u2019s FortiSIEM. All FortiSIEM licensing, high-availability hosting, ongoing maintenance, and user administration for the FortiSIEM console is included with easy pay-as-you-grow monthly pricing.","hyperlink":"","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"29","service_tiering":"Monthly consumption-based subscription model","partner_benefits":" \u2022 SaaS-delivered SIEM solution that is hosted and maintained by Tech Data\u2019s RECON SOC partner, StratoZen. <\/p>\n \u2022 No software to buy, no infrastructure to build. <\/p>\n \u2022 Simple pay-as-you-grow pricing <\/p>\n \u2022 Monthly per-device pricing. Start with as few as 10 managed devices per end user, simply pay for the devices you manage each month.<\/p>","typeof_service":" Managed Security Services Turn-Key Solution: People, Processes and Technology (An MSP can plug this solution into their offerings without much effort or investment)<\/p>","end_user_benefits":" \u2022 24x7x365 Monitoring and Alerting <\/p>\n \u2022 <\/span> Constant monitoring using advanced log correlation, contextual analytics, big data analysis, and StratoZen\u2019s custom-tuned rule database. <\/p>\n \u2022 Access to Customized, Browser-Based Management Portal <\/p>\n \u2022 Additional features such as Replication to Secondary Datacenter, Data & System Backup Management, System Upgrades, Role-Based Access Control Management, Collector Registration & Configuration, StratoZen\u2019s Proprietary Pre-Tuned Rules Matrix, Customized Rules for Each Organization.<\/p>","mssp_available":"0","org_id":"1","vendor_name":"Fortinet","region":"","solutions_practice":"","category_2":"Managed Security Service","category_1":"Security Intelligence","sub_category_1":"Turn-Key Solution","sub_category_2":"Turn-Key Solution"},{"product_id":"417","product_name":"Fortinet Hardware-as-a-Service Program","description":"Fortinet and Tech Data have partnered to provide advanced, security-focused technologies and threat intelligence tailored to broaden your security service portfolio all while being delivered under a monthly recurring procurement model.","hyperlink":"","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"29","service_tiering":"Flexible quarter or monthly billing","partner_benefits":" \u2022 Low barrier to entry enables you to create valuable Managed Security Services offerings and accelerate your Managed Security Services practice. <\/p>\n \u2022 Ability to deliver an OPEX procurement model to conserve capital. <\/p>\n \u2022 Ability to offer flexible, monthly billing. <\/p>\n \u2022 Ability for you to layer on additional Managed Services such as SD-WAN (included feature), FortiSIEM, FortiSandbox, etc.<\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 NGFW with built-in SD-WAN capabilities delivering high-speed application performance while reducing cost.<\/p>\n \u2022 Enterprise protection featuring NGFW Application Control and IPS, Web Filtering, FortiSandbox Cloud, Antivirus, Mobile Security, IP Reputation & Antibotnet, Antispam, CASB, Industrial Security, Security Rating, Virus Outbreak Protection Service, Content Disarm & Reconstruction, and core FortiCare security services.<\/p>","mssp_available":"0","org_id":"1","vendor_name":"Fortinet","region":"","solutions_practice":"","sub_category_6":"Building Block Solution","sub_category_7":"Building Block Solution","sub_category_8":"Building Block Solution","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","sub_category_3":"Building Block Solution","sub_category_4":"Building Block Solution","sub_category_5":"Building Block Solution","category_3":"Cloud Security","category_2":"Endpoint Security","category_6":"Identity and Access","category_1":"Managed Security Service","category_7":"Mobile Security","category_8":"Network Security","category_4":"Security Intelligence","category_5":"Web Security"},{"product_id":"418","product_name":"Fortinet Information Security Awareness and Training Service","description":"The service\u2019s training course was researched and developed by Fortinet\u2019s NSE Training Institute, a world-class team of cybersecurity experts. The awareness components were created to complement the training and keep information security top of mind. \nEducate your workforce about today\u2019s cyber threats, such as phishing, social engineering, and ransomware attacks, and how to protect against them. The awareness and training service is suitable for your entire workforce, from technical to non-technical employees and contractors.","hyperlink":"https:\/\/www.fortinet.com\/training\/infosec-awareness","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Fortinet","region":"","solutions_practice":"","sub_category_1":"Security Awareness Training","category_1":"Security Strategy"},{"product_id":"419","product_name":"FortiADC","description":"Fast layer 4, layer 7, and SSL throughput. All app delivery and security features needed in single solution","hyperlink":"https:\/\/www.fortinet.com\/products\/application-delivery-controller\/fortiadc.html","td_contact":"uspmfortinet@techdata.com","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Fortinet","region":"","solutions_practice":"","sub_category_1":"Web Application Firewall","category_1":"Web Security"},{"product_id":"420","product_name":"FortiAnalyzer","description":"Centralized Loggingand Reporting solution.Fabric-based visibility reduces analysis complexity. Fabric Security Ratings assess how secure you are.Lack of visibility continues to extend breach and compromise events to an average of more than 100 days. For each day an organization is exposed, it\u2019s another opportunity for attackers to get to sensitive customer and confidential information.FortiAnalyzer is the NOC-SOC security analysis tool built with operations perspective. With action-oriented views and deep drill-down capabilities, FortiAnalyzer not only gives organizations critical insight into threats, but also accurately scopes risk across the attack surface, pinpointing where immediate response is required.","hyperlink":"https:\/\/www.fortinet.com\/products\/management\/fortianalyzer.html","td_contact":"uspmfortinet@techdata.com","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Fortinet","region":"","solutions_practice":"","sub_category_1":"Log Management","category_1":"Security Intelligence"},{"product_id":"421","product_name":"FortiAP","description":"Wireless Access Point. Highest Performing Access Points with the latest 802.11ac Wave 2 standard. Most secure Wi-Fi with UTM services integrated in the Access Points","hyperlink":"https:\/\/www.fortinet.com\/products\/secure-wifi\/access-points.html","td_contact":"uspmfortinet@techdata.com","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Fortinet","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"Wireless Security"},{"product_id":"422","product_name":"FortiAuthenticator","description":"User Identity Management Server. Offers a centralized user identity management solution that simplifies administration and the end user experience. Single Sign On capabilities for both internal and cloud networks","hyperlink":"https:\/\/www.fortinet.com\/products\/identity-access-management\/fortiauthenticator.html","td_contact":"uspmfortinet@techdata.com","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Fortinet","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"MultiFactor and Advanced Authentication"},{"product_id":"423","product_name":"FortiCASB","description":"Visibility and Control for SaaS Applications. On-demand scanning of data stored in cloud.User analytics and monitoring.Organizations are increasingly turning to SaaS applications for the agility and savings, but find that they don't have the visibility and control they require.\n\nFortiCASB is a cloud-native Cloud Access Security Broker (CASB) subscription service that is designed to provide visibility, compliance, data security, and threat protection for cloud-based services being used by an organization. With support for major SaaS service providers, FortiCASB provides insights into users, behaviors, and data stored in the cloud with comprehensive reporting tools. It also includes advanced controls to extend security policies from within the network perimeter to SaaS applications.","hyperlink":"https:\/\/www.fortinet.com\/products\/cloud-access-security-broker.html","td_contact":"uspmfortinet@techdata.com","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Fortinet","region":"","solutions_practice":"","sub_category_1":"CASB","category_1":"Cloud Security"},{"product_id":"424","product_name":"FortiClient","description":"Advanced Endpoint Protection.Endpoints are frequently the target of initial compromise or attacks. One recent study found that 30% of breaches involved malware being installed on endpoints. FortiClient strengthens endpoint security through integrated visibility, control, and proactive defense. With the ability to discover, monitor, and assess endpoint risks, you can ensure endpoint compliance, mitigate risks, and reduce exposure. FortiClient proactively defends against advanced attacks. Its tight integration with the Security Fabric enables policy-based automation to contain threats and control outbreaks. FortiClient is compatible with Fabric-Ready partners to further strengthen enterprises\u2019 security posture.","hyperlink":"https:\/\/www.fortinet.com\/products\/endpoint-security\/forticlient.html","td_contact":"uspmfortinet@techdata.com","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Fortinet","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security","category_2":"Mobile Security","sub_category_2":"Mobility Security"},{"product_id":"425","product_name":"FortiCloud","description":"FortiCloud can help with your security and wireless challenges in a number of ways. Our solution addresses common IT difficulties including time-consuming provisioning, high investment costs, complex management, vulnerability to advanced threats, and the need to easily scale with growth.","hyperlink":"https:\/\/www.fortinet.com\/solutions\/enterprise-midsize-business\/cloud-security.html","td_contact":"uspmfortinet@techdata.com","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Fortinet","region":"","solutions_practice":"","category_1":"Cloud Security","sub_category_1":"Other"},{"product_id":"426","product_name":"FortiDDOS","description":"Hardware Accelerated DDOS Mitigator. Distributed Denial of Service (DDoS) attacks are ever-evolving and use a variety of technologies. To successfully combat these attacks, you need a dynamic, multi-layered security solution. FortiDDoS protects from both known and zero day attacks with very low latency. It\u2019s easy to deploy and manage, and includes comprehensive reporting and analysis tools.","hyperlink":"https:\/\/www.fortinet.com\/products\/ddos\/fortiddos.html","td_contact":"uspmfortinet@techdata.com","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Fortinet","region":"","solutions_practice":"","sub_category_1":"DoS and DDoS","category_1":"Network Security"},{"product_id":"427","product_name":"FortiExtender","description":"Establishing and maintaining Internet connectivity can be a critical requirement for business execution. To provide a secondary WAN connection, the FortiExtender appliance uses LTE connectivity with the cellular phone infrastructure to provide broadband speeds that can be used in a failover or load-balancing configuration. And for those locations without wired broadband options, FortiExtender can provide the primary Internet connection.","hyperlink":"https:\/\/www.fortinet.com\/products\/wireless-lan-fortiextender.html","td_contact":"uspmfortinet@techdata.com","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Fortinet","region":"","solutions_practice":"","sub_category_1":"Backup, Restore, and Recovery","category_1":"Data Security","sub_category_2":"Internet Resiliency","category_2":"Network Security"},{"product_id":"428","product_name":"FortiExtender - Cloud","description":"Deploy, manage and optimize your LTE modem network with an easy to use, browser-based FortiExtender Cloud. This hosted service enables the management of an unlimited number of FortiExtender Appliances from anywhere you can connect to the Internet. With both free and paid service levels, FortiExtender Cloud offers inventory management, device configuration, carrier data consumption, and more for devices that can be spread around the country or around the world.","hyperlink":"https:\/\/www.fortinet.com\/products\/fortiextender-cloud.html","td_contact":"uspmfortinet@techdata.com","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Fortinet","region":"","solutions_practice":"","sub_category_1":"Management","category_1":"Security Intelligence"},{"product_id":"429","product_name":"FortiGate","description":"FortiGate is a market leading, high performance next-generation firewall that delivers advanced protection for north-south and east-west traffic in data centers, at the network edge and in the cloud.","hyperlink":"https:\/\/www.fortinet.com\/solutions\/enterprise-midsize-business\/private-cloud-security-sdn.html","td_contact":"uspmfortinet@techdata.com","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Fortinet","region":"","solutions_practice":"","sub_category_3":"Advanced Malware Protection","sub_category_2":"Building Block Solution","category_5":"Cloud Security","sub_category_1":"Gateway Firewall\/UTM","sub_category_4":"Intrusion Detection and Prevention","category_1":"Network Security","category_2":"Network Security","category_3":"Network Security","category_4":"Network Security","sub_category_5":"Other"},{"product_id":"430","product_name":"FortiMail","description":"Messaging Security Server.According to analysts, email security solutions from multi-product vendors have lagged behind changes in the threat landscape and email threats bypass traditional threat prevention technologies. As a result, they recommend assessing the advanced threat defense capabilities of incumbent email security solutions, supplementing them or replacing them to fill gaps. In fact, according to Verizon\u2019s 2017 Data Breach Investigations Report, two-thirds of all malware leading to security incidents are initially delivered via email. That\u2019s why you need the powerful protection of FortiMail, as a high performance physical or virtual appliance in your data center, to help secure the dynamic enterprise attack surface with your Fortinet Security Fabric.","hyperlink":"https:\/\/www.fortinet.com\/products\/email-security\/fortimail.html","td_contact":"uspmfortinet@techdata.com","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Fortinet","region":"","solutions_practice":"","sub_category_1":"Email Security\/Gateway","category_1":"Network Security"},{"product_id":"431","product_name":"FortiManager","description":"Centralized Management Platform.As the cloud and IoT force networks to evolve, organizations struggle to keep ahead. Too many solutions with varying management tools strain already overworked security teams. A new approach is needed to short-circuit this challenge, one that combines the perspective of both operations and security. FortiManager is the NOC-SOC operations tool that was built with security perspective. It provides a single-pane-of-glass across the entire Fortinet Security Fabric.","hyperlink":"https:\/\/www.fortinet.com\/products\/management\/fortimanager.html","td_contact":"uspmfortinet@techdata.com","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Fortinet","region":"","solutions_practice":"","sub_category_1":"Management","category_1":"Security Intelligence"},{"product_id":"432","product_name":"FortiNAC","description":"Network access control, or NAC, is a zero-trust network access solution that provides users with enhanced visibility into the Internet of Things (IoT) devices on their corporate networks. This technology has been around for nearly two decades, but a new generation of its solutions is helping organizations keep up with today\u2019s ever-expanding attack surface, delivering not only visibility of the network environment, but also enforcement and dynamic policy control. Whether devices are connecting from inside or outside the network, it can automatically respond to compromised devices or anomalous activity. Modern solutions also provide a clear view into network assets to support regulatory certifications and security best practices that require organizations to establish and maintain an accurate inventory of all connected devices\u2014even in virtual environments where assets are constantly connecting and disconnecting from the network. The monitoring and response capabilities are especially critical since many devices open users to additional risk via compromised, poorly written and un-patchable software, unadvertised back doors hardwired into firmware, and other factors.","hyperlink":"https:\/\/www.fortinet.com\/products\/network-access-control","td_contact":"uspmfortinet@techdata.com","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Fortinet","region":"","solutions_practice":""},{"product_id":"433","product_name":"FortiSandbox","description":"Advanced Threat Prevention System","hyperlink":"https:\/\/www.fortinet.com\/products\/sandbox\/fortisandbox.html","td_contact":"uspmfortinet@techdata.com","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Fortinet","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"Sandboxing and APT Protection"},{"product_id":"434","product_name":"FortiSIEM","description":"FortiSIEM provides organizations of all sizes with a comprehensive, and scalable solution to monitor IT and security systems, from IoT to the cloud.","hyperlink":"https:\/\/www.fortinet.com\/products\/siem\/fortisiem.html","td_contact":"uspmfortinet@techdata.com","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Fortinet","region":"","solutions_practice":"","category_1":"Security Intelligence","sub_category_1":"SIEM"},{"product_id":"435","product_name":"FortiToken","description":"Establishing identity through secure authentication is important for implementing an effective security policy. Many of today\u2019s most damaging security breaches have been due to users being provided with inappropriate levels of access, or worse\u2014compromised static passwords.","hyperlink":"https:\/\/www.fortinet.com\/products\/identity-access-management.html","td_contact":"uspmfortinet@techdata.com","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Fortinet","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"MultiFactor and Advanced Authentication"},{"product_id":"436","product_name":"FortiWeb","description":"Web Application Firewall. Unprotected web applications are the easiest point of entry for hackers and vulnerable to a number of attack types. FortiWeb\u2019s AI-enhanced and multi-layered approach protects your web apps from the OWASP Top 10 and more. When combined with our Web Application Security Service from FortiGuard Labs you\u2019re protected from the latest application vulnerabilities, bots, and suspicious URLs, and with dual machine learning detection engines your applications are safe from sophisticated threats such as SQL injection, cross-site scripting, buffer overflows, cookie poisoning, malicious sources, and DoS attacks.","hyperlink":"https:\/\/www.fortinet.com\/products\/web-application-firewall\/fortiweb.html","td_contact":"uspmfortinet@techdata.com","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Fortinet","region":"","solutions_practice":"","sub_category_1":"Web Application Firewall","category_1":"Web Security"},{"product_id":"437","product_name":"FortiWLC\/WLM","description":"Some wireless deployments require high mobility with high performance and the Fortinet Wireless Controller can provide enterprise-class Wi-Fi to deliver this in large and high-density environments.The Controller and Management platforms are available as appliances or as virtual machines, and when combined with enterprise-class 802.11ac Wave 2 access points, the controllers deliver seamless mobility, quick deployment, and easy capacity expansion with radio frequency virtualization.","hyperlink":"https:\/\/www.fortinet.com\/products\/secure-wifi\/wifi-controllers.html","td_contact":"uspmfortinet@techdata.com","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Fortinet","region":"","solutions_practice":"","sub_category_2":"Management","category_1":"Network Security","category_2":"Security Intelligence","sub_category_1":"Wireless Security"},{"product_id":"438","product_name":"Secure Web Gateway - SWG","description":"SWG protects against web attacks with URL filtering, visibility and control of encrypted web traffic via SSL inspection, and application of granular web application policies.","hyperlink":"https:\/\/www.fortinet.com\/products\/secure-web-gateway.html","td_contact":"uspmfortinet@techdata.com","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Fortinet","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"URL Filtering\/Web Gateway"},{"product_id":"439","product_name":"FortiSIEM- MSSP Licensing","description":"Accelerate your MSSP offerings with Pay-As-You-\u201cGrow\u201d\nLicensing from Fortinet. FortiSIEM-MSSP\nLicensing starts with an annual Program Fee that provides\na FortiSIEM-MSSP license. This license allows you to\nonboard customers and be billed only for what you use.","hyperlink":"","td_contact":"uspmfortinet@techdata.com\n(727) 539-7429 x-64216","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"Tiered Volume Discounting, All-Inclusive Per-Device Pricing, UNLIMITED EPS","partner_benefits":" \u2022 Low cost of entry: Minimal up-front investment ($4175 list) means you grow at your pace, while keeping costs aligned with revenue.<\/p>\n \u2022 Predictable Costs: Billing is based on managed devices, so there is no need to account for unknown EPS or ingest rates. Since devices can be added and removed at any time, there are no complex license processes to burden your business.<\/p>\n \u2022 All-Inclusive Licensing: Fortinet\u2019s Indicators Of Compromise (IOC) Service is included to protect your customers using the most current threat intelligence. Optional Advanced Agents for Windows & Linux provide additional monitoring capabilities. To simplify billing, maintenance and support is included with every license.<\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 Correlation of security events and device availability catch security incidents earlier than traditional log-only tools<\/p>\n \u2022 Embedded CMDB provides an up-to-date inventory ofcustomer assets<\/p>\n \u2022 Device health and availability monitoring eliminates the need for a separate tool<\/p>\n \u2022 Business Services monitors end-user experience by monitoring assets that are used to deliver that business application<\/p>\n \u2022 Advanced Agents for Windows & Linux provide additional capabilities including file integrity monitoring and registry change notification (Windows only)<\/p>\n \u2022 Please see the FortiSIEM datasheet for a complete list of features<\/p>","mssp_available":"0","org_id":"1","vendor_name":"Fortinet","region":"","solutions_practice":"","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","category_2":"Managed Security Service","category_1":"Security Intelligence"},{"product_id":"440","product_name":"FortiSIEM-as-a-Service","description":"Tech Data has partnered with StratoZen to offer SIEM-as-a-Service\u2013 a turnkey, multi-tenant SIEM environment, hosted and maintained by StratoZen and powered by Fortinet\u2019s FortiSIEM. All FortiSIEM licensing, high-availability hosting, ongoing maintenance, and user administration for the FortiSIEM console is included with easy pay-as-you-grow monthly pricing.","hyperlink":"","td_contact":"uspmfortinet@techdata.com\n(727) 539-7429 x-64216","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"Monthly consumption-based subscription model","partner_benefits":" \u2022 SaaS-delivered SIEM solution that is hosted and maintained by Tech Data\u2019s RECON SOC partner, StratoZen. <\/p>\n \u2022 No software to buy, no infrastructure to build. <\/p>\n \u2022 Simple pay-as-you-grow pricing <\/p>\n \u2022 Monthly per-device pricing. Start with as few as 10 managed devices per end user, simply pay for the devices you manage each month.<\/p>","typeof_service":" Managed Security Services Turn-Key Solution: People, Processes and Technology (An MSP can plug this solution into their offerings without much effort or investment)<\/p>","end_user_benefits":" \u2022 24x7x365 Monitoring and Alerting <\/p>\n \u2022 <\/span> Constant monitoring using advanced log correlation, contextual analytics, big data analysis, and StratoZen\u2019s custom-tuned rule database. <\/p>\n \u2022 Access to Customized, Browser-Based Management Portal <\/p>\n \u2022 Additional features such as Replication to Secondary Datacenter, Data & System Backup Management, System Upgrades, Role-Based Access Control Management, Collector Registration & Configuration, StratoZen\u2019s Proprietary Pre-Tuned Rules Matrix, Customized Rules for Each Organization.<\/p>","mssp_available":"0","org_id":"1","vendor_name":"Fortinet","region":"","solutions_practice":"","category_2":"Managed Security Service","category_1":"Security Intelligence","sub_category_1":"Turn-Key Solution","sub_category_2":"Turn-Key Solution"},{"product_id":"441","product_name":"Fortinet Hardware-as-a-Service Program","description":"Fortinet and Tech Data have partnered to provide advanced, security-focused technologies and threat intelligence tailored to broaden your security service portfolio all while being delivered under a monthly recurring procurement model.","hyperlink":"","td_contact":"uspmfortinet@techdata.com\n(727) 539-7429 x-64216","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"Flexible quarter or monthly billing","partner_benefits":" \u2022 Low barrier to entry enables you to create valuable Managed Security Services offerings and accelerate your Managed Security Services practice. <\/p>\n \u2022 Ability to deliver an OPEX procurement model to conserve capital. <\/p>\n \u2022 Ability to offer flexible, monthly billing. <\/p>\n \u2022 Ability for you to layer on additional Managed Services such as SD-WAN (included feature), FortiSIEM, FortiSandbox, etc.<\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 NGFW with built-in SD-WAN capabilities delivering high-speed application performance while reducing cost.<\/p>\n \u2022 Enterprise protection featuring NGFW Application Control and IPS, Web Filtering, FortiSandbox Cloud, Antivirus, Mobile Security, IP Reputation & Antibotnet, Antispam, CASB, Industrial Security, Security Rating, Virus Outbreak Protection Service, Content Disarm & Reconstruction, and core FortiCare security services.<\/p>","mssp_available":"0","org_id":"1","vendor_name":"Fortinet","region":"","solutions_practice":"","sub_category_6":"Building Block Solution","sub_category_7":"Building Block Solution","sub_category_8":"Building Block Solution","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","sub_category_3":"Building Block Solution","sub_category_4":"Building Block Solution","sub_category_5":"Building Block Solution","category_3":"Cloud Security","category_2":"Endpoint Security","category_6":"Identity and Access","category_1":"Managed Security Service","category_7":"Mobile Security","category_8":"Network Security","category_4":"Security Intelligence","category_5":"Web Security"},{"product_id":"442","product_name":"Fortinet Information Security Awareness and Training Service","description":"The service\u2019s training course was researched and developed by Fortinet\u2019s NSE Training Institute, a world-class team of cybersecurity experts. The awareness components were created to complement the training and keep information security top of mind. \nEducate your workforce about today\u2019s cyber threats, such as phishing, social engineering, and ransomware attacks, and how to protect against them. The awareness and training service is suitable for your entire workforce, from technical to non-technical employees and contractors.","hyperlink":"https:\/\/www.fortinet.com\/training\/infosec-awareness","td_contact":"uspmfortinet@techdata.com\n(727) 539-7429 x-64216","td_extension":"800-237-8931 x5545031","vendor_id":"29","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Fortinet","region":"","solutions_practice":"","sub_category_1":"Security Awareness Training","category_1":"Security Strategy"},{"product_id":"443","product_name":"F-Secure Anti-Virus","description":"Virus and malware protection for PC","hyperlink":"https:\/\/www.f-secure.com\/en_US\/web\/home_us\/anti-virus","td_contact":"fsecure@techdata.com","td_extension":"(480) 643-5064","vendor_id":"30","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"F-Secure","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"444","product_name":"F\u2011Secure FREEDOME VPN","description":"Browse the internet anonymously and securely","hyperlink":"https:\/\/www.f-secure.com\/en_US\/web\/home_us\/freedome","td_contact":"fsecure@techdata.com","td_extension":"(480) 643-5064","vendor_id":"30","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"F-Secure","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"VPN"},{"product_id":"445","product_name":"F\u2011Secure Internet Security","description":"Advanced protection for PC","hyperlink":"https:\/\/www.f-secure.com\/en_US\/web\/home_us\/internet-security","td_contact":"fsecure@techdata.com","td_extension":"(480) 643-5064","vendor_id":"30","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"F-Secure","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"446","product_name":"F-Secure KEY","description":"The ultimate password manager","hyperlink":"https:\/\/www.f-secure.com\/en_US\/web\/home_us\/key","td_contact":"fsecure@techdata.com","td_extension":"(480) 643-5064","vendor_id":"30","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"F-Secure","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Other"},{"product_id":"447","product_name":"F\u2011Secure SAFE","description":"Internet security for PCs, Macs, smart\u00adphones and tablets","hyperlink":"https:\/\/www.f-secure.com\/en_US\/web\/home_us\/safe","td_contact":"fsecure@techdata.com","td_extension":"(480) 643-5064","vendor_id":"30","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"F-Secure","region":"","solutions_practice":"","category_1":"Mobile Security","sub_category_1":"Mobility Security"},{"product_id":"448","product_name":"F-Secure SENSE","description":"F-Secure SENSE is a secure and elegant WiFi router that secures every device in your home from online threats. Protecting your entire home network as well as your devices on the go, it is the only internet security you need.","hyperlink":"https:\/\/www.f-secure.com\/en_US\/web\/home_us\/sense","td_contact":"fsecure@techdata.com","td_extension":"(480) 643-5064","vendor_id":"30","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"F-Secure","region":"","solutions_practice":"","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security"},{"product_id":"449","product_name":"F-Secure TOTAL","description":"Internet security and VPN for all devices","hyperlink":"https:\/\/www.f-secure.com\/en_US\/web\/home_us\/total","td_contact":"fsecure@techdata.com","td_extension":"(480) 643-5064","vendor_id":"30","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"F-Secure","region":"","solutions_practice":"","sub_category_2":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security","category_2":"Endpoint Security","sub_category_1":"VPN"},{"product_id":"450","product_name":"Identity & Access Management","description":"Gemalto's identity and access management (IAM) solutions allow organizations to meet the evolving needs around cloud applications and mobile devices by enabling secure access to online resources and protecting the digital interactions of employees, partners, and customers with market-leading strong authentication and digital signing pr oducts.","hyperlink":"https:\/\/www.gemalto.com\/enterprise-security\/identity-access-management","td_contact":"","td_extension":"","vendor_id":"31","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Gemalto","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"Wireless & Access Management"},{"product_id":"451","product_name":"Enterprise Encryption","description":"To reduce the\u00a0risk posed by\u00a0hackers, insider threats, and other malicious attacks, your organization must utilize encryption to protect sensitive data wherever it is found across your on-premises, virtual, public cloud, and hybrid environments. This includes data at rest in application and web servers, file servers, databases, and network attached storage, as well as data in motion across your network.\u00a0","hyperlink":"https:\/\/www.gemalto.com\/enterprise-security\/enterprise-data-encryption","td_contact":"","td_extension":"","vendor_id":"31","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Gemalto","region":"","solutions_practice":"","category_1":"Data Security","sub_category_1":"Endpoint Encryption"},{"product_id":"452","product_name":"Crypto Management","description":"When\u00a0encryption\u00a0is used, the risk is transferred from the data itself to the cryptographic keys. The ability to securely manage, store, and use keys is essential. With a copy of the private key an attacker could decrypt data, create fraudule nt identities, and generate certificates at will.\u00a0 Deploying a high-assurance crypto management platform is the best way to protect your cryptographic keys. This approach is built on a foundation of strong keys, enterprise key management, centralized crypto resource management, and the use of a hardware root of trust.","hyperlink":"","td_contact":"","td_extension":"","vendor_id":"31","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Gemalto","region":"","solutions_practice":"","category_1":"Data Security","sub_category_1":"Encyption Key Management"},{"product_id":"453","product_name":"Cloud Security","description":"The cloud is helping your business move forward, faster. But this digital transformation doesn\u2019t come without risk. Wherever your data goes, from public, private, hybrid, or virtual cloud environments, you need to know that it will remain secure and your business will be compliant.\u00a0\u00a0Gemalto offers a comprehensive portfolio of identity and access management and data protection solutions that ensure you are the only one who controls access and keys to your data - especially across multi-tenant, geographically distributed sites.","hyperlink":"https:\/\/www.gemalto.com\/enterprise-security\/cloud-security","td_contact":"","td_extension":"","vendor_id":"31","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Gemalto","region":"","solutions_practice":"","category_1":"Cloud Security","category_2":"Identity and Access","sub_category_1":"Other","sub_category_2":"Wireless & Access Management"},{"product_id":"454","product_name":"dSecure:Mobile","description":"Every business is mobile now. Everyone has a mobile device (or two or three\u2026) and your business information is moving through the wireless world. dSecure:Mobile \u2013 Our Mobile applications provide ultra-secure technology to ensure your voice, text message conversations, your attachments (photos, videos, etc.), chats and email are securely exchanged using Protected Mobility\u2019s FIPS-140-2 certified encryption technologies.","hyperlink":"https:\/\/www.globalintegrity.com\/","td_contact":"globalintegrity@techdata.com","td_extension":"","vendor_id":"32","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Global Integrity","region":"","solutions_practice":"","category_1":"Mobile Security","sub_category_1":"Mobility Security"},{"product_id":"455","product_name":"dSecure:Office","description":"dSecure:Office is the ultimate solution for protecting your business documents and e-mail communications and is fully integrated into the Microsoft Office product suite. Effortlessly send and receive encrypted messages and documents using Microsoft Outlook. There\u2019s a reason encrypted e-mail does not work; it\u2019s just too difficult for mere mortals to use effectively. With dSecure, the hassle and headache of dealing with encrypted communication is all managed for you.","hyperlink":"https:\/\/www.globalintegrity.com\/","td_contact":"globalintegrity@techdata.com","td_extension":"","vendor_id":"32","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Global Integrity","region":"","solutions_practice":"","category_1":"Data Security","sub_category_1":"File, Folder and\/or Email Encryption"},{"product_id":"456","product_name":"Next-Generation Firewalls (NGFW)","description":"Comprehensive Network Security with Advanced Firewall Features","hyperlink":"https:\/\/www.hillstonenet.com\/products\/next-gen-firewalls-e-series\/","td_contact":"eduardo.araujo@techdata.com","td_extension":"55-11-31912870 x-5222870","vendor_id":"33","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Hillstone Networks","region":"","solutions_practice":"","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security"},{"product_id":"457","product_name":"Network Intrusion Prevention System (NIPS)","description":"Unparalleled Threat Protection Without Performance Compromise","hyperlink":"https:\/\/www.hillstonenet.com\/products\/network-intrusion-prevention-system-s-series\/","td_contact":"eduardo.araujo@techdata.com","td_extension":"55-11-31912870 x-5222870","vendor_id":"33","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Hillstone Networks","region":"","solutions_practice":"","sub_category_1":"Intrusion Detection and Prevention","category_1":"Network Security"},{"product_id":"458","product_name":"Intelligent Next-Generation Firewalls (iNGFW)","description":"Defend Advanced Threats and Continually Monitor your Network","hyperlink":"https:\/\/www.hillstonenet.com\/products\/intelligent-next-gen-firewalls-t-series\/","td_contact":"eduardo.araujo@techdata.com","td_extension":"55-11-31912870 x-5222870","vendor_id":"33","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Hillstone Networks","region":"","solutions_practice":"","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security"},{"product_id":"459","product_name":"Server Breach Detection System (sBDS)","description":"Post-Breach Detection to Protect Critical Servers from Advanced Threats","hyperlink":"https:\/\/www.hillstonenet.com\/products\/hillstone-breach-detection-system-i-series\/","td_contact":"eduardo.araujo@techdata.com","td_extension":"55-11-31912870 x-5222870","vendor_id":"33","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Hillstone Networks","region":"","solutions_practice":"","sub_category_1":"Intrusion Detection and Prevention","category_1":"Network Security"},{"product_id":"460","product_name":"Data Center Next-Generation Firewalls","description":"Designed for the Unique Requirements of a Data Center","hyperlink":"https:\/\/www.hillstonenet.com\/products\/datacenter-next-gen-firewalls-x-series\/","td_contact":"eduardo.araujo@techdata.com","td_extension":"55-11-31912870 x-5222870","vendor_id":"33","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Hillstone Networks","region":"","solutions_practice":"","sub_category_1":"Data Center Protection","category_1":"Network Security"},{"product_id":"461","product_name":"Hillstone CloudHive","description":"Micro-Segmentation Solution for Virtualized Data Centers","hyperlink":"https:\/\/www.hillstonenet.com\/products\/hillstone-cloudhive\/","td_contact":"eduardo.araujo@techdata.com","td_extension":"55-11-31912870 x-5222870","vendor_id":"33","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Hillstone Networks","region":"","solutions_practice":"","category_1":"Cloud Security","sub_category_1":"Other"},{"product_id":"462","product_name":"Hillstone CloudEdge","description":"Advanced Security Services for Virtual Networks and Applications","hyperlink":"https:\/\/www.hillstonenet.com\/products\/hillstone-cloudedge\/","td_contact":"eduardo.araujo@techdata.com","td_extension":"55-11-31912870 x-5222870","vendor_id":"33","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Hillstone Networks","region":"","solutions_practice":"","category_1":"Cloud Security","sub_category_1":"Other"},{"product_id":"463","product_name":"Hillstone CloudView","description":"Cloud-Based Security Management and Analytics Platform","hyperlink":"https:\/\/www.hillstonenet.com\/products\/hillstone-cloudview\/","td_contact":"eduardo.araujo@techdata.com","td_extension":"55-11-31912870 x-5222870","vendor_id":"33","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Hillstone Networks","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"Security Management"},{"product_id":"464","product_name":"Hillstone Security Management Platform","description":"Centralized Security Management, Configuration and Monitoring Solution","hyperlink":"https:\/\/www.hillstonenet.com\/products\/hillstone-security-management-platform\/","td_contact":"eduardo.araujo@techdata.com","td_extension":"55-11-31912870 x-5222870","vendor_id":"33","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Hillstone Networks","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"Security Management"},{"product_id":"465","product_name":"Hillstone Security Audit Platform (HSA)","description":"Centralized log retention and high-speed retrieval","hyperlink":"https:\/\/www.hillstonenet.com\/products\/hillstone-security-audit-platform\/","td_contact":"eduardo.araujo@techdata.com","td_extension":"55-11-31912870 x-5222870","vendor_id":"33","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Hillstone Networks","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"Security Management"},{"product_id":"466","product_name":"Secure SD-WAN Solution","description":"Helps multi-branch organizations quickly deploy a secure VPN network, anywhere.","hyperlink":"https:\/\/www.hillstonenet.com\/what-we-do\/","td_contact":"eduardo.araujo@techdata.com","td_extension":"55-11-31912870 x-5222870","vendor_id":"33","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Hillstone Networks","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"Security Management"},{"product_id":"467","product_name":"HP Sure Click Enterprise","description":" Protection that doesn't rely on detection. The HP Sure Click Enterprise software solution for endpoint security helps stop known and unknown threats, regardless of whether they are detectable, through hardware-enforced isolation of email attachments and browsing activity without impact to the user's experience or the way they access their data.<\/p>\n HP Sure Click Enterprise integrates: 1) government-grade, hardware-enforced malware isolation and containment software, along with 2) full customization of security policies by user role, for organizations with a more mature security posture, plus 3) actionable insights and threat intelligence from certified cybersecurity experts.<\/p>","hyperlink":"https:\/\/www8.hp.com\/us\/en\/solutions\/sure-click-enterprise.html","td_contact":"hpincservices@techdata.com","td_extension":"(727) 539-7429 ext. 5584222","vendor_id":"34","service_tiering":"No Service Tiering","partner_benefits":" • HP has taken a holistic approach to our service offerings by starting at the hardware level and enhancing our portfolio with end-to-end solutions.<\/p>\n • <\/span>We have – and continue – to enable our services for partner delivery that best complements what you are currently offering.<\/p>\n • We are providing you and your team with our tools, methodologies and resources that will assist you in driving revenue growth, such as security intelligence and dashboards, self-paced training, and easy integration with your current systems (ITSM, SIEM). <\/p>\n • We’ve implemented robust compensation and partner certification programs that open special opportunities of partnering and selling our services portfolio.<\/p>\n • With HP Proactive Security, you, our partners can:<\/p>\n - Broaden your product and solutions portfolio – risk free. HP Sure Click Enterprise has no minimum commitment for partners and provides an opportunity to instantly start or expand your security practice in a way that’s low cost, low investment and low risk. <\/p>\n - With HP you can build your security practice - HP works with you. And you can leverage HP’s global infrastructure and security expertise to develop your security services. All with simple deployment, no server infrastructure costs and no long-term contracts.<\/p>\n - Differentiate your security offerings with a protection-first endpoint security solution that provides government-grade security in real-time and detailed threat intelligence -- truly protecting your customers against zero-day threats.<\/p>\n - Deepen customer relationships and build customer loyalty by being the one-stop-shop for all of your customer’s IT needs, providing them with the “peace of mind” of knowing they are protected from cyberthreats.<\/p>","typeof_service":"Managed Security Service Turn-Key Solution: People, Processes and Technology (An MSP can plug this solution into their offerings without much effort or investment) and\/or Managed Security Service Building Block Solution: Component used by partner to build a Monthly Recurring Revenue (MRR) managed service","end_user_benefits":" • Isolate and prevent undetectable threats: HP Sure Click Enterprise helps stop known and unknown threats, regardless of whether they are detectable, through hardware-enforced isolation of email and browsing activity without impact to the user’s experience, or the way they access their data.<\/p>\n • Keep risky clicks contained: Keep risky clicks contained using hardware-enforced micro-virtual machines (micro-VMs) and advanced hypervisor technology to isolate all email attachments, applications and browsers to safeguard a user’s PC, identity, and network.<\/p>\n • Improve user and IT productivity: HP Sure Click Enterprise helps improve user productivity by eliminating restrictive security policies and inhibiting workflows, while reducing IT time and spend by providing actionable dashboards and reports to speed and simplify threat analysis.<\/p>\n • Enterprise-class service and support: Ideal for government and enterprise with more mature security operations, HP Sure Click Enterprise offers simple deployment and advanced, defense-grade threat intelligence with no additional on-premise infrastructure or software purchase required.<\/p>","mssp_available":"0","org_id":"1","vendor_name":"HP Inc. <\/span>NEW!","region":"","solutions_practice":"","sub_category_1":"Advanced Malware Protection","sub_category_7":"Building Block Solution","sub_category_2":"Building Block Solution","sub_category_4":"Critical System Protection\/Application Whitelisting","sub_category_5":"Endpoint Anti-Virus\/Anti-Malware","category_6":"Endpoint Security","category_1":"Endpoint Security","category_2":"Endpoint Security","category_3":"Endpoint Security","category_4":"Endpoint Security","category_5":"Endpoint Security","sub_category_6":"Endpoint Security Management","category_7":"Managed Security Service","category_8":"Managed Security Service","sub_category_8":"Turn-Key Solution","sub_category_3":"Turn-Key Solution"},{"product_id":"468","product_name":"HP Proactive Security","description":" The world's most advanced endpoint security service. HP Proactive Security is a protection-first approach to managing endpoint security. It reduces your risk from attacks and gives users the freedom to work securely from anywhere without increasing IT workload. <\/p>\n HP Proactive Security integrates 1) multi-layered, government-grade anti-malware protection combining deep learning and isolation technologies – along with 2) actionable insights and 3) management by cybersecurity experts – delivered as a fully managed service.<\/p>","hyperlink":"http:\/\/www.hp.com\/proactive-security","td_contact":"hpincservices@techdata.com","td_extension":"(727) 539-7429 ext. 5584222","vendor_id":"34","service_tiering":"No Service Tiering","partner_benefits":" • HP has taken a holistic approach to our service offerings by starting at the hardware level and enhancing our portfolio with end-to-end solutions.<\/p>\n • We have – and continue – to enable our services for partner delivery that best complements what you are currently offering.<\/p>\n • We are providing you and your team with our tools, methodologies and resources that will assist you in driving revenue growth, such as security intelligence and dashboards, self-paced training, and easy integration with your current systems (ITSM, SIEM). <\/p>\n • We’ve implemented robust compensation and partner certification programs that open special opportunities of partnering and selling our services portfolio.<\/p>\n • With HP Proactive Security, you, our partners can:<\/p>\n - Broaden your product and solutions portfolio – risk free. HP Proactive Security has no minimum commitment for partners and provides an opportunity for partners to instantly start or expand their security practice in a way that’s low cost, low investment and low risk.<\/p>\n - With HP you can build your security practice - HP works with you. And you can leverage HP’s global infrastructure and security expertise to develop your security services. All with simple deployment, no server infrastructure costs and no long-term contracts.<\/p>\n - Differentiate your security offerings with a compelling managed security service offering that provides advanced government-grade security and insights -- truly protecting your customers against zero-day threats.<\/p>\n - Deepen customer relationships and build customer loyalty by being the one-stop-shop for all of your customer’s IT needs, providing them with the “peace of mind” of knowing they are protected from cyberthreats.<\/p>","typeof_service":"Managed Security Service Turn-Key Solution: People, Processes and Technology (An MSP can plug this solution into their offerings without much effort or investment)","end_user_benefits":" • Take a protection-first approach with real-time, multi-layered defense: Defend against cyberattacks without changing user behavior or increasing IT's workload with HP Proactive Security, a managed solution right-sized for medium businesses that provides proactive protection, reduces your risk, and gives users the freedom to work securely from anywhere.<\/p>\n • Protection You Can Trust: Protect endpoints from cybersecurity threats with multiple layers of proactive protection that use government-grade isolation and advanced deep learning technologies.<\/p>\n • Simplified Security Management: Benefit from an advanced security solution, including actionable insights, without the complexity or need for in-house expertise. And, free up IT to work on strategic projects,instead of chasing false positives and security threats.<\/p>\n • Keep Employees Happy: Empower your employees to work how and where they want with their choice of common productivity tools and applications without the fear of compromising their IT networks.<\/p>","mssp_available":"0","org_id":"1","vendor_name":"HP Inc. <\/span>NEW!","region":"","solutions_practice":"","sub_category_1":"Advanced Malware Protection","sub_category_2":"Critical System Protection\/Application Whitelisting","sub_category_3":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security","category_2":"Endpoint Security","category_3":"Endpoint Security","category_4":"Endpoint Security","category_5":"Endpoint Security","sub_category_4":"Endpoint Security Management","category_6":"Managed Security Service","sub_category_5":"Turn-Key Solution","sub_category_6":"Turn-Key Solution"},{"product_id":"469","product_name":"Guardium","description":"Support your entire data protection journey with the same infrastructure and approach. IBM Security\u00ae Guardium\u00ae helps ensure the security, privacy and integrity of your critical data across a full range of environments\u2014from databases to big data, cloud, file systems and more.","hyperlink":"https:\/\/www.ibm.com\/security\/data-security\/guardium","td_contact":"West: Rick.Marshall@techdata.com\n East: Karen.Bailey@techdata.com<\/p>","td_extension":"West: (480) 254-4420\n East: (678) 642-3446<\/p>","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"IBM","region":"","solutions_practice":"","category_1":"Data Security","category_2":"Data Security","category_3":"Data Security","sub_category_1":"Database Encryption","sub_category_2":"File, Folder and\/or Email Encryption","sub_category_3":"Server Encryption"},{"product_id":"470","product_name":"MaaS360","description":"With IBM\u00ae BigFix\u00ae, IT departments can cut operational costs, compress endpoint management cycles and enforce compliance in real-time.","hyperlink":"https:\/\/www.ibm.com\/security\/mobile\/maas360","td_contact":"West: Rick.Marshall@techdata.com\n East: Karen.Bailey@techdata.com<\/p>","td_extension":"West: (480) 254-4420\n East: (678) 642-3446<\/p>","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"IBM","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Endpoint Security Management","category_2":"Mobile Security","sub_category_2":"Mobility Management"},{"product_id":"471","product_name":"QRadar","description":"The IBM QRadar Security Intelligence Platform, with SIEM at the core, provides security teams with the visibility and analytics needed to quickly and accurately detect, prioritize, investigate and respond to threats across on-premises and cloud-based environments.","hyperlink":"https:\/\/www.ibm.com\/security\/security-intelligence\/qradar","td_contact":"West: Rick.Marshall@techdata.com\n East: Karen.Bailey@techdata.com<\/p>","td_extension":"West: (480) 254-4420\n East: (678) 642-3446<\/p>","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"IBM","region":"","solutions_practice":"","category_1":"Security Intelligence","sub_category_1":"SIEM"},{"product_id":"472","product_name":"Resilient","description":"IBM Resilient Incident Response Platform (IRP) is the leading platform for orchestrating and automating incident response processes. IBM Resilient IRP quickly and easily integrates with your organization\u2019s existing security and IT investments. It makes security alerts instantly actionable, provides valuable intelligence and incident context, and enables adaptive response to complex cyber threats.","hyperlink":"https:\/\/www.ibm.com\/us-en\/marketplace\/resilient-incident-response-platform","td_contact":"West: Rick.Marshall@techdata.com\n East: Karen.Bailey@techdata.com<\/p>","td_extension":"West: (480) 254-4420\n East: (678) 642-3446<\/p>","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"IBM","region":"","solutions_practice":"","sub_category_1":"Incident Response","category_1":"Security Intelligence"},{"product_id":"473","product_name":"Security Directory Suite","description":"IBM Security Directory Suite is a scalable, standards-based identity platform that simplifies identity and directory management. Directory Suite helps collapse identity silos into a single authoritative identity source. This unified identity enables faster and more agile application deployment and improved user experience. Directory Suite also captures user insight for auditing and compliance reporting.","hyperlink":"https:\/\/www.ibm.com\/us-en\/marketplace\/ibm-security-directory-suite","td_contact":"West: Rick.Marshall@techdata.com\n East: Karen.Bailey@techdata.com<\/p>","td_extension":"West: (480) 254-4420\n East: (678) 642-3446<\/p>","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"IBM","region":"","solutions_practice":"","sub_category_2":"Directory Management","category_1":"Identity and Access","category_2":"Identity and Access","sub_category_1":"Identity Governance"},{"product_id":"474","product_name":"Trusteer","description":"IBM\u00ae Trusteer helps organizations seamlessly establish identity trust across the omnichannel customer journey. Through cloud-based intelligence, backed by AI and patented machine learning, Trusteer provides a holistic approach to identifying new and existing customers, without negatively impacting user experience. Over 500 leading organizations rely on Trusteer to help enable and secure their customers\u2019 digital journey and support business growth. In doing so, Trusteer runs over 40 billion application accesses monthly and over 1 billion monthly user sessions.","hyperlink":"https:\/\/www.ibm.com\/security\/fraud-protection\/trusteer","td_contact":"West: Rick.Marshall@techdata.com\n East: Karen.Bailey@techdata.com<\/p>","td_extension":"West: (480) 254-4420\n East: (678) 642-3446<\/p>","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"IBM","region":"","solutions_practice":"","category_2":"Advanced Fraud Security","category_1":"Identity and Access","sub_category_1":"Other","sub_category_2":"Other"},{"product_id":"475","product_name":"X-Force Exchange","description":"Provides a cloud-based threat intelligence sharing platform that enables users to research threats, collaborate with peers and take action","hyperlink":"https:\/\/www.ibm.com\/us-en\/marketplace\/ibm-xforce-exchange","td_contact":"West: Rick.Marshall@techdata.com\n East: Karen.Bailey@techdata.com<\/p>","td_extension":"West: (480) 254-4420\n East: (678) 642-3446<\/p>","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"IBM","region":"","solutions_practice":""},{"product_id":"476","product_name":"Qradar Incident Forensics","description":"IBM\u00ae QRadar\u00ae Incident Forensics allows you to retrace the step-by-step actions of a potential attacker and quickly and easily conduct an in-depth forensics investigation of suspected malicious network security incidents. It reduces the time it takes security teams to investigate QRadar offense records, in many cases from days to hours\u2014or even minutes. It can also help you remediate a network security breach and prevent it from happening again. IBM QRadar Packet Capture appliances are also available to store and manage data if no other network packet capture (PCAP) device is deployed.","hyperlink":"https:\/\/www.ibm.com\/us-en\/marketplace\/ibm-qradar-incident-forensics","td_contact":"West: Rick.Marshall@techdata.com\n East: Karen.Bailey@techdata.com<\/p>","td_extension":"West: (480) 254-4420\n East: (678) 642-3446<\/p>","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"IBM","region":"","solutions_practice":"","sub_category_1":"Forensics","category_1":"Security Intelligence"},{"product_id":"477","product_name":"Qradar Network Insights","description":"Attackers can't hide on your network with IBM\u00ae QRadar\u00ae Network Insights. Security teams are flooded with security log activity every day, but inspecting those logs does not always generate the level of insight required to detect modern threats. They are eager to find additional methods to provide more accurate threat detection. QRadar Network Insights analyzes network data in real-time to uncover an attacker\u2019s footprints and expose hidden security threats in many scenarios before they can damage your organization, including: phishing e-mails, malware, data exfiltration, lateral movement, DNS and other application abuse, and compliance gaps.","hyperlink":"https:\/\/www.ibm.com\/us-en\/marketplace\/real-time-threat-identification","td_contact":"West: Rick.Marshall@techdata.com\n East: Karen.Bailey@techdata.com<\/p>","td_extension":"West: (480) 254-4420\n East: (678) 642-3446<\/p>","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"IBM","region":"","solutions_practice":"","sub_category_1":"Other","category_1":"Security Intelligence"},{"product_id":"478","product_name":"Cloud Identity","description":"IBM Cloud Identity helps you secure user productivity with cloud-delivered Single Sign-On (SSO), multifactor authentication, and identity governance. It comes with thousands of pre-built connectors to help you quickly provide access to popular SaaS apps; and pre-built templates to help integrate in-house apps.","hyperlink":"https:\/\/www.ibm.com\/us-en\/marketplace\/cloud-identity-connect","td_contact":"West: Rick.Marshall@techdata.com\n East: Karen.Bailey@techdata.com<\/p>","td_extension":"West: (480) 254-4420\n East: (678) 642-3446<\/p>","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"IBM","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"MultiFactor and Advanced Authentication"},{"product_id":"479","product_name":"Data Risk Manager","description":"What you don\u2019t know can hurt you. Identify and help prevent risks to sensitive business data that may impact business processes, operations, and competitive position. IBM Data Risk Manager provides executives and their teams a business-consumable data risk control center that helps to uncover, analyze, and visualize data-related business risks so they can take action to protect their business.","hyperlink":"https:\/\/www.ibm.com\/us-en\/marketplace\/data-risk-manager","td_contact":"West: Rick.Marshall@techdata.com\n East: Karen.Bailey@techdata.com<\/p>","td_extension":"West: (480) 254-4420\n East: (678) 642-3446<\/p>","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"IBM","region":"","solutions_practice":"","category_2":"Data Security","sub_category_1":"Governance, Risk, Compliance, & Audit","sub_category_2":"Other","category_1":"Security Intelligence"},{"product_id":"480","product_name":"Security Secret Server","description":"IBM Security Secret Server protects privileged accounts from hackers and insider threats, helps ensure compliance with evolving regulations, and allows authorized employees to seamlessly gain access to the tools and information they need to drive productivity. Easily detect, manage and audit privileged accounts, and control which applications are permitted to run on endpoints and servers to prevent malicious applications from penetrating the environment. IBM Security Secret Server is fast to deploy, easy to use and scalable for the enterprise.","hyperlink":"https:\/\/www.ibm.com\/us-en\/marketplace\/secret-server","td_contact":"West: Rick.Marshall@techdata.com\n East: Karen.Bailey@techdata.com<\/p>","td_extension":"West: (480) 254-4420\n East: (678) 642-3446<\/p>","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"IBM","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"Privileged Access Management"},{"product_id":"481","product_name":"Security Access Manager","description":"In a world of highly fragmented access management environments, IBM Security Access Manager helps you simplify your users' access while more securely adopting web, mobile and cloud technologies. This solution helps you strike a balance between usability and security through the use of risk-based access, single sign-on, integrated access management control, identity federation and its mobile multi-factor authentication capability, IBM Verify. Take back control of your access management with IBM Security Access Manager.","hyperlink":"https:\/\/www.ibm.com\/us-en\/marketplace\/access-management","td_contact":"West: Rick.Marshall@techdata.com\n East: Karen.Bailey@techdata.com<\/p>","td_extension":"West: (480) 254-4420\n East: (678) 642-3446<\/p>","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"IBM","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"Identity Governance"},{"product_id":"482","product_name":"Security Identity Governance & Intelligence (IGI)","description":"Within your organization, you need to be able to understand who has access to what and how that access is being used. Is your identity governance working intelligently? IBM is focused on collecting and analyzing identity data to support enterprise IT and regulatory compliance. With IGI, you\u2019ll improve visibility into how access is being utilized, prioritize compliance actions with risk-based insights, and make better decisions with clear actionable intelligence. All of this is driven by a business-activity based approach to risk modeling, a major differentiator for IBM that makes life easier for auditors and risk compliance managers.","hyperlink":"https:\/\/www.ibm.com\/us-en\/marketplace\/identity-governance-and-intelligence","td_contact":"West: Rick.Marshall@techdata.com\n East: Karen.Bailey@techdata.com<\/p>","td_extension":"West: (480) 254-4420\n East: (678) 642-3446<\/p>","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"IBM","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"Identity Governance"},{"product_id":"483","product_name":"Maximo Application Suite","description":"IBM Maximo\u00ae Application Suite helps drive operational resiliency and reliability with condition-based asset maintenance. With expanded access to CMMS, EAM and asset performance management applications, your teams can reach across the enterprise to unify operations and maintain business continuity, even under rapidly changing or disruptive conditions.","hyperlink":"https:\/\/www.ibm.com\/products\/maximo","td_contact":"West: Rick.Marshall@techdata.com\n East: Karen.Bailey@techdata.com<\/p>","td_extension":"West: (480) 254-4420\n East: (678) 642-3446<\/p>","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"IBM","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Endpoint Security Management"},{"product_id":"484","product_name":"Application Security on Cloud","description":"Ensure that security is integrated into the development process so that you can develop secure applications without sacrificing speed-to-market","hyperlink":"","td_contact":"West: Rick.Marshall@techdata.com\n East: Karen.Bailey@techdata.com<\/p>","td_extension":"West: (480) 254-4420\n East: (678) 642-3446<\/p>","vendor_id":"35","service_tiering":"Tiered discounting is supported. Upfront, annual, quarterly and monthly billing supported for EPS and other pricing metrics.","partner_benefits":" \u2022 IBM Security supports multiple partnering models for MSSPs including IBM Embedded Solution Agreement which enables MSSPs to retain entitlement of software and sell a service, achieving a pure OPEX model for their clients. <\/p>\n \u2022 IBM Channel Value Rewards provides higher margin for initial license sales and ongoing renewals.<\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 Automate security testing throughout software development lifecyle <\/p>\n \u2022 Secure applications during development without sacrificing speed to market. <\/p>\n \u2022 Focus on high priority vulnerabilities <\/p>\n \u2022 Utilize multiple developer plug ins. 5. Complete coverage of web, mobile, open source, and cloud applications.<\/p>","mssp_available":"0","org_id":"1","vendor_name":"IBM","region":"","solutions_practice":"","category_1":"Application Security","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","category_2":"Managed Security Service"},{"product_id":"485","product_name":"Guardium Analyzer","description":"Guardium Analyzer helps you find GDPR-relevant data (emails, phone numbers etc.), understand data and database exposures, and act on a prioritized list of recommendations to address issues and minimize risk","hyperlink":"","td_contact":"West: Rick.Marshall@techdata.com\n East: Karen.Bailey@techdata.com<\/p>","td_extension":"West: (480) 254-4420\n East: (678) 642-3446<\/p>","vendor_id":"35","service_tiering":"Tiered discounting is supported. Upfront, annual, quarterly and monthly billing supported for EPS and other pricing metrics.","partner_benefits":" \u2022 Guardium Analyzer empowers an MSSP to help clients discover data security and regulatory compliance issues.<\/p>\n \u2022 IBM Security supports multiple partnering models for MSSPs including IBM Embedded Solution Agreement which enables MSSPs to retain entitlement of software and sell a service, achieving a pure OPEX model for their clients. <\/p>\n \u2022 IBM Channel Value Rewards provides higher margin for initial license sales and ongoing renewals.<\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 Analyzer applies next-generation data classification to enable organizations to identify security and compliance risk associated with GDPR-relevant data.<\/p>\n \u2022 View information in a single view across cloud and on-premises databases and provides prioritized, actionable remediation recommendations.<\/p>","mssp_available":"0","org_id":"1","vendor_name":"IBM","region":"","solutions_practice":"","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","category_1":"Data Security","category_2":"Managed Security Service"},{"product_id":"486","product_name":"Qradar on Cloud","description":"IBM QRadar SIEM provides centralized visibility, \nthreat detection and pre-built reporting capabilities \nto help organizations effectively manage compliance \nwith far less manual effort than competitive \nsolutions.","hyperlink":"","td_contact":"West: Rick.Marshall@techdata.com\n East: Karen.Bailey@techdata.com<\/p>","td_extension":"West: (480) 254-4420\n East: (678) 642-3446<\/p>","vendor_id":"35","service_tiering":"Tiering discount at certain Events Per Second (EPS) level. Upfront, annual, quarterly and monthly billing supported for EPS and other pricing metrics.","partner_benefits":" \u2022 IBM QRadar on Cloud provides the lowest TCO of any SIEM soluton for MSSPs. The QRadar Security Intelligence platform empoweres MSSPs to offer a number of different managed service offerings to drive multiple revenue streams including:<\/p>\n - Log Management<\/p>\n - Managed SIEM and Advance Threat Detection<\/p>\n - Risk Vulnerability Management<\/p>\n - Compliance Management<\/p>\n - Insider Threat<\/p>\n - Cloud Security and Monitoring<\/p>\n \u2022 IBM Security supports multiple partnering models for MSSPs including IBM Embedded Solution Agreement which enables MSSPs to retain entitlement of software and sell a service, achieving a pure OPEX model for their clients. IBM Channel Value Rewards provides higher margin for initial license sales and ongoing renewals.<\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 External and internal threat and malware detection <\/p>\n \u2022 Compliance reporting <\/p>\n \u2022 Built in integrations to third-party security tools <\/p>\n \u2022 Reduction in point devices across network <\/p>\n \u2022 Cloud implementation provides easy implementation and quick time to value.<\/p>","mssp_available":"0","org_id":"1","vendor_name":"IBM","region":"","solutions_practice":"","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","category_2":"Managed Security Service","category_1":"Security Intelligence"},{"product_id":"487","product_name":"Resilient","description":"IBM Resilient Incident Response Platform (IRP) on Cloud orchestrates Incident Response across your organization to ensure the best time to response and containment for cyber incidents","hyperlink":"","td_contact":"West: Rick.Marshall@techdata.com\n East: Karen.Bailey@techdata.com<\/p>","td_extension":"West: (480) 254-4420\n East: (678) 642-3446<\/p>","vendor_id":"35","service_tiering":"Tiered discounting is supported. Upfront, annual, quarterly and monthly billing supported for EPS and other pricing metrics.","partner_benefits":" \u2022 IBM Resilient empowers MSSPs to drive consistency and automation across their SOC processes, improving the customer experience while driving down operational costs associated with Incident Response.<\/p>\n \u2022 IBM Security supports multiple partnering models for MSSPs including IBM Embedded Solution Agreement which enables MSSPs to retain entitlement of software and sell a service, achieving a pure OPEX model for their clients. <\/p>\n \u2022 IBM Channel Value Rewards provides higher margin for initial license sales and ongoing renewals.<\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 IBM Resilient Incident Response Platform (IRP) on Cloud automates investigation and escalation of incidents by guiding security analysts through a fast, accurate response by providing dynamic, incident-specific playbooks. <\/p>\n \u2022 Captures expertise from and aligns security operations, privacy and legal teams, executives, and other business units.<\/p>\n \u2022 Provides a single, audit-able record of security incidents to comply with regulations, including GDPR<\/p>","mssp_available":"0","org_id":"1","vendor_name":"IBM","region":"","solutions_practice":"","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","category_2":"Managed Security Service","category_1":"Security Intelligence"},{"product_id":"488","product_name":"Security Consulting Services for Managed Securty Service Providers","description":"IBM Security Consulting Services for MSSPs provides expertise on MSSP business practices including service catalog definition and development, organizatonal design and development, process development and optimization and technology architecture and implementation specializing in but not limited to IBM Security technologies.","hyperlink":"","td_contact":"West: Rick.Marshall@techdata.com\n East: Karen.Bailey@techdata.com<\/p>","td_extension":"West: (480) 254-4420\n East: (678) 642-3446<\/p>","vendor_id":"35","service_tiering":"Services are billed by the the day and week with support for flexible subscription style offerings as well.","partner_benefits":" IBM Security Consulting Services for MSSPs help:<\/p>\n \u2022 Optimize existing processes and architect from scratch<\/p>\n \u2022 Service Catalog and Use-Case development<\/p>\n \u2022 Technology architecture and implementation<\/p>\n \u2022 Staff Augmentation<\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":"IBM Security Consulting Services for MSSPs are designed to help an MSSP grow their MSS business and advance their service delivery maturity, resulting in more value to the end-client.","mssp_available":"0","org_id":"1","vendor_name":"IBM","region":"","solutions_practice":"","category_7":"Advanced Fraud Security","category_8":"Application Security","sub_category_6":"Building Block Solution","sub_category_7":"Building Block Solution","sub_category_8":"Building Block Solution","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","sub_category_3":"Building Block Solution","sub_category_4":"Building Block Solution","sub_category_5":"Building Block Solution","category_6":"Data Security","category_2":"Endpoint Security","category_4":"Identity and Access","category_1":"Managed Security Service","category_5":"Mobile Security","category_3":"Security Intelligence"},{"product_id":"489","product_name":"Guardium","description":"Support your entire data protection journey with the same infrastructure and approach. IBM Security\u00ae Guardium\u00ae helps ensure the security, privacy and integrity of your critical data across a full range of environments\u2014from databases to big data, cloud, file systems and more.","hyperlink":"https:\/\/www.ibm.com\/security\/data-security\/guardium","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"IBM","region":"","solutions_practice":"","category_1":"Data Security","category_2":"Data Security","category_3":"Data Security","sub_category_1":"Database Encryption","sub_category_2":"File, Folder and\/or Email Encryption","sub_category_3":"Server Encryption"},{"product_id":"490","product_name":"MaaS360","description":"With IBM\u00ae BigFix\u00ae, IT departments can cut operational costs, compress endpoint management cycles and enforce compliance in real-time.","hyperlink":"https:\/\/www.ibm.com\/security\/mobile\/maas360","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"IBM","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Endpoint Security Management","category_2":"Mobile Security","sub_category_2":"Mobility Management"},{"product_id":"491","product_name":"QRadar","description":"The IBM QRadar Security Intelligence Platform, with SIEM at the core, provides security teams with the visibility and analytics needed to quickly and accurately detect, prioritize, investigate and respond to threats across on-premises and cloud-based environments.","hyperlink":"https:\/\/www.ibm.com\/security\/security-intelligence\/qradar","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"IBM","region":"","solutions_practice":"","category_1":"Security Intelligence","sub_category_1":"SIEM"},{"product_id":"492","product_name":"Resilient","description":"IBM Resilient Incident Response Platform (IRP) is the leading platform for orchestrating and automating incident response processes. IBM Resilient IRP quickly and easily integrates with your organization\u2019s existing security and IT investments. It makes security alerts instantly actionable, provides valuable intelligence and incident context, and enables adaptive response to complex cyber threats.","hyperlink":"https:\/\/www.ibm.com\/us-en\/marketplace\/resilient-incident-response-platform","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"IBM","region":"","solutions_practice":"","sub_category_1":"Incident Response","category_1":"Security Intelligence"},{"product_id":"493","product_name":"Security Directory Suite","description":"IBM Security Directory Suite is a scalable, standards-based identity platform that simplifies identity and directory management. Directory Suite helps collapse identity silos into a single authoritative identity source. This unified identity enables faster and more agile application deployment and improved user experience. Directory Suite also captures user insight for auditing and compliance reporting.","hyperlink":"https:\/\/www.ibm.com\/us-en\/marketplace\/ibm-security-directory-suite","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"IBM","region":"","solutions_practice":"","sub_category_2":"Directory Management","category_1":"Identity and Access","category_2":"Identity and Access","sub_category_1":"Identity Governance"},{"product_id":"494","product_name":"Trusteer","description":"IBM\u00ae Trusteer helps organizations seamlessly establish identity trust across the omnichannel customer journey. Through cloud-based intelligence, backed by AI and patented machine learning, Trusteer provides a holistic approach to identifying new and existing customers, without negatively impacting user experience. Over 500 leading organizations rely on Trusteer to help enable and secure their customers\u2019 digital journey and support business growth. In doing so, Trusteer runs over 40 billion application accesses monthly and over 1 billion monthly user sessions.","hyperlink":"https:\/\/www.ibm.com\/security\/fraud-protection\/trusteer","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"IBM","region":"","solutions_practice":"","category_2":"Advanced Fraud Security","category_1":"Identity and Access","sub_category_1":"Other","sub_category_2":"Other"},{"product_id":"495","product_name":"X-Force Exchange","description":"Provides a cloud-based threat intelligence sharing platform that enables users to research threats, collaborate with peers and take action","hyperlink":"https:\/\/www.ibm.com\/us-en\/marketplace\/ibm-xforce-exchange","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"IBM","region":"","solutions_practice":""},{"product_id":"496","product_name":"Qradar Incident Forensics","description":"IBM\u00ae QRadar\u00ae Incident Forensics allows you to retrace the step-by-step actions of a potential attacker and quickly and easily conduct an in-depth forensics investigation of suspected malicious network security incidents. It reduces the time it takes security teams to investigate QRadar offense records, in many cases from days to hours\u2014or even minutes. It can also help you remediate a network security breach and prevent it from happening again. IBM QRadar Packet Capture appliances are also available to store and manage data if no other network packet capture (PCAP) device is deployed.","hyperlink":"https:\/\/www.ibm.com\/us-en\/marketplace\/ibm-qradar-incident-forensics","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"IBM","region":"","solutions_practice":"","sub_category_1":"Forensics","category_1":"Security Intelligence"},{"product_id":"497","product_name":"Qradar Network Insights","description":"Attackers can't hide on your network with IBM\u00ae QRadar\u00ae Network Insights. Security teams are flooded with security log activity every day, but inspecting those logs does not always generate the level of insight required to detect modern threats. They are eager to find additional methods to provide more accurate threat detection. QRadar Network Insights analyzes network data in real-time to uncover an attacker\u2019s footprints and expose hidden security threats in many scenarios before they can damage your organization, including: phishing e-mails, malware, data exfiltration, lateral movement, DNS and other application abuse, and compliance gaps.","hyperlink":"https:\/\/www.ibm.com\/us-en\/marketplace\/real-time-threat-identification","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"IBM","region":"","solutions_practice":"","sub_category_1":"Other","category_1":"Security Intelligence"},{"product_id":"498","product_name":"Cloud Identity","description":"IBM Cloud Identity helps you secure user productivity with cloud-delivered Single Sign-On (SSO), multifactor authentication, and identity governance. It comes with thousands of pre-built connectors to help you quickly provide access to popular SaaS apps; and pre-built templates to help integrate in-house apps.","hyperlink":"https:\/\/www.ibm.com\/us-en\/marketplace\/cloud-identity-connect","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"IBM","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"MultiFactor and Advanced Authentication"},{"product_id":"499","product_name":"Data Risk Manager","description":"What you don\u2019t know can hurt you. Identify and help prevent risks to sensitive business data that may impact business processes, operations, and competitive position. IBM Data Risk Manager provides executives and their teams a business-consumable data risk control center that helps to uncover, analyze, and visualize data-related business risks so they can take action to protect their business.","hyperlink":"https:\/\/www.ibm.com\/us-en\/marketplace\/data-risk-manager","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"IBM","region":"","solutions_practice":"","category_2":"Data Security","sub_category_1":"Governance, Risk, Compliance, & Audit","sub_category_2":"Other","category_1":"Security Intelligence"},{"product_id":"500","product_name":"Security Secret Server","description":"IBM Security Secret Server protects privileged accounts from hackers and insider threats, helps ensure compliance with evolving regulations, and allows authorized employees to seamlessly gain access to the tools and information they need to drive productivity. Easily detect, manage and audit privileged accounts, and control which applications are permitted to run on endpoints and servers to prevent malicious applications from penetrating the environment. IBM Security Secret Server is fast to deploy, easy to use and scalable for the enterprise.","hyperlink":"https:\/\/www.ibm.com\/us-en\/marketplace\/secret-server","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"IBM","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"Privleged User Management"},{"product_id":"501","product_name":"Security Access Manager","description":"In a world of highly fragmented access management environments, IBM Security Access Manager helps you simplify your users' access while more securely adopting web, mobile and cloud technologies. This solution helps you strike a balance between usability and security through the use of risk-based access, single sign-on, integrated access management control, identity federation and its mobile multi-factor authentication capability, IBM Verify. Take back control of your access management with IBM Security Access Manager.","hyperlink":"https:\/\/www.ibm.com\/us-en\/marketplace\/access-management","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"IBM","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"Identity Governance"},{"product_id":"502","product_name":"Security Identity Governance & Intelligence (IGI)","description":"Within your organization, you need to be able to understand who has access to what and how that access is being used. Is your identity governance working intelligently? IBM is focused on collecting and analyzing identity data to support enterprise IT and regulatory compliance. With IGI, you\u2019ll improve visibility into how access is being utilized, prioritize compliance actions with risk-based insights, and make better decisions with clear actionable intelligence. All of this is driven by a business-activity based approach to risk modeling, a major differentiator for IBM that makes life easier for auditors and risk compliance managers.","hyperlink":"https:\/\/www.ibm.com\/us-en\/marketplace\/identity-governance-and-intelligence","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"IBM","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"Identity Governance"},{"product_id":"503","product_name":"Maximo Application Suite","description":"IBM Maximo\u00ae Application Suite helps drive operational resiliency and reliability with condition-based asset maintenance. With expanded access to CMMS, EAM and asset performance management applications, your teams can reach across the enterprise to unify operations and maintain business continuity, even under rapidly changing or disruptive conditions.","hyperlink":"https:\/\/www.ibm.com\/products\/maximo","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"35","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"IBM","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Endpoint Security Management"},{"product_id":"504","product_name":"Application Security on Cloud","description":"Ensure that security is integrated into the development process so that you can develop secure applications without sacrificing speed-to-market","hyperlink":"","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"35","service_tiering":"Tiered discounting is supported. Upfront, annual, quarterly and monthly billing supported for EPS and other pricing metrics.","partner_benefits":" \u2022 IBM Security supports multiple partnering models for MSSPs including IBM Embedded Solution Agreement which enables MSSPs to retain entitlement of software and sell a service, achieving a pure OPEX model for their clients. <\/p>\n \u2022 IBM Channel Value Rewards provides higher margin for initial license sales and ongoing renewals.<\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 Automate security testing throughout software development lifecyle <\/p>\n \u2022 Secure applications during development without sacrificing speed to market. <\/p>\n \u2022 Focus on high priority vulnerabilities <\/p>\n \u2022 Utilize multiple developer plug ins. 5. Complete coverage of web, mobile, open source, and cloud applications.<\/p>","mssp_available":"0","org_id":"1","vendor_name":"IBM","region":"","solutions_practice":"","category_1":"Application Security","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","category_2":"Managed Security Service"},{"product_id":"505","product_name":"Guardium Analyzer","description":"Guardium Analyzer helps you find GDPR-relevant data (emails, phone numbers etc.), understand data and database exposures, and act on a prioritized list of recommendations to address issues and minimize risk","hyperlink":"","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"35","service_tiering":"Tiered discounting is supported. Upfront, annual, quarterly and monthly billing supported for EPS and other pricing metrics.","partner_benefits":" \u2022 Guardium Analyzer empowers an MSSP to help clients discover data security and regulatory compliance issues.<\/p>\n \u2022 IBM Security supports multiple partnering models for MSSPs including IBM Embedded Solution Agreement which enables MSSPs to retain entitlement of software and sell a service, achieving a pure OPEX model for their clients. <\/p>\n \u2022 IBM Channel Value Rewards provides higher margin for initial license sales and ongoing renewals.<\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 Analyzer applies next-generation data classification to enable organizations to identify security and compliance risk associated with GDPR-relevant data.<\/p>\n \u2022 View information in a single view across cloud and on-premises databases and provides prioritized, actionable remediation recommendations.<\/p>","mssp_available":"0","org_id":"1","vendor_name":"IBM","region":"","solutions_practice":"","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","category_1":"Data Security","category_2":"Managed Security Service"},{"product_id":"506","product_name":"MaaS360","description":"IBM MaaS360\u00ae provides a cloud-based, comprehensive unitfied endpoint management solution that helps IT organizations manage and secure a heterogeneous pool of endpoints, end users, and everything in between\u2014including their applications, content and data.","hyperlink":"","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"35","service_tiering":"Tiered discounting is supported. Upfront, annual, quarterly and monthly billing supported for EPS and other pricing metrics.","partner_benefits":" \u2022 IBM MaaS360 empowers an MSSP with and industry leading unified management offering. The enables the MSSP to solve both mobile and security issues for clients with a minimal touch, low TCO solution.<\/p>\n \u2022 IBM Security supports multiple partnering models for MSSPs including IBM Embedded Solution Agreement which enables MSSPs to retain entitlement of software and sell a service, achieving a pure OPEX model for their clients. <\/p>\n \u2022 IBM Channel Value Rewards provides higher margin for initial license sales and ongoing renewals.<\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 Robust security capabilities, including an automated enforcement rules engine <\/p>\n \u2022 Reporting dashboards and inventory capabilities for endpoints and their associated applications <\/p>\n \u2022 Granular control over operating system and software patching policies, allowing IT administrators to customize maintenance and management of legacy devices <\/p>\n \u2022 MaaS360 facilitates fast deployment, helps minimize your endpoint management footprint and costs, and ensures that you always have the latest software versions, including updated code as platform vendors release expanded APIs.<\/p>","mssp_available":"0","org_id":"1","vendor_name":"IBM","region":"","solutions_practice":"","sub_category_3":"Building Block Solution","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","category_1":"Endpoint Security","category_3":"Managed Security Service","category_2":"Mobile Security"},{"product_id":"507","product_name":"Qradar on Cloud","description":"IBM QRadar SIEM provides centralized visibility, \nthreat detection and pre-built reporting capabilities \nto help organizations effectively manage compliance \nwith far less manual effort than competitive \nsolutions.","hyperlink":"","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"35","service_tiering":"Tiering discount at certain Events Per Second (EPS) level. Upfront, annual, quarterly and monthly billing supported for EPS and other pricing metrics.","partner_benefits":" \u2022 IBM QRadar on Cloud provides the lowest TCO of any SIEM soluton for MSSPs. The QRadar Security Intelligence platform empoweres MSSPs to offer a number of different managed service offerings to drive multiple revenue streams including:<\/p>\n - Log Management<\/p>\n - Managed SIEM and Advance Threat Detection<\/p>\n - Risk Vulnerability Management<\/p>\n - Compliance Management<\/p>\n - Insider Threat<\/p>\n - Cloud Security and Monitoring<\/p>\n \u2022 IBM Security supports multiple partnering models for MSSPs including IBM Embedded Solution Agreement which enables MSSPs to retain entitlement of software and sell a service, achieving a pure OPEX model for their clients. IBM Channel Value Rewards provides higher margin for initial license sales and ongoing renewals.<\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 External and internal threat and malware detection <\/p>\n \u2022 Compliance reporting <\/p>\n \u2022 Built in integrations to third-party security tools <\/p>\n \u2022 Reduction in point devices across network <\/p>\n \u2022 Cloud implementation provides easy implementation and quick time to value.<\/p>","mssp_available":"0","org_id":"1","vendor_name":"IBM","region":"","solutions_practice":"","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","category_2":"Managed Security Service","category_1":"Security Intelligence"},{"product_id":"508","product_name":"Resilient","description":"IBM Resilient Incident Response Platform (IRP) on Cloud orchestrates Incident Response across your organization to ensure the best time to response and containment for cyber incidents","hyperlink":"","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"35","service_tiering":"Tiered discounting is supported. Upfront, annual, quarterly and monthly billing supported for EPS and other pricing metrics.","partner_benefits":" \u2022 IBM Resilient empowers MSSPs to drive consistency and automation across their SOC processes, improving the customer experience while driving down operational costs associated with Incident Response.<\/p>\n \u2022 IBM Security supports multiple partnering models for MSSPs including IBM Embedded Solution Agreement which enables MSSPs to retain entitlement of software and sell a service, achieving a pure OPEX model for their clients. <\/p>\n \u2022 IBM Channel Value Rewards provides higher margin for initial license sales and ongoing renewals.<\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 IBM Resilient Incident Response Platform (IRP) on Cloud automates investigation and escalation of incidents by guiding security analysts through a fast, accurate response by providing dynamic, incident-specific playbooks. <\/p>\n \u2022 Captures expertise from and aligns security operations, privacy and legal teams, executives, and other business units.<\/p>\n \u2022 Provides a single, audit-able record of security incidents to comply with regulations, including GDPR<\/p>","mssp_available":"0","org_id":"1","vendor_name":"IBM","region":"","solutions_practice":"","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","category_2":"Managed Security Service","category_1":"Security Intelligence"},{"product_id":"509","product_name":"Security Consulting Services for Managed Securty Service Providers","description":"IBM Security Consulting Services for MSSPs provides expertise on MSSP business practices including service catalog definition and development, organizatonal design and development, process development and optimization and technology architecture and implementation specializing in but not limited to IBM Security technologies.","hyperlink":"","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"35","service_tiering":"Services are billed by the the day and week with support for flexible subscription style offerings as well.","partner_benefits":" IBM Security Consulting Services for MSSPs help:<\/p>\n \u2022 Optimize existing processes and architect from scratch<\/p>\n \u2022 Service Catalog and Use-Case development<\/p>\n \u2022 Technology architecture and implementation<\/p>\n \u2022 Staff Augmentation<\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":"IBM Security Consulting Services for MSSPs are designed to help an MSSP grow their MSS business and advance their service delivery maturity, resulting in more value to the end-client.","mssp_available":"0","org_id":"1","vendor_name":"IBM","region":"","solutions_practice":"","category_7":"Advanced Fraud Security","category_8":"Application Security","sub_category_6":"Building Block Solution","sub_category_7":"Building Block Solution","sub_category_8":"Building Block Solution","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","sub_category_3":"Building Block Solution","sub_category_4":"Building Block Solution","sub_category_5":"Building Block Solution","category_6":"Data Security","category_2":"Endpoint Security","category_4":"Identity and Access","category_1":"Managed Security Service","category_5":"Mobile Security","category_3":"Security Intelligence"},{"product_id":"510","product_name":"Compact Identity Module - Access Management","description":"Single Sign on (includes to Cloud, web and thick clients); Multi-factor Authentication (Challenge Response, Soft token, Email OTP, SMS OTP), step up authentication; Password Management (self-service and helpdesk assisted; reverse password sync, password reset from locked screen, password policies). Integration to Active Directory (AD), user import from AD, HR systems and CSV files supported. Identity Analytics -Reporting and dashboards included.","hyperlink":"https:\/\/www.ilantus.com\/products\/compact-identity\/#single-sign-on","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"(305) 593-5000","vendor_id":"36","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Ilantus <\/span>NEW!","region":"","solutions_practice":"","sub_category_1":"Building Block Solution","sub_category_5":"Directory Management","sub_category_2":"Directory Management","category_6":"Identity and Access","category_7":"Identity and Access","category_8":"Identity and Access","category_1":"Identity and Access","category_9":"Identity and Access","category_2":"Identity and Access","category_3":"Identity and Access","category_4":"Identity and Access","category_5":"Identity and Access","sub_category_9":"Lifecycle management","sub_category_3":"MultiFactor and Advanced Authentication","sub_category_4":"NAC","sub_category_7":"Other","sub_category_6":"Password Management","sub_category_8":"Turn-Key Solution"},{"product_id":"511","product_name":"Compact Identity Module - Identity Governance","description":"Recertification of roles, applications, entitlements, users; Recurring recertification campaigns; multi-level recertification; auto and manual fulfillment; orphan and dorman account management; centralized identity store. Identity Analytics - Reporting and dashboards included.","hyperlink":"https:\/\/www.ilantus.com\/products\/compact-identity\/#identity-governance","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"(305) 593-5000","vendor_id":"36","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Ilantus <\/span>NEW!","region":"","solutions_practice":"","sub_category_1":"Building Block Solution","sub_category_2":"Directory Management","category_6":"Identity and Access","category_1":"Identity and Access","category_2":"Identity and Access","category_3":"Identity and Access","category_4":"Identity and Access","category_5":"Identity and Access","sub_category_3":"Identity Governance","sub_category_4":"Other","sub_category_6":"Privileged Access Management","sub_category_5":"Turn-Key Solution"},{"product_id":"512","product_name":"Compact Identity Module - Identity Administration","description":"User Life Cycle Management; Automated Provisioning\/Deprovisioning: role based, birth right account provisioniong; entitlement mapping, static and dynamic role; entitlement and role access request; user access request; multi-level access approval workflow, Cloud and On-premise application Provisioning Connectors. Identity Analytics -Reporting and dashboards included.","hyperlink":"https:\/\/www.ilantus.com\/products\/compact-identity\/#identity-administration\"","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"(305) 593-5000","vendor_id":"36","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Ilantus <\/span>NEW!","region":"","solutions_practice":"","sub_category_1":"Building Block Solution","sub_category_2":"Directory Management","category_6":"Identity and Access","category_7":"Identity and Access","category_1":"Identity and Access","category_2":"Identity and Access","category_3":"Identity and Access","category_4":"Identity and Access","category_5":"Identity and Access","sub_category_3":"Identity Governance","sub_category_5":"Lifecycle management","sub_category_7":"Other","sub_category_6":"Privileged Access Management","sub_category_4":"User Provisioning"},{"product_id":"513","product_name":"Compact Identity - FULL SUITE - Access Management - Identity Administration - Identity Governance","description":"Includees the following modules - Access Management (Single Sign on, Password Management, MFA); Identity Administration (User Life Cycle Management - Provisioning, Access Request); Identity Governance (Acesss certifications, Fulfillment). Identity Analytics - Reporting and dashborads included.","hyperlink":"https:\/\/www.ilantus.com\/products\/compact-identity\/","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"(305) 593-5000","vendor_id":"36","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Ilantus <\/span>NEW!","region":"","solutions_practice":"","sub_category_1":"Building Block Solution","sub_category_2":"Directory Management","category_6":"Identity and Access","category_7":"Identity and Access","category_8":"Identity and Access","category_1":"Identity and Access","category_9":"Identity and Access","category_2":"Identity and Access","category_10":"Identity and Access","category_3":"Identity and Access","category_11":"Identity and Access","category_4":"Identity and Access","category_12":"Identity and Access","category_5":"Identity and Access","sub_category_3":"Identity Governance","sub_category_4":"Lifecycle management","sub_category_5":"MultiFactor and Advanced Authentication","sub_category_6":"NAC","sub_category_12":"Other","sub_category_7":"Password Management","sub_category_8":"Privileged Access Management","sub_category_9":"Turn-Key Solution","sub_category_10":"User Provisioning","sub_category_11":"Wireless & Access Management"},{"product_id":"514","product_name":"PAM - Privileged Access Management","description":"All in one solution for least privileged management, threat intelligence, application control. Features the following - Secure vault (encrypted, centralized), discover privileges (full view of all accounts), managed secrets (password complexity and rotation), delegate access (RBAC, access request workflow), control sessions (monitoring and recordings). On-premise or Cloud with choice of standard or premium support and distributed engine capability.","hyperlink":"https:\/\/www.ilantus.com\/products\/compact-identity\/privilege-access-management\/","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"(305) 593-5000","vendor_id":"36","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Ilantus <\/span>NEW!","region":"","solutions_practice":"","sub_category_1":"Building Block Solution","sub_category_2":"Directory Management","category_1":"Identity and Access","category_2":"Identity and Access","category_3":"Identity and Access","category_4":"Identity and Access","sub_category_3":"Privileged Access Management","sub_category_4":"Wireless & Access Management"},{"product_id":"515","product_name":"Data Archive","description":"Retire legacy systems while retaining reporting access, managing long-term retention, and ensuring compliance.","hyperlink":"https:\/\/www.informatica.com\/products\/data-security\/data-archive.html#fbid=UeeCmkL0Wl1","td_contact":"","td_extension":"800-237-8931 x82343","vendor_id":"37","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Informatica","region":"","solutions_practice":"","sub_category_1":"Backup, Restore, and Recovery","category_1":"Data Security"},{"product_id":"516","product_name":"Data Masking","description":"Protects unauthorized access to and disclosure of sensitive, private, and confidential information.","hyperlink":"https:\/\/www.informatica.com\/products\/data-security\/data-masking.html#fbid=UeeCmkL0Wl1","td_contact":"","td_extension":"800-237-8931 x82343","vendor_id":"37","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Informatica","region":"","solutions_practice":"","category_1":"Data Security","category_2":"Data Security","sub_category_2":"Database Encryption","sub_category_1":"Other"},{"product_id":"517","product_name":"Secure@Source","description":"Locate, analyze, and remediate the risk of your sensitive data with data protection, and monitor data access and movement for suspicious activity.","hyperlink":"https:\/\/www.informatica.com\/products\/data-security\/secure-at-source.html#fbid=UeeCmkL0Wl1","td_contact":"","td_extension":"800-237-8931 x82343","vendor_id":"37","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Informatica","region":"","solutions_practice":"","sub_category_1":"Data and Discovery Classification","category_1":"Data Security","category_2":"Data Security","sub_category_2":"Other"},{"product_id":"518","product_name":"Test Data Management","description":"Employ secure, automated provisioning of non-production data sets to meet development and testing needs.","hyperlink":"https:\/\/www.informatica.com\/products\/data-security\/test-data-management.html#fbid=UeeCmkL0Wl1","td_contact":"","td_extension":"800-237-8931 x82343","vendor_id":"37","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Informatica","region":"","solutions_practice":"","category_1":"Data Security","category_2":"Data Security","sub_category_2":"Database Encryption","sub_category_1":"Other"},{"product_id":"519","product_name":"Contrail Security","description":"Contrail Security minimizes risk to applications that run in multicloud environments. It discovers application traffic flows and drastically reduces policy proliferation across different environments. It\u2019s a fundamental building block of Contrail Enterprise Multicloud.","hyperlink":"https:\/\/www.juniper.net\/us\/en\/products-services\/sdn\/contrail\/contrail-security\/","td_contact":"","td_extension":"","vendor_id":"38","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Juniper","region":"","solutions_practice":"","category_1":"Cloud Security","sub_category_1":"Other"},{"product_id":"520","product_name":"cSRX Container Firewall","description":"Businesses increasingly rely on container technology for developing and deploying cloud-native applications. The cSRX Container Firewall protects your containerized environments with advanced security services, including content security, intrusion prevention system (IPS), AppSecure, and unified threat management (UTM).","hyperlink":"https:\/\/www.juniper.net\/us\/en\/products-services\/security\/srx-series\/csrx\/","td_contact":"","td_extension":"","vendor_id":"38","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Juniper","region":"","solutions_practice":"","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security"},{"product_id":"521","product_name":"JSA Series Virtual Appliance","description":"Security teams understand the vital need to prevent data breaches by responding effectively to cyber threats in real time. They\u2019re defending against constant change, as attacks continue to hit from every angle. Advanced persistent threats perpetuated by cyber criminals silently breach security defenses, hunt for valuable data, and disappear before they\u2019re detected. Insiders also pose a threat with their direct access to corporate data that renders perimeter security ineffective.\n\nYou need end-to-end threat management that easily reduces the millions of security events occurring every day into a manageable, actionable list of suspected offenses. The ability to detect and track malicious activity over extended time periods helps uncover threats that are often otherwise missed. As IT infrastructure becomes more distributed and vulnerable to attack, security information and event management (SIEM) technology becomes more essential for real-time alerting, analysis, and auditing.","hyperlink":"https:\/\/www.juniper.net\/us\/en\/products-services\/security\/secure-analytics\/jsa-virtual-appliance\/","td_contact":"","td_extension":"","vendor_id":"38","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Juniper","region":"","solutions_practice":"","category_1":"Security Intelligence","sub_category_1":"SIEM"},{"product_id":"522","product_name":"Juniper Identity Management Service","description":"Juniper Identity Management Service strengthens enterprise security that authenticates and restricts user access. It\u2019s the first line of defense in preventing corporate breaches and safeguarding corporate assets. Employees are identified and assigned corporate roles that determine what applications and data they are permitted to access.","hyperlink":"https:\/\/www.juniper.net\/us\/en\/products-services\/security\/jims\/","td_contact":"","td_extension":"","vendor_id":"38","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Juniper","region":"","solutions_practice":"","category_1":"Identity and Access","category_2":"Identity and Access","category_3":"Identity and Access","sub_category_3":"MultiFactor and Advanced Authentication","sub_category_1":"Other","sub_category_2":"Privileged Access Management"},{"product_id":"523","product_name":"Steel-Belted Radius CarrierSteel-Belted Radius Carrier","description":"SBR Carrier is a standards-based AAA server that enables service providers to integrate their business intelligence into the network infrastructure.","hyperlink":"https:\/\/www.juniper.net\/us\/en\/products-services\/ipc\/sbr-carrier\/","td_contact":"","td_extension":"","vendor_id":"38","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Juniper","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"MultiFactor and Advanced Authentication"},{"product_id":"524","product_name":"SRX Series Services Gateways","description":"Provides advanced, next-generation defense against known and unknown threats, with a comprehensive suite of layered security services both on-premises and in the cloud. All SRX Series gateways are built for resiliency, scalability, and availability to secure data centers or the enterprise edge against the broadest spectrum of threats.","hyperlink":"https:\/\/www.juniper.net\/us\/en\/products-services\/security\/srx-series\/","td_contact":"","td_extension":"","vendor_id":"38","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Juniper","region":"","solutions_practice":"","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security"},{"product_id":"525","product_name":"Secure Analytics","description":"Market-leading security information and event management (SIEM) system that consolidates large volumes of event data from thousands of devices, endpoints, and applications in near real time.","hyperlink":"https:\/\/www.juniper.net\/us\/en\/products-services\/security\/secure-analytics\/","td_contact":"","td_extension":"","vendor_id":"38","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Juniper","region":"","solutions_practice":"","category_1":"Security Intelligence","sub_category_1":"SIEM"},{"product_id":"526","product_name":"Spotlight Secure Threat Intelligence Platform","description":"As the threat landscape continues to accelerate and evolve, the security industry continues to respond with a variety of disparate new detection technologies. Unfortunately, this approach results in customers struggling to manage a patchwork of uncoordinated security tools, leaving a gap between detection and enforcement at the firewall. Many next-generation firewalls (NGFWs) include integrated capabilities, such as intrusion prevention system (IPS), antivirus signatures, and proprietary reputation feeds, but they are closed systems that are not capable of taking full advantage of the highly diverse third-party and custom feeds utilized by customers, specific to their industry.","hyperlink":"https:\/\/www.juniper.net\/us\/en\/products-services\/security\/spotlight\/","td_contact":"","td_extension":"","vendor_id":"38","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Juniper","region":"","solutions_practice":"","sub_category_1":"Intrusion Detection and Prevention","category_1":"Network Security"},{"product_id":"527","product_name":"vSRX Virtual Firewall","description":"The vSRX offers the same features as our physical SRX Series firewalls but in a virtualized form factor for delivering security services that scale to match network demand. It offers the same features as the SRX appliance, including core firewall, robust networking, full next-gen capabilities, and automated life-cycle management. Handling speeds up to 100 Gbps, the vSRX is the industry\u2019s fastest virtual firewall.","hyperlink":"https:\/\/www.juniper.net\/us\/en\/products-services\/security\/srx-series\/vsrx\/","td_contact":"","td_extension":"","vendor_id":"38","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Juniper","region":"","solutions_practice":"","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security"},{"product_id":"528","product_name":"Advance Endpoint Security","description":"Kaspersky Endpoint Security for Business Advanced includes all of the functionality delivered by Kaspersky Endpoint Security for Business Select\u2026 plus additional technologies that do even more to protect your business. Medium Business offers Cloud based and Office 365 products shown below","hyperlink":"https:\/\/www.kaspersky.com\/small-to-medium-business-security\/endpoint-advanced","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Kaspersky","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"529","product_name":"DDoS Protection","description":"Total defense against all forms of DDoS attack to your infrastructure","hyperlink":"https:\/\/www.kaspersky.com\/enterprise-security\/embedded-security-internet-of-things","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Kaspersky","region":"","solutions_practice":"","sub_category_1":"DoS and DDoS","category_1":"Network Security"},{"product_id":"530","product_name":"Endpoint Detection and Response (EDR) Optimum","description":"Kaspersky Endpoint Detection and Response (EDR) Optimum is a centralized automated tool that addresses advanced and targeted attacks in ways that make it easy on both your staff and your IT resources. EDR solution for the mass market, 100% channel-ready and partner-oriented. Very simple, with no need to install an additional server and managed from the same KSC console as KESB.","hyperlink":"https:\/\/me-en.kaspersky.com\/enterprise-security\/endpoint-detection-response-edr#:~:text=Kaspersky%20EDR%20is%20a%20specialized%2C%20unified%20protection%20solution,trusted%20sources%20can%20easily%20penetrate%20the%20corporate%20perimeter","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Kaspersky","region":"","solutions_practice":"","sub_category_1":"Advanced Malware Protection","sub_category_2":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security","category_2":"Endpoint Security","category_3":"Endpoint Security","sub_category_3":"Endpoint Security Management"},{"product_id":"531","product_name":"Sandbox","description":"Today\u2019s businesses need to combat the growing number and complexity of modern threats that bypass existing antivirus and EPP-class solutions, such as unknown malware, new viruses and ransomware, zero-day exploits and others. At the same time, there is a global shortage of skilled cybersecurity professionals, which can make it tough and expensive to hire them. Companies are looking for ways to automate the detection and response to advanced threats as much as possible. Kaspersky Sandbox harnesses their best expert practices in combating complex threats and APT-level attacks, providing advanced threat protection without the need for information security analysts.","hyperlink":"https:\/\/me-en.kaspersky.com\/enterprise-security\/malware-sandbox","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Kaspersky","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"Sandboxing and APT Protection"},{"product_id":"532","product_name":"Integrated Endpoint Security","description":"The reliable, proven security platform that protects your bottom line. This tightly integrated solution combines outstanding protection, detection and incident response capabilities, based on unequalled global security intelligence and Next Generation machine learning, to automatically enrich your SOC and enhance your risk mitigation capabilities. Protection for every physical, virtual and cloud-based endpoint is managed together through one console, improving efficiency and reducing your TCO","hyperlink":"https:\/\/www.kaspersky.com\/enterprise-security\/endpoint","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Kaspersky","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"533","product_name":"Endpoint Security Cloud","description":"Developed specifically for small and medium-sized businesses, Kaspersky Endpoint Security Cloud lets you manage security for multiple endpoints, mobile devices and file servers remotely, from anywhere","hyperlink":"https:\/\/www.kaspersky.com\/enterprise-security\/fraud-prevention","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Kaspersky","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"534","product_name":"Fraud Prevention","description":"Good user verification-Seamless user experience for legitimate clients- Account take over detection-Proactive real-time discovery of early signs of account takeover-Money Laundering detection-Cross-channel detection of money laundering and related activities-Fraud Intelligence-The understanding of what is happening, how fraudsters behave, which schemes they use and how to stop them- Behavioral biometrics-Building user profiles based on mouse, keyboard, mobile phone usage.- Behavioral analysis- Patterns of legitimate and fraudulent behavior- Device and environment analysis-Analysis of session events happening around the users and their devices- Malware detection-Accurate detection of various kinds of malware in both web and mobile channels","hyperlink":"https:\/\/www.kaspersky.com\/enterprise-security\/cloud-security","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Kaspersky","region":"","solutions_practice":"","category_1":"Advanced Fraud Security","sub_category_1":"Other"},{"product_id":"535","product_name":"Hybrid Cloud Security","description":"Our Hybrid Cloud Security solution provides outstanding multi-layered protection to multi-cloud environments. Wherever you process and store critical business data - in a private or public cloud, or both - we deliver a perfectly balanced combination of agile, continuous security and superior efficiency, protecting your data against the most advanced current and future threats without compromising on systems performance.","hyperlink":"https:\/\/www.kaspersky.com\/enterprise-security\/industrial-solution","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Kaspersky","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"536","product_name":"Hybrid Cloud Security for AWS","description":"Automate security provisioning and simplify orchestration in your AWS cloud","hyperlink":"https:\/\/www.kaspersky.com\/enterprise-security\/threat-management-defense-solution","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Kaspersky","region":"","solutions_practice":"","category_1":"Cloud Security","sub_category_1":"Other"},{"product_id":"537","product_name":"Hybrid Cloud Security for Azure","description":"Streamline security and accelerate compliance in your Azure cloud","hyperlink":"","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Kaspersky","region":"","solutions_practice":"","category_1":"Cloud Security","sub_category_1":"Other"},{"product_id":"538","product_name":"Incident Response","description":"Managing the aftermath of a security breach","hyperlink":"","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Kaspersky","region":"","solutions_practice":"","sub_category_1":"Incident Response","category_1":"Security Intelligence"},{"product_id":"539","product_name":"Industrial Cybersecurity","description":"Kaspersky Industrial Cybersecurity is a portfolio of technologies and services designed to secure every industrial layer, including SCADA servers, HMI, engineering workstations, PLCs, network connections and people \u2013 without impacting on operational continuity and the consistency of industrial processes. Our solution delivers a logical, incremental path to holistic industrial cybersecurity, from people through to processes and technologies.","hyperlink":"https:\/\/www.kaspersky.com\/enterprise-security\/mail-server-security","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Kaspersky","region":"","solutions_practice":"","sub_category_1":"Critical System Protection\/Application Whitelisting","category_1":"Endpoint Security"},{"product_id":"540","product_name":"Internet of Things and Embedded Security","description":"The Internet of Things forms a cornerstone to digital transformation in all industry sectors. It\u2019s already changing world around us in manufacturing, agriculture, city infrastructure, retail and the automotive industry. This latest industrial revolution relies on all its component parts, from sensors to data centers, incorporating interconnected, unassailable defenses against cyberthreats and malicious attacks.","hyperlink":"https:\/\/www.kaspersky.com\/enterprise-security\/storage-security","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Kaspersky","region":"","solutions_practice":"","sub_category_1":"Device and Sensor","category_1":"IoT"},{"product_id":"541","product_name":"Mobile Security","description":"An integrated security and management solution supporting your mobile device strategy","hyperlink":"https:\/\/www.kaspersky.com\/enterprise-security\/ddos-protection","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Kaspersky","region":"","solutions_practice":"","category_1":"Mobile Security","sub_category_1":"Mobility Security"},{"product_id":"542","product_name":"Password Manager","description":"Gives you easy access to your accounts, plus a secure digital vault for your passport, driver\u2019s license, bank cards & other personal data.","hyperlink":"https:\/\/usa.kaspersky.com\/password-manager","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Kaspersky","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"Password Management"},{"product_id":"543","product_name":"Professional Services","description":"Extract the maximum benefit from your Kaspersky Lab security solutions","hyperlink":"https:\/\/www.kaspersky.com\/enterprise-security\/aws-hybrid-cloud-security","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Kaspersky","region":"","solutions_practice":"","sub_category_1":"Other","category_1":"Security Intelligence"},{"product_id":"544","product_name":"Security Assessment","description":"Practical demonstration of potential attack vectors that could bypass your security controls","hyperlink":"https:\/\/www.kaspersky.com\/enterprise-security\/mobile","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Kaspersky","region":"","solutions_practice":"","sub_category_1":"Policy","category_1":"Security Intelligence"},{"product_id":"545","product_name":"Security Awareness","description":"Building a safe corporate cyber-environment with gamified training","hyperlink":"https:\/\/www.kaspersky.com\/enterprise-security\/azure-hybrid-cloud-security","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Kaspersky","region":"","solutions_practice":"","sub_category_1":"Education","sub_category_2":"Security Awareness Training","category_1":"Security Strategy","category_2":"Security Strategy"},{"product_id":"546","product_name":"Security for Mail Server","description":"Proven Next Generation protection against mail-based attacks","hyperlink":"https:\/\/www.kaspersky.com\/enterprise-security\/security-awareness","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Kaspersky","region":"","solutions_practice":"","sub_category_1":"Email Security\/Gateway","category_1":"Network Security"},{"product_id":"547","product_name":"Security for Microsoft Office 365","description":"Detect and block spam and malicious email before it becomes a problem \u2013 without slowing productivity or accidentally deleting legitimate traffic. Advanced heuristics, sandboxing and machine learning protect email from spam, phishing, business email compromise (BEC) and other advanced threats.","hyperlink":"https:\/\/www.kaspersky.com\/enterprise-security\/professional-services","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"Kaspersky","region":"","solutions_practice":"","sub_category_1":"Email Security\/Gateway","category_1":"Network Security"},{"product_id":"548","product_name":"Security for Storage","description":"High-performance protection integrated with network-attached storage systems","hyperlink":"https:\/\/www.kaspersky.com\/enterprise-security\/threat-intelligence","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Kaspersky","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"549","product_name":"Security Training","description":"Comprehensive training programs covering digital forensics, malware analysis and incident response topics","hyperlink":"https:\/\/www.kaspersky.com\/enterprise-security\/security-assessment","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Kaspersky","region":"","solutions_practice":"","sub_category_1":"Education","category_1":"Security Strategy"},{"product_id":"550","product_name":"Threat Hunting","description":"Hands-on detection of advanced threats by our security analysts","hyperlink":"https:\/\/www.kaspersky.com\/enterprise-security\/threat-hunting","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Kaspersky","region":"","solutions_practice":"","sub_category_1":"Other","category_1":"Security Intelligence"},{"product_id":"551","product_name":"Threat Intelligence","description":"Evidence-based knowledge, including context and actionable recommendations, regarding cyberthreats","hyperlink":"https:\/\/www.kaspersky.com\/enterprise-security\/incident-response","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Kaspersky","region":"","solutions_practice":"","category_1":"Security Intelligence","sub_category_1":"Threat Intelligence"},{"product_id":"552","product_name":"Threat Management and Defense","description":"Kaspersky Threat Management and Defense delivers a unique combination of leading technologies and services which support the implementation of an Adaptive Security Strategy - helping your security team to Prevent most attacks, Detect unique new threats rapidly, Respond to live incidents and Predict future threats.","hyperlink":"https:\/\/www.kaspersky.com\/enterprise-security\/security-training","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Kaspersky","region":"","solutions_practice":"","sub_category_1":"Other","category_1":"Security Intelligence"},{"product_id":"553","product_name":"Hybrid Cloud","description":"Kaspersky Hybrid Cloud Security offers unified security for any stage of your cloud journey. It will secure your physical machines and virtualized workloads, whether running on-premise, in a datacenter or in a public cloud. \ue908Protects Windows and Linux servers and virtual desktops\nProvides Next Gen protection against the latest cyberthreats\n- Helps businesses tailor security for new & legacy systems\n- Reduces exposure to attack\u2026 by hardening corporate servers\n- Manages from a single point across your whole hybrid infrastructure\n- Does more to support your regulatory compliance initiatives\n- Offers convenience and flexibility, integrating with leading public cloud platforms such as AWS and Microsoft Azure.","hyperlink":"","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"Monthly subscription based on band levels over 5,000+ nodes.","partner_benefits":" \u2022 Increase sales revenue and net new customers <\/p>\n \u2022 Access to volume-based pricing<\/p>\n \u2022 Monthly licensing belongs to the partner not the end user<\/p>\n \u2022 Product and sales trainings and certification <\/p>\n \u2022 Standard and premium technical support <\/p>\n \u2022 Sales and marketing materials<\/p>\n \u2022 Five premium incidents are included for technical support. <\/p>\n \u2022 Reduces IT costs and frees up resources.<\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 Unified management for all your software assets<\/p>\n \u2022 On-premise and in the cloud<\/p>\n \u2022 Through a single console<\/p>\n \u2022 Providing full visibility and transparency<\/p>\n \u2022 Enabling smooth and efficient orchestration and administration<\/p>","mssp_available":"0","org_id":"1","vendor_name":"Kaspersky","region":"","solutions_practice":"","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","category_2":"Managed Security Service","category_1":"Web Security"},{"product_id":"554","product_name":"Internet Gateway","description":"Kaspersky Security for Internet Gateways offers significant risk reduction in areas including infection, data leaks and internet distractions. Provides next gen protection again the latest web-based threats. Blocks infections before they can reach your endpoints. Negates the effects of social engineering. Readily complements your existing gateway-level defenses. Reduces your exposure to attack by controlling internet resource usage. Allows the management of multiple independent workspaces.","hyperlink":"","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"Monthly subscription based on band levels over 5,000+ nodes.","partner_benefits":" \u2022 Increase sales revenue and net new customers <\/p>\n \u2022 Access to volume-based pricing<\/p>\n \u2022 Monthly licensing belongs to the partner not the end user<\/p>\n \u2022 Product and sales trainings and certification <\/p>\n \u2022 Standard and premium technical support <\/p>\n \u2022 Sales and marketing materials<\/p>\n \u2022 Five premium incidents are included for technical support. <\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 Supports multi-tenant management capabilities<\/p>\n \u2022 Flexible licensing<\/p>","mssp_available":"0","org_id":"1","vendor_name":"Kaspersky","region":"","solutions_practice":"","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","category_2":"Managed Security Service","category_1":"Web Security"},{"product_id":"555","product_name":"Mail","description":"Kaspersky Security for Mail Servers provides a rock-solid frontline defense for corporate infrastructure by filtering out incoming streams of spam and blocking malicious emails of all types. Works on the latest emailing platforms including Microsoft Exchange and Linux-based. Cloud-assisted spam filtering works in real-time to significantly reduce the traffic load. Ability to exclude specified objects from scanning processes. Automatic restart in the event of a system shutdown helps to determine stable security while determining the cause of the malfunction.","hyperlink":"","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"Monthly subscription based on band levels over 5,000+ nodes.","partner_benefits":" \u2022 Increase sales revenue and net new customers <\/p>\n \u2022 Access to volume-based pricing<\/p>\n \u2022 Monthly licensing belongs to the partner not the end user<\/p>\n \u2022 Product and sales trainings and certification <\/p>\n \u2022 Standard and premium technical support <\/p>\n \u2022 Sales and marketing materials<\/p>\n \u2022 Five premium incidents are included for technical support <\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 User-friendly management tools<\/p>\n \u2022 Information on mail protection status<\/p>\n \u2022 Flexible settings for scans<\/p>\n \u2022 Reporting features<\/p>","mssp_available":"0","org_id":"1","vendor_name":"Kaspersky","region":"","solutions_practice":"","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","category_2":"Managed Security Service","category_1":"Network Security"},{"product_id":"556","product_name":"O365","description":"Detect and block spam and malicious email before it becomes a problem \u2013 without slowing productivity or accidentally deleting legitimate traffic. Advanced heuristics, sandboxing and machine learning protect email from spam, phishing, business email compromise (BEC) and other advanced threats. \ue908Intuitive management from a single, cloud-based console - Kaspersky Business Hub.\n- Complete control over what happens to suspicious email.\n- Latest spam, phishing, malware (including ransomware) protection and advanced attachment filtering.","hyperlink":"","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"Monthly subscription based on band levels over 5,000+ nodes.","partner_benefits":" \u2022 Increase sales revenue and net new customers <\/p>\n \u2022 Access to volume-based pricing<\/p>\n \u2022 Monthly licensing belongs to the partner not the end user<\/p>\n \u2022 Product and sales trainings and certification <\/p>\n \u2022 Standard and premium technical support <\/p>\n \u2022 Sales and marketing materials<\/p>\n \u2022 Five premium incidents are included for technical support. <\/p>\n \u2022 Reduces IT costs and frees up resources. <\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 Managed with a single cloud-based administration console<\/p>","mssp_available":"0","org_id":"1","vendor_name":"Kaspersky","region":"","solutions_practice":"","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","category_2":"Managed Security Service","category_1":"Network Security"},{"product_id":"557","product_name":"Off-Prem Solution Cloud","description":"Endpoint security in the Cloud available in two tiers licensed by user, not device. Tier 1 - offers protection for 2 mobile devices for free, for every license. No device and web controls, but offers all of the other features of Kaspersky's Endpoint. \nTier 2 - Offers Patch Management and Data Encryption. Retains the Web and Device control features, but no application control.","hyperlink":"","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"Monthly subscription based on band levels up to 999","partner_benefits":" \u2022 Increase sales revenue and net new customers <\/p>\n \u2022 Access to volume-based pricing<\/p>\n \u2022 Monthly licensing belongs to the partner not the end user<\/p>\n \u2022 Product and sales trainings and certification <\/p>\n \u2022 Standard and premium technical support <\/p>\n \u2022 Sales and marketing materials<\/p>\n \u2022 Five premium incidents are included for technical support. <\/p>\n \u2022 Reduces IT costs and frees up resources. <\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 Cloud-based console allows administrators to update settings from any remote location<\/p>\n \u2022 Support multi-tenancy<\/p>\n \u2022 Each end customer is limited to 1000 nodes <\/p>","mssp_available":"0","org_id":"1","vendor_name":"Kaspersky","region":"","solutions_practice":"","sub_category_3":"Building Block Solution","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","category_1":"Cloud Security","category_3":"Managed Security Service","category_2":"Mobile Security"},{"product_id":"558","product_name":"On-Prem Solution Advanced","description":"Kaspersky Endpoint Security for Business Advanced includes all of the functionality delivered by Kaspersky Endpoint Security for Business Select, plus additional technologies that do even more to protect your business including data encryption, systems management, patch management, and 3rd party application deployment.","hyperlink":"","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"Monthly subscription based on band levels over 5,000+ nodes.","partner_benefits":" \u2022 Increase sales revenue and net new customers <\/p>\n \u2022 Access to volume-based pricing<\/p>\n \u2022 Monthly licensing belongs to the partner not the end user<\/p>\n \u2022 Product and sales trainings and certification <\/p>\n \u2022 Standard and premium technical support <\/p>\n \u2022 Sales and marketing materials<\/p>\n \u2022 Five premium incidents are included for technical support. <\/p>\n \u2022 Reduces IT costs and frees up resources. <\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 Simple, seamless security administration for desktop, portable, mobile, virtual endpoints and servers<\/p>\n \u2022 Delivered through a single pane of glass <\/p>","mssp_available":"0","org_id":"1","vendor_name":"Kaspersky","region":"","solutions_practice":"","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","category_1":"Endpoint Security","category_2":"Managed Security Service"},{"product_id":"559","product_name":"On-Prem Solution Select","description":"With more of your business operations going digital, you need to protect every server, laptop and mobile device. We deliver Next Gen security in a single solution that helps you protect every endpoint your business runs.\nProtects against the latest threats, including ransomware\nHardens endpoints \u2013 to reduce your exposure to cyberattacks\nHelps boost productivity \u2013 via cloud-enabled usage controls\nProtects servers & endpoints without damaging performance\nSecures diverse environments \u2013 PC, Mac, Linux, iOS & Android\nSimplifies security management \u2013 with one unified console","hyperlink":"","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"Monthly subscription based on band levels over 5,000+ nodes.","partner_benefits":" \u2022 Increase sales revenue and net new customers <\/p>\n \u2022 Access to volume-based pricing<\/p>\n \u2022 Monthly licensing belongs to the partner not the end user<\/p>\n \u2022 Product and sales trainings and certification <\/p>\n \u2022 Standard and premium technical support <\/p>\n \u2022 Sales and marketing materials<\/p>\n \u2022 Five premium incidents are included for technical support. <\/p>\n \u2022 Reduces IT costs and frees up resources. <\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 Simple, seamless security administration for desktop, portable, mobile, virtual endpoints and servers<\/p>\n \u2022 Delivered through a single pane of glass <\/p>","mssp_available":"0","org_id":"1","vendor_name":"Kaspersky","region":"","solutions_practice":"","sub_category_3":"Building Block Solution","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","category_2":"Data Security","category_1":"Endpoint Security","category_3":"Managed Security Service"},{"product_id":"560","product_name":"Small Office","description":"Designed for small businesses using computers, file servers, laptops and mobile devices. Protects Mac and Window PCs\/file servers. Ransomware protection, System Watcher, with rollback feature. File encryption and backup for extra layers of protection. Offer Safe Money and Password Manager.","hyperlink":"","td_contact":"psckaspersky@techdata.com","td_extension":"800-237-8931 x5545037","vendor_id":"39","service_tiering":"Monthly subscription based on band levels up to 49 nodes.","partner_benefits":" \u2022 Increase sales revenue and net new customers <\/p>\n \u2022 Access to volume-based pricing<\/p>\n \u2022 Monthly licensing belongs to the partner not the end user<\/p>\n \u2022 Product and sales trainings and certification <\/p>\n \u2022 Standard and premium technical support <\/p>\n \u2022 Sales and marketing materials<\/p>\n \u2022 Five premium incidents are included for technical support. <\/p>\n \u2022 Reduces IT costs and frees up resources. <\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 Designed for small business. <\/p>\n \u2022 Installs in under 10 minutes. <\/p>\n \u2022 Manage anywhere via online portal ksos.kaspersky.com<\/p>","mssp_available":"0","org_id":"1","vendor_name":"Kaspersky","region":"","solutions_practice":"","sub_category_2":"Building Block Solution","sub_category_3":"Building Block Solution","sub_category_4":"Building Block Solution","sub_category_1":"Building Block Solution","category_3":"Data Security","category_1":"Endpoint Security","category_4":"Managed Security Service","category_2":"Mobile Security"},{"product_id":"561","product_name":"Prevention","description":"Malwarebytes offers two endpoint protection platforms featuring seven layers of technology, driven by the industry's best-informed telemetry, to protect your endpoints against known and unknown threats.","hyperlink":"https:\/\/www.malwarebytes.com\/business\/products\/","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"40","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Malwarebytes","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"562","product_name":"Remediation","description":"Malwarebytes Incident Response is a threat detection and remediation platform that completely removes advanced threats from enterprise endpoints, both Windows and Mac.","hyperlink":"https:\/\/www.malwarebytes.com\/business\/products\/","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"40","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Malwarebytes","region":"","solutions_practice":"","sub_category_1":"Incident Response","category_1":"Security Intelligence"},{"product_id":"563","product_name":"Active Response","description":"McAfee Active Response is endpoint detection and response software that helps you find and remediate advanced threats.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/active-response.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Incident Response","category_1":"Security Intelligence"},{"product_id":"564","product_name":"Advanced Correlation Engine","description":"McAfee Advanced Correlation Engine supplements McAfee Enterprise Security Manager (SIEM) event correlation with two dedicated correlation engines: A risk detection engine that generates a risk score and a threat detection engine.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/advanced-correlation-engine.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","category_1":"Security Intelligence","sub_category_1":"Threat Intelligence"},{"product_id":"565","product_name":"Advanced Threat Defense","description":"McAfee Advanced Threat Defense protects against advanced malware, including zero-day and advanced persistent threats, providing the strongest advanced threat protection available.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/advanced-threat-defense.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Advanced Malware Protection","category_1":"Endpoint Security"},{"product_id":"566","product_name":"McAfee Application Control","description":"McAfee Application Control guards enterprises against unauthorized applications and malware on servers and endpoints by using a dynamic trust model.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/application-control.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Critical System Protection\/Application Whitelisting","category_1":"Endpoint Security"},{"product_id":"567","product_name":"Application Data Monitor","description":"McAfee Application Data Monitor decodes an entire application session to Layer 7 to detect fraud, data loss, and hidden threats, and create an audit trail for application compliance.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/application-data-monitor.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","category_1":"Data Security","sub_category_1":"File Integrity Monitoring"},{"product_id":"568","product_name":"Behavioral Analytics","description":"McAfee Behavioral Analytics is a security analytics technology that alerts you to risk employee behavior and other malicious activity that can put your data and systems at risk.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/behavioral-analytics.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_2":"Other","sub_category_1":"Predictive Analytics","category_1":"Security Intelligence","category_2":"Security Intelligence"},{"product_id":"569","product_name":"Change Control","description":"McAfee Change Control enforces change policies and alerts you to file integrity issues, while providing options to easily block unauthorized changes to critical system files and directories.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/change-control.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","category_1":"Data Security","sub_category_1":"File Integrity Monitoring"},{"product_id":"570","product_name":"Cloud Workload Security","description":"McAfee Cloud Workload Security automates the discovery and defense of elastic workloads to eliminate blind spots, deliver advanced threat defense, and simplify hybrid and public cloud security management.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/cloud-workload-security.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","category_1":"Cloud Security","sub_category_1":"Other"},{"product_id":"571","product_name":"Complete Data Protection","description":"McAfee Complete Data Protection delivers powerful endpoint encryption integrated with centralized management to prevent unauthorized access and data loss.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/complete-data-protection.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"572","product_name":"Complete Data Protection\u2014Advanced","description":"McAfee Complete Data Protection\u2014Advanced uses full-disk encryption, authentication, data loss prevention, and access controls to safeguard sensitive information at rest, during use, and in motion.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/complete-data-protection-advanced.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"573","product_name":"Complete Endpoint Protection\u2014Business","description":"McAfee Complete Endpoint Protection\u2014Business is an integrated endpoint security suite that protects PCs, Macs, Linux systems, servers, virtual systems, smartphones, and tablets from online threats.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/complete-endpoint-protection-business.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"574","product_name":"Complete Endpoint Threat Protection","description":"McAfee Complete Endpoint Threat Protection provides advanced defenses that investigate, contain, and take action against zero-day threats and sophisticated attacks.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/complete-endpoint-threat-protection.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"575","product_name":"Data Center Security Suite for Databases","description":"McAfee Data Center Security Suite for Databases offers real-time, reliable protection for business-critical databases, and requires no architecture changes, costly hardware, or database downtime.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/data-center-security-suite-for-databases.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Critical System Protection\/Application Whitelisting","category_1":"Endpoint Security"},{"product_id":"576","product_name":"Database Event Monitor for SIEM","description":"McAfee Database Event Monitor for SIEM provides non-intrusive, detailed discovery, logging, and correlation of database transactions, including access to regulated data.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/database-event-monitor-for-siem.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","category_1":"Data Security","sub_category_1":"Database Activity Monitoring"},{"product_id":"577","product_name":"Device Control","description":"McAfee Device Control protects against data loss by monitoring and controlling data transfers from PCs to removable storage devices such as USB drives.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/device-control.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","category_1":"Data Security","sub_category_1":"Device control"},{"product_id":"578","product_name":"DLP Discover","description":"McAfee Data Loss Prevention (DLP) Discover finds your sensitive data even if the location is unknown. Using advanced network crawling technology, it searches systems based on LAN segment, IP address range, network group, and many other easily defined criteria.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/dlp-discover.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Data and Discovery Classification","category_1":"Data Security"},{"product_id":"579","product_name":"DLP Endpoint","description":"McAfee Data Loss Prevention (DLP) Endpoint safeguards intellectual property and ensures compliance by protecting sensitive data on endpoint systems.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/dlp-endpoint.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Data Loss Prevention","category_1":"Data Security"},{"product_id":"580","product_name":"DLP Monitor","description":"McAfee Data Loss Prevention (DLP) Monitor provides industry-leading data protection scanning and analysis that examines network traffic at a deeper level than any other data protection solution on the market.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/dlp-monitor.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Data Loss Prevention","category_1":"Data Security"},{"product_id":"581","product_name":"DLP Prevent","description":"McAfee Data Loss Prevention (DLP) Prevent delivers comprehensive scans of inbound and outbound network traffic across all ports, protocols, and content types.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/dlp-prevent.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Data Loss Prevention","category_1":"Data Security"},{"product_id":"582","product_name":"Embedded Control","description":"McAfee Embedded Control helps device manufacturers secure embedded systems from malware and attacks by hackers and cybercriminals","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/embedded-control.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","category_1":"Data Security","sub_category_1":"Other"},{"product_id":"583","product_name":"Endpoint Protection for SMB","description":"McAfee Endpoint Protection for SMB delivers simple and affordable endpoint security, web security and data protection designed for small and medium-size businesses.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/endpoint-protection-for-smb.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"584","product_name":"Endpoint Protection\u2014Advanced Suite","description":"McAfee Endpoint Protection\u2014Advanced Suite delivers proactive anti-malware protection, access control, and centralized policy-based management to keep your assets safe and compliant.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/endpoint-protection-advanced-suite.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"585","product_name":"McAfee Endpoint Security","description":"McAfee Endpoint Security speeds threat detection and remediation with a framework that enables fast scanning, instant threat detection and updates, and maximized CPU performance.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/endpoint-security.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"586","product_name":"Endpoint Security for Mac","description":"McAfee Endpoint Security for Mac provides essential endpoint protection for Macs to protect against viruses, spyware, Trojan horses, and other malware threats.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/endpoint-security-for-mac.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"587","product_name":"Endpoint Threat Defense","description":"McAfee Endpoint Threat Defense is an endpoint security solution that detects zero-day threats, advanced malware, and targeted attacks, and secures endpoint patient zero.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/endpoint-threat-defense.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"588","product_name":"Endpoint Threat Defense and Response","description":"McAfee Endpoint Threat Defense and Response includes advanced protection and endpoint detection and response (EDR) technology that detects, hunts, contains, and eliminates advanced threats, such as ransomware and other greyware.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/endpoint-threat-defense-response.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"589","product_name":"Endpoint Threat Protection","description":"McAfee Endpoint Threat Protection delivers essential, effective endpoint protection to protect against advanced threats.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/endpoint-threat-protection.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"590","product_name":"Enterprise Log Manager","description":"McAfee Enterprise Log Manager automates log management and analysis for all log types, including Windows event logs, database logs, application logs, and syslogs, and integrates with McAfee SIEM for analysis and incident management.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/enterprise-log-manager.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Log Management","category_1":"Security Intelligence"},{"product_id":"591","product_name":"Enterprise Security Manager","description":"McAfee Enterprise Security Manager delivers intelligent, fast, and accurate security and information (SIEM) and log management.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/enterprise-security-manager.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Management","category_1":"Security Intelligence"},{"product_id":"592","product_name":"ePolicy Orchestrator","description":"McAfee ePolicy Orchestrator (McAfee ePO) software centralizes and streamlines management of endpoint, network, and data security, and compliance solutions, to drive down the cost and complexity of security management.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/epolicy-orchestrator.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Management","category_1":"Security Intelligence"},{"product_id":"593","product_name":"Event Receiver","description":"McAfee Event Receiver collects third-party events and logs, and correlates events collected by other distributed receivers for system-wide threat detection and fast security data retrieval and analysis.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/event-receiver.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Other","category_1":"Security Intelligence"},{"product_id":"594","product_name":"Global Threat Intelligence (GTI) for ESM","description":"Built for big security data, McAfee Global Threat Intelligence (GTI) for ESM puts the power of McAfee Labs directly into the security monitoring flow using McAfee\u2019s high-speed, highly intelligent security information and event management (SIEM).","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/global-threat-intelligence-esm.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","category_1":"Security Intelligence","sub_category_1":"Threat Intelligence"},{"product_id":"595","product_name":"Host Intrusion Prevention for Desktop","description":"McAfee Host Intrusion Prevention for Desktop protects your systems from known and emerging threats\u2014all through a simple management platform.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/host-ips-for-desktop.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Intrusion Detection and Prevention","category_1":"Network Security"},{"product_id":"596","product_name":"Host Intrusion Prevention for Server","description":"McAfee Host Intrusion Prevention for Server guards against zero-day attacks, keeps servers up and running, reduces patch requirements, and protects critical corporate assets.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/host-ips-for-server.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Intrusion Detection and Prevention","category_1":"Network Security"},{"product_id":"597","product_name":"Integrity Control","description":"McAfee Integrity Control blocks out-of-policy changes, ensuring that only trusted applications run on fixed-function and point-of-service systems.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/integrity-control.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Other","category_1":"Security Intelligence"},{"product_id":"598","product_name":"Investigator","description":"McAfee Investigator provides interactive, cloud-based security analytics so incident responders can investigate malware, network threats, and indicators of compromise (IOCs) in less time, with increased accuracy, using automation, human expertise, and machine learning.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/investigator.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Predictive Analytics","category_1":"Security Intelligence"},{"product_id":"599","product_name":"MOVE AntiVirus","description":"McAfee Management for Optimized Virtual Environments (MOVE) AntiVirus optimizes security, flexibility, and management for virtual environments, increasing the options for companies investing in virtualization for data centers, applications, and desktops.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/move-anti-virus.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"600","product_name":"Network Security Platform","description":"McAfee Network Security Platform guards all your network-connected devices from zero-day and other attacks, with a cost-effective network intrusion prevention system.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/network-security-platform.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Intrusion Detection and Prevention","category_1":"Network Security"},{"product_id":"601","product_name":"Policy Auditor","description":"McAfee Policy Auditor automates IT audits to help you easily meet industry security compliance requirements and save time.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/policy-auditor.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Other","category_1":"Security Intelligence"},{"product_id":"602","product_name":"Security for Email Servers","description":"McAfee Security for Email Servers detects and blocks viruses, spam, and other unwanted programs on inbound and outbound emails on Microsoft Exchange and Lotus Domino servers.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/security-for-email-servers.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Email Security\/Gateway","category_1":"Network Security"},{"product_id":"603","product_name":"Security for Microsoft SharePoint","description":"McAfee Security for Microsoft SharePoint filters content and detects, blocks, and removes malware to secure information in SharePoint servers.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/security-for-microsoft-sharepoint.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Critical System Protection\/Application Whitelisting","category_1":"Endpoint Security"},{"product_id":"604","product_name":"Security Suite for Virtual Desktop Infrastructure","description":"McAfee Security Suite for Virtual Desktop Infrastructure (VDI) provides a scalable security solution specifically designed to manage and optimize security for VDI.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/data-center-security-suite-for-vdi.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"605","product_name":"Server Security Suite Advanced","description":"McAfee Server Security Suite Advanced delivers comprehensive server protection and management for physical, virtual, and cloud deployments. It discovers, protects, and expands workloads into the cloud, and includes whitelisting and change control technologies to help ensure regulatory compliance.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/server-security-suite-advanced.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Critical System Protection\/Application Whitelisting","category_1":"Endpoint Security"},{"product_id":"606","product_name":"Server Security Suite Essentials","description":"McAfee Server Security Suite Essentials provides foundational server security protection and management for physical, virtual, and cloud deployments, enabling customers to discover, protect, and expand workloads into the cloud with automatic provisioning of security policies.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/server-security-suite-essentials.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Critical System Protection\/Application Whitelisting","category_1":"Endpoint Security"},{"product_id":"607","product_name":"SiteAdvisor Enterprise","description":"McAfee SiteAdvisor allows you to surf and search the web safely, avoiding online threats such as spyware, adware, and phishing scams.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/siteadvisor-enterprise.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"URL Filtering\/Web Gateway"},{"product_id":"608","product_name":"Skyhigh Security Cloud","description":"McAfee Skyhigh Security Cloud is a cloud access security broker (CASB) that protects enterprise data and users across all cloud services, including SaaS, PaaS, and IaaS.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/skyhigh-security-cloud.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"CASB","category_1":"Cloud Security"},{"product_id":"609","product_name":"Threat Intelligence Exchange","description":"McAfee Threat Intelligence Exchange optimizes threat prevention by narrowing the gap from malware encounter to containment from days, weeks, and months down to milliseconds.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/threat-intelligence-exchange.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","category_1":"Security Intelligence","sub_category_1":"Threat Intelligence"},{"product_id":"610","product_name":"Total Protection for Data Loss Prevention","description":"McAfee Total Protection for Data Loss Prevention (DLP) enables you to be proactive about data protection, and ensures that you create effective information protection policies.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/total-protection-for-data-loss-prevention.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Data Loss Prevention","category_1":"Data Security"},{"product_id":"611","product_name":"Virtual Network Security Platform","description":"With support for network virtualization, VMware NSX, and Amazon Web Services (AWS), McAfee Virtual Network Security Platform enables the flexibility to quickly scale security based upon the changing dynamics of virtualized workloads.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/virtual-network-security-platform.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Other"},{"product_id":"612","product_name":"VirusScan Enterprise","description":"Upgrade from McAfee VirusScan Enterprise to McAfee Endpoint Security, our newest security solution that offers comprehensive antivirus, anti-malware, desktop firewall, and web control.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/virusscan-enterprise.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"613","product_name":"VirusScan Enterprise for Linux","description":"McAfee VirusScan Enterprise for Linux keeps viruses and other malware off Linux systems with a scalable and easy-to-manage solution.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/virusscan-enterprise-for-linux.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"614","product_name":"VirusScan Enterprise for Storage","description":"McAfee VirusScan Enterprise for Storage blocks and removes malware from network-attached (NAS) storage devices.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/virusscan-enterprise-for-storage.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"615","product_name":"Vulnerability Manager for Databases","description":"McAfee Vulnerability Manager for Databases conducts more than 4,700 vulnerability checks against leading database systems such as Oracle, Microsoft SQL Server, IBM DB2, and MySQL.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/vulnerability-manager-databases.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Vulnerability Management\/Patching"},{"product_id":"616","product_name":"Web Gateway","description":"McAfee Web Gateway is a high-performance secure web gateway with best-in-class threat protection in one unified appliance software architecture.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/web-gateway.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"URL Filtering\/Web Gateway"},{"product_id":"617","product_name":"Web Gateway Cloud Service","description":"McAfee Web Gateway Cloud Service is a cloud-delivered web security service built with best-in-class threat protection available to organizations around the world.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/web-gateway-cloud-service.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"URL Filtering\/Web Gateway"},{"product_id":"618","product_name":"Web Protection","description":"McAfee Web Protection delivers best-in-class internet threat protection for devices, users, and locations everywhere.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/web-protection.html","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"URL Filtering\/Web Gateway"},{"product_id":"619","product_name":"Endpoint Security (ENS)","description":"McAfee Endpoint Security delivers centrally managed defenses with integrated capabilities like endpoint detection and response and machine learning analysis. Protect your Windows, Mac, and Linux systems with multiple, collaborative defenses and automated responses.","hyperlink":"","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"Annual Subscription\/PayGo","partner_benefits":" \u2022 Machine learning analysis:<\/strong> Detect zero-day threats in near real time by examining how they look and behave to halt threats designed to evade detection.<\/p>\n \u2022 Dynamic application containment:<\/strong> Defend against ransomware and greyware by securing endpoints that are leveraged as entry points for attacks.<\/p>\n \u2022 Proactive web security:<\/strong> Ensure safe browsing with web protection and filtering for endpoints.<\/p>\n \u2022 Advanced anti-malware protection:<\/strong> Our anti-malware engine is continually updated by McAfee Global Threat Intelligence and works efficiently across multiple operating systems.<\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 Zero-impact user scans for greater user productivity.<\/p>\n \u2022 Stronger forensic data to help you harden your policies.<\/p>\n \u2022 Performance improvements.<\/p>\n \u2022 Fewer agents to manage, along with scan avoidance, to reduce manual entry.<\/p>\n \u2022 Collaborative defenses that work together to defeat advanced threats.<\/p>\n \u2022 A next-generation framework that is ready to plug into our other advanced threat and endpoint detection.<\/p>","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","category_1":"Endpoint Security","category_2":"Managed Security Service"},{"product_id":"620","product_name":"MVISION Cloud","description":"McAfee MVISION Cloud is a cloud access security broker (CASB) that protects data where it lives today, with a solution that was built natively in the cloud, for the cloud. It\u2019s cloud-native data security.","hyperlink":"","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"Annual Subscription\/PayGo","partner_benefits":" \u2022 DETECT:<\/strong> Gain complete visibility into data, context and user behavior across all cloud services, users and devices.<\/p>\n \u2022 PROTECT: <\/strong> Apply persistent protection to sensitive information where it goes inside or outside the cloud.<\/p>\n \u2022 CORRECT: <\/strong>Take real-time actions within cloud services to correct policy violations and stop security threats.<\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 Enforce data loss prevention (DLP) policies across data in the cloud Prevent unauthorized sharing of sensitive data to the wrong people <\/p>\n \u2022 Block sync\/download of corporate data to personal devices Detect compromised accounts, insider threats, and malware<\/p>\n \u2022 Encrypt cloud data with keys that only you can access <\/p>\n \u2022 Audit and tighten the security settings of cloud services<\/p>","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","category_1":"Cloud Security","category_2":"Managed Security Service"},{"product_id":"621","product_name":"MVISION Endpoint","description":"McAfee MVISION Endpoint is a unified management and automated workflow control across native and non-native endpoint defense technologies. It augments the security built into Windows 10 and combats sophisticated threats. It delivers machine learning, credential theft monitoring, and rollback remediation to block advanced, traditional, and zero-day threats. It is managed by our industry-leading McAfee ePolicy Orchestrator (McAfee ePO) platform, which provides a single pane of glass to manage Microsoft and McAfee defense settings as well as a centralized view of the attack surface.","hyperlink":"","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"Annual Subscription\/PayGo","partner_benefits":" \u2022 Advanced defenses for advanced threats: <\/strong> Machine-learning, credential theft defense, and rollback remediation complement Windows 10 basic security capabilities. <\/p>\n \u2022 No additional complexity: <\/strong> Manage McAfee technologies, Windows Defender Antivirus policies, Defender Exploit Guard, and Windows Firewall settings using a single policy and console.<\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 Centralized management for all devices<\/p>\n \u2022 Advanced, file, fileless, and behavioral machine learning defenses<\/p>\n \u2022 Protection for your Mac, Linux, IoT, and mobile devices<\/p>\n \u2022 Lower your TCO and streamline workflows<\/p>","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","category_1":"Endpoint Security","category_2":"Managed Security Service"},{"product_id":"622","product_name":"MVISION ePolicy Orchestrator","description":"McAfee MVISION ePO\u2122 eliminates the need for maintenance of an on-premises security infrastructure, allowing the security professional to focus exclusively on security. Simply access from a browser with your credentials and manage your security.","hyperlink":"","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"Annual Subscription\/PayGo","partner_benefits":" \u2022 Be consistent and save time by deploying policies to all devices, including those with native controls.<\/p>\n \u2022 Save time and eliminate redundant and labor-intensive efforts by scheduling security compliance reports to meet the needs of each stakeholder.<\/p>\n \u2022 Maintain your security posture by deploying agent or machine-learning security solutions as new devices are added to your corporate network by syncing the McAfee MVISION ePO console with Microsoft Active Directory<\/p>\n \u2022 Single Management Console for all endpoint protection software<\/p>\n \u2022 SaaS Interface, allowing access from anywhere in the world<\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 Graphical security posture Dashboard<\/p>\n \u2022 Role-based access control<\/p>\n \u2022 Two-factor authentication<\/p>\n \u2022 Custom reports and queries<\/p>\n \u2022 Zero downtime upgrades<\/p>\n \u2022 Migration assistance tool for McAfee\u00ae Endpoint Security and McAfee\u00ae VirusScan\u00ae Enterprise<\/p>","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","category_2":"Managed Security Service","category_1":"Security Intelligence"},{"product_id":"623","product_name":"MVISION Mobile","description":"McAfee MVISION Mobile provides visibility and mobile threat defense for iOS and Android devices to ensure they are safeguarded just like any other device. Unlike cloud-based mobile security solutions that rely on app sandboxing or traffic tunneling, McAfee MVISION Mobile sits directly on mobile devices to provide always-on protection no matter how a device is connected (corporate network, public access point (AP), cellular carrier, or even offline).","hyperlink":"","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"41","service_tiering":"Annual Subscription\/PayGo","partner_benefits":" \u2022 On Device Protection<\/p>\n \u2022 Unified Management <\/p>\n \u2022 Security Infrastructure Integration with existing MDM or EMM Solutions <\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 Optimal mobile security provides on-device, real-time protection that detects mobile threats and protects against zero-day attacks<\/p>\n \u2022 Protection that highlights privacy risks in applications to protect users and ensure that they are aware of the dangers associated with any given application<\/p>\n \u2022 Enterprise-grade actionable mobile threat intelligence to help you better understand and quickly respond to mobile threats. <\/p>\n \u2022 Compliance control for mobile devices, allowing your employees to work anywhere, any time and on any device. <\/p>\n \u2022 Protect users against phishing by detecting harmful links found in text messages, social media apps, and email.<\/p>","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","category_2":"Managed Security Service","category_1":"Mobile Security"},{"product_id":"624","product_name":"Active Response","description":"McAfee Active Response is endpoint detection and response software that helps you find and remediate advanced threats.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/active-response.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Incident Response","category_1":"Security Intelligence"},{"product_id":"625","product_name":"Advanced Correlation Engine","description":"McAfee Advanced Correlation Engine supplements McAfee Enterprise Security Manager (SIEM) event correlation with two dedicated correlation engines: A risk detection engine that generates a risk score and a threat detection engine.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/advanced-correlation-engine.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","category_1":"Security Intelligence","sub_category_1":"Threat Intelligence"},{"product_id":"626","product_name":"Advanced Threat Defense","description":"McAfee Advanced Threat Defense protects against advanced malware, including zero-day and advanced persistent threats, providing the strongest advanced threat protection available.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/advanced-threat-defense.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Advanced Malware Protection","category_1":"Endpoint Security"},{"product_id":"627","product_name":"McAfee Application Control","description":"McAfee Application Control guards enterprises against unauthorized applications and malware on servers and endpoints by using a dynamic trust model.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/application-control.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Critical System Protection\/Application Whitelisting","category_1":"Endpoint Security"},{"product_id":"628","product_name":"Application Data Monitor","description":"McAfee Application Data Monitor decodes an entire application session to Layer 7 to detect fraud, data loss, and hidden threats, and create an audit trail for application compliance.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/application-data-monitor.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","category_1":"Data Security","sub_category_1":"File Integrity Monitoring"},{"product_id":"629","product_name":"Behavioral Analytics","description":"McAfee Behavioral Analytics is a security analytics technology that alerts you to risk employee behavior and other malicious activity that can put your data and systems at risk.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/behavioral-analytics.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_2":"Other","sub_category_1":"Predictive Analytics","category_1":"Security Intelligence","category_2":"Security Intelligence"},{"product_id":"630","product_name":"Change Control","description":"McAfee Change Control enforces change policies and alerts you to file integrity issues, while providing options to easily block unauthorized changes to critical system files and directories.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/change-control.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","category_1":"Data Security","sub_category_1":"File Integrity Monitoring"},{"product_id":"631","product_name":"Cloud Workload Security","description":"McAfee Cloud Workload Security automates the discovery and defense of elastic workloads to eliminate blind spots, deliver advanced threat defense, and simplify hybrid and public cloud security management.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/cloud-workload-security.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","category_1":"Cloud Security","sub_category_1":"Other"},{"product_id":"632","product_name":"Complete Data Protection","description":"McAfee Complete Data Protection delivers powerful endpoint encryption integrated with centralized management to prevent unauthorized access and data loss.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/complete-data-protection.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"633","product_name":"Complete Data Protection\u2014Advanced","description":"McAfee Complete Data Protection\u2014Advanced uses full-disk encryption, authentication, data loss prevention, and access controls to safeguard sensitive information at rest, during use, and in motion.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/complete-data-protection-advanced.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"634","product_name":"Complete Endpoint Protection\u2014Business","description":"McAfee Complete Endpoint Protection\u2014Business is an integrated endpoint security suite that protects PCs, Macs, Linux systems, servers, virtual systems, smartphones, and tablets from online threats.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/complete-endpoint-protection-business.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"635","product_name":"Complete Endpoint Threat Protection","description":"McAfee Complete Endpoint Threat Protection provides advanced defenses that investigate, contain, and take action against zero-day threats and sophisticated attacks.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/complete-endpoint-threat-protection.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"636","product_name":"Data Center Security Suite for Databases","description":"McAfee Data Center Security Suite for Databases offers real-time, reliable protection for business-critical databases, and requires no architecture changes, costly hardware, or database downtime.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/data-center-security-suite-for-databases.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Critical System Protection\/Application Whitelisting","category_1":"Endpoint Security"},{"product_id":"637","product_name":"Database Event Monitor for SIEM","description":"McAfee Database Event Monitor for SIEM provides non-intrusive, detailed discovery, logging, and correlation of database transactions, including access to regulated data.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/database-event-monitor-for-siem.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","category_1":"Data Security","sub_category_1":"Database Activity Monitoring"},{"product_id":"638","product_name":"Device Control","description":"McAfee Device Control protects against data loss by monitoring and controlling data transfers from PCs to removable storage devices such as USB drives.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/device-control.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","category_1":"Data Security","sub_category_1":"Device control"},{"product_id":"639","product_name":"DLP Discover","description":"McAfee Data Loss Prevention (DLP) Discover finds your sensitive data even if the location is unknown. Using advanced network crawling technology, it searches systems based on LAN segment, IP address range, network group, and many other easily defined criteria.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/dlp-discover.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Data and Discovery Classification","category_1":"Data Security"},{"product_id":"640","product_name":"DLP Endpoint","description":"McAfee Data Loss Prevention (DLP) Endpoint safeguards intellectual property and ensures compliance by protecting sensitive data on endpoint systems.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/dlp-endpoint.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Data Loss Prevention","category_1":"Data Security"},{"product_id":"641","product_name":"DLP Monitor","description":"McAfee Data Loss Prevention (DLP) Monitor provides industry-leading data protection scanning and analysis that examines network traffic at a deeper level than any other data protection solution on the market.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/dlp-monitor.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Data Loss Prevention","category_1":"Data Security"},{"product_id":"642","product_name":"DLP Prevent","description":"McAfee Data Loss Prevention (DLP) Prevent delivers comprehensive scans of inbound and outbound network traffic across all ports, protocols, and content types.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/dlp-prevent.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Data Loss Prevention","category_1":"Data Security"},{"product_id":"643","product_name":"Embedded Control","description":"McAfee Embedded Control helps device manufacturers secure embedded systems from malware and attacks by hackers and cybercriminals","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/embedded-control.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","category_1":"Data Security","sub_category_1":"Other"},{"product_id":"644","product_name":"Endpoint Protection for SMB","description":"McAfee Endpoint Protection for SMB delivers simple and affordable endpoint security, web security and data protection designed for small and medium-size businesses.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/endpoint-protection-for-smb.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"645","product_name":"Endpoint Protection\u2014Advanced Suite","description":"McAfee Endpoint Protection\u2014Advanced Suite delivers proactive anti-malware protection, access control, and centralized policy-based management to keep your assets safe and compliant.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/endpoint-protection-advanced-suite.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"646","product_name":"McAfee Endpoint Security","description":"McAfee Endpoint Security speeds threat detection and remediation with a framework that enables fast scanning, instant threat detection and updates, and maximized CPU performance.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/endpoint-security.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"647","product_name":"Endpoint Security for Mac","description":"McAfee Endpoint Security for Mac provides essential endpoint protection for Macs to protect against viruses, spyware, Trojan horses, and other malware threats.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/endpoint-security-for-mac.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"648","product_name":"Endpoint Threat Defense","description":"McAfee Endpoint Threat Defense is an endpoint security solution that detects zero-day threats, advanced malware, and targeted attacks, and secures endpoint patient zero.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/endpoint-threat-defense.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"649","product_name":"Endpoint Threat Defense and Response","description":"McAfee Endpoint Threat Defense and Response includes advanced protection and endpoint detection and response (EDR) technology that detects, hunts, contains, and eliminates advanced threats, such as ransomware and other greyware.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/endpoint-threat-defense-response.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"650","product_name":"Endpoint Threat Protection","description":"McAfee Endpoint Threat Protection delivers essential, effective endpoint protection to protect against advanced threats.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/endpoint-threat-protection.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"651","product_name":"Enterprise Log Manager","description":"McAfee Enterprise Log Manager automates log management and analysis for all log types, including Windows event logs, database logs, application logs, and syslogs, and integrates with McAfee SIEM for analysis and incident management.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/enterprise-log-manager.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Log Management","category_1":"Security Intelligence"},{"product_id":"652","product_name":"Enterprise Security Manager","description":"McAfee Enterprise Security Manager delivers intelligent, fast, and accurate security and information (SIEM) and log management.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/enterprise-security-manager.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Management","category_1":"Security Intelligence"},{"product_id":"653","product_name":"ePolicy Orchestrator","description":"McAfee ePolicy Orchestrator (McAfee ePO) software centralizes and streamlines management of endpoint, network, and data security, and compliance solutions, to drive down the cost and complexity of security management.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/epolicy-orchestrator.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Management","category_1":"Security Intelligence"},{"product_id":"654","product_name":"Event Receiver","description":"McAfee Event Receiver collects third-party events and logs, and correlates events collected by other distributed receivers for system-wide threat detection and fast security data retrieval and analysis.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/event-receiver.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Other","category_1":"Security Intelligence"},{"product_id":"655","product_name":"Global Threat Intelligence (GTI) for ESM","description":"Built for big security data, McAfee Global Threat Intelligence (GTI) for ESM puts the power of McAfee Labs directly into the security monitoring flow using McAfee\u2019s high-speed, highly intelligent security information and event management (SIEM).","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/global-threat-intelligence-esm.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","category_1":"Security Intelligence","sub_category_1":"Threat Intelligence"},{"product_id":"656","product_name":"Host Intrusion Prevention for Desktop","description":"McAfee Host Intrusion Prevention for Desktop protects your systems from known and emerging threats\u2014all through a simple management platform.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/host-ips-for-desktop.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Intrusion Detection and Prevention","category_1":"Network Security"},{"product_id":"657","product_name":"Host Intrusion Prevention for Server","description":"McAfee Host Intrusion Prevention for Server guards against zero-day attacks, keeps servers up and running, reduces patch requirements, and protects critical corporate assets.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/host-ips-for-server.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Intrusion Detection and Prevention","category_1":"Network Security"},{"product_id":"658","product_name":"Integrity Control","description":"McAfee Integrity Control blocks out-of-policy changes, ensuring that only trusted applications run on fixed-function and point-of-service systems.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/integrity-control.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Other","category_1":"Security Intelligence"},{"product_id":"659","product_name":"Investigator","description":"McAfee Investigator provides interactive, cloud-based security analytics so incident responders can investigate malware, network threats, and indicators of compromise (IOCs) in less time, with increased accuracy, using automation, human expertise, and machine learning.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/investigator.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Predictive Analytics","category_1":"Security Intelligence"},{"product_id":"660","product_name":"MOVE AntiVirus","description":"McAfee Management for Optimized Virtual Environments (MOVE) AntiVirus optimizes security, flexibility, and management for virtual environments, increasing the options for companies investing in virtualization for data centers, applications, and desktops.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/move-anti-virus.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"661","product_name":"Network Security Platform","description":"McAfee Network Security Platform guards all your network-connected devices from zero-day and other attacks, with a cost-effective network intrusion prevention system.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/network-security-platform.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Intrusion Detection and Prevention","category_1":"Network Security"},{"product_id":"662","product_name":"Policy Auditor","description":"McAfee Policy Auditor automates IT audits to help you easily meet industry security compliance requirements and save time.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/policy-auditor.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Other","category_1":"Security Intelligence"},{"product_id":"663","product_name":"Security for Email Servers","description":"McAfee Security for Email Servers detects and blocks viruses, spam, and other unwanted programs on inbound and outbound emails on Microsoft Exchange and Lotus Domino servers.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/security-for-email-servers.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Email Security\/Gateway","category_1":"Network Security"},{"product_id":"664","product_name":"Security for Microsoft SharePoint","description":"McAfee Security for Microsoft SharePoint filters content and detects, blocks, and removes malware to secure information in SharePoint servers.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/security-for-microsoft-sharepoint.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Critical System Protection\/Application Whitelisting","category_1":"Endpoint Security"},{"product_id":"665","product_name":"Security Suite for Virtual Desktop Infrastructure","description":"McAfee Security Suite for Virtual Desktop Infrastructure (VDI) provides a scalable security solution specifically designed to manage and optimize security for VDI.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/data-center-security-suite-for-vdi.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"666","product_name":"Server Security Suite Advanced","description":"McAfee Server Security Suite Advanced delivers comprehensive server protection and management for physical, virtual, and cloud deployments. It discovers, protects, and expands workloads into the cloud, and includes whitelisting and change control technologies to help ensure regulatory compliance.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/server-security-suite-advanced.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Critical System Protection\/Application Whitelisting","category_1":"Endpoint Security"},{"product_id":"667","product_name":"Server Security Suite Essentials","description":"McAfee Server Security Suite Essentials provides foundational server security protection and management for physical, virtual, and cloud deployments, enabling customers to discover, protect, and expand workloads into the cloud with automatic provisioning of security policies.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/server-security-suite-essentials.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Critical System Protection\/Application Whitelisting","category_1":"Endpoint Security"},{"product_id":"668","product_name":"SiteAdvisor Enterprise","description":"McAfee SiteAdvisor allows you to surf and search the web safely, avoiding online threats such as spyware, adware, and phishing scams.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/siteadvisor-enterprise.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"URL Filtering\/Web Gateway"},{"product_id":"669","product_name":"Skyhigh Security Cloud","description":"McAfee Skyhigh Security Cloud is a cloud access security broker (CASB) that protects enterprise data and users across all cloud services, including SaaS, PaaS, and IaaS.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/skyhigh-security-cloud.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"CASB","category_1":"Cloud Security"},{"product_id":"670","product_name":"Threat Intelligence Exchange","description":"McAfee Threat Intelligence Exchange optimizes threat prevention by narrowing the gap from malware encounter to containment from days, weeks, and months down to milliseconds.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/threat-intelligence-exchange.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","category_1":"Security Intelligence","sub_category_1":"Threat Intelligence"},{"product_id":"671","product_name":"Total Protection for Data Loss Prevention","description":"McAfee Total Protection for Data Loss Prevention (DLP) enables you to be proactive about data protection, and ensures that you create effective information protection policies.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/total-protection-for-data-loss-prevention.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Data Loss Prevention","category_1":"Data Security"},{"product_id":"672","product_name":"Virtual Network Security Platform","description":"With support for network virtualization, VMware NSX, and Amazon Web Services (AWS), McAfee Virtual Network Security Platform enables the flexibility to quickly scale security based upon the changing dynamics of virtualized workloads.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/virtual-network-security-platform.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Other"},{"product_id":"673","product_name":"VirusScan Enterprise","description":"Upgrade from McAfee VirusScan Enterprise to McAfee Endpoint Security, our newest security solution that offers comprehensive antivirus, anti-malware, desktop firewall, and web control.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/virusscan-enterprise.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"674","product_name":"VirusScan Enterprise for Linux","description":"McAfee VirusScan Enterprise for Linux keeps viruses and other malware off Linux systems with a scalable and easy-to-manage solution.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/virusscan-enterprise-for-linux.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"675","product_name":"VirusScan Enterprise for Storage","description":"McAfee VirusScan Enterprise for Storage blocks and removes malware from network-attached (NAS) storage devices.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/virusscan-enterprise-for-storage.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"676","product_name":"Vulnerability Manager for Databases","description":"McAfee Vulnerability Manager for Databases conducts more than 4,700 vulnerability checks against leading database systems such as Oracle, Microsoft SQL Server, IBM DB2, and MySQL.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/vulnerability-manager-databases.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Vulnerability Management\/Patching"},{"product_id":"677","product_name":"Web Gateway","description":"McAfee Web Gateway is a high-performance secure web gateway with best-in-class threat protection in one unified appliance software architecture.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/web-gateway.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"URL Filtering\/Web Gateway"},{"product_id":"678","product_name":"Web Gateway Cloud Service","description":"McAfee Web Gateway Cloud Service is a cloud-delivered web security service built with best-in-class threat protection available to organizations around the world.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/web-gateway-cloud-service.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"URL Filtering\/Web Gateway"},{"product_id":"679","product_name":"Web Protection","description":"McAfee Web Protection delivers best-in-class internet threat protection for devices, users, and locations everywhere.","hyperlink":"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/web-protection.html","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"URL Filtering\/Web Gateway"},{"product_id":"680","product_name":"Endpoint Security (ENS)","description":"McAfee Endpoint Security delivers centrally managed defenses with integrated capabilities like endpoint detection and response and machine learning analysis. Protect your Windows, Mac, and Linux systems with multiple, collaborative defenses and automated responses.","hyperlink":"","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"Annual Subscription\/PayGo","partner_benefits":" \u2022 Machine learning analysis:<\/strong> Detect zero-day threats in near real time by examining how they look and behave to halt threats designed to evade detection.<\/p>\n \u2022 Dynamic application containment:<\/strong> Defend against ransomware and greyware by securing endpoints that are leveraged as entry points for attacks.<\/p>\n \u2022 Proactive web security:<\/strong> Ensure safe browsing with web protection and filtering for endpoints.<\/p>\n \u2022 Advanced anti-malware protection:<\/strong> Our anti-malware engine is continually updated by McAfee Global Threat Intelligence and works efficiently across multiple operating systems.<\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 Zero-impact user scans for greater user productivity.<\/p>\n \u2022 Stronger forensic data to help you harden your policies.<\/p>\n \u2022 Performance improvements.<\/p>\n \u2022 Fewer agents to manage, along with scan avoidance, to reduce manual entry.<\/p>\n \u2022 Collaborative defenses that work together to defeat advanced threats.<\/p>\n \u2022 A next-generation framework that is ready to plug into our other advanced threat and endpoint detection.<\/p>","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","category_1":"Endpoint Security","category_2":"Managed Security Service"},{"product_id":"681","product_name":"MVISION Cloud","description":"McAfee MVISION Cloud is a cloud access security broker (CASB) that protects data where it lives today, with a solution that was built natively in the cloud, for the cloud. It\u2019s cloud-native data security.","hyperlink":"","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"Annual Subscription\/PayGo","partner_benefits":" \u2022 DETECT:<\/strong> Gain complete visibility into data, context and user behavior across all cloud services, users and devices.<\/p>\n \u2022 PROTECT: <\/strong> Apply persistent protection to sensitive information where it goes inside or outside the cloud.<\/p>\n \u2022 CORRECT: <\/strong>Take real-time actions within cloud services to correct policy violations and stop security threats.<\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 Enforce data loss prevention (DLP) policies across data in the cloud Prevent unauthorized sharing of sensitive data to the wrong people <\/p>\n \u2022 Block sync\/download of corporate data to personal devices Detect compromised accounts, insider threats, and malware<\/p>\n \u2022 Encrypt cloud data with keys that only you can access <\/p>\n \u2022 Audit and tighten the security settings of cloud services<\/p>","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","category_1":"Cloud Security","category_2":"Managed Security Service"},{"product_id":"682","product_name":"MVISION Endpoint","description":"McAfee MVISION Endpoint is a unified management and automated workflow control across native and non-native endpoint defense technologies. It augments the security built into Windows 10 and combats sophisticated threats. It delivers machine learning, credential theft monitoring, and rollback remediation to block advanced, traditional, and zero-day threats. It is managed by our industry-leading McAfee ePolicy Orchestrator (McAfee ePO) platform, which provides a single pane of glass to manage Microsoft and McAfee defense settings as well as a centralized view of the attack surface.","hyperlink":"","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"Annual Subscription\/PayGo","partner_benefits":" \u2022 Advanced defenses for advanced threats: <\/strong> Machine-learning, credential theft defense, and rollback remediation complement Windows 10 basic security capabilities. <\/p>\n \u2022 No additional complexity: <\/strong> Manage McAfee technologies, Windows Defender Antivirus policies, Defender Exploit Guard, and Windows Firewall settings using a single policy and console.<\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 Centralized management for all devices<\/p>\n \u2022 Advanced, file, fileless, and behavioral machine learning defenses<\/p>\n \u2022 Protection for your Mac, Linux, IoT, and mobile devices<\/p>\n \u2022 Lower your TCO and streamline workflows<\/p>","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","category_1":"Endpoint Security","category_2":"Managed Security Service"},{"product_id":"683","product_name":"MVISION ePolicy Orchestrator","description":"McAfee MVISION ePO\u2122 eliminates the need for maintenance of an on-premises security infrastructure, allowing the security professional to focus exclusively on security. Simply access from a browser with your credentials and manage your security.","hyperlink":"","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"Annual Subscription\/PayGo","partner_benefits":" \u2022 Be consistent and save time by deploying policies to all devices, including those with native controls.<\/p>\n \u2022 Save time and eliminate redundant and labor-intensive efforts by scheduling security compliance reports to meet the needs of each stakeholder.<\/p>\n \u2022 Maintain your security posture by deploying agent or machine-learning security solutions as new devices are added to your corporate network by syncing the McAfee MVISION ePO console with Microsoft Active Directory<\/p>\n \u2022 Single Management Console for all endpoint protection software<\/p>\n \u2022 SaaS Interface, allowing access from anywhere in the world<\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 Graphical security posture Dashboard<\/p>\n \u2022 Role-based access control<\/p>\n \u2022 Two-factor authentication<\/p>\n \u2022 Custom reports and queries<\/p>\n \u2022 Zero downtime upgrades<\/p>\n \u2022 Migration assistance tool for McAfee\u00ae Endpoint Security and McAfee\u00ae VirusScan\u00ae Enterprise<\/p>","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","category_2":"Managed Security Service","category_1":"Security Intelligence"},{"product_id":"684","product_name":"MVISION Mobile","description":"McAfee MVISION Mobile provides visibility and mobile threat defense for iOS and Android devices to ensure they are safeguarded just like any other device. Unlike cloud-based mobile security solutions that rely on app sandboxing or traffic tunneling, McAfee MVISION Mobile sits directly on mobile devices to provide always-on protection no matter how a device is connected (corporate network, public access point (AP), cellular carrier, or even offline).","hyperlink":"","td_contact":"mcafee@techdata.com","td_extension":"800-237-8931 x5545034","vendor_id":"41","service_tiering":"Annual Subscription\/PayGo","partner_benefits":" \u2022 On Device Protection<\/p>\n \u2022 Unified Management <\/p>\n \u2022 Security Infrastructure Integration with existing MDM or EMM Solutions <\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 Optimal mobile security provides on-device, real-time protection that detects mobile threats and protects against zero-day attacks<\/p>\n \u2022 Protection that highlights privacy risks in applications to protect users and ensure that they are aware of the dangers associated with any given application<\/p>\n \u2022 Enterprise-grade actionable mobile threat intelligence to help you better understand and quickly respond to mobile threats. <\/p>\n \u2022 Compliance control for mobile devices, allowing your employees to work anywhere, any time and on any device. <\/p>\n \u2022 Protect users against phishing by detecting harmful links found in text messages, social media apps, and email.<\/p>","mssp_available":"0","org_id":"1","vendor_name":"McAfee","region":"","solutions_practice":"","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","category_2":"Managed Security Service","category_1":"Mobile Security"},{"product_id":"685","product_name":"Access Manager\u00a0","description":"Provides single sign-on for enterprises and federation for cloud applications","hyperlink":"https:\/\/www.netiq.com\/products\/access-manager\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Cloud Security","sub_category_1":"Other"},{"product_id":"686","product_name":"Advanced Authentication\u00a0","description":"Move beyond username and passwords and securely protect data and applications","hyperlink":"https:\/\/www.netiq.com\/products\/advanced-authentication\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"MultiFactor and Advanced Authentication"},{"product_id":"687","product_name":"Application Defender\u00a0","description":"Gain visibility into application abuse while protecting software from exploits","hyperlink":"https:\/\/software.microfocus.com\/en-us\/software\/application-defender","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Application Security","sub_category_1":"Other"},{"product_id":"688","product_name":"ArcSight Data Platform\u00a0","description":"A future-ready, open platform that transforms data chaos into security insight","hyperlink":"https:\/\/software.microfocus.com\/en-us\/software\/siem-data-collection-log-management-platform","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Security Intelligence","sub_category_1":"SIEM"},{"product_id":"689","product_name":"ArcSight Enterprise Security Manager (ESM)\u00a0","description":"A comprehensive threat detection, analysis, and compliance management SIEM solution","hyperlink":"https:\/\/software.microfocus.com\/en-us\/software\/siem-security-information-event-management","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Security Intelligence","sub_category_1":"SIEM"},{"product_id":"690","product_name":"ArcSight Investigate\u00a0","description":"An intuitive hunt and investigation solution that decreases security incidents","hyperlink":"https:\/\/software.microfocus.com\/en-us\/software\/arcsight-investigate","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","sub_category_1":"Forensics","category_1":"Security Intelligence"},{"product_id":"691","product_name":"ArcSight User Behavior Analytics (UBA)\u00a0","description":"Detect unknown threats through real-time analytics","hyperlink":"https:\/\/software.microfocus.com\/en-us\/software\/siem-big-data-security-analytics","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","sub_category_1":"Predictive Analytics","category_1":"Security Intelligence"},{"product_id":"692","product_name":"Atalla HSM\u00a0","description":"FIPS 140-2 Level 3 hardware cryptographic appliance to meet compliance standards","hyperlink":"https:\/\/software.microfocus.com\/en-us\/software\/hardware-security-module-hsm-atalla-nsp","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Data Security","sub_category_1":"Other"},{"product_id":"693","product_name":"Change Guardian\u00a0","description":"Identifies and responds to unmanaged changes that could lead to security breaches. Protect critical data, reduce risk and manage change with Change Guardian","hyperlink":"https:\/\/www.netiq.com\/products\/change-guardian\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Data Security","sub_category_1":"File Integrity Monitoring"},{"product_id":"694","product_name":"Directory & Resource Administrator\u00a0","description":"Limits administrative privileges and restricts directory views to specific users","hyperlink":"https:\/\/www.netiq.com\/products\/directory-resource-administrator\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"Privileged Access Management"},{"product_id":"695","product_name":"Enterprise Secure Key Manager\u00a0","description":"Automated encryption key lifecycle management appliance","hyperlink":"https:\/\/software.microfocus.com\/en-us\/software\/eskm-enterprise-secure-key-management","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Data Security","sub_category_1":"Other"},{"product_id":"696","product_name":"Exchange Administrator\u00a0","description":"Provides Exchange administration that restricts privileges to specific users","hyperlink":"https:\/\/www.netiq.com\/products\/exchange-administrator\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"Privileged Access Management"},{"product_id":"697","product_name":"Fortify on Demand\u00a0","description":"Manage your entire application security program from one interface","hyperlink":"https:\/\/software.microfocus.com\/en-us\/software\/fortify-on-demand","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","sub_category_1":"Management","category_1":"Security Intelligence"},{"product_id":"698","product_name":"Fortify Software Security Center\u00a0","description":"Gain valuable insight with a centralized management repository for scan results","hyperlink":"https:\/\/software.microfocus.com\/en-us\/software\/software-security-assurance-sdlc","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","sub_category_1":"Management","category_1":"Security Intelligence"},{"product_id":"699","product_name":"Fortify Static Code Analyzer\u00a0","description":"Identifies security vulnerabilities in source code early in software development","hyperlink":"https:\/\/software.microfocus.com\/en-us\/software\/sca","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Application Security","sub_category_1":"Static Source Code Scanning"},{"product_id":"700","product_name":"Fortify WebInspect\u00a0","description":"Provides comprehensive dynamic analysis of complex web applications and services","hyperlink":"https:\/\/software.microfocus.com\/en-us\/software\/webinspect","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Application Security","sub_category_1":"Dynamic Vulnerability Analysis"},{"product_id":"701","product_name":"Group Policy Administrator\u00a0","description":"Edit, test, and review Microsoft Group Policy Objects changes before implementation","hyperlink":"https:\/\/www.netiq.com\/products\/group-policy-administrator\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","sub_category_3":"Directory Management","category_1":"Identity and Access","category_2":"Identity and Access","category_3":"Identity and Access","sub_category_2":"Identity Governance","sub_category_1":"User Provisioning"},{"product_id":"702","product_name":"Host Access Management & Security Server\u00a0","description":"Integrate the host with your modern security framework","hyperlink":"https:\/\/www.microfocus.com\/products\/mss\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Endpoint Security Management"},{"product_id":"703","product_name":"Identity Governance\u00a0","description":"Provides automated user access review and recertification to remain compliant","hyperlink":"https:\/\/www.netiq.com\/products\/identity-governance\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"Identity Governance"},{"product_id":"704","product_name":"Identity Manager\u00a0","description":"Delivers an intelligent identity management framework to service your enterprise","hyperlink":"https:\/\/www.netiq.com\/products\/identity-manager\/advanced\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"Other"},{"product_id":"705","product_name":"Privileged Account Manager\u00a0","description":"Enables IT administrators to work on systems without exposing credentials","hyperlink":"https:\/\/www.netiq.com\/products\/privileged-account-manager\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Endpoint Security Management"},{"product_id":"706","product_name":"Reflection for Secure IT\u00a0","description":"File transfer protection to control privileged users and stop persistent threats","hyperlink":"https:\/\/www.microfocus.com\/products\/reflection-secure-it\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Data Security","sub_category_1":"Other"},{"product_id":"707","product_name":"Secure Configuration Manager\u00a0","description":"Finds and repairs configuration errors that lead to security breaches or downtime","hyperlink":"https:\/\/www.netiq.com\/products\/secure-configuration-manager\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","sub_category_1":"Other","category_1":"Security Intelligence"},{"product_id":"708","product_name":"Secure Messaging Gateway\u00a0","description":"Protect your network and messaging system from malware, viruses, and harmful content","hyperlink":"https:\/\/www.microfocus.com\/products\/secure-gateway\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","sub_category_1":"Email Security\/Gateway","category_1":"Network Security"},{"product_id":"709","product_name":"SecureLogin\u00a0","description":"Streamlines authentication for enterprise apps with a single login experience","hyperlink":"https:\/\/www.netiq.com\/products\/securelogin\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"MultiFactor and Advanced Authentication"},{"product_id":"710","product_name":"Security Intelligence & Operations Consulting\u00a0","description":"Consulting to help build and mature enterprise security operation capabilities","hyperlink":"https:\/\/software.microfocus.com\/en-us\/software\/security-operations-center","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","sub_category_1":"Other","category_1":"Security Intelligence"},{"product_id":"711","product_name":"Security Solutions for IBM i\u00a0","description":"Provides easy compliance auditing and real-time protection for IBM iSeries systems","hyperlink":"https:\/\/www.netiq.com\/products\/ibmi\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Other"},{"product_id":"712","product_name":"Self Service Password Reset\u00a0","description":"Enables users to reset their passwords without the help of IT","hyperlink":"https:\/\/www.netiq.com\/products\/self-service-password-reset\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Other"},{"product_id":"713","product_name":"Sentinel\u00a0","description":"A fully-featured, adaptable solution that simplifies the day-to-day use of SIEM","hyperlink":"https:\/\/www.netiq.com\/products\/sentinel\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Security Intelligence","sub_category_1":"SIEM"},{"product_id":"714","product_name":"Voltage SecureData Enterprise\u00a0","description":"Format-preserving encryption, tokenization, data masking, and key management","hyperlink":"https:\/\/software.microfocus.com\/en-us\/software\/voltage-data-encryption-security","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Data Security","sub_category_1":"File, Folder and\/or Email Encryption"},{"product_id":"715","product_name":"Voltage SecureData for Payments\u00a0","description":"Omni-channel PCI compliance and data protection for end-to-end payments security","hyperlink":"https:\/\/software.microfocus.com\/en-us\/products\/omnichannel-payment-security\/overview","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Advanced Fraud Security","sub_category_1":"Other"},{"product_id":"716","product_name":"Voltage SecureMail Cloud\u00a0","description":"SaaS cloud email encryption to protect information on Office 365","hyperlink":"https:\/\/software.microfocus.com\/en-us\/products\/cloud-email-encryption\/overview","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","sub_category_1":"Data Loss Prevention","category_1":"Data Security","sub_category_2":"Email Security\/Gateway","category_2":"Network Security"},{"product_id":"717","product_name":"Voltage SecureMail On-Premises\u00a0","description":"Email, file, and Office 365 protection for PII, PHI, and Intellectual Property","hyperlink":"https:\/\/software.microfocus.com\/en-us\/products\/email-encryption-security\/overview","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","sub_category_1":"Data Loss Prevention","category_1":"Data Security","sub_category_2":"Email Security\/Gateway","category_2":"Network Security"},{"product_id":"718","product_name":"Voltage SecureMail\u00a0","description":"Scalable, end-to-end encrypted email solution for desktop, cloud, and mobile","hyperlink":"https:\/\/software.microfocus.com\/en-us\/software\/secure-email-encryption","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","sub_category_1":"Data Loss Prevention","category_1":"Data Security","sub_category_2":"Email Security\/Gateway","category_2":"Network Security"},{"product_id":"719","product_name":"ZENworks Asset Management\u00a0","description":"Provides reports that integrate licensing, installation, and usage data","hyperlink":"https:\/\/www.microfocus.com\/products\/zenworks\/asset-management\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Endpoint Security Management"},{"product_id":"720","product_name":"ZENworks Configuration Management\u00a0","description":"Provides automated endpoint management, software distribution, support, and more","hyperlink":"https:\/\/www.microfocus.com\/products\/zenworks\/configuration-management\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Endpoint Security Management"},{"product_id":"721","product_name":"ZENworks Desktop Containers\u00a0","description":"Package, test, and deploy containerized Windows apps quickly and easily","hyperlink":"https:\/\/www.microfocus.com\/products\/desktop-containers\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Other"},{"product_id":"722","product_name":"ZENworks Endpoint Security Management\u00a0","description":"Delivers identity-based protection for devices and features total protection","hyperlink":"https:\/\/www.microfocus.com\/products\/zenworks\/endpoint-security-management\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Endpoint Security Management"},{"product_id":"723","product_name":"ZENworks Full Disk Encryption\u00a0","description":"Proactive laptop and desktop data protection to automatically lock out threats","hyperlink":"https:\/\/www.microfocus.com\/products\/zenworks\/full-disk-encryption\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Data Security","sub_category_1":"Endpoint Encryption"},{"product_id":"724","product_name":"ZENworks Mobile Workspace\u00a0","description":"Enable users to securely access data while respecting privacy and device freedom","hyperlink":"https:\/\/www.microfocus.com\/products\/zenworks\/mobile-workspace\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Mobile Security","sub_category_1":"Other"},{"product_id":"725","product_name":"ZENworks Patch Management\u00a0","description":"Automates patch assessment and monitors patch compliance for security vulnerabilities","hyperlink":"https:\/\/www.microfocus.com\/products\/zenworks\/patch-management\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Vulnerability Management\/Patching"},{"product_id":"726","product_name":"ZENworks Service Desk\u00a0","description":"Streamlines and automates the way you provide IT services to your business","hyperlink":"https:\/\/www.microfocus.com\/products\/service-desk\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Endpoint Security Management"},{"product_id":"727","product_name":"ZENworks Suite\u00a0","description":"Seven integrated products to help track, manage, and protect endpoint devices","hyperlink":"https:\/\/www.microfocus.com\/products\/zenworks\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Endpoint Security Management"},{"product_id":"728","product_name":"Access Manager\u00a0","description":"Provides single sign-on for enterprises and federation for cloud applications","hyperlink":"https:\/\/www.netiq.com\/products\/access-manager\/","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Cloud Security","sub_category_1":"Other"},{"product_id":"729","product_name":"Advanced Authentication\u00a0","description":"Move beyond username and passwords and securely protect data and applications","hyperlink":"https:\/\/www.netiq.com\/products\/advanced-authentication\/","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"MultiFactor and Advanced Authentication"},{"product_id":"730","product_name":"Application Defender\u00a0","description":"Gain visibility into application abuse while protecting software from exploits","hyperlink":"https:\/\/software.microfocus.com\/en-us\/software\/application-defender","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Application Security","sub_category_1":"Other"},{"product_id":"731","product_name":"ArcSight Data Platform\u00a0","description":"A future-ready, open platform that transforms data chaos into security insight","hyperlink":"https:\/\/software.microfocus.com\/en-us\/software\/siem-data-collection-log-management-platform","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Security Intelligence","sub_category_1":"SIEM"},{"product_id":"732","product_name":"ArcSight Enterprise Security Manager (ESM)\u00a0","description":"A comprehensive threat detection, analysis, and compliance management SIEM solution","hyperlink":"https:\/\/software.microfocus.com\/en-us\/software\/siem-security-information-event-management","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Security Intelligence","sub_category_1":"SIEM"},{"product_id":"733","product_name":"ArcSight Investigate\u00a0","description":"An intuitive hunt and investigation solution that decreases security incidents","hyperlink":"https:\/\/software.microfocus.com\/en-us\/software\/arcsight-investigate","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","sub_category_1":"Forensics","category_1":"Security Intelligence"},{"product_id":"734","product_name":"ArcSight User Behavior Analytics (UBA)\u00a0","description":"Detect unknown threats through real-time analytics","hyperlink":"https:\/\/software.microfocus.com\/en-us\/software\/siem-big-data-security-analytics","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","sub_category_1":"Predictive Analytics","category_1":"Security Intelligence"},{"product_id":"735","product_name":"Atalla HSM\u00a0","description":"FIPS 140-2 Level 3 hardware cryptographic appliance to meet compliance standards","hyperlink":"https:\/\/software.microfocus.com\/en-us\/software\/hardware-security-module-hsm-atalla-nsp","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Data Security","sub_category_1":"Other"},{"product_id":"736","product_name":"Change Guardian\u00a0","description":"Identifies and responds to unmanaged changes that could lead to security breaches. Protect critical data, reduce risk and manage change with Change Guardian","hyperlink":"https:\/\/www.netiq.com\/products\/change-guardian\/","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Data Security","sub_category_1":"File Integrity Monitoring"},{"product_id":"737","product_name":"Directory & Resource Administrator\u00a0","description":"Limits administrative privileges and restricts directory views to specific users","hyperlink":"https:\/\/www.netiq.com\/products\/directory-resource-administrator\/","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"Privleged User Management"},{"product_id":"738","product_name":"Enterprise Secure Key Manager\u00a0","description":"Automated encryption key lifecycle management appliance","hyperlink":"https:\/\/software.microfocus.com\/en-us\/software\/eskm-enterprise-secure-key-management","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Data Security","sub_category_1":"Other"},{"product_id":"739","product_name":"Exchange Administrator\u00a0","description":"Provides Exchange administration that restricts privileges to specific users","hyperlink":"https:\/\/www.netiq.com\/products\/exchange-administrator\/","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"Privleged User Management"},{"product_id":"740","product_name":"Fortify on Demand\u00a0","description":"Manage your entire application security program from one interface","hyperlink":"https:\/\/software.microfocus.com\/en-us\/software\/fortify-on-demand","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","sub_category_1":"Management","category_1":"Security Intelligence"},{"product_id":"741","product_name":"Fortify Software Security Center\u00a0","description":"Gain valuable insight with a centralized management repository for scan results","hyperlink":"https:\/\/software.microfocus.com\/en-us\/software\/software-security-assurance-sdlc","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","sub_category_1":"Management","category_1":"Security Intelligence"},{"product_id":"742","product_name":"Fortify Static Code Analyzer\u00a0","description":"Identifies security vulnerabilities in source code early in software development","hyperlink":"https:\/\/software.microfocus.com\/en-us\/software\/sca","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Application Security","sub_category_1":"Static Source Code Scanning"},{"product_id":"743","product_name":"Fortify WebInspect\u00a0","description":"Provides comprehensive dynamic analysis of complex web applications and services","hyperlink":"https:\/\/software.microfocus.com\/en-us\/software\/webinspect","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Application Security","sub_category_1":"Dynamic Vulnerability Analysis"},{"product_id":"744","product_name":"Group Policy Administrator\u00a0","description":"Edit, test, and review Microsoft Group Policy Objects changes before implementation","hyperlink":"https:\/\/www.netiq.com\/products\/group-policy-administrator\/","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","sub_category_3":"Directory Management","category_1":"Identity and Access","category_2":"Identity and Access","category_3":"Identity and Access","sub_category_2":"Identity Governance","sub_category_1":"User Provisioning"},{"product_id":"745","product_name":"Host Access Management & Security Server\u00a0","description":"Integrate the host with your modern security framework","hyperlink":"https:\/\/www.microfocus.com\/products\/mss\/","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Endpoint Security Management"},{"product_id":"746","product_name":"Identity Governance\u00a0","description":"Provides automated user access review and recertification to remain compliant","hyperlink":"https:\/\/www.netiq.com\/products\/identity-governance\/","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"Identity Governance"},{"product_id":"747","product_name":"Identity Manager\u00a0","description":"Delivers an intelligent identity management framework to service your enterprise","hyperlink":"https:\/\/www.netiq.com\/products\/identity-manager\/advanced\/","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"Other"},{"product_id":"748","product_name":"Privileged Account Manager\u00a0","description":"Enables IT administrators to work on systems without exposing credentials","hyperlink":"https:\/\/www.netiq.com\/products\/privileged-account-manager\/","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Endpoint Security Management"},{"product_id":"749","product_name":"Reflection for Secure IT\u00a0","description":"File transfer protection to control privileged users and stop persistent threats","hyperlink":"https:\/\/www.microfocus.com\/products\/reflection-secure-it\/","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Data Security","sub_category_1":"Other"},{"product_id":"750","product_name":"Secure Configuration Manager\u00a0","description":"Finds and repairs configuration errors that lead to security breaches or downtime","hyperlink":"https:\/\/www.netiq.com\/products\/secure-configuration-manager\/","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","sub_category_1":"Other","category_1":"Security Intelligence"},{"product_id":"751","product_name":"Secure Messaging Gateway\u00a0","description":"Protect your network and messaging system from malware, viruses, and harmful content","hyperlink":"https:\/\/www.microfocus.com\/products\/secure-gateway\/","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","sub_category_1":"Email Security\/Gateway","category_1":"Network Security"},{"product_id":"752","product_name":"SecureLogin\u00a0","description":"Streamlines authentication for enterprise apps with a single login experience","hyperlink":"https:\/\/www.netiq.com\/products\/securelogin\/","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"MultiFactor and Advanced Authentication"},{"product_id":"753","product_name":"Security Intelligence & Operations Consulting\u00a0","description":"Consulting to help build and mature enterprise security operation capabilities","hyperlink":"https:\/\/software.microfocus.com\/en-us\/software\/security-operations-center","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","sub_category_1":"Other","category_1":"Security Intelligence"},{"product_id":"754","product_name":"Security Solutions for IBM i\u00a0","description":"Provides easy compliance auditing and real-time protection for IBM iSeries systems","hyperlink":"https:\/\/www.netiq.com\/products\/ibmi\/","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Other"},{"product_id":"755","product_name":"Self Service Password Reset\u00a0","description":"Enables users to reset their passwords without the help of IT","hyperlink":"https:\/\/www.netiq.com\/products\/self-service-password-reset\/","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Other"},{"product_id":"756","product_name":"Sentinel\u00a0","description":"A fully-featured, adaptable solution that simplifies the day-to-day use of SIEM","hyperlink":"https:\/\/www.netiq.com\/products\/sentinel\/","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Security Intelligence","sub_category_1":"SIEM"},{"product_id":"757","product_name":"Voltage SecureData Enterprise\u00a0","description":"Format-preserving encryption, tokenization, data masking, and key management","hyperlink":"https:\/\/software.microfocus.com\/en-us\/software\/voltage-data-encryption-security","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Data Security","sub_category_1":"File, Folder and\/or Email Encryption"},{"product_id":"758","product_name":"Voltage SecureData for Payments\u00a0","description":"Omni-channel PCI compliance and data protection for end-to-end payments security","hyperlink":"https:\/\/software.microfocus.com\/en-us\/products\/omnichannel-payment-security\/overview","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Advanced Fraud Security","sub_category_1":"Other"},{"product_id":"759","product_name":"Voltage SecureMail Cloud\u00a0","description":"SaaS cloud email encryption to protect information on Office 365","hyperlink":"https:\/\/software.microfocus.com\/en-us\/products\/cloud-email-encryption\/overview","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","sub_category_1":"Data Loss Prevention","category_1":"Data Security","sub_category_2":"Email Security\/Gateway","category_2":"Network Security"},{"product_id":"760","product_name":"Voltage SecureMail On-Premises\u00a0","description":"Email, file, and Office 365 protection for PII, PHI, and Intellectual Property","hyperlink":"https:\/\/software.microfocus.com\/en-us\/products\/email-encryption-security\/overview","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","sub_category_1":"Data Loss Prevention","category_1":"Data Security","sub_category_2":"Email Security\/Gateway","category_2":"Network Security"},{"product_id":"761","product_name":"Voltage SecureMail\u00a0","description":"Scalable, end-to-end encrypted email solution for desktop, cloud, and mobile","hyperlink":"https:\/\/software.microfocus.com\/en-us\/software\/secure-email-encryption","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","sub_category_1":"Data Loss Prevention","category_1":"Data Security","sub_category_2":"Email Security\/Gateway","category_2":"Network Security"},{"product_id":"762","product_name":"ZENworks Asset Management\u00a0","description":"Provides reports that integrate licensing, installation, and usage data","hyperlink":"https:\/\/www.microfocus.com\/products\/zenworks\/asset-management\/","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Endpoint Security Management"},{"product_id":"763","product_name":"ZENworks Configuration Management\u00a0","description":"Provides automated endpoint management, software distribution, support, and more","hyperlink":"https:\/\/www.microfocus.com\/products\/zenworks\/configuration-management\/","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Endpoint Security Management"},{"product_id":"764","product_name":"ZENworks Desktop Containers\u00a0","description":"Package, test, and deploy containerized Windows apps quickly and easily","hyperlink":"https:\/\/www.microfocus.com\/products\/desktop-containers\/","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Other"},{"product_id":"765","product_name":"ZENworks Endpoint Security Management\u00a0","description":"Delivers identity-based protection for devices and features total protection","hyperlink":"https:\/\/www.microfocus.com\/products\/zenworks\/endpoint-security-management\/","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Endpoint Security Management"},{"product_id":"766","product_name":"ZENworks Full Disk Encryption\u00a0","description":"Proactive laptop and desktop data protection to automatically lock out threats","hyperlink":"https:\/\/www.microfocus.com\/products\/zenworks\/full-disk-encryption\/","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Data Security","sub_category_1":"Endpoint Encryption"},{"product_id":"767","product_name":"ZENworks Mobile Workspace\u00a0","description":"Enable users to securely access data while respecting privacy and device freedom","hyperlink":"https:\/\/www.microfocus.com\/products\/zenworks\/mobile-workspace\/","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Mobile Security","sub_category_1":"Other"},{"product_id":"768","product_name":"ZENworks Patch Management\u00a0","description":"Automates patch assessment and monitors patch compliance for security vulnerabilities","hyperlink":"https:\/\/www.microfocus.com\/products\/zenworks\/patch-management\/","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Vulnerability Management\/Patching"},{"product_id":"769","product_name":"ZENworks Service Desk\u00a0","description":"Streamlines and automates the way you provide IT services to your business","hyperlink":"https:\/\/www.microfocus.com\/products\/service-desk\/","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Endpoint Security Management"},{"product_id":"770","product_name":"ZENworks Suite\u00a0","description":"Seven integrated products to help track, manage, and protect endpoint devices","hyperlink":"https:\/\/www.microfocus.com\/products\/zenworks\/","td_contact":"microfocus@techdata.com","td_extension":"","vendor_id":"42","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"MicroFocus","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Endpoint Security Management"},{"product_id":"771","product_name":"Azure Active Directory","description":"Azure Active Directory (Azure AD) helps you manage user identities and create intelligence-driven access policies to secure your resources. As an integral component of Office 365, Azure and Enterprise Mobility + Security, Azure AD centralizes identity and access management to enable deep security, productivity, and management across devices, data, apps, and infrastructure. Azure AD is built to work for apps in the cloud, on mobile, or on-premises, and you can layer security features such as conditional access to help protect users and your business.","hyperlink":"https:\/\/www.microsoft.com\/cloud-platform\/azure-active-directory","td_contact":"microsoft@techdata.com","td_extension":"800-237-8931 x5545006","vendor_id":"43","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Microsoft","region":"","solutions_practice":"","category_2":"Cloud Security","sub_category_1":"Directory Management","category_1":"Identity and Access","sub_category_2":"Other"},{"product_id":"772","product_name":"Azure MFA","description":"Azure Multi-Factor Authentication helps safeguard access to data and applications while maintaining simplicity for users. It provides additional security by requiring a second form of authentication and delivers strong authentication via a range of easy to use authentication methods. Users may or may not be challenged for MFA based on configuration decisions that an administrator makes.\n\nYour applications or services don't need to make any changes to use Azure Multi-Factor Authentication. The verification prompts are part of the Azure AD sign-in event, which automatically requests and processes the MFA challenge when required.","hyperlink":"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/authentication\/concept-mfa-howitworks","td_contact":"microsoft@techdata.com","td_extension":"800-237-8931 x5545006","vendor_id":"43","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Microsoft","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"MultiFactor and Advanced Authentication"},{"product_id":"773","product_name":"Azure Advanced Threat Protection","description":"With Azure Advanced Threat Protection, the power and scale of the cloud help you safeguard against threats that are increasing in frequency, severity, and sophistication. Detect and investigate security incidents across your enterprise with a cloud-based security solution that supports the most demanding security analytics workloads.","hyperlink":"https:\/\/azure.microsoft.com\/features\/azure-advanced-threat-protection\/","td_contact":"microsoft@techdata.com","td_extension":"800-237-8931 x5545006","vendor_id":"43","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Microsoft","region":"","solutions_practice":"","sub_category_1":"Advanced Malware Protection","category_2":"Cloud Security","category_1":"Endpoint Security","sub_category_2":"Other"},{"product_id":"774","product_name":"Azure Security Center","description":"Get a unified view of security across all of your on-premises and cloud workloads. Automatically discover and onboard new Azure resources, and apply security policies across your hybrid cloud workloads to ensure compliance with security standards. Collect, search, and analyze security data from a variety of sources, including firewalls and other partner solutions.","hyperlink":"https:\/\/azure.microsoft.com\/services\/security-center\/","td_contact":"microsoft@techdata.com","td_extension":"800-237-8931 x5545006","vendor_id":"43","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Microsoft","region":"","solutions_practice":"","category_1":"Cloud Security","category_2":"Cloud Security","sub_category_1":"Other","sub_category_2":"Other"},{"product_id":"775","product_name":"Microsoft Cloud App Security","description":"Elevate your security posture by taking control of your cloud environment\nMicrosoft Cloud App Security gives you visibility into your cloud apps and services, provides sophisticated analytics to identify and combat cyberthreats and enables you to control how your data travels.","hyperlink":"https:\/\/www.microsoft.com\/en-us\/cloud-platform\/cloud-app-security","td_contact":"microsoft@techdata.com","td_extension":"800-237-8931 x5545006","vendor_id":"43","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Microsoft","region":"","solutions_practice":"","category_2":"Application Security","sub_category_3":"CASB","category_1":"Cloud Security","category_3":"Cloud Security","sub_category_1":"Other","sub_category_2":"Other"},{"product_id":"776","product_name":"Microsoft Advanced Threat Analytics","description":"Detect suspicious activity right away\nReduce your risk of costly damage and get all the information you need in a succinct, real-time view of the attack timeline with Advanced Threat Analytics. All the intelligence to learn, analyze, and identify normal and suspicious user or device behavior is built-in.","hyperlink":"https:\/\/www.microsoft.com\/cloud-platform\/advanced-threat-analytics","td_contact":"microsoft@techdata.com","td_extension":"800-237-8931 x5545006","vendor_id":"43","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Microsoft","region":"","solutions_practice":"","sub_category_1":"Predictive Analytics","category_1":"Security Intelligence","category_2":"Security Intelligence","sub_category_2":"Threat Intelligence"},{"product_id":"777","product_name":"Office 365 Advanced Threat Protection","description":"Get trusted, enterprise-grade threat protection\nWith a hacker attack happening somewhere every 39 seconds, you need trustworthy, tested protection for your digital environment. The Microsoft Office 365 collection of threat-protection technologies helps protect against and provides visibility about spam, malware, viruses, phishing attempts, malicious links, and other threats.","hyperlink":"https:\/\/products.office.com\/business\/security-and-compliance\/threat-protection","td_contact":"microsoft@techdata.com","td_extension":"800-237-8931 x5545006","vendor_id":"43","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Microsoft","region":"","solutions_practice":"","category_2":"Cloud Security","sub_category_1":"Email Security\/Gateway","category_1":"Network Security","sub_category_2":"Other"},{"product_id":"778","product_name":"Office 365 Security & Compliance Center","description":"The Office 365 Security & Compliance Center is your one-stop portal for protecting your data in Office 365. Use the Office 365 Security & Compliance Center to manage compliance for all of your organization\u2019s data across Office 365.","hyperlink":"https:\/\/support.office.com\/article\/Office-365-Security-Compliance-Center-7e696a40-b86b-4a20-afcc-559218b7b1b8","td_contact":"microsoft@techdata.com","td_extension":"800-237-8931 x5545006","vendor_id":"43","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Microsoft","region":"","solutions_practice":"","category_2":"Cloud Security","sub_category_1":"Email Security\/Gateway","category_1":"Network Security","sub_category_2":"Other"},{"product_id":"779","product_name":"Windows Defender Security Center","description":"Security threats are some of the leading concerns our customers have with technology today and that\u2019s why we\u2019ve built Windows 10 to be the most secure version of Windows ever. With comprehensive, built-in security features, Windows 10 provides protection from viruses and malware threats including ransomware, safer authentication with Windows Hello using your smile or fingerprint to login and ongoing security updates delivered monthly through Windows Update, to name a few.","hyperlink":"https:\/\/blogs.windows.com\/windowsexperience\/2017\/01\/23\/introducing-windows-defender-security-center\/","td_contact":"microsoft@techdata.com","td_extension":"800-237-8931 x5545006","vendor_id":"43","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Microsoft","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"780","product_name":"Active Roles","description":"Management and Security for Hybrid Active Directory and Beyond","hyperlink":"https:\/\/www.oneidentity.com\/products\/active-roles\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"44","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"One Identity","region":"","solutions_practice":"","sub_category_1":"Directory Management","category_1":"Identity and Access","category_2":"Identity and Access","category_3":"Identity and Access","sub_category_2":"Identity Governance","sub_category_3":"Privileged Access Management"},{"product_id":"781","product_name":"Authentication Services","description":"Unix and Linux Active Directory authentication that extends infrastructure to the rest of your enterprise","hyperlink":"","td_contact":"oneldus@techdata.com","td_extension":"","vendor_id":"44","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"One Identity","region":"","solutions_practice":"","category_1":"Identity and Access","category_2":"Identity and Access","sub_category_1":"MultiFactor and Advanced Authentication","sub_category_2":"Privileged Access Management"},{"product_id":"782","product_name":"Defender","description":"Two-factor authentication made easy","hyperlink":"https:\/\/www.oneidentity.com\/products\/defender\/","td_contact":"oneldus@techdata.com","td_extension":"","vendor_id":"44","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"One Identity","region":"","solutions_practice":"","category_1":"Identity and Access","category_2":"Identity and Access","sub_category_1":"MultiFactor and Advanced Authentication","sub_category_2":"Privileged Access Management"},{"product_id":"783","product_name":"GoPlex","description":"Manage and monitor MultSess, NC-Access and NCI\/XF","hyperlink":"https:\/\/www.oneidentity.com\/products\/goplex\/","td_contact":"oneldus@techdata.com","td_extension":"","vendor_id":"44","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"One Identity","region":"","solutions_practice":"","category_1":"Identity and Access","category_2":"Identity and Access","sub_category_1":"Other","sub_category_2":"Privileged Access Management"},{"product_id":"784","product_name":"Identity Manager","description":"Take the risk out of enterprise identity and access management","hyperlink":"https:\/\/www.oneidentity.com\/products\/identity-manager\/","td_contact":"oneldus@techdata.com","td_extension":"","vendor_id":"44","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"One Identity","region":"","solutions_practice":"","sub_category_1":"Building Block Solution","category_1":"Identity and Access","category_2":"Identity and Access","sub_category_2":"Privileged Access Management"},{"product_id":"785","product_name":"Identity Manager Data Governance Edition","description":"Data governance that puts you in control of sensitive data access","hyperlink":"https:\/\/www.oneidentity.com\/products\/identity-manager-data-governance\/","td_contact":"oneldus@techdata.com","td_extension":"","vendor_id":"44","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"One Identity","region":"","solutions_practice":"","category_2":"Data Security","sub_category_2":"Database Activity Monitoring","category_1":"Identity and Access","category_3":"Identity and Access","sub_category_1":"Identity Governance","sub_category_3":"Privileged Access Management"},{"product_id":"786","product_name":"MultSess","description":"Access multiple applications in VTAM environments to boost productivity","hyperlink":"https:\/\/www.oneidentity.com\/products\/multsess\/","td_contact":"oneldus@techdata.com","td_extension":"","vendor_id":"44","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"One Identity","region":"","solutions_practice":"","category_1":"Identity and Access","category_2":"Identity and Access","sub_category_1":"Other","sub_category_2":"Privileged Access Management"},{"product_id":"787","product_name":"NC-Access","description":"Simplify network management support with a flexible, full-featured session manager for OS\/390 or z\/OS","hyperlink":"https:\/\/www.oneidentity.com\/products\/nc-access\/","td_contact":"oneldus@techdata.com","td_extension":"","vendor_id":"44","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"One Identity","region":"","solutions_practice":"","category_1":"Identity and Access","category_2":"Identity and Access","sub_category_1":"Identity Governance","sub_category_2":"Privileged Access Management"},{"product_id":"788","product_name":"Firewall-as-a-Service","description":"Now more than ever, advanced firewall capabilities are needed by organizations in order to withstand the increasingly sophisticated assault on their networks. This is particularly true for midsize enterprises, which lack budget, security personnel, and other resources to effectively manage their risk. Buying, testing, integrating, and managing next-gen firewalls is just too complex and expensive. OPAQ\u2019s Firewall-as-a-Service utilizes backend automation and orchestration to provide advanced Next-Generation Firewall capabilities powered by Palo Alto Networks \u2014 delivered from the OPAQ Cloud in the most simplified, cost-effective, and flexible way.","hyperlink":"https:\/\/opaq.com\/solutions\/solutions-by-product\/firewall-as-a-service\/","td_contact":"opaqUS@techdata.com","td_extension":"800-237-8931 x5540434","vendor_id":"45","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Opaq (Fortinet)","region":"","solutions_practice":"","category_1":"Cloud Security","sub_category_2":"Gateway Firewall\/UTM","category_2":"Network Security","sub_category_1":"Other"},{"product_id":"789","product_name":"Endpoint Protection-as-a-Service","description":"Endpoint inventory, protection, detection, and response typically requires multiple, complex security products and manual coordination or integration \u2014 leaving many companies with insufficient risk mitigation where it matters most. OPAQ Endpoint Protection from the OPAQ Cloud provides hardware and software asset inventory, software-defined network segmentation, and instant quarantine capabilities \u2014 which increase visibility and reduce attack surface and response time.","hyperlink":"https:\/\/opaq.com\/solutions\/solutions-by-product\/endpoint-protection\/","td_contact":"opaqUS@techdata.com","td_extension":"800-237-8931 x5540434","vendor_id":"45","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Opaq (Fortinet)","region":"","solutions_practice":"","category_1":"Cloud Security","sub_category_2":"Endpoint Anti-Virus\/Anti-Malware","category_2":"Endpoint Security","sub_category_1":"Other"},{"product_id":"790","product_name":"Identity and Access Management","description":"Oracle\u2019s complete, integrated, next-generation identity management platform provides breakthrough scalability with an industry-leading suite of identity and access management (IAM) solutions for on-premises or hybrid cloud.","hyperlink":"https:\/\/www.oracle.com\/middleware\/identity-management\/index.html","td_contact":"","td_extension":"","vendor_id":"46","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Oracle","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"Identity Governance"},{"product_id":"791","product_name":"CASB Cloud Service","description":"Oracle CASB Cloud Service is a multimode cloud access security broker (CASB) that provides advanced threat analytics using user behavior analytics (UBA) and third-party feeds, configuration seeding, monitoring and alerts, and Shadow IT discovery.","hyperlink":"https:\/\/www.oracle.com\/cloud\/paas\/casb-cloud-service.html","td_contact":"","td_extension":"","vendor_id":"46","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Oracle","region":"","solutions_practice":"","sub_category_1":"CASB","category_1":"Cloud Security"},{"product_id":"792","product_name":"Analytics-Driven Security Monitoring","description":"Oracle Security Monitoring and Analytics (SMA) Cloud Service is an integrated SIEM and UEBA solution for rapid detection, investigation, and remediation of a broad range of security threats and attacks across your IT.","hyperlink":"https:\/\/www.oracle.com\/cloud\/security-monitoring-and-analytics.html","td_contact":"","td_extension":"","vendor_id":"46","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Oracle","region":"","solutions_practice":"","category_1":"Security Intelligence","sub_category_1":"SIEM"},{"product_id":"793","product_name":"Database Security","description":"Oracle Databases hold the majority of the world\u2019s relational data, and are attractive targets for attackers seeking high-value targets for data theft. Compromise of a single Oracle Database can result in tens of millions of breached records costing millions in breach-mitigation activity. Safeguard your most valuable data with Oracle\u2019s powerful preventive and detective security controls, including transparent data encryption, encryption key management, privileged user and multifactor access control, data classification and discovery, database activity monitoring and blocking, consolidated auditing and reporting, and data masking. With Oracle, you can deploy reliable data-security solutions that require no changes to existing applications, saving time and money.","hyperlink":"https:\/\/www.oracle.com\/database\/security\/index.html","td_contact":"","td_extension":"","vendor_id":"46","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Oracle","region":"","solutions_practice":"","category_1":"Data Security","category_2":"Data Security","category_3":"Data Security","sub_category_1":"Database Activity Monitoring","sub_category_2":"Database Activity Monitoring","sub_category_3":"Other"},{"product_id":"794","product_name":"Oracle Configuration and Compliance","description":"Oracle Configuration and Compliance (OCC) Cloud Service is an integrated security configuration and compliance management solution to monitor, assess, and remediate misconfigurations and compliance violations.","hyperlink":"https:\/\/www.oracle.com\/cloud\/configuration-compliance.html","td_contact":"","td_extension":"","vendor_id":"46","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Oracle","region":"","solutions_practice":"","sub_category_1":"Governance, Risk, Compliance, & Audit","category_1":"Security Intelligence"},{"product_id":"795","product_name":"Pwnie Pulse","description":"Pwine Pulse discovers, inventories, and classifies all IT and IoT devices, building a comprehensive identity for each device. Device discovery and classification is performed on a continual basis, without the need for agents or network changes.","hyperlink":"https:\/\/www.pwnieexpress.com\/iot-security","td_contact":"pwnieexpress@techdata.com","td_extension":"","vendor_id":"47","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Pwnie Express (Outpost24)","region":"","solutions_practice":"","category_3":"Endpoint Security","category_1":"Identity and Access","sub_category_2":"Intrusion Detection and Prevention","sub_category_1":"NAC","category_2":"Network Security","sub_category_3":"Other"},{"product_id":"796","product_name":"Email Protection","description":"Proofpoint Email Protection protects users against unwanted and malicious email\u2014\nboth malware and non-malware threats.","hyperlink":"https:\/\/www.proofpoint.com\/us\/products\/email-protection\/email-security-and-protection","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 621","vendor_id":"48","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Proofpoint","region":"","solutions_practice":"","sub_category_1":"Email Security\/Gateway","category_1":"Network Security"},{"product_id":"797","product_name":"Email Fraud Defense (EFD)","description":"Block fraudulent emails before they reach your employees, customers, and partners","hyperlink":"https:\/\/www.proofpoint.com\/us\/products\/email-protection\/email-fraud-defense","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 622","vendor_id":"48","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Proofpoint","region":"","solutions_practice":"","category_2":"Advanced Fraud Security","sub_category_1":"Email Security\/Gateway","category_1":"Network Security","sub_category_2":"Other"},{"product_id":"798","product_name":"Threat Response Auto-Pull (TRAP)","description":"Quarantine malicious email post-delivery and get reports on quarantine attempts","hyperlink":"https:\/\/www.proofpoint.com\/us\/products\/email-protection\/threat-response-auto-pull","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 623","vendor_id":"48","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Proofpoint","region":"","solutions_practice":"","sub_category_1":"Email Security\/Gateway","category_1":"Network Security","category_3":"Network Security","sub_category_2":"Other","sub_category_3":"Sandboxing and APT Protection","category_2":"Web Security"},{"product_id":"799","product_name":"Internal Mail Defense","description":"Proofpoint Internal Mail Defense uses a robust, multilayered approach to protect your\norganization\u2019s internal email and help detect compromised accounts.","hyperlink":"https:\/\/www.proofpoint.com\/us\/products\/email-protection","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 624","vendor_id":"48","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Proofpoint","region":"","solutions_practice":"","sub_category_1":"Email Security\/Gateway","category_1":"Network Security","sub_category_2":"Web Application Protection","category_2":"Web Security"},{"product_id":"800","product_name":"Essentials for Small Business","description":"Essentials for Small Business provides spam filtering, phishing detection, multilayer anti-virus, dynamic sandboxing\nof URLs, a robust filter rules engine, email continuity, policyenforced encryption, email archive and social media account\nprotection.","hyperlink":"https:\/\/www.proofpoint.com\/us\/products\/email-protection\/essentials","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 625","vendor_id":"48","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Proofpoint","region":"","solutions_practice":"","sub_category_2":"Email Security\/Gateway","category_2":"Network Security","sub_category_1":"Turn-Key Solution","category_1":"Web Security"},{"product_id":"801","product_name":"Targeted Attack Protection (TAP)","description":"Protect your people against ransomware and advanced threats in email","hyperlink":"https:\/\/www.proofpoint.com\/us\/products\/advanced-threat-protection\/targeted-attack-protection","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 626","vendor_id":"48","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Proofpoint","region":"","solutions_practice":"","sub_category_1":"Email Security\/Gateway","category_1":"Network Security","category_3":"Network Security","sub_category_2":"Other","sub_category_3":"Sandboxing and APT Protection","category_2":"Web Security"},{"product_id":"802","product_name":"Email Isolation","description":"Email Isolation allows users to freely access personal email while protecting your people and your organization from advanced attacks.","hyperlink":"https:\/\/www.proofpoint.com\/us\/products\/advanced-threat-protection\/email-isolation","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 627","vendor_id":"48","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Proofpoint","region":"","solutions_practice":"","sub_category_1":"Email Security\/Gateway","category_1":"Network Security","sub_category_2":"Web Application Protection","category_2":"Web Security"},{"product_id":"803","product_name":"Browser Isolation","description":"Browser Isolation allows your users to browse the web while preventing malicious content from impacting your corporate devices.","hyperlink":"https:\/\/www.proofpoint.com\/us\/products\/advanced-threat-protection\/browser-isolation","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 628","vendor_id":"48","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Proofpoint","region":"","solutions_practice":"","sub_category_1":"Email Security\/Gateway","category_1":"Network Security","sub_category_2":"Web Application Protection","category_2":"Web Security"},{"product_id":"804","product_name":"Threat Response","description":"Threat Response orchestrates several key phases of the incident response process","hyperlink":"https:\/\/www.proofpoint.com\/us\/products\/advanced-threat-protection\/threat-response","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 629","vendor_id":"48","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Proofpoint","region":"","solutions_practice":"","sub_category_1":"Incident Response","sub_category_2":"Intrusion Detection and Prevention","category_2":"Network Security","category_1":"Security Intelligence"},{"product_id":"805","product_name":"Emerging Threats Intelligence","description":"Proofpoint ET Intelligence delivers the most timely and accurate threat intelligence. Our fully verified intel provides deeper context and integrates seamlessly with your security tools to enhance your decision-making","hyperlink":"https:\/\/www.proofpoint.com\/us\/products\/et-intelligence","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 630","vendor_id":"48","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Proofpoint","region":"","solutions_practice":"","sub_category_3":"Intrusion Detection and Prevention","category_3":"Network Security","sub_category_2":"Other","sub_category_1":"Predictive Analytics","category_1":"Security Intelligence","category_2":"Web Security"},{"product_id":"806","product_name":"Emerging Threats Pro Ruleset","description":"Proofpoint Emerging Threats (ET) Pro is a timely and accurate\nrule set that detects and blocks threats using your existing\nnetwork security appliances, such as next-generation firewalls\nand network IDS\/IPS.","hyperlink":"","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 631","vendor_id":"48","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Proofpoint","region":"","solutions_practice":"","sub_category_3":"Intrusion Detection and Prevention","category_3":"Network Security","sub_category_2":"Other","category_1":"Security Intelligence","sub_category_1":"Threat Intelligence","category_2":"Web Security"},{"product_id":"807","product_name":"Premium Threat Information Service (PTIS)","description":"Proofpoint Premium Threat Information Service (PTIS) enables\nyou to prioritize security decisions by providing you with\na deeper situational understanding of the ongoing threat\nlandscape.","hyperlink":"","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 632","vendor_id":"48","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Proofpoint","region":"","solutions_practice":"","category_3":"Network Security","sub_category_3":"Other","sub_category_2":"Predictive Analytics","category_1":"Security Intelligence","category_2":"Security Intelligence","sub_category_1":"Threat Intelligence"},{"product_id":"808","product_name":"Anti-Phishing Suite","description":"Proofpoint Anti-Phishing Suite helps you identify and reduce\nyour employees\u2019 susceptibility to phishing attacks and malware\ninfections by up to 90%.","hyperlink":"https:\/\/www.proofpoint.com\/us\/products\/security-awareness-training","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 633","vendor_id":"48","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Proofpoint","region":"","solutions_practice":"","sub_category_1":"Education","category_1":"Security Strategy"},{"product_id":"809","product_name":"Enterprise Security Awareness Training","description":"The Proofpoint Security Awareness Training Enterprise package\nincludes everything from the Anti-Phishing Suite and adds\nThreatSim USB, CyberStrength\u00ae Knowledge Assessments,\nour entire library of Training Modules, and all of our Awareness\nMaterials, including videos.","hyperlink":"https:\/\/www.proofpoint.com\/us\/products\/security-awareness-training","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 634","vendor_id":"48","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Proofpoint","region":"","solutions_practice":"","sub_category_1":"Education","category_1":"Security Strategy"},{"product_id":"810","product_name":"Cloud Account Defense (CAD)","description":"Protect your people from Email Account Compromise","hyperlink":"https:\/\/www.proofpoint.com\/us\/products\/cloud-security\/cloud-account-defense","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 635","vendor_id":"48","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Proofpoint","region":"","solutions_practice":"","sub_category_2":"CASB","category_1":"Cloud Security","category_2":"Cloud Security","sub_category_1":"Other","sub_category_3":"Web Application Protection","category_3":"Web Security"},{"product_id":"811","product_name":"Cloud App Security Broker","description":"Protect users of cloud apps from threats, data loss, and compliance risks","hyperlink":"https:\/\/www.proofpoint.com\/us\/products\/cloud-security\/cloud-app-security-broker","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 636","vendor_id":"48","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Proofpoint","region":"","solutions_practice":"","sub_category_2":"CASB","category_1":"Cloud Security","category_2":"Cloud Security","sub_category_1":"Turn-Key Solution","sub_category_3":"Web Application Protection","category_3":"Web Security"},{"product_id":"812","product_name":"Email Data Loss Prevention (DLP)","description":"Proofpoint Email DLP mitigates the risk of email data loss and protects against email fraud. Prevent outbound communication of W2s and transfer requests to impostors.","hyperlink":"https:\/\/www.proofpoint.com\/us\/products\/information-protection\/email-dlp","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 637","vendor_id":"48","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Proofpoint","region":"","solutions_practice":"","sub_category_1":"Data Loss Prevention","sub_category_2":"Data Loss Prevention","category_1":"Data Security","category_2":"Data Security","sub_category_3":"Web Application Protection","category_3":"Web Security"},{"product_id":"813","product_name":"Email Encryption","description":"With Proofpoint Email Encryption, messages and attachments are automatically encrypted with complete transparency. Users don\u2019t need to manually encrypt their email to send and receive messages securely\u2014it just happens in the background.","hyperlink":"https:\/\/www.proofpoint.com\/us\/products\/information-protection\/email-encryption","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 638","vendor_id":"48","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Proofpoint","region":"","solutions_practice":"","category_2":"Data Security","sub_category_1":"Email Security\/Gateway","sub_category_2":"File, Folder and\/or Email Encryption","category_1":"Network Security"},{"product_id":"814","product_name":"Data Discover","description":"Proofpoint\u2019s Information Protection provides out\u00ad-of-\u00adthe-\u00adbox visibility without the complexity and costs of legacy data protection tools.","hyperlink":"https:\/\/www.proofpoint.com\/us\/products\/information-protection\/data-discover","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 639","vendor_id":"48","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Proofpoint","region":"","solutions_practice":"","sub_category_1":"Data and Discovery Classification","sub_category_2":"Data Loss Prevention","category_1":"Data Security","category_2":"Data Security","sub_category_3":"Other","category_3":"Web Security"},{"product_id":"815","product_name":"Proofpoint Meta","description":"A people-centric solution, Meta ensures employees, contractors and partners have zero-trust, identity based access to enterprise resources in the datacenter and any cloud.","hyperlink":"https:\/\/www.proofpoint.com\/us","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 640","vendor_id":"48","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Proofpoint","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"User Provisioning","sub_category_2":"Web Application Protection","category_2":"Web Security"},{"product_id":"816","product_name":"ObserveIT Insider Threat Management","description":"Protect your IP and people from insider threats across the organization","hyperlink":"https:\/\/www.proofpoint.com\/us\/products\/information-protection\/insider-threat-management","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 641","vendor_id":"48","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Proofpoint","region":"","solutions_practice":"","category_2":"Advanced Fraud Security","category_1":"Endpoint Security","sub_category_1":"Endpoint Security Management","sub_category_2":"Other"},{"product_id":"817","product_name":"Digital Risk Protection","description":"Proofpoint Digital Risk Protection secures your brand and customers against digital security risks across web domains, social media, and the deep and dark web. It\u2019s the only solution that gives you a holistic defense for all your digital engagement channels.","hyperlink":"https:\/\/www.proofpoint.com\/us\/products\/digital-risk-protection","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 642","vendor_id":"48","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Proofpoint","region":"","solutions_practice":"","category_2":"Application Security","sub_category_2":"Turn-Key Solution","sub_category_1":"Web Application Protection","category_1":"Web Security"},{"product_id":"818","product_name":"Enterprise Archive","description":"Retain, discover and supervise data to meet today\u2019s compliance and e-discovery needs.","hyperlink":"https:\/\/www.proofpoint.com\/us\/products\/archiving-and-compliance\/enterprise-archive","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 643","vendor_id":"48","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Proofpoint","region":"","solutions_practice":"","category_3":"Data Security","sub_category_1":"Documentation","sub_category_3":"File, Folder and\/or Email Encryption","sub_category_2":"Management","category_2":"Security Intelligence","category_1":"Security Strategy"},{"product_id":"819","product_name":"Enterprise Collaboration Archive","description":"Proofpoint Enterprise Collaboration Archive applies policy based controls to capture social content from Salesforce Chatter, Jive, Skype for Business, LinkedIn, Twitter and other platforms to be managed or reviewed as any other critical data asset in your compliance archive or supervision platform.","hyperlink":"https:\/\/www.proofpoint.com\/us\/products\/archiving-and-compliance","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 644","vendor_id":"48","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Proofpoint","region":"","solutions_practice":"","sub_category_2":"Other","category_3":"Security Intelligence","category_2":"Security Strategy","sub_category_3":"Threat Intelligence","sub_category_1":"Web Application Protection","category_1":"Web Security"},{"product_id":"820","product_name":"Intelligent Supervision","description":"Meet FINRA, SEC, and IIROC obligations quickly and effectively.","hyperlink":"https:\/\/www.proofpoint.com\/us\/products\/archiving-and-compliance\/intelligent-supervision","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 645","vendor_id":"48","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Proofpoint","region":"","solutions_practice":"","sub_category_1":"Documentation","sub_category_2":"Policy","category_2":"Security Intelligence","category_1":"Security Strategy"},{"product_id":"821","product_name":"E-Discovery Analytics","description":"Proofpoint E-Discovery Analytics provides an intuitive e-discovery workflow for legal teams. It increases insight by using machine learning with real-time search results and integrated early case analytics.","hyperlink":"https:\/\/www.proofpoint.com\/us\/products\/archiving-and-compliance\/ediscovery-analytics","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 646","vendor_id":"48","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Proofpoint","region":"","solutions_practice":"","sub_category_2":"Data and Discovery Classification","category_2":"Data Security","sub_category_1":"Predictive Analytics","category_1":"Security Intelligence"},{"product_id":"822","product_name":"Social Media Compliance","description":"Proofpoint helps bridge the gap between social media compliance and marketing practices to help users comply with the current social media regulations.","hyperlink":"https:\/\/www.proofpoint.com\/us\/products\/archiving-and-compliance","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 647","vendor_id":"48","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Proofpoint","region":"","solutions_practice":"","sub_category_1":"Other","sub_category_2":"Other","category_2":"Security Intelligence","category_1":"Web Security"},{"product_id":"823","product_name":"RangeForce CyberSkills Platform","description":"The RangeForce CyberSkills Training Platform will engage your team in hands-on lessons that teach how to detect and respond to the latest cyber threats and system vulnerabilities. A cloud-based, on-demand, SaaS environment that includes dvanced training features like attack bots that recreate real-life targeted cyberattacks, an integrated gaming engine, learning paths that match security roles, a virtual teaching assistant that provides timely support, and comprehensive reporting dashboards quickly and accurately identify individual and team skill levels and competencies.","hyperlink":"https:\/\/rangeforce.com\/","td_contact":"RangeForceUS@TechData.com","td_extension":"(727) 539-7249 ext 5540516","vendor_id":"49","service_tiering":"The platform is sold as a monthly subscription single-tier per user with access to all training modules. CyberSiege blue and red team exercises are sold separately and cost $20,000 per exercise.","partner_benefits":"1) Offers a way to train up clients on the skills they must have to compliment the MSP serves (for example how to go into the CLI and clean up an infected server. 2) Offers a way for MSP clients to assess their people's skills and assess the skills of new hires. 3) Offers and affordable and consumable way to train.","typeof_service":"MSSP Turn-Key Solution: People, Processes and Technology (An MSP can plug this solution into their offerings without much effort or investment)","end_user_benefits":"1) Hands-on simulation training allows learners to build and practice critical skills needed for career success. 2) Allows junior IT and Security folks to get up to speed quickly and cost-efficiently. 3) Allow managers to understand the skills of their team and improve them.","mssp_available":"1","org_id":"1","vendor_name":"RangeForce <\/span>NEW!","region":"","solutions_practice":"","sub_category_1":"Building Block Solution","sub_category_4":"Education","category_1":"Managed Security Service","category_3":"Network Security","sub_category_2":"Other","sub_category_3":"Other","sub_category_5":"Security Awareness Training","category_4":"Security Strategy","category_5":"Security Strategy","category_2":"Web Security"},{"product_id":"824","product_name":"ReSecure Mail","description":"ReSecure Mail, one of the ReSecure Platform 360-degree agents, can be installed as a service in the DMZ or in the cloud and connected to the organization\u2019s mail gateway. When an email arrives the ReSecure Mail agent fetches the email, including the body and any attachments, and transfers it to the core of the ReSecure platform. The ReSecure Engine processes the email according to policy and ensures no threats reach the organization. ReSecure Mail transfers the email in real time back to the mail server for delivery to its destination.","hyperlink":"https:\/\/resec.co\/resecure-email\/","td_contact":"resecus@techdata.com","td_extension":"","vendor_id":"50","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Resec","region":"","solutions_practice":"","sub_category_1":"Email Security\/Gateway","category_1":"Network Security"},{"product_id":"825","product_name":"ReSecure Safe Browsing","description":"ReSecure Safe Browsing, one of the ReSecure Platform 360-degree agents is a lightweight agent that monitors all the files being downloaded by your end-users to their personal computer via their web browser or other web services. When a user downloads a file, the ReSecure Safe Browsing\u00a0agent automatically fetches the file and sends it to the ReSecure Engine. The ReSecure Engine then processes the file according to policy to ensure that no threats reach the organization. ReSecure Safe Browsing then saves the clean replica file in the end-user\u2019s download directory.","hyperlink":"https:\/\/resec.co\/resecure-web\/","td_contact":"resecus@techdata.com","td_extension":"","vendor_id":"50","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Resec","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"826","product_name":"ReSecure File Transfer","description":"The ReSecure File Transfer suite contains these agents\u2013 ReSecure File Server, ReSecure FTP, and ReSecure Vault. The agents constantly monitor the specified directory or folder. When a new file is identified, the agent fetches the file automatically, and transfers it to the ReSecure Engine for processing according to policy. At the end of the process, the agent can return the file to the same directory, or even forward it to another directory.","hyperlink":"https:\/\/resec.co\/resecure-file-transfer\/","td_contact":"resecus@techdata.com","td_extension":"","vendor_id":"50","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Resec","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Other"},{"product_id":"827","product_name":"ReSecure Endpoint","description":"The ReSecure Endpoint agent is deployed directly on end-users\u2019 computers and integrated with all common device control. Files loaded on the endpoint from external devices are intercepted and sent directly from the external device to the ReSecure platform for processing according to policy, and threat free replicas are placed in a predefined folder on the network or endpoint.","hyperlink":"https:\/\/resec.co\/resecure-endpoint\/","td_contact":"resecus@techdata.com","td_extension":"","vendor_id":"50","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Resec","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"828","product_name":"RSA Archer\u00ae Suite","description":"Recognized by Gartner\u00ae as a perennial leader for operational risk management, IT risk management, IT vendor risk management, business continuity management and GRC platform solutions. Offers the depth, breadth and adaptability you need to manage risk in multiple domains, combined with the ecosystem and track record to deliver strategic value to your organization.","hyperlink":"https:\/\/www.rsa.com\/en-us\/products\/governance-risk-and-compliance","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"51","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"RSA","region":"","solutions_practice":"","category_2":"Governance, Risk, Compliance","sub_category_2":"Governance, Risk, Compliance","sub_category_1":"Governance, Risk, Compliance, & Audit","category_1":"Security Intelligence"},{"product_id":"829","product_name":"RSA NetWitness UEBA","description":"UEBA, which stands for user and entity behavior analytics, is software that analyzes user activity data from logs, network traffic and endpoints and correlates this data with threat intelligence to identify activities\u2014or behaviors\u2014likely to indicate a malicious presence in your environment. It uses machine learning technology to baseline \u201cnormal\u201d behavior and get smarter over time, and applies both static rules and statistical analysis to rapidly and accurately detect suspicious activity. Using such advanced technology and statistical models, UEBA is a force multiplier for security teams struggling to stay on top of today\u2019s advanced, targeted threats.","hyperlink":"https:\/\/www.rsa.com\/en-us\/products\/threat-detection-response\/ueba","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"51","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"RSA","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"Identity Governance","sub_category_2":"Predictive Analytics","category_2":"Security Intelligence"},{"product_id":"830","product_name":"RSA NetWitness\u00ae Endpoint","description":"an endpoint detection and response solution that leverages unique, continuous endpoint behavioral monitoring and advanced machine learning to dive deeper into endpoints and more accurately and rapidly identify targeted, unknown and non-malware attacks that other endpoint security solutions miss entirely. With RSA NetWitness Endpoint, security teams gain the unparalleled endpoint visibility they need to more quickly detect threats they couldn\u2019t see before and investigate them more thoroughly.","hyperlink":"https:\/\/www.rsa.com\/en-us\/products\/threat-detection-response\/endpoint-security-endpoint-detection-response","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"51","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"RSA","region":"","solutions_practice":"","sub_category_2":"Endpoint Anti-Virus\/Anti-Malware","category_2":"Endpoint Security","category_1":"Security Intelligence","sub_category_1":"SIEM"},{"product_id":"831","product_name":"RSA NetWitness\u00ae Logs","description":"Log management and monitoring tools like RSA NetWitness Logs are designed to address those challenges by collecting data from a wide range of sources (both on premises and in the cloud), interpreting relevant security information from this data, providing short- and longer-term retention capabilities, and applying advanced analytics to speed correlation and detection.","hyperlink":"https:\/\/www.rsa.com\/en-us\/products\/threat-detection-response\/log-management-monitoring","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"51","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"RSA","region":"","solutions_practice":"","sub_category_1":"Log Management","category_1":"Security Intelligence"},{"product_id":"832","product_name":"RSA NetWitness\u00ae Orchestrator","description":"Security automation and orchestration tools, also known as O&A or SOAR solutions, are designed to improve the productivity, efficiency and effectiveness of security operations centers and the analysts who work in them. As the term suggests, these tools automate routine, often time-consuming tasks, such as gathering and correlating data from disparate security systems, and they help orchestrate the incident management and incident response lifecycles. In the process, they help security teams address the staffing shortage; bring consistency, discipline and predictability to security operations; and help reduce the time it takes to detect and respond to incidents.","hyperlink":"https:\/\/www.rsa.com\/en-us\/products\/threat-detection-response\/security-automation-orchestration","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"51","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"RSA","region":"","solutions_practice":"","sub_category_1":"Other","category_1":"Security Intelligence","category_2":"Security Intelligence","sub_category_2":"SIEM"},{"product_id":"833","product_name":"RSA NetWitness\u00ae Platform","description":"Security information and event management (SIEM) tools were originally intended for compliance and log management. Over time, as SIEM tools became the aggregation point for security alerts, organizations began using them to detect and investigate attacks\u2014but with limited success. Log-centric SIEMs make it difficult to detect and investigate today\u2019s complex threats in a timely manner because they don\u2019t provide full visibility across an enterprise. In contrast, the RSA NetWitness Platform evolved SIEM accelerates threat detection and response by providing unparalleled visibility to see threats anywhere\u2014on endpoints, across the network, in the cloud and virtual environments. In addition, it combines essential business context with automation and machine learning capabilities to help pinpoint and respond definitively to the threats that matter most.","hyperlink":"https:\/\/www.rsa.com\/en-us\/products\/threat-detection-response\/siem-security-information-event-management","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"51","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"RSA","region":"","solutions_practice":"","category_1":"Security Intelligence","sub_category_1":"SIEM"},{"product_id":"834","product_name":"RSA SecurID\u00ae Suite","description":"Attackers are finding ways to compromise your users\u2019 credentials every day. RSA SecurID Suite delivers the identity and access assurance you need to thwart them at every turn\u2014while delivering an absolutely seamless access experience for your users.\n\nRSA SecurID Suite goes beyond traditional identity and access management, using identity insights, threat intelligence and business context to provide secure access to all of your users, across all of your applications, from the ground to the cloud. It brings together multi-factor authentication, risk-based access management, identity governance and user lifecycle management in one powerful suite of solutions.","hyperlink":"https:\/\/www.rsa.com\/en-us\/products\/rsa-securid-suite","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"51","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"RSA","region":"","solutions_practice":"","category_1":"Identity and Access","category_2":"Identity and Access","sub_category_2":"Identity Governance","sub_category_1":"MultiFactor and Advanced Authentication"},{"product_id":"835","product_name":"RSA\u00ae Adaptive Authentication","description":"RSA Adaptive Authentication is a comprehensive, risk-based authentication and fraud detection platform. The Mobile Protection module allows organizations to easily extend strong risk-based authentication to mobile transactions. Allows developers to build controls directly into their mobile applications.\nIntegrates through a web services call or a software development kit (SDK).\nSupported platforms include iOS and Android\u2122.","hyperlink":"https:\/\/www.rsa.com\/en-us\/products\/fraud-prevention\/mobile-transaction-protection","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"51","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"RSA","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"MultiFactor and Advanced Authentication"},{"product_id":"836","product_name":"RSA\u00ae Adaptive Authentication for eCommerce","description":"Prevent payment fraud and accelerate digital commerce with a fraud detection and risk-based authentication solution that supports the 3D Secure 2.0 protocol. RSA Adaptive Authentication for eCommerce:\nDetects up to 97 percent of fraudulent transactions\nGenerates average monthly fraud savings of nearly $2 million\nProvides a seamless, secure payments experience for consumers","hyperlink":"https:\/\/www.rsa.com\/en-us\/products\/fraud-prevention\/3d-secure-authentication","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"51","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"RSA","region":"","solutions_practice":"","category_2":"Advanced Fraud Security","category_1":"Identity and Access","sub_category_1":"MultiFactor and Advanced Authentication","sub_category_2":"Other"},{"product_id":"837","product_name":"RSA\u00ae FraudAction\u2122","description":"Protect your customers and your organization against phishing, Trojan attacks, social media threats and rogue mobile apps using the all-inclusive RSA FraudAction threat management service.","hyperlink":"https:\/\/www.rsa.com\/en-us\/products\/fraud-prevention\/phishing-protection","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"51","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"RSA","region":"","solutions_practice":"","category_1":"Advanced Fraud Security","sub_category_1":"Other"},{"product_id":"838","product_name":"RSA\u00ae FraudAction\u2122 Cyber Intelligence Service","description":"Get unprecedented insight into the cybercriminal underground and attacks targeting your organization. Our dedicated team of multilingual analysts monitors the underground forums, IRC chat rooms and other clandestine communication channels cybercriminals use.\nDeep undercover intelligence agents engage in this underground community.\nIntelligence capable of revealing the identities of threat actors behind attacks","hyperlink":"https:\/\/www.rsa.com\/en-us\/products\/fraud-prevention\/fraud-intelligence-services","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"51","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"RSA","region":"","solutions_practice":"","category_1":"Advanced Fraud Security","sub_category_1":"Other"},{"product_id":"839","product_name":"RSA\u00ae Web Threat Detection","description":"Data breaches have exposed billions of user names and passwords in recent years, leading to a surge in account takeover\u2014cybercriminals taking over consumers\u2019 online accounts or account credentials to make purchases, transfer money or steal their data. Cybercriminals\u2019 account takeover attempts are getting stealthier, but they\u2019re not clever enough to outsmart RSA Web Threat Detection.","hyperlink":"https:\/\/www.rsa.com\/en-us\/products\/fraud-prevention\/account-takeover-prevention","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"51","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"RSA","region":"","solutions_practice":"","category_1":"Security Intelligence","sub_category_1":"Threat Intelligence"},{"product_id":"840","product_name":"RSA Archer\u00ae Suite","description":"Recognized by Gartner\u00ae as a perennial leader for operational risk management, IT risk management, IT vendor risk management, business continuity management and GRC platform solutions. Offers the depth, breadth and adaptability you need to manage risk in multiple domains, combined with the ecosystem and track record to deliver strategic value to your organization.","hyperlink":"https:\/\/www.rsa.com\/en-us\/products\/governance-risk-and-compliance","td_contact":"rsa2@techdata.com","td_extension":"(480) 643-5064","vendor_id":"51","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"RSA","region":"","solutions_practice":"","category_2":"Governance, Risk, Compliance","sub_category_2":"Governance, Risk, Compliance","sub_category_1":"Governance, Risk, Compliance, & Audit","category_1":"Security Intelligence"},{"product_id":"841","product_name":"RSA NetWitness UEBA","description":"UEBA, which stands for user and entity behavior analytics, is software that analyzes user activity data from logs, network traffic and endpoints and correlates this data with threat intelligence to identify activities\u2014or behaviors\u2014likely to indicate a malicious presence in your environment. It uses machine learning technology to baseline \u201cnormal\u201d behavior and get smarter over time, and applies both static rules and statistical analysis to rapidly and accurately detect suspicious activity. Using such advanced technology and statistical models, UEBA is a force multiplier for security teams struggling to stay on top of today\u2019s advanced, targeted threats.","hyperlink":"https:\/\/www.rsa.com\/en-us\/products\/threat-detection-response\/ueba","td_contact":"rsa2@techdata.com","td_extension":"(480) 643-5064","vendor_id":"51","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"RSA","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"Identity Governance","sub_category_2":"Predictive Analytics","category_2":"Security Intelligence"},{"product_id":"842","product_name":"RSA NetWitness\u00ae Endpoint","description":"an endpoint detection and response solution that leverages unique, continuous endpoint behavioral monitoring and advanced machine learning to dive deeper into endpoints and more accurately and rapidly identify targeted, unknown and non-malware attacks that other endpoint security solutions miss entirely. With RSA NetWitness Endpoint, security teams gain the unparalleled endpoint visibility they need to more quickly detect threats they couldn\u2019t see before and investigate them more thoroughly.","hyperlink":"https:\/\/www.rsa.com\/en-us\/products\/threat-detection-response\/endpoint-security-endpoint-detection-response","td_contact":"rsa2@techdata.com","td_extension":"(480) 643-5064","vendor_id":"51","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"RSA","region":"","solutions_practice":"","sub_category_2":"Endpoint Anti-Virus\/Anti-Malware","category_2":"Endpoint Security","category_1":"Security Intelligence","sub_category_1":"SIEM"},{"product_id":"843","product_name":"RSA NetWitness\u00ae Logs","description":"Log management and monitoring tools like RSA NetWitness Logs are designed to address those challenges by collecting data from a wide range of sources (both on premises and in the cloud), interpreting relevant security information from this data, providing short- and longer-term retention capabilities, and applying advanced analytics to speed correlation and detection.","hyperlink":"https:\/\/www.rsa.com\/en-us\/products\/threat-detection-response\/log-management-monitoring","td_contact":"rsa2@techdata.com","td_extension":"(480) 643-5064","vendor_id":"51","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"RSA","region":"","solutions_practice":"","sub_category_1":"Log Management","category_1":"Security Intelligence"},{"product_id":"844","product_name":"RSA NetWitness\u00ae Orchestrator","description":"Security automation and orchestration tools, also known as O&A or SOAR solutions, are designed to improve the productivity, efficiency and effectiveness of security operations centers and the analysts who work in them. As the term suggests, these tools automate routine, often time-consuming tasks, such as gathering and correlating data from disparate security systems, and they help orchestrate the incident management and incident response lifecycles. In the process, they help security teams address the staffing shortage; bring consistency, discipline and predictability to security operations; and help reduce the time it takes to detect and respond to incidents.","hyperlink":"https:\/\/www.rsa.com\/en-us\/products\/threat-detection-response\/security-automation-orchestration","td_contact":"rsa2@techdata.com","td_extension":"(480) 643-5064","vendor_id":"51","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"RSA","region":"","solutions_practice":"","sub_category_1":"Other","category_1":"Security Intelligence","category_2":"Security Intelligence","sub_category_2":"SIEM"},{"product_id":"845","product_name":"RSA NetWitness\u00ae Platform","description":"Security information and event management (SIEM) tools were originally intended for compliance and log management. Over time, as SIEM tools became the aggregation point for security alerts, organizations began using them to detect and investigate attacks\u2014but with limited success. Log-centric SIEMs make it difficult to detect and investigate today\u2019s complex threats in a timely manner because they don\u2019t provide full visibility across an enterprise. In contrast, the RSA NetWitness Platform evolved SIEM accelerates threat detection and response by providing unparalleled visibility to see threats anywhere\u2014on endpoints, across the network, in the cloud and virtual environments. In addition, it combines essential business context with automation and machine learning capabilities to help pinpoint and respond definitively to the threats that matter most.","hyperlink":"https:\/\/www.rsa.com\/en-us\/products\/threat-detection-response\/siem-security-information-event-management","td_contact":"rsa2@techdata.com","td_extension":"(480) 643-5064","vendor_id":"51","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"RSA","region":"","solutions_practice":"","category_1":"Security Intelligence","sub_category_1":"SIEM"},{"product_id":"846","product_name":"RSA SecurID\u00ae Suite","description":"Attackers are finding ways to compromise your users\u2019 credentials every day. RSA SecurID Suite delivers the identity and access assurance you need to thwart them at every turn\u2014while delivering an absolutely seamless access experience for your users.\n\nRSA SecurID Suite goes beyond traditional identity and access management, using identity insights, threat intelligence and business context to provide secure access to all of your users, across all of your applications, from the ground to the cloud. It brings together multi-factor authentication, risk-based access management, identity governance and user lifecycle management in one powerful suite of solutions.","hyperlink":"https:\/\/www.rsa.com\/en-us\/products\/rsa-securid-suite","td_contact":"rsa2@techdata.com","td_extension":"(480) 643-5064","vendor_id":"51","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"RSA","region":"","solutions_practice":"","category_1":"Identity and Access","category_2":"Identity and Access","sub_category_2":"Identity Governance","sub_category_1":"MultiFactor and Advanced Authentication"},{"product_id":"847","product_name":"RSA\u00ae Adaptive Authentication","description":"RSA Adaptive Authentication is a comprehensive, risk-based authentication and fraud detection platform. The Mobile Protection module allows organizations to easily extend strong risk-based authentication to mobile transactions. Allows developers to build controls directly into their mobile applications.\nIntegrates through a web services call or a software development kit (SDK).\nSupported platforms include iOS and Android\u2122.","hyperlink":"https:\/\/www.rsa.com\/en-us\/products\/fraud-prevention\/mobile-transaction-protection","td_contact":"rsa2@techdata.com","td_extension":"(480) 643-5064","vendor_id":"51","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"RSA","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"MultiFactor and Advanced Authentication"},{"product_id":"848","product_name":"RSA\u00ae Adaptive Authentication for eCommerce","description":"Prevent payment fraud and accelerate digital commerce with a fraud detection and risk-based authentication solution that supports the 3D Secure 2.0 protocol. RSA Adaptive Authentication for eCommerce:\nDetects up to 97 percent of fraudulent transactions\nGenerates average monthly fraud savings of nearly $2 million\nProvides a seamless, secure payments experience for consumers","hyperlink":"https:\/\/www.rsa.com\/en-us\/products\/fraud-prevention\/3d-secure-authentication","td_contact":"rsa2@techdata.com","td_extension":"(480) 643-5064","vendor_id":"51","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"RSA","region":"","solutions_practice":"","category_2":"Advanced Fraud Security","category_1":"Identity and Access","sub_category_1":"MultiFactor and Advanced Authentication","sub_category_2":"Other"},{"product_id":"849","product_name":"RSA\u00ae FraudAction\u2122","description":"Protect your customers and your organization against phishing, Trojan attacks, social media threats and rogue mobile apps using the all-inclusive RSA FraudAction threat management service.","hyperlink":"https:\/\/www.rsa.com\/en-us\/products\/fraud-prevention\/phishing-protection","td_contact":"rsa2@techdata.com","td_extension":"(480) 643-5064","vendor_id":"51","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"RSA","region":"","solutions_practice":"","category_1":"Advanced Fraud Security","sub_category_1":"Other"},{"product_id":"850","product_name":"RSA\u00ae FraudAction\u2122 Cyber Intelligence Service","description":"Get unprecedented insight into the cybercriminal underground and attacks targeting your organization. Our dedicated team of multilingual analysts monitors the underground forums, IRC chat rooms and other clandestine communication channels cybercriminals use.\nDeep undercover intelligence agents engage in this underground community.\nIntelligence capable of revealing the identities of threat actors behind attacks","hyperlink":"https:\/\/www.rsa.com\/en-us\/products\/fraud-prevention\/fraud-intelligence-services","td_contact":"rsa2@techdata.com","td_extension":"(480) 643-5064","vendor_id":"51","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"RSA","region":"","solutions_practice":"","category_1":"Advanced Fraud Security","sub_category_1":"Other"},{"product_id":"851","product_name":"RSA\u00ae Web Threat Detection","description":"Data breaches have exposed billions of user names and passwords in recent years, leading to a surge in account takeover\u2014cybercriminals taking over consumers\u2019 online accounts or account credentials to make purchases, transfer money or steal their data. Cybercriminals\u2019 account takeover attempts are getting stealthier, but they\u2019re not clever enough to outsmart RSA Web Threat Detection.","hyperlink":"https:\/\/www.rsa.com\/en-us\/products\/fraud-prevention\/account-takeover-prevention","td_contact":"rsa2@techdata.com","td_extension":"(480) 643-5064","vendor_id":"51","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"RSA","region":"","solutions_practice":"","category_1":"Security Intelligence","sub_category_1":"Threat Intelligence"},{"product_id":"852","product_name":"Knox Configure","description":"Remotely configure Samsung phones and tablets in bulk and tailor them to specific needs.","hyperlink":"https:\/\/www.samsungknox.com\/en\/solutions\/it-solutions\/knox-configure","td_contact":"BU-Security@techdata.com","td_extension":"+49 89 47003222","vendor_id":"52","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Samsung Knox","region":"","solutions_practice":"","category_1":"Mobile Security","sub_category_1":"Other"},{"product_id":"853","product_name":"Knox Manage","description":"Manage a fleet of devices with a cloud-based EMM solution that increases business efficiency and secures corporate data","hyperlink":"https:\/\/www.samsungknox.com\/en\/solutions\/it-solutions\/knox-manage","td_contact":"BU-Security@techdata.com","td_extension":"+49 89 47003222","vendor_id":"52","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Samsung Knox","region":"","solutions_practice":"","category_1":"Mobile Security","sub_category_1":"Mobility Management"},{"product_id":"854","product_name":"Knox Platform for Enterprise","description":"A military-grade mobile solution for IT admins to manage and secure Samsung Android phones, tablets and Tizen watches for business","hyperlink":"https:\/\/www.samsungknox.com\/en\/solutions\/it-solutions\/knox-platform-for-enterprise","td_contact":"BU-Security@techdata.com","td_extension":"+49 89 47003222","vendor_id":"52","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Samsung Knox","region":"","solutions_practice":"","category_1":"Mobile Security","sub_category_1":"Mobility Security"},{"product_id":"855","product_name":"Knox E-FOTA","description":"Knox Enterprise Firmware-Over-The-Air is a business solution that allows you to manage firmware versions on Samsung mobile devices to maximize cost efficiency","hyperlink":"https:\/\/www.samsungknox.com\/en\/solutions\/it-solutions\/samsung_e-fota","td_contact":"BU-Security@techdata.com","td_extension":"+49 89 47003222","vendor_id":"52","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Samsung Knox","region":"","solutions_practice":"","category_1":"Mobile Security","sub_category_1":"Other"},{"product_id":"856","product_name":"Samsung ETS","description":"Samsung Enterprise Technical Support is our dedicated technical support for IT admins","hyperlink":"https:\/\/www.samsungknox.com\/en\/enterprise-tech-support","td_contact":"BU-Security@techdata.com","td_extension":"+49 89 47003222","vendor_id":"52","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Samsung Knox","region":"","solutions_practice":"","category_1":"Mobile Security","sub_category_1":"Other"},{"product_id":"857","product_name":"Security Colony","description":"A library of resources including an entire ISO27001-based ISMS, incident response guidelines, awareness training materials, sample cyber security roadmaps and more to help implement information security in your organisation.","hyperlink":"https:\/\/securitycolony.com\/","td_contact":"securitycolony@techdata.com\n(727) 539-7429 x-84008","td_extension":"","vendor_id":"53","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Security Colony","region":"","solutions_practice":"","sub_category_2":"Documentation","sub_category_1":"Policy","category_1":"Security Intelligence","category_2":"Security Strategy"},{"product_id":"858","product_name":"Sepio Solution","description":"Sepio\u2019s security suite is currently the first solution available that identifies and blocks malicious hardware devices before they can cause any harm. The suite stops rogue hardware before it damages normal operations or degrades system performance","hyperlink":"https:\/\/www.sepio.systems\/","td_contact":"sepio@techdata.com","td_extension":"","vendor_id":"54","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Sepio Systems","region":"","solutions_practice":"","category_1":"Data Security","sub_category_1":"Device control"},{"product_id":"859","product_name":"Network Configuration Manager","description":"Automated network configuration and compliance management","hyperlink":"https:\/\/www.solarwinds.com\/network-configuration-manager","td_contact":"solarwindssoftware@techdata.com","td_extension":"1-800-237-8931 ext. 5540493","vendor_id":"55","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Solarwinds","region":"","solutions_practice":"","sub_category_1":"Governance, Risk, Compliance, & Audit","category_1":"Security Intelligence"},{"product_id":"860","product_name":"Patch Manager","description":"Intuitive patch management software for quickly addressing software vulnerabilities","hyperlink":"https:\/\/www.solarwinds.com\/patch-manager","td_contact":"solarwindssoftware@techdata.com","td_extension":"1-800-237-8931 ext. 5540493","vendor_id":"55","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Solarwinds","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Vulnerability Management\/Patching"},{"product_id":"861","product_name":"Security Information and Event Management (SIEM)","description":"Log & Event Manager makes it easy to use logs for security, compliance, and troubleshooting","hyperlink":"https:\/\/www.solarwinds.com\/siem-security-information-event-management-software","td_contact":"solarwindssoftware@techdata.com","td_extension":"1-800-237-8931 ext. 5540493","vendor_id":"55","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Solarwinds","region":"","solutions_practice":"","category_1":"Security Intelligence","sub_category_1":"SIEM"},{"product_id":"862","product_name":"Serv-U File Transfer Protocol Server","description":"Simple, affordable, easy-to-use FTP server software","hyperlink":"https:\/\/www.solarwinds.com\/ftp-server-software","td_contact":"solarwindssoftware@techdata.com","td_extension":"1-800-237-8931 ext. 5540493","vendor_id":"55","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Solarwinds","region":"","solutions_practice":"","category_1":"Data Security","sub_category_1":"Other"},{"product_id":"863","product_name":"Serv-U Managed File Transfer Server","description":"Enhance security and control over file transfers in and outside your organization","hyperlink":"https:\/\/www.solarwinds.com\/serv-u-managed-file-transfer-server","td_contact":"solarwindssoftware@techdata.com","td_extension":"1-800-237-8931 ext. 5540493","vendor_id":"55","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Solarwinds","region":"","solutions_practice":"","category_1":"Data Security","sub_category_1":"Other"},{"product_id":"864","product_name":"User Device Tracker","description":"Locate users and devices on your network with User Device Tracker","hyperlink":"https:\/\/www.solarwinds.com\/user-device-tracker","td_contact":"solarwindssoftware@techdata.com","td_extension":"1-800-237-8931 ext. 5540493","vendor_id":"55","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Solarwinds","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Other"},{"product_id":"865","product_name":"Sonicwall Advanced Threat Protection","description":"Revolutionizes advanced threat detection and sandboxing with a cloud-based, multi-engine solution for stopping unknown and zero-day attacks at the gateway, and with automated remediation. Leverages the RTDMI engine which proactively blocks mass-market, zero-day threats and unknown malware accurately utilizing real-time memory-based inspection techniques.","hyperlink":"https:\/\/www.sonicwall.com\/en-us\/products\/firewalls\/security-services\/capture-advanced-threat-protection","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"56","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"SonicWall","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"Sandboxing and APT Protection"},{"product_id":"866","product_name":"Sonicwall Application Control","description":"Helps administrators control and manage both business and non\u2010business related applications with granular, application\u2010specific policies providing application classification and policy enforcement.","hyperlink":"https:\/\/www.sonicwall.com\/en-us\/products\/firewalls\/security-services\/total-secure-bundle","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"56","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"SonicWall","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"Other"},{"product_id":"867","product_name":"Comprehensive Anti-SPAM Service","description":"Remove junk email at the gateway with one-click activation, and ensure that only legitimate emails reach your email server.","hyperlink":"https:\/\/www.sonicwall.com\/en-us\/products\/firewalls\/security-services\/total-secure-bundle","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"56","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"SonicWall","region":"","solutions_practice":"","sub_category_1":"Email Security\/Gateway","category_1":"Network Security"},{"product_id":"868","product_name":"Content Filtering Service","description":"Address safety, security and productivity concerns with controls to enforce Internet use policies, and block access to harmful and unproductive web content.","hyperlink":"https:\/\/www.sonicwall.com\/en-us\/products\/firewalls\/security-services\/total-secure-bundle","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"56","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"SonicWall","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"URL Filtering\/Web Gateway"},{"product_id":"869","product_name":"Email Security Appliances","description":"SonicWall Email Security appliances are ideal for organizations that need a dedicated on-premises solution. The hardened Linux-based appliance defends against advanced email-borne threats such as ransomware, zero-day threats, spear phishing and business email compromise. Our multi-layered solution provides comprehensive inbound and outbound protection, and is available in a range of hardware appliance options that scales up to 10,000 users per appliance.","hyperlink":"https:\/\/www.sonicwall.com\/en-us\/products\/secure-email\/email-security-appliance","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"56","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"SonicWall","region":"","solutions_practice":"","sub_category_1":"Email Security\/Gateway","category_1":"Network Security"},{"product_id":"870","product_name":"Gateway Anti-Virus and anti-spyware","description":"Combine network\u2010based anti\u2010malware with a cloud database of over 12 million malware signatures for deep security protection against advanced modern threats.","hyperlink":"https:\/\/www.sonicwall.com\/en-us\/products\/firewalls\/security-services\/total-secure-bundle","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"56","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"SonicWall","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"Other"},{"product_id":"871","product_name":"Sonicwall Hosted Email Security","description":"Deploy a cloud-based security solution to protect your organization from email-borne threats such as ransomware, zero-day threats, spear phishing and business email compromise (BEC) \u2500 while meeting email compliance and regulatory mandates. Our solution includes email continuity to minimize business impact during planned and unplanned outages to your email servers. Get the scalability you need with no upfront costs and predictable subscription rates.","hyperlink":"https:\/\/www.sonicwall.com\/en-us\/products\/secure-email\/cloud-email-security","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"56","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"SonicWall","region":"","solutions_practice":"","sub_category_1":"Email Security\/Gateway","category_1":"Network Security"},{"product_id":"872","product_name":"Intrusion Prevention Service","description":"Protect against worms, Trojans, software vulnerabilities and other intrusions by scanning all network traffic for malicious or anomalous patterns, thereby increasing network reliability and performance.","hyperlink":"https:\/\/www.sonicwall.com\/en-us\/products\/firewalls\/security-services\/total-secure-bundle","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"56","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"SonicWall","region":"","solutions_practice":"","sub_category_1":"Intrusion Detection and Prevention","category_1":"Network Security"},{"product_id":"873","product_name":"Next-Gen Firewall","description":"Get the network security, control and visibility your organization needs to innovate and grow faster with our broad range of award-winning next-generation network firewalls.","hyperlink":"https:\/\/www.sonicwall.com\/en-us\/products\/firewalls","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"56","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"SonicWall","region":"","solutions_practice":"","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security"},{"product_id":"874","product_name":"Secure Mobile Access Appliances","description":"Empower your mobile workforce and reduce IT costs with a unified secure access gateway that provides best-in-class SSL VPN, per app VPN, device authorization and single sign-on (SSO). Choose the deployment option that best fits your needs.","hyperlink":"https:\/\/www.sonicwall.com\/en-us\/products\/remote-access\/remote-access-appliances","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"56","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"SonicWall","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"VPN Concentrator"},{"product_id":"875","product_name":"Virtual Firewalls","description":"Secure your public, private or hybrid cloud environment with virtualized versions of SonicWall next-generation firewalls and simplify administration with common management across your virtual and physical infrastructure.","hyperlink":"https:\/\/www.sonicwall.com\/en-us\/products\/firewalls\/nsv-series","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"56","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"SonicWall","region":"","solutions_practice":"","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security"},{"product_id":"876","product_name":"Web Application Firewall","description":"SonicWall WAF Series features advanced web security tools and services to keep compliance data unexposed and web properties safe, undisrupted and in peak performance. It applies Layer-7 application delivery capabilities that enable application-aware load balancing, SSL offloading and acceleration for resilience and an enhanced digital engagement and experience.","hyperlink":"https:\/\/www.sonicwall.com\/en-us\/products\/web-application-firewall","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"56","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"SonicWall","region":"","solutions_practice":"","sub_category_1":"Web Application Firewall","category_1":"Web Security"},{"product_id":"877","product_name":"Capture Client","description":"SonicWall Capture Client is an antivirus platform that delivers multiple endpoint and server protection capabilities, including advanced malware protection, network sandbox integration, and support for visibility into encrypted traffic.","hyperlink":"https:\/\/www.sonicwall.com\/en-us\/products\/firewalls\/security-services\/capture-client","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"56","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"SonicWall","region":"","solutions_practice":"","sub_category_1":"Advanced Malware Protection","sub_category_2":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security","category_2":"Endpoint Security"},{"product_id":"878","product_name":"SonicWall Security-as-a-Service Program","description":"SonicWall's SECaaS is a monthly subscription pricing model (OPEX) with no upfront costs.\u00a0 This business model is very popular with the MSP\/MSSP partner community, or any sales scenario where a monthly subscription price is the preferred purchasing mechanism for the end-customer.\u00a0\u00a0\u00a0","hyperlink":"","td_contact":"CyberSecurityLatam@techdata.com","td_extension":"305-593-5000","vendor_id":"56","service_tiering":"Flexible quarter or monthly billing","partner_benefits":" \u2022 Available from SonicWall exclusively for the SonicWall partner community, this monthly pricing option includes the hardware. <\/p>\n \u2022 Pass OpEx flexbility to their clients <\/p>\n \u2022 Win more business at higher margins<\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 SonicWall Next-Generation Firewall that delivers all of these services bundled with the security services needed for comprehensive network protection from a wide range of advanced threats.<\/p>\n \u2022 All-in-One network protection that combines gateway anti-virus, anti-spyware, intrusion prevention, application intelligence and control, content filtering, firmware updates, and 24x7 support delivered through a high-performance, deep-packet inspection firewall.<\/p>\n \u2022 Access to the Global Management System, a powerful and intuitive solution to rapidly deploy and centrally manage SonicWall firewalls, email security, and secure mobile access solutions. <\/p>","mssp_available":"0","org_id":"1","vendor_name":"SonicWall","region":"","solutions_practice":"","sub_category_2":"Building Block Solution","sub_category_3":"Building Block Solution","sub_category_4":"Building Block Solution","sub_category_1":"Building Block Solution","category_1":"Endpoint Security","category_4":"Managed Security Service","category_3":"Network Security","category_2":"Web Security"},{"product_id":"879","product_name":"Sonicwall Advanced Threat Protection","description":"Revolutionizes advanced threat detection and sandboxing with a cloud-based, multi-engine solution for stopping unknown and zero-day attacks at the gateway, and with automated remediation. Leverages the RTDMI engine which proactively blocks mass-market, zero-day threats and unknown malware accurately utilizing real-time memory-based inspection techniques.","hyperlink":"https:\/\/www.sonicwall.com\/en-us\/products\/firewalls\/security-services\/capture-advanced-threat-protection","td_contact":"sonicwall@techdata.com","td_extension":"800-237-8931 x5545032","vendor_id":"56","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"SonicWall","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"Sandboxing and APT Protection"},{"product_id":"880","product_name":"Sonicwall Application Control","description":"Helps administrators control and manage both business and non\u2010business related applications with granular, application\u2010specific policies providing application classification and policy enforcement.","hyperlink":"https:\/\/www.sonicwall.com\/en-us\/products\/firewalls\/security-services\/total-secure-bundle","td_contact":"sonicwall@techdata.com","td_extension":"800-237-8931 x5545032","vendor_id":"56","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"SonicWall","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"Other"},{"product_id":"881","product_name":"Comprehensive Anti-SPAM Service","description":"Remove junk email at the gateway with one-click activation, and ensure that only legitimate emails reach your email server.","hyperlink":"https:\/\/www.sonicwall.com\/en-us\/products\/firewalls\/security-services\/total-secure-bundle","td_contact":"sonicwall@techdata.com","td_extension":"800-237-8931 x5545032","vendor_id":"56","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"SonicWall","region":"","solutions_practice":"","sub_category_1":"Email Security\/Gateway","category_1":"Network Security"},{"product_id":"882","product_name":"Content Filtering Service","description":"Address safety, security and productivity concerns with controls to enforce Internet use policies, and block access to harmful and unproductive web content.","hyperlink":"https:\/\/www.sonicwall.com\/en-us\/products\/firewalls\/security-services\/total-secure-bundle","td_contact":"sonicwall@techdata.com","td_extension":"800-237-8931 x5545032","vendor_id":"56","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"SonicWall","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"URL Filtering\/Web Gateway"},{"product_id":"883","product_name":"Email Security Appliances","description":"SonicWall Email Security appliances are ideal for organizations that need a dedicated on-premises solution. The hardened Linux-based appliance defends against advanced email-borne threats such as ransomware, zero-day threats, spear phishing and business email compromise. Our multi-layered solution provides comprehensive inbound and outbound protection, and is available in a range of hardware appliance options that scales up to 10,000 users per appliance.","hyperlink":"https:\/\/www.sonicwall.com\/en-us\/products\/secure-email\/email-security-appliance","td_contact":"sonicwall@techdata.com","td_extension":"800-237-8931 x5545032","vendor_id":"56","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"SonicWall","region":"","solutions_practice":"","sub_category_1":"Email Security\/Gateway","category_1":"Network Security"},{"product_id":"884","product_name":"Gateway Anti-Virus and anti-spyware","description":"Combine network\u2010based anti\u2010malware with a cloud database of over 12 million malware signatures for deep security protection against advanced modern threats.","hyperlink":"https:\/\/www.sonicwall.com\/en-us\/products\/firewalls\/security-services\/total-secure-bundle","td_contact":"sonicwall@techdata.com","td_extension":"800-237-8931 x5545032","vendor_id":"56","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"SonicWall","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"Other"},{"product_id":"885","product_name":"Sonicwall Hosted Email Security","description":"Deploy a cloud-based security solution to protect your organization from email-borne threats such as ransomware, zero-day threats, spear phishing and business email compromise (BEC) \u2500 while meeting email compliance and regulatory mandates. Our solution includes email continuity to minimize business impact during planned and unplanned outages to your email servers. Get the scalability you need with no upfront costs and predictable subscription rates.","hyperlink":"https:\/\/www.sonicwall.com\/en-us\/products\/secure-email\/cloud-email-security","td_contact":"sonicwall@techdata.com","td_extension":"800-237-8931 x5545032","vendor_id":"56","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"SonicWall","region":"","solutions_practice":"","sub_category_1":"Email Security\/Gateway","category_1":"Network Security"},{"product_id":"886","product_name":"Intrusion Prevention Service","description":"Protect against worms, Trojans, software vulnerabilities and other intrusions by scanning all network traffic for malicious or anomalous patterns, thereby increasing network reliability and performance.","hyperlink":"https:\/\/www.sonicwall.com\/en-us\/products\/firewalls\/security-services\/total-secure-bundle","td_contact":"sonicwall@techdata.com","td_extension":"800-237-8931 x5545032","vendor_id":"56","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"SonicWall","region":"","solutions_practice":"","sub_category_1":"Intrusion Detection and Prevention","category_1":"Network Security"},{"product_id":"887","product_name":"Next-Gen Firewall","description":"Get the network security, control and visibility your organization needs to innovate and grow faster with our broad range of award-winning next-generation network firewalls.","hyperlink":"https:\/\/www.sonicwall.com\/en-us\/products\/firewalls","td_contact":"sonicwall@techdata.com","td_extension":"800-237-8931 x5545032","vendor_id":"56","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"SonicWall","region":"","solutions_practice":"","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security"},{"product_id":"888","product_name":"Secure Mobile Access Appliances","description":"Empower your mobile workforce and reduce IT costs with a unified secure access gateway that provides best-in-class SSL VPN, per app VPN, device authorization and single sign-on (SSO). Choose the deployment option that best fits your needs.","hyperlink":"https:\/\/www.sonicwall.com\/en-us\/products\/remote-access\/remote-access-appliances","td_contact":"sonicwall@techdata.com","td_extension":"800-237-8931 x5545032","vendor_id":"56","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"SonicWall","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"VPN Concentrator"},{"product_id":"889","product_name":"Virtual Firewalls","description":"Secure your public, private or hybrid cloud environment with virtualized versions of SonicWall next-generation firewalls and simplify administration with common management across your virtual and physical infrastructure.","hyperlink":"https:\/\/www.sonicwall.com\/en-us\/products\/firewalls\/nsv-series","td_contact":"sonicwall@techdata.com","td_extension":"800-237-8931 x5545032","vendor_id":"56","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"SonicWall","region":"","solutions_practice":"","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security"},{"product_id":"890","product_name":"Web Application Firewall","description":"SonicWall WAF Series features advanced web security tools and services to keep compliance data unexposed and web properties safe, undisrupted and in peak performance. It applies Layer-7 application delivery capabilities that enable application-aware load balancing, SSL offloading and acceleration for resilience and an enhanced digital engagement and experience.","hyperlink":"https:\/\/www.sonicwall.com\/en-us\/products\/web-application-firewall","td_contact":"sonicwall@techdata.com","td_extension":"800-237-8931 x5545032","vendor_id":"56","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"SonicWall","region":"","solutions_practice":"","sub_category_1":"Web Application Firewall","category_1":"Web Security"},{"product_id":"891","product_name":"Capture Client","description":"SonicWall Capture Client is an antivirus platform that delivers multiple endpoint and server protection capabilities, including advanced malware protection, network sandbox integration, and support for visibility into encrypted traffic.","hyperlink":"https:\/\/www.sonicwall.com\/en-us\/products\/firewalls\/security-services\/capture-client","td_contact":"","td_extension":"800-237-8931 x5545032","vendor_id":"56","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"SonicWall","region":"","solutions_practice":"","sub_category_1":"Advanced Malware Protection","sub_category_2":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security","category_2":"Endpoint Security"},{"product_id":"892","product_name":"Sonicwall Advanced Threat Protection","description":"Revolutionizes advanced threat detection and sandboxing with a cloud-based, multi-engine solution for stopping unknown and zero-day attacks at the gateway, and with automated remediation. Leverages the RTDMI engine which proactively blocks mass-market, zero-day threats and unknown malware accurately utilizing real-time memory-based inspection techniques.","hyperlink":"https:\/\/www.sonicwall.com\/en-us\/products\/firewalls\/security-services\/capture-advanced-threat-protection","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"56","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"SonicWall","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"Sandboxing and APT Protection"},{"product_id":"893","product_name":"Sonicwall Application Control","description":"Helps administrators control and manage both business and non\u2010business related applications with granular, application\u2010specific policies providing application classification and policy enforcement.","hyperlink":"https:\/\/www.sonicwall.com\/en-us\/products\/firewalls\/security-services\/total-secure-bundle","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"56","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"SonicWall","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"Other"},{"product_id":"894","product_name":"Comprehensive Anti-SPAM Service","description":"Remove junk email at the gateway with one-click activation, and ensure that only legitimate emails reach your email server.","hyperlink":"https:\/\/www.sonicwall.com\/en-us\/products\/firewalls\/security-services\/total-secure-bundle","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"56","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"SonicWall","region":"","solutions_practice":"","sub_category_1":"Email Security\/Gateway","category_1":"Network Security"},{"product_id":"895","product_name":"Content Filtering Service","description":"Address safety, security and productivity concerns with controls to enforce Internet use policies, and block access to harmful and unproductive web content.","hyperlink":"https:\/\/www.sonicwall.com\/en-us\/products\/firewalls\/security-services\/total-secure-bundle","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"56","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"SonicWall","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"URL Filtering\/Web Gateway"},{"product_id":"896","product_name":"Email Security Appliances","description":"SonicWall Email Security appliances are ideal for organizations that need a dedicated on-premises solution. The hardened Linux-based appliance defends against advanced email-borne threats such as ransomware, zero-day threats, spear phishing and business email compromise. Our multi-layered solution provides comprehensive inbound and outbound protection, and is available in a range of hardware appliance options that scales up to 10,000 users per appliance.","hyperlink":"https:\/\/www.sonicwall.com\/en-us\/products\/secure-email\/email-security-appliance","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"56","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"SonicWall","region":"","solutions_practice":"","sub_category_1":"Email Security\/Gateway","category_1":"Network Security"},{"product_id":"897","product_name":"Gateway Anti-Virus and anti-spyware","description":"Combine network\u2010based anti\u2010malware with a cloud database of over 12 million malware signatures for deep security protection against advanced modern threats.","hyperlink":"https:\/\/www.sonicwall.com\/en-us\/products\/firewalls\/security-services\/total-secure-bundle","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"56","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"SonicWall","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"Other"},{"product_id":"898","product_name":"Sonicwall Hosted Email Security","description":"Deploy a cloud-based security solution to protect your organization from email-borne threats such as ransomware, zero-day threats, spear phishing and business email compromise (BEC) \u2500 while meeting email compliance and regulatory mandates. Our solution includes email continuity to minimize business impact during planned and unplanned outages to your email servers. Get the scalability you need with no upfront costs and predictable subscription rates.","hyperlink":"https:\/\/www.sonicwall.com\/en-us\/products\/secure-email\/cloud-email-security","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"56","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"SonicWall","region":"","solutions_practice":"","sub_category_1":"Email Security\/Gateway","category_1":"Network Security"},{"product_id":"899","product_name":"Intrusion Prevention Service","description":"Protect against worms, Trojans, software vulnerabilities and other intrusions by scanning all network traffic for malicious or anomalous patterns, thereby increasing network reliability and performance.","hyperlink":"https:\/\/www.sonicwall.com\/en-us\/products\/firewalls\/security-services\/total-secure-bundle","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"56","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"SonicWall","region":"","solutions_practice":"","sub_category_1":"Intrusion Detection and Prevention","category_1":"Network Security"},{"product_id":"900","product_name":"Next-Gen Firewall","description":"Get the network security, control and visibility your organization needs to innovate and grow faster with our broad range of award-winning next-generation network firewalls.","hyperlink":"https:\/\/www.sonicwall.com\/en-us\/products\/firewalls","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"56","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"SonicWall","region":"","solutions_practice":"","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security"},{"product_id":"901","product_name":"Secure Mobile Access Appliances","description":"Empower your mobile workforce and reduce IT costs with a unified secure access gateway that provides best-in-class SSL VPN, per app VPN, device authorization and single sign-on (SSO). Choose the deployment option that best fits your needs.","hyperlink":"https:\/\/www.sonicwall.com\/en-us\/products\/remote-access\/remote-access-appliances","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"56","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"SonicWall","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"VPN Concentrator"},{"product_id":"902","product_name":"Virtual Firewalls","description":"Secure your public, private or hybrid cloud environment with virtualized versions of SonicWall next-generation firewalls and simplify administration with common management across your virtual and physical infrastructure.","hyperlink":"https:\/\/www.sonicwall.com\/en-us\/products\/firewalls\/nsv-series","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"56","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"SonicWall","region":"","solutions_practice":"","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security"},{"product_id":"903","product_name":"Web Application Firewall","description":"SonicWall WAF Series features advanced web security tools and services to keep compliance data unexposed and web properties safe, undisrupted and in peak performance. It applies Layer-7 application delivery capabilities that enable application-aware load balancing, SSL offloading and acceleration for resilience and an enhanced digital engagement and experience.","hyperlink":"https:\/\/www.sonicwall.com\/en-us\/products\/web-application-firewall","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"56","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"SonicWall","region":"","solutions_practice":"","sub_category_1":"Web Application Firewall","category_1":"Web Security"},{"product_id":"904","product_name":"Capture Client","description":"SonicWall Capture Client is an antivirus platform that delivers multiple endpoint and server protection capabilities, including advanced malware protection, network sandbox integration, and support for visibility into encrypted traffic.","hyperlink":"https:\/\/www.sonicwall.com\/en-us\/products\/firewalls\/security-services\/capture-client","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"56","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"1","org_id":"1","vendor_name":"SonicWall","region":"","solutions_practice":"","sub_category_1":"Advanced Malware Protection","sub_category_2":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security","category_2":"Endpoint Security"},{"product_id":"905","product_name":"SonicWall Security-as-a-Service Program","description":"SonicWall's SECaaS is a monthly subscription pricing model (OPEX) with no upfront costs.\u00a0 This business model is very popular with the MSP\/MSSP partner community, or any sales scenario where a monthly subscription price is the preferred purchasing mechanism for the end-customer.\u00a0\u00a0\u00a0","hyperlink":"","td_contact":"sonicwall@techdata.com","td_extension":"800-237-8931 x5545032","vendor_id":"56","service_tiering":"Flexible quarter or monthly billing","partner_benefits":" \u2022 Available from SonicWall exclusively for the SonicWall partner community, this monthly pricing option includes the hardware. <\/p>\n \u2022 Pass OpEx flexbility to their clients <\/p>\n \u2022 Win more business at higher margins<\/p>","typeof_service":" Managed Security Services Building Block Solution:<\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 SonicWall Next-Generation Firewall that delivers all of these services bundled with the security services needed for comprehensive network protection from a wide range of advanced threats.<\/p>\n \u2022 All-in-One network protection that combines gateway anti-virus, anti-spyware, intrusion prevention, application intelligence and control, content filtering, firmware updates, and 24x7 support delivered through a high-performance, deep-packet inspection firewall.<\/p>\n \u2022 Access to the Global Management System, a powerful and intuitive solution to rapidly deploy and centrally manage SonicWall firewalls, email security, and secure mobile access solutions. <\/p>","mssp_available":"0","org_id":"1","vendor_name":"SonicWall","region":"","solutions_practice":"","sub_category_2":"Building Block Solution","sub_category_3":"Building Block Solution","sub_category_4":"Building Block Solution","sub_category_1":"Building Block Solution","category_1":"Endpoint Security","category_4":"Managed Security Service","category_3":"Network Security","category_2":"Web Security"},{"product_id":"906","product_name":"Intercept X","description":"Experts agree. Intercept X Advanced consistently rates at the top of independent tests and analyst reports for endpoint protection. By combining cutting-edge technologies, such as deep learning and endpoint detection and response, Intercept X delivers unmatched protection against unknown malware, exploits, and ransomware.","hyperlink":"https:\/\/www.sophos.com\/en-us\/products\/intercept-x.aspx","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"57","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Sophos","region":"","solutions_practice":"","sub_category_1":"Advanced Malware Protection","sub_category_2":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security","category_2":"Endpoint Security"},{"product_id":"907","product_name":"Sophos Mobile","description":"Sophos Mobile is a secure Unified Endpoint Management (UEM) solution that helps businesses spend less time and effort to manage and secure traditional and mobile endpoints. The only UEM solution that integrates natively with a leading next-gen endpoint security platform, Sophos Mobile supports management of Windows 10, macOS, iOS, and Android devices.","hyperlink":"https:\/\/www.sophos.com\/en-us\/products\/mobile-control.aspx","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"57","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Sophos","region":"","solutions_practice":"","category_1":"Mobile Security","sub_category_1":"Mobility Security"},{"product_id":"908","product_name":"Synchronized Encryption","description":"Sophos SafeGuard encrypts content as soon as it\u2019s created. And with the encryption always on, you can enjoy seamless secure collaboration. Synchronized Encryption proactively protects your data by continuously validating the user, application, and security integrity of a device before allowing access to encrypted data.","hyperlink":"https:\/\/www.sophos.com\/en-us\/products\/safeguard-encryption.aspx","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"57","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Sophos","region":"","solutions_practice":"","category_1":"Data Security","sub_category_1":"Endpoint Encryption"},{"product_id":"909","product_name":"Managed Threat Response","description":"24\/7 threat hunting, detection, and response delivered by an expert team as a fully-managed service","hyperlink":"https:\/\/www.sophos.com\/en-us\/products\/managed-threat-response.aspx","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"57","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Sophos","region":"","solutions_practice":"","sub_category_1":"Other","category_1":"Security Intelligence"},{"product_id":"910","product_name":"Sophos Email Security","description":"Smarter Email Security with AI. Today\u2019s email threats move fast, and growing businesses need predictive email security \u2013 defeating today\u2019s threats with an eye on tomorrow.","hyperlink":"https:\/\/www.sophos.com\/en-us\/products\/sophos-email.aspx","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"57","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Sophos","region":"","solutions_practice":"","sub_category_1":"Email Security\/Gateway","category_1":"Network Security"},{"product_id":"911","product_name":"Sophos Phish Threat","description":"Phishing is big business. Attacks have shown record growth in recent years, and a solid security awareness program is an integral part of any defense-in-depth strategy. Sophos Phish Threat educates and tests your end users through automated attack simulations, quality security awareness training, and actionable reporting metrics. \nPhish Threat provides you with the flexibility and customization that your organization needs to facilitate a positive security awareness culture.","hyperlink":"https:\/\/www.sophos.com\/en-us\/products\/phish-threat.aspx","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"57","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Sophos","region":"","solutions_practice":"","sub_category_1":"Email Security\/Gateway","category_1":"Network Security"},{"product_id":"912","product_name":"Intercept X for Server with EDR","description":"Protect. Discover. Control. Secure your cloud, on-premises, or hybrid server environments.","hyperlink":"https:\/\/www.sophos.com\/en-us\/products\/server-security.aspx","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"57","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Sophos","region":"","solutions_practice":"","sub_category_1":"Critical System Protection\/Application Whitelisting","category_1":"Endpoint Security"},{"product_id":"913","product_name":"XG Firewall","description":"Sophos XG Firewall provides unprecedented visibility into your network, users, and applications directly from the control center. You also get rich on-box reporting and the option to add Sophos iView for centralized reporting across multiple firewalls.","hyperlink":"https:\/\/www.sophos.com\/en-us\/products\/next-gen-firewall.aspx","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"57","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Sophos","region":"","solutions_practice":"","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security"},{"product_id":"914","product_name":"Secure Web Appliance","description":"Get the ultimate in web security, control, and insights. It\u2019s web protection that\u2019s effective,\naffordable, and easy with lightning performance that won\u2019t slow users down.","hyperlink":"https:\/\/www.sophos.com\/en-us\/products\/secure-web-gateway.aspx","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"57","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Sophos","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"URL Filtering\/Web Gateway"},{"product_id":"915","product_name":"SG UTM","description":"Sophos UTM drives threat prevention to unmatched levels. The artificial intelligence built into Sophos Sandstorm is a deep learning neural network, an advanced form of machine learning, that detects both known and unknown malware without relying on signatures.","hyperlink":"https:\/\/www.sophos.com\/en-us\/products\/unified-threat-management.aspx","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"57","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Sophos","region":"","solutions_practice":"","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security"},{"product_id":"916","product_name":"Sophos Wireless","description":"Sophos Wireless is easy to deploy and manage, so your wireless networks are up and running in no time.","hyperlink":"https:\/\/www.sophos.com\/en-us\/products\/secure-wifi.aspx","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"57","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Sophos","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"Wireless & Access Management"},{"product_id":"917","product_name":"Sophos Cloud Optix","description":"Public Cloud Visibility and Threat Response. Detect, respond, and prevent the cloud security and compliance gaps leaving you exposed","hyperlink":"https:\/\/www.sophos.com\/en-us\/products\/cloud-optix.aspx","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"57","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Sophos","region":"","solutions_practice":"","category_1":"Cloud Security","sub_category_1":"Other"},{"product_id":"918","product_name":"Intercept X","description":"Experts agree. Intercept X Advanced consistently rates at the top of independent tests and analyst reports for endpoint protection. By combining cutting-edge technologies, such as deep learning and endpoint detection and response, Intercept X delivers unmatched protection against unknown malware, exploits, and ransomware.","hyperlink":"https:\/\/www.sophos.com\/en-us\/products\/intercept-x.aspx","td_contact":"","td_extension":"","vendor_id":"57","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Sophos","region":"","solutions_practice":"","sub_category_1":"Advanced Malware Protection","sub_category_2":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security","category_2":"Endpoint Security"},{"product_id":"919","product_name":"Sophos Mobile","description":"Sophos Mobile is a secure Unified Endpoint Management (UEM) solution that helps businesses spend less time and effort to manage and secure traditional and mobile endpoints. The only UEM solution that integrates natively with a leading next-gen endpoint security platform, Sophos Mobile supports management of Windows 10, macOS, iOS, and Android devices.","hyperlink":"https:\/\/www.sophos.com\/en-us\/products\/mobile-control.aspx","td_contact":"","td_extension":"","vendor_id":"57","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Sophos","region":"","solutions_practice":"","category_1":"Mobile Security","sub_category_1":"Mobility Security"},{"product_id":"920","product_name":"Synchronized Encryption","description":"Sophos SafeGuard encrypts content as soon as it\u2019s created. And with the encryption always on, you can enjoy seamless secure collaboration. Synchronized Encryption proactively protects your data by continuously validating the user, application, and security integrity of a device before allowing access to encrypted data.","hyperlink":"https:\/\/www.sophos.com\/en-us\/products\/safeguard-encryption.aspx","td_contact":"","td_extension":"","vendor_id":"57","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Sophos","region":"","solutions_practice":"","category_1":"Data Security","sub_category_1":"Endpoint Encryption"},{"product_id":"921","product_name":"Managed Threat Response","description":"24\/7 threat hunting, detection, and response delivered by an expert team as a fully-managed service","hyperlink":"https:\/\/www.sophos.com\/en-us\/products\/managed-threat-response.aspx","td_contact":"","td_extension":"","vendor_id":"57","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Sophos","region":"","solutions_practice":"","sub_category_1":"Other","category_1":"Security Intelligence"},{"product_id":"922","product_name":"Sophos Email Security","description":"Smarter Email Security with AI. Today\u2019s email threats move fast, and growing businesses need predictive email security \u2013 defeating today\u2019s threats with an eye on tomorrow.","hyperlink":"https:\/\/www.sophos.com\/en-us\/products\/sophos-email.aspx","td_contact":"","td_extension":"","vendor_id":"57","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Sophos","region":"","solutions_practice":"","sub_category_1":"Email Security\/Gateway","category_1":"Network Security"},{"product_id":"923","product_name":"Sophos Phish Threat","description":"Phishing is big business. Attacks have shown record growth in recent years, and a solid security awareness program is an integral part of any defense-in-depth strategy. Sophos Phish Threat educates and tests your end users through automated attack simulations, quality security awareness training, and actionable reporting metrics. \nPhish Threat provides you with the flexibility and customization that your organization needs to facilitate a positive security awareness culture.","hyperlink":"https:\/\/www.sophos.com\/en-us\/products\/phish-threat.aspx","td_contact":"","td_extension":"","vendor_id":"57","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Sophos","region":"","solutions_practice":"","sub_category_1":"Email Security\/Gateway","category_1":"Network Security"},{"product_id":"924","product_name":"Intercept X for Server with EDR","description":"Protect. Discover. Control. Secure your cloud, on-premises, or hybrid server environments.","hyperlink":"https:\/\/www.sophos.com\/en-us\/products\/server-security.aspx","td_contact":"","td_extension":"","vendor_id":"57","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Sophos","region":"","solutions_practice":"","sub_category_1":"Critical System Protection\/Application Whitelisting","category_1":"Endpoint Security"},{"product_id":"925","product_name":"XG Firewall","description":"Sophos XG Firewall provides unprecedented visibility into your network, users, and applications directly from the control center. You also get rich on-box reporting and the option to add Sophos iView for centralized reporting across multiple firewalls.","hyperlink":"https:\/\/www.sophos.com\/en-us\/products\/next-gen-firewall.aspx","td_contact":"","td_extension":"","vendor_id":"57","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Sophos","region":"","solutions_practice":"","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security"},{"product_id":"926","product_name":"Secure Web Appliance","description":"Get the ultimate in web security, control, and insights. It\u2019s web protection that\u2019s effective,\naffordable, and easy with lightning performance that won\u2019t slow users down.","hyperlink":"https:\/\/www.sophos.com\/en-us\/products\/secure-web-gateway.aspx","td_contact":"","td_extension":"","vendor_id":"57","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Sophos","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"URL Filtering\/Web Gateway"},{"product_id":"927","product_name":"SG UTM","description":"Sophos UTM drives threat prevention to unmatched levels. The artificial intelligence built into Sophos Sandstorm is a deep learning neural network, an advanced form of machine learning, that detects both known and unknown malware without relying on signatures.","hyperlink":"https:\/\/www.sophos.com\/en-us\/products\/unified-threat-management.aspx","td_contact":"","td_extension":"","vendor_id":"57","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Sophos","region":"","solutions_practice":"","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security"},{"product_id":"928","product_name":"Sophos Wireless","description":"Sophos Wireless is easy to deploy and manage, so your wireless networks are up and running in no time.","hyperlink":"https:\/\/www.sophos.com\/en-us\/products\/secure-wifi.aspx","td_contact":"","td_extension":"","vendor_id":"57","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Sophos","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"Wireless & Access Management"},{"product_id":"929","product_name":"Sophos Cloud Optix","description":"Public Cloud Visibility and Threat Response. Detect, respond, and prevent the cloud security and compliance gaps leaving you exposed","hyperlink":"https:\/\/www.sophos.com\/en-us\/products\/cloud-optix.aspx","td_contact":"","td_extension":"","vendor_id":"57","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Sophos","region":"","solutions_practice":"","category_1":"Cloud Security","sub_category_1":"Other"},{"product_id":"930","product_name":"Cloud Backup (backup for your SaaS data)","description":"Add granular protection and recovery to your cloud-based applications (Microsoft Office 365 and G Suite by Google), and ensure that even when important data is accidentally or maliciously overwritten or deleted, it isn\u2019t lost.","hyperlink":"https:\/\/www.storagecraft.com\/data-availability-products","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"58","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"StorageCraft","region":"","solutions_practice":"","sub_category_2":"Backup, Restore, and Recovery","category_1":"Cloud Security","category_2":"Data Security","sub_category_1":"Other"},{"product_id":"931","product_name":"File Backup and Recovery","description":"Back up only the business-critical data living on laptops and desktops. This online backup solution identifies the data that should be protected, backs it up to the cloud, and enables easy file and folder recovery.","hyperlink":"https:\/\/www.storagecraft.com\/data-availability-products","td_contact":"storagecraft@techdata.com","td_extension":"800-237-8931 x71458","vendor_id":"58","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"StorageCraft","region":"","solutions_practice":"","sub_category_1":"Backup, Restore, and Recovery","category_1":"Data Security"},{"product_id":"932","product_name":"Granular Recovery for Exchange","description":"RE works with your ShadowProtect backups to protect email. This solution to searches for\/recovers Microsoft Exchange message data.","hyperlink":"https:\/\/www.storagecraft.com\/data-availability-products","td_contact":"storagecraft@techdata.com","td_extension":"800-237-8931 x71458","vendor_id":"58","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"StorageCraft","region":"","solutions_practice":"","sub_category_1":"Backup, Restore, and Recovery","category_1":"Data Security"},{"product_id":"933","product_name":"ShadowProtect","description":"ShadowProtect delivers continuous, airtight image-based backups. This makes recovery from disaster a breeze. Access, migrate, and restore your data with remote management.","hyperlink":"https:\/\/www.storagecraft.com\/data-availability-products","td_contact":"storagecraft@techdata.com","td_extension":"800-237-8931 x71458","vendor_id":"58","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"StorageCraft","region":"","solutions_practice":"","sub_category_1":"Backup, Restore, and Recovery","category_1":"Data Security"},{"product_id":"934","product_name":"ShadowProtect IT Edition","description":"This tool available via subscription lets your system admin back up, restore, and migrate machines without needing to install software.","hyperlink":"https:\/\/www.storagecraft.com\/data-availability-products","td_contact":"storagecraft@techdata.com","td_extension":"800-237-8931 x71458","vendor_id":"58","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"StorageCraft","region":"","solutions_practice":"","sub_category_1":"Backup, Restore, and Recovery","category_1":"Data Security"},{"product_id":"935","product_name":"Cloud Services -DRaaS","description":"Protect your data from a site-wide disaster by storing backups remotely; If you don't need full DRaaS, choose a Service Level for replication as a service (RaaS) in our secure cloud, including system restore or file and folder recovery.","hyperlink":"https:\/\/www.storagecraft.com\/data-availability-products","td_contact":"storagecraft@techdata.com","td_extension":"800-237-8931 x71458","vendor_id":"58","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"StorageCraft","region":"","solutions_practice":"","sub_category_1":"Backup, Restore, and Recovery","category_2":"Cloud Security","category_1":"Data Security","sub_category_2":"Other"},{"product_id":"936","product_name":"Next-generation UTM Firewall","description":"Stormshield Network Security solutions are built on the concept of Multi-Layer Collaborative Security. This holistic approach, based on active collaboration between the security engines of other Stormshield products and solutions, represents the future of in-depth IT systems protection.","hyperlink":"https:\/\/www.stormshield.com\/products-services\/products\/network-security\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"59","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Stormshield","region":"","solutions_practice":"","sub_category_1":"Gateway Firewall\/UTM","category_1":"Network Security"},{"product_id":"937","product_name":"Virtual appliances","description":"Stormshield Elastic Virtual Appliances offers companies proven security \nthat is proactive in the face of future threats, guaranteeing real \nprotection against internal and external threats. These solutions secure\n both employee productivity and business servers in virtual \nenvironments. It is available for Amazon Web Services and Microsoft Azure.","hyperlink":"https:\/\/www.stormshield.com\/products\/virtual-appliances\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"59","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Stormshield","region":"","solutions_practice":"","sub_category_1":"Building Block Solution","category_1":"Cloud Security"},{"product_id":"938","product_name":"Stormshield Endpoint Security","description":"Stormshield Endpoint Security offers a complementary layer of security \nto compensate weaknesses by ensuring continuous control over \nbehaviors on servers, workstations, and terminal devices according to \nfine-grained security policies put in place by the administrator.","hyperlink":"https:\/\/www.stormshield.com\/products-services\/products\/endpoint-security\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"59","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Stormshield","region":"","solutions_practice":"","sub_category_1":"Advanced Malware Protection","category_1":"Endpoint Security"},{"product_id":"939","product_name":"Adaptive Defense","description":"Panda\u2019s next generation Adaptive Defense solution provides workstations \nwith protection by classifying and analyzing the entire range of \napplications used on them","hyperlink":"https:\/\/www.stormshield.com\/products-services\/products\/endpoint-security\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"59","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Stormshield","region":"","solutions_practice":"","sub_category_1":"Critical System Protection\/Application Whitelisting","category_1":"Endpoint Security"},{"product_id":"940","product_name":"Data Enterprise","description":"Give your company all the tools it needs to control confidential data \nexchanged by employees in the course of your business activity.","hyperlink":"https:\/\/www.stormshield.com\/products\/enterprise\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"59","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Stormshield","region":"","solutions_practice":"","category_1":"Data Security","sub_category_1":"Database Encryption"},{"product_id":"941","product_name":"\u00a0\u00a0 Data for Cloud and Mobility","description":"Keep control over the confidentiality of your sensitive data in an unsupervised cloud infrastructure by encrypting information contained on the computer and in the Cloud","hyperlink":"https:\/\/www.stormshield.com\/products\/cloud-and-mobility\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"59","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Stormshield","region":"","solutions_practice":"","category_1":"Data Security","sub_category_1":"Endpoint Encryption"},{"product_id":"942","product_name":"\u00a0\u00a0 Data Connector","description":"Enable developers to integrate a data \nprotection feature into business applications. Encryption is carried out\n as closely to data processing as possible, thus alleviating the risk \nthat the solution will go unused","hyperlink":"https:\/\/www.stormshield.com\/products\/connector\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"59","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Stormshield","region":"","solutions_practice":"","category_1":"Data Security","sub_category_1":"Other"},{"product_id":"943","product_name":"\u00a0\u00a0 Breach Fighter","description":"Stormshield's Breach Fighter solution extends the capabilities of \nnext-generation Stormshield Network Security firewalls and guarantees \nreal-time protection from such attacks thanks to its unique technology \nbased on the Stormshield Endpoint Security behavioral analysis engine. Combines the high-level antivirus protection that the Kaspersky engine \nprovides with the protection of the patented IPS engine and Stormshield \nEndpoint Security's technology.It","hyperlink":"https:\/\/www.stormshield.com\/products\/breach-fighter\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"59","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Stormshield","region":"","solutions_practice":"","sub_category_1":"Intrusion Detection and Prevention","category_1":"Network Security"},{"product_id":"944","product_name":"Administration Tools - Visibility Center","description":"A turnkey solution that offers a unified presentation of security events \noriginating from all of Stormshield product ranges. Gives you an overview \nof how secure your infrastructure and data are. The intuitive visualizations you will find in Stormshield Visibility \nCenter enable you to quickly identify significant events and security \nincidents.","hyperlink":"https:\/\/www.stormshield.com\/products\/visibility-center\/","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"59","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Stormshield","region":"","solutions_practice":"","category_1":"Security Intelligence","sub_category_1":"SIEM"},{"product_id":"945","product_name":"SIEM-as-a-Service","description":"StratoZen\u2019s SIEM-as-a-Service is designed to provide MSPs all the benefits needed from a security information and event management system without any of the headache or capital investment. The offering is a comprehensive SIEM-as-a-Service solution, fully hosted in our secure and compliant cloud to manage and monitor your critical systems regardless of where they may be.","hyperlink":"https:\/\/stratozen.com\/siem-as-a-service\/","td_contact":"","td_extension":"800-237-8931 x5540508","vendor_id":"60","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Stratozen","region":"","solutions_practice":"","category_1":"Security Intelligence","sub_category_1":"SIEM"},{"product_id":"946","product_name":"Advanced Threat Protection","description":"Uncover, prioritize, and remediate advanced attacks across endpoints, networks, and email in minutes, all from a single console.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/atp-brochure-en","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"947","product_name":"Advanced Threat Protection for Email","description":"Symantec's Advanced Threat Protection for Email protect against most sophisticated email threats and gain comprehensive insights in advanced email attacks.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/email-threat-detection-and-response-en","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"Email Security\/Gateway","category_1":"Network Security"},{"product_id":"948","product_name":"Asset Management Suite","description":"Control your assets, uncover savings, and ensure compliance. Powered by Altiris technology to optimize your IT investments.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/endpoint\/management\/asset-management-suite","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Endpoint Security Management"},{"product_id":"949","product_name":"Certificate Lifecycle Platform","description":"Enable end-to-end information protection, authentication, and secure control for governments and large institutions with PKI.","hyperlink":"https:\/\/community.broadcom.com\/symantecenterprise\/communities\/community-home?CommunityKey=24e6cd72-e3fc-4f77-b346-f8740e624c56","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"Other"},{"product_id":"950","product_name":"Client Management Suite","description":"Automate redundant tasks for managing devices and software to reduce costs. For Windows, Mac, Linux, and virtual desktops.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/endpoint\/management\/client-management-suite","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Endpoint Security Management"},{"product_id":"951","product_name":"Cloud Workload Protection","description":"Symantec Cloud Workload Protection automates security for public cloud workloads, enabling business agility, compliance and cost savings for organizations, while easing DevOps and administrative burdens.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/endpoint\/hybrid-cloud\/cloud-workload-protection","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Cloud Security","sub_category_1":"Other"},{"product_id":"952","product_name":"CloudSOC Audit \u2013 Shadow IT","description":"Uncover Shadow IT risk \u2013 find and audit use of cloud applications. Evaluate which cloud services are business-ready and control their usage to keep your organization safe and compliant.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/cloudsoc-audit-en","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"Governance, Risk, Compliance, & Audit","category_1":"Security Intelligence"},{"product_id":"953","product_name":"CloudSOC CASB Gateway","description":"Control employee use of a wide range of sanctioned and unsanctioned cloud apps with CloudSOC CASB Gateway, a leading Cloud Security Gateway (CSG) solution.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/cloudsoc-gateway-en","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"CASB","category_1":"Cloud Security"},{"product_id":"954","product_name":"CloudSOC Security for Cloud Apps \u2013 Securlets","description":"Keep your organization secure and compliant while using cloud applications with CloudSOC, a leading Cloud Access Security Broker (CASB) and Cloud Security Gateway (CSG)","hyperlink":"https:\/\/community.broadcom.com\/home","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"CASB","category_1":"Cloud Security"},{"product_id":"955","product_name":"Content & Malware Analysis","description":"Symantec Content and Malware Analysis protects against advanced threats through file reputation, multiple antimalware and analysis techniques, and sophisticated sandbox detonation.","hyperlink":"https:\/\/community.broadcom.com\/symantecenterprise\/communities\/community-home?CommunityKey=20e864d3-37d2-4fd7-a3cd-71dd178476c5","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"Sandboxing and APT Protection"},{"product_id":"956","product_name":"Control Compliance Suite","description":"Delivers a unified view of security controls and vulnerabilities. Align priorities across security, IT operations, and compliance.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/information-protection\/control-compliance-suite","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Governance, Risk, Compliance","sub_category_1":"Governance, Risk, Compliance"},{"product_id":"957","product_name":"Critical System Protection","description":"Embed critical protection into Internet of Things (IoT) devices through a lightweight system so they are secure by design.","hyperlink":"https:\/\/community.broadcom.com\/symantecenterprise\/communities\/community-home\/librarydocuments\/viewdocument?DocumentKey=5ac32d32-9e66-4d3a-981c-711f5061719c&CommunityKey=3f8a53f1-00c7-4411-8203-ee040b59e575&tab=librarydocuments","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"Critical System Protection\/Application Whitelisting","sub_category_2":"Device and Sensor","category_1":"Endpoint Security","category_2":"IoT"},{"product_id":"958","product_name":"Data Center Security","description":"Harden security for on-premise, hybrid, and cloud-based data centers using detection, monitoring, and prevention capabilities.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/endpoint\/hybrid-cloud\/data-center-security","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"Intrusion Detection and Prevention","category_1":"Network Security"},{"product_id":"959","product_name":"Data Loss Prevention","description":"Secure your vital information and prevent data leaks\u2014on-premise, mobile, or in the cloud\u2014with our market-leading product.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/information-protection\/data-loss-prevention","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"Data Loss Prevention","category_1":"Data Security"},{"product_id":"960","product_name":"Data Loss Prevention and CASB - Symantec DLP Cloud and Symantec CloudSOC","description":"Eliminate data loss blind spots in cloud apps with Symantec Data Loss Prevention (DLP) Cloud and Symantec CloudSOC, the first integrated cloud security offering that combines DLP and CASB technologies.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/information-protection\/data-loss-prevention","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_2":"CASB","category_2":"Cloud Security","sub_category_1":"Data Loss Prevention","category_1":"Data Security"},{"product_id":"961","product_name":"Data Loss Prevention Cloud Service for Email","description":"Data Loss Prevention Cloud Service for Email helps enterprises quickly move their email to the cloud without compromising security by combining data loss prevention and email security.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/dlp-cloud-service-for-email-en","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"Data Loss Prevention","category_1":"Data Security","sub_category_2":"Email Security\/Gateway","category_2":"Network Security"},{"product_id":"962","product_name":"DeepSight\u2122 Adversary Intelligence","description":"Outsmart emerging threats and improve your risk assessment through rich adversary intelligence and context of cyber attacks.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/cyber-security-services-deepsight-intelligence-en","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Security Intelligence","sub_category_1":"Threat Intelligence"},{"product_id":"963","product_name":"DeepSight\u2122 Technical Intelligence","description":"Improve your security infrastructure with automated access to relevant vulnerability, malware, and threat intelligence.","hyperlink":"https:\/\/www.broadcom.com\/support\/symantec\/services","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Security Intelligence","sub_category_1":"Threat Intelligence"},{"product_id":"964","product_name":"Deployment Solution","description":"Manage OS and software deployment, configuration, and PC \u2018personality\u2019 migration across hardware platforms and OS types.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/deployment-solution-en","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Endpoint Security Management"},{"product_id":"965","product_name":"Desktop Email Encryption","description":"Provide end-to-end email message encryption in your network with a simple user experience.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/encryption-solutions-for-email-en","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Data Security","sub_category_1":"File, Folder and\/or Email Encryption"},{"product_id":"966","product_name":"Education Services","description":"Maximize your product competency and validate technical knowledge to gain the most benefit from your IT investments with in depth technical training.","hyperlink":"https:\/\/www.broadcom.com\/support\/symantec\/services\/education","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"Education","category_1":"Security Strategy"},{"product_id":"967","product_name":"Emergency Response","description":"Resolve your incident, restore normal operations, and minimize operational impact from attacks with our Incident Response Team.","hyperlink":"https:\/\/community.broadcom.com\/symantecenterprise\/communities\/community-home?CommunityKey=2d17029b-76e4-4bcb-9329-1c5f27a25247","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"Incident Response","category_1":"Security Intelligence"},{"product_id":"968","product_name":"Encrypted Traffic Management","description":"Symantec Proxy and SSL Visibility Appliance decrypt traffic, feed existing security infrastructure, and maintain privacy compliance.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/web-and-email\/encrypted-traffic-management","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_2":"Data Security","sub_category_2":"Encyption Key Management","category_1":"Network Security","sub_category_1":"VPN Concentrator"},{"product_id":"969","product_name":"Endpoint Detection and Response (EDR)","description":"Symantec's Endpoint Detection and Response (EDR) solution detects, investigates, and remediates threats across all endpoints from a single console.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/endpoint\/detection-and-response","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security","sub_category_2":"Forensics","category_2":"Security Intelligence"},{"product_id":"970","product_name":"Endpoint Encryption","description":"Full disk encryption (including BitLocker and FileVault management) to protect data and ensure compliance. Also protects data on removable media.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/information-protection\/encryption","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Data Security","sub_category_1":"Endpoint Encryption"},{"product_id":"971","product_name":"Endpoint Protection","description":"Symantec Endpoint Protection 14 leverages the largest endpoint work together with advanced machine learning algorithms to protect you and your data.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/endpoint\/end-user","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"972","product_name":"Endpoint Protection Small Business Edition","description":"Secure your small business desktops, laptops, and servers against cyber attacks, either on-premises or based in the cloud.","hyperlink":"https:\/\/support.broadcom.com\/security\/product-page.html?productName=Endpoint%20Protection%20Small%20Business%20Edition%20(Cloud)","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"973","product_name":"File Share Encryption","description":"Protect specific files and folders before sharing across devices, servers and in the cloud, with DLP policy enforcement integration.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/file-share-encryption-en","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Data Security","sub_category_1":"File, Folder and\/or Email Encryption"},{"product_id":"974","product_name":"Gateway Email Encryption","description":"Protect email as it leaves your network so it can be safely shared with customers and partners.","hyperlink":"https:\/\/community.broadcom.com\/symantecenterprise\/communities\/community-home?CommunityKey=6c3b4f1e-9a34-48a5-8855-c1b5d96fb81a","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_2":"Data Security","sub_category_1":"Email Security\/Gateway","sub_category_2":"File, Folder and\/or Email Encryption","category_1":"Network Security"},{"product_id":"975","product_name":"Ghost Solution Suite","description":"Facilitate operating system deployment, migration, and cross-platform management for desktops, laptops, tablets, and servers.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/endpoint\/management\/ghost-solutions-suite","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Endpoint Security Management"},{"product_id":"976","product_name":"Incident Response Retainers and Readiness Services","description":"Preempt attacks and lessen security incident impact through remote and on-site investigations by our Incident Response Teams.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/incident-response-ds-en","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"Incident Response","category_1":"Security Intelligence"},{"product_id":"977","product_name":"Information Centric Analytics","description":"Information Centric Analytics provides centralized analysis and visualization of all user-driven risk. It allows pre-emptive action before a breach, or guides a rapid response during an incident.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/information-centric-analytics-en","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"Other","category_1":"Security Intelligence"},{"product_id":"978","product_name":"Information Centric Tagging","description":"Enhance existing data protection solutions by incorporating user based data classification and tagging as your data is being created or at rest.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/information-centric-tagging-en","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"Data and Discovery Classification","category_1":"Data Security"},{"product_id":"979","product_name":"IT Management Suite","description":"Securely manage your endpoints throughout their entire lifecycle across Windows, Mac, Linux, Unix, and virtual environments.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/it-management-suite-en","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Endpoint Security Management"},{"product_id":"980","product_name":"Mail Security for Microsoft Exchange","description":"Protect against malware, phishing, and targeted attacks, blocking 99% of spam with less than one in 1 million false positives.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/web-and-email\/messaging\/mail-security-exchange","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"Email Security\/Gateway","category_1":"Network Security"},{"product_id":"981","product_name":"Malware Analysis Service","description":"Symantec\u2019s cloud-delivered Malware Analysis Service uses threat intelligence, behavioral analysis, and sandboxing to provide scalable inline protection against zero-day, targeted, and advanced malware threats.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/malware-analysis-service","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Security Intelligence","sub_category_1":"Threat Intelligence"},{"product_id":"982","product_name":"Management Center and Reporting","description":"Centralized Management and Reporting solutions for Symantec network security products simplify governance, mitigate cloud access risks, enhance threat defenses, improve visibility and reduce operational costs.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/web-and-email\/gateway\/management-center-and-reporting","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"Management","category_1":"Security Intelligence"},{"product_id":"983","product_name":"Messaging Gateway","description":"Defend your email perimeter against spam, malware, and targeted attacks with content filtering, data loss prevention, and encryption.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/web-and-email\/messaging\/gateway","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_2":"Data Loss Prevention","category_2":"Data Security","sub_category_1":"Email Security\/Gateway","category_1":"Network Security"},{"product_id":"984","product_name":"Network Forensics & Security Analytics","description":"Security Analytics arms incident response teams with enriched, full-packet capture for complete security visibility, advanced network forensics, and real-time threat detection.","hyperlink":"https:\/\/www.broadcom.com\/info\/symantec\/security-analytics-key-features","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"Forensics","category_1":"Security Intelligence"},{"product_id":"985","product_name":"Patch Management Solution","description":"Manage patches and software updates by automating the collection, analysis, and delivery processes across your enterprise.","hyperlink":"https:\/\/support.broadcom.com\/security\/product-page.html?productName=Patch%20Management%20Solution%20for%20Windows","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Vulnerability Management\/Patching"},{"product_id":"986","product_name":"Phishing Readiness","description":"Improve your employees\u2019 recognition and reporting of phishing attacks so they are better equipped as your first line of defense.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/web-and-email\/messaging\/phishing-readiness","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"Education","sub_category_2":"Security Awareness Training","category_1":"Security Strategy","category_2":"Security Strategy"},{"product_id":"987","product_name":"Protection Suite Enterprise Edition","description":"Secure your endpoint and email infrastructure with advanced protection against complex malware, data loss and spam threats.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/protection-suite-enterprise-edition-en","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"988","product_name":"Risk Insight","description":"Automated, cloud-based risk assessment allows you to proactively monitor and analyze your enterprise, industry, and global risks to refine and improve your security posture.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/risk-insight-en","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"Governance, Risk, Compliance, & Audit","category_1":"Security Intelligence"},{"product_id":"989","product_name":"RuleSpace","description":"Filter malicious or inappropriate content with categorization databases, ensuring a safe web environment for 350 million+ users.","hyperlink":"https:\/\/www.broadcom.com\/company\/partners\/symantec\/programs\/oem-sales-program\/rulespace","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"URL Filtering\/Web Gateway"},{"product_id":"990","product_name":"Secure Web Gateway (SWG) Solutions","description":"Symantec secure web gateway offers the industry\u2019s most sophisticated ecosystem to protect your organization\u2019s cloud use.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/web-and-email\/gateway","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"URL Filtering\/Web Gateway"},{"product_id":"991","product_name":"Security Awareness Service","description":"Mitigate information risk by educating your employees through the Symantec Security Awareness Program. Contact Symantec Education to register.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/security-awareness-service-en","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"Education","sub_category_2":"Security Awareness Training","category_1":"Security Strategy","category_2":"Security Strategy"},{"product_id":"992","product_name":"Server Management Suite","description":"Provision, control, automate, and monitor physical and virtual servers from a central console across a wide array of platforms.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/endpoint\/management\/server-management-suite","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Endpoint Security Management"},{"product_id":"993","product_name":"ServiceDesk","description":"Automate incident response and resolution to reduce service interruptions, accelerate restoration, and correct systemic problems.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/endpoint\/management\/service-desk","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Endpoint Security Management"},{"product_id":"994","product_name":"Shared Service Provider PKI: Federal and Non-Federal","description":"Achieve Federal agency compliance with FIPS 201 and HSPD-12 requirements through our highly scalable cloud-based PKI Service.","hyperlink":"https:\/\/community.broadcom.com\/symantecenterprise\/communities\/community-home\/librarydocuments\/viewdocument?DocumentKey=ca689f42-70a8-41f6-8a00-1ff13812bf08&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab=librarydocuments","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Data Security","sub_category_1":"Encyption Key Management"},{"product_id":"995","product_name":"Storage Protection","description":"Scalable, high-performance malware detection and prevention for cloud services, NAS devices, and SharePoint servers.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/endpoint\/hybrid-cloud\/protection-engine","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"996","product_name":"Trust Center Account for Enterprise","description":"Manage your enterprise website security and SSL certificates from a single sign-on, cloud-based platform with 100 percent uptime.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/vpat-symantec-trust-center-for-enterprise-en","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Data Security","sub_category_1":"Encyption Key Management"},{"product_id":"997","product_name":"Trusted Mobile Device Security Service","description":"Symantec\u2019s cloud-delivered Mobile Device Security Service brings enterprise-grade threat protection and policy controls to mobile devices, no matter where your employees are using them","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/web-and-email\/gateway\/trusted-mobile-device-security-service","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Mobile Security","category_2":"Mobile Security","sub_category_1":"Mobility Management","sub_category_2":"Mobility Security"},{"product_id":"998","product_name":"VDI Security - Endpoint Protection For VDI","description":"Boost the performance of your VDI and keep a high level of security with agentless anti-malware and complete threat protection.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/endpoint-protection-vdi-en","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"999","product_name":"VIP","description":"Prevent unauthorized access to networks, applications, and the cloud with easy to use multi-factor and risk-based authentication.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/symantec-vip-en","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"MultiFactor and Advanced Authentication"},{"product_id":"1000","product_name":"VIP Access Manager","description":"Protect your enterprise\u2019s data through Single Sign-On (SSO) with strong authentication, access control, and user management.","hyperlink":"https:\/\/www.broadcom.com\/info\/symantec\/vip-access-manager","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"MultiFactor and Advanced Authentication"},{"product_id":"1001","product_name":"Virtual Secure Web Gateway","description":"Symantec\u2019s award-winning Secure Web Gateway in a virtual appliance form factor for VMWare, Hyper-V and AWS environments","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/web-and-email\/gateway","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"URL Filtering\/Web Gateway"},{"product_id":"1002","product_name":"Web Application Firewall and Reverse Proxy","description":"Built on the industry-leading ProxySG platform, Symantec Web Application Firewall offers full protection with advanced policy, control, accountability, and performance features.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/web-and-email\/gateway\/web-application-firewall-reverse-proxy","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"Web Application Firewall","category_1":"Web Security"},{"product_id":"1003","product_name":"Web Isolation","description":"Symantec Web Isolation prevents malware and phishing threats while allowing broad web access through the isolation of uncategorized and potentially risky traffic.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/web-and-email\/gateway\/web-isolation","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"URL Filtering\/Web Gateway"},{"product_id":"1004","product_name":"Web Security Service","description":"Symantec's advanced cloud delivered network security service enforces consistent web and cloud application security, and compliance policies, for all users regardless of location and device.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/web-and-email\/gateway\/web-security-service","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"Web Application Protection","category_1":"Web Security"},{"product_id":"1005","product_name":"Web Security.cloud","description":"Protect your organization from web-based threats and enforce acceptable use policies with our cloud-based application.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/web-and-email\/gateway\/web-security-service","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"Web Application Protection","category_1":"Web Security"},{"product_id":"1006","product_name":"WebFilter \/ Intelligence Services","description":"Proven solutions that enable IT managers to deliver effective, real-time web protection with security categorization, web application control, and threat risk levels.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/web-and-email\/gateway\/webfilter-intelligent-services","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"URL Filtering\/Web Gateway"},{"product_id":"1007","product_name":"Email Security.cloud","description":"Symantec Email Security.cloud is a complete email security solution that safeguards Office 365, G Suite and on-premises email. It blocks sophisticated email threats such as ransomware, spear phishing, and business email compromise with multi-layered defense and insights from the world\u2019s largest civilian global intelligence network. Email Security.cloud also keeps emails secure and confidential with built-in DLP & encryption controls, which includes tight integration with Symantec DLP.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/web-and-email\/messaging\/email-security-cloud","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"Per user subscription pricing","partner_benefits":" \u2022 Prevent threats with the highest efficacy and accuracy with multi-layered defense and strong email isolation<\/p>\n \u2022 Realize integrated cyber defense at scale<\/p>\n \u2022 Stop spear phishing attacks with the most comprehensive defense<\/p>","typeof_service":" Managed Security Services Building Block Solution: <\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 Block ransomware and emerging threats with the highest effectiveness and accuracy<\/p>\n \u2022 Stop spear phishing with comprehensive defense<\/p>\n \u2022 Accelerate your threat response with Integrated Cyber Defense<\/p>\n \u2022 Ensure safe cloud adoption with the industry\u2019s strongest controls<\/p>","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_3":"Building Block Solution","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","category_1":"Cloud Security","category_3":"Managed Security Service","category_2":"Network Security"},{"product_id":"1008","product_name":"Endpoint Protection Cloud","description":"Symantec Endpoint Protection Cloud (SEP Cloud) is an easy to use security-as-a-service that protects and manages PC, Mac, mobile devices and servers from a single console, making it the ideal solution for organizations with limited IT security resources. SEP Cloud effectively stops today\u2019s ransomware, zero-day threats and other sophisticated attacks using advanced multi-layered technologies including advanced machine learning and behavior analysis. Utilizing SEP Cloud\u2019s, default security settings and user self-enrollment capabilities, this solution quickly protects your endpoints.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/endpoint\/end-user","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"Per user or per device subscription pricing","partner_benefits":" \u2022 Advanced Endpoint<\/p>\n \u2022 Easy to Use<\/p>\n \u2022 Low IT overhead<\/p>","typeof_service":" Managed Security Services Building Block Solution: <\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" Why Endpoint Security is Criticial<\/p>\n \u2022 Closest termination point to the end-user<\/p>\n \u2022 The ultimate destination for the criminal (last line of defense)<\/p>\n \u2022 Data lives for most of its life on endpoints<\/p>\n \u2022 Proliferation of devices - we live in the \"Cloud Genration\"<\/p>","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_3":"Building Block Solution","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","category_2":"Cloud Security","category_1":"Endpoint Security","category_3":"Managed Security Service"},{"product_id":"1009","product_name":"Endpoint Protection Mobile","description":"Symantec Endpoint Protection Mobile (SEP Mobile) offers comprehensive mobile threat defense solution for both managed and unmanaged devices, delivering superior depth of threat intelligence to help predict, detect and prevent an extensive range of known and unknown threats. SEP Mobile's advanced technology uses a layered approach that leverages massive crowd-sourced threat intelligence, in addition to both device- and server- based analysis, to proactively help protect enterprise mobile devices against malware, network threats, and vulnerability exploits.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/endpoint\/end-user\/protection-mobile","td_contact":"symantec@techdata.com","td_extension":"800-237-8931 x5540102","vendor_id":"61","service_tiering":"Per device subscription pricing","partner_benefits":" \u2022 Holistic, Layered Mobile Security <\/p>\n \u2022 Public App<\/p>\n \u2022 Proactive Protections, Not Just Detections<\/p>\n \u2022 Enterprise Readiness<\/p>","typeof_service":" Managed Security Services Building Block Solution: <\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 Protect BYOD and corporate managed mobile devices <\/p>\n \u2022 Predictive technology with high efficacy<\/p>\n \u2022 Productive and unobtrusive to enable seamless mobile experience<\/p>\n \u2022 Scalable and effortless deployment<\/p>","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_2":"Building Block Solution","sub_category_3":"Building Block Solution","sub_category_4":"Building Block Solution","sub_category_1":"Building Block Solution","category_1":"Endpoint Security","category_2":"Identity and Access","category_4":"Managed Security Service","category_3":"Mobile Security"},{"product_id":"1010","product_name":"Advanced Threat Protection","description":"Uncover, prioritize, and remediate advanced attacks across endpoints, networks, and email in minutes, all from a single console.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/atp-brochure-en","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"1011","product_name":"Advanced Threat Protection for Email","description":"Symantec's Advanced Threat Protection for Email protect against most sophisticated email threats and gain comprehensive insights in advanced email attacks.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/email-threat-detection-and-response-en","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"Email Security\/Gateway","category_1":"Network Security"},{"product_id":"1012","product_name":"Asset Management Suite","description":"Control your assets, uncover savings, and ensure compliance. Powered by Altiris technology to optimize your IT investments.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/endpoint\/management\/asset-management-suite","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Endpoint Security Management"},{"product_id":"1013","product_name":"Certificate Lifecycle Platform","description":"Enable end-to-end information protection, authentication, and secure control for governments and large institutions with PKI.","hyperlink":"https:\/\/community.broadcom.com\/symantecenterprise\/communities\/community-home?CommunityKey=24e6cd72-e3fc-4f77-b346-f8740e624c56","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"Other"},{"product_id":"1014","product_name":"Client Management Suite","description":"Automate redundant tasks for managing devices and software to reduce costs. For Windows, Mac, Linux, and virtual desktops.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/endpoint\/management\/client-management-suite","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Endpoint Security Management"},{"product_id":"1015","product_name":"Cloud Workload Protection","description":"Symantec Cloud Workload Protection automates security for public cloud workloads, enabling business agility, compliance and cost savings for organizations, while easing DevOps and administrative burdens.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/endpoint\/hybrid-cloud\/cloud-workload-protection","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Cloud Security","sub_category_1":"Other"},{"product_id":"1016","product_name":"CloudSOC Audit \u2013 Shadow IT","description":"Uncover Shadow IT risk \u2013 find and audit use of cloud applications. Evaluate which cloud services are business-ready and control their usage to keep your organization safe and compliant.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/cloudsoc-audit-en","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"Governance, Risk, Compliance, & Audit","category_1":"Security Intelligence"},{"product_id":"1017","product_name":"CloudSOC CASB Gateway","description":"Control employee use of a wide range of sanctioned and unsanctioned cloud apps with CloudSOC CASB Gateway, a leading Cloud Security Gateway (CSG) solution.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/cloudsoc-gateway-en","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"CASB","category_1":"Cloud Security"},{"product_id":"1018","product_name":"CloudSOC Security for Cloud Apps \u2013 Securlets","description":"Keep your organization secure and compliant while using cloud applications with CloudSOC, a leading Cloud Access Security Broker (CASB) and Cloud Security Gateway (CSG)","hyperlink":"https:\/\/community.broadcom.com\/home","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"CASB","category_1":"Cloud Security"},{"product_id":"1019","product_name":"Content & Malware Analysis","description":"Symantec Content and Malware Analysis protects against advanced threats through file reputation, multiple antimalware and analysis techniques, and sophisticated sandbox detonation.","hyperlink":"https:\/\/community.broadcom.com\/symantecenterprise\/communities\/community-home?CommunityKey=20e864d3-37d2-4fd7-a3cd-71dd178476c5","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"Sandboxing and APT Protection"},{"product_id":"1020","product_name":"Control Compliance Suite","description":"Delivers a unified view of security controls and vulnerabilities. Align priorities across security, IT operations, and compliance.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/information-protection\/control-compliance-suite","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Governance, Risk, Compliance","sub_category_1":"Governance, Risk, Compliance"},{"product_id":"1021","product_name":"Critical System Protection","description":"Embed critical protection into Internet of Things (IoT) devices through a lightweight system so they are secure by design.","hyperlink":"https:\/\/community.broadcom.com\/symantecenterprise\/communities\/community-home\/librarydocuments\/viewdocument?DocumentKey=5ac32d32-9e66-4d3a-981c-711f5061719c&CommunityKey=3f8a53f1-00c7-4411-8203-ee040b59e575&tab=librarydocuments","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"Critical System Protection\/Application Whitelisting","sub_category_2":"Device and Sensor","category_1":"Endpoint Security","category_2":"IoT"},{"product_id":"1022","product_name":"Data Center Security","description":"Harden security for on-premise, hybrid, and cloud-based data centers using detection, monitoring, and prevention capabilities.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/endpoint\/hybrid-cloud\/data-center-security","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"Intrusion Detection and Prevention","category_1":"Network Security"},{"product_id":"1023","product_name":"Data Loss Prevention","description":"Secure your vital information and prevent data leaks\u2014on-premise, mobile, or in the cloud\u2014with our market-leading product.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/information-protection\/data-loss-prevention","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"Data Loss Prevention","category_1":"Data Security"},{"product_id":"1024","product_name":"Data Loss Prevention and CASB - Symantec DLP Cloud and Symantec CloudSOC","description":"Eliminate data loss blind spots in cloud apps with Symantec Data Loss Prevention (DLP) Cloud and Symantec CloudSOC, the first integrated cloud security offering that combines DLP and CASB technologies.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/information-protection\/data-loss-prevention","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_2":"CASB","category_2":"Cloud Security","sub_category_1":"Data Loss Prevention","category_1":"Data Security"},{"product_id":"1025","product_name":"Data Loss Prevention Cloud Service for Email","description":"Data Loss Prevention Cloud Service for Email helps enterprises quickly move their email to the cloud without compromising security by combining data loss prevention and email security.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/dlp-cloud-service-for-email-en","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"Data Loss Prevention","category_1":"Data Security","sub_category_2":"Email Security\/Gateway","category_2":"Network Security"},{"product_id":"1026","product_name":"DeepSight\u2122 Adversary Intelligence","description":"Outsmart emerging threats and improve your risk assessment through rich adversary intelligence and context of cyber attacks.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/cyber-security-services-deepsight-intelligence-en","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Security Intelligence","sub_category_1":"Threat Intelligence"},{"product_id":"1027","product_name":"DeepSight\u2122 Technical Intelligence","description":"Improve your security infrastructure with automated access to relevant vulnerability, malware, and threat intelligence.","hyperlink":"https:\/\/www.broadcom.com\/support\/symantec\/services","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Security Intelligence","sub_category_1":"Threat Intelligence"},{"product_id":"1028","product_name":"Deployment Solution","description":"Manage OS and software deployment, configuration, and PC \u2018personality\u2019 migration across hardware platforms and OS types.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/deployment-solution-en","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Endpoint Security Management"},{"product_id":"1029","product_name":"Desktop Email Encryption","description":"Provide end-to-end email message encryption in your network with a simple user experience.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/encryption-solutions-for-email-en","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Data Security","sub_category_1":"File, Folder and\/or Email Encryption"},{"product_id":"1030","product_name":"Education Services","description":"Maximize your product competency and validate technical knowledge to gain the most benefit from your IT investments with in depth technical training.","hyperlink":"https:\/\/www.broadcom.com\/support\/symantec\/services\/education","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"Education","category_1":"Security Strategy"},{"product_id":"1031","product_name":"Emergency Response","description":"Resolve your incident, restore normal operations, and minimize operational impact from attacks with our Incident Response Team.","hyperlink":"https:\/\/community.broadcom.com\/symantecenterprise\/communities\/community-home?CommunityKey=2d17029b-76e4-4bcb-9329-1c5f27a25247","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"Incident Response","category_1":"Security Intelligence"},{"product_id":"1032","product_name":"Encrypted Traffic Management","description":"Symantec Proxy and SSL Visibility Appliance decrypt traffic, feed existing security infrastructure, and maintain privacy compliance.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/web-and-email\/encrypted-traffic-management","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_2":"Data Security","sub_category_2":"Encyption Key Management","category_1":"Network Security","sub_category_1":"VPN Concentrator"},{"product_id":"1033","product_name":"Endpoint Detection and Response (EDR)","description":"Symantec's Endpoint Detection and Response (EDR) solution detects, investigates, and remediates threats across all endpoints from a single console.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/endpoint\/detection-and-response","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security","sub_category_2":"Forensics","category_2":"Security Intelligence"},{"product_id":"1034","product_name":"Endpoint Encryption","description":"Full disk encryption (including BitLocker and FileVault management) to protect data and ensure compliance. Also protects data on removable media.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/information-protection\/encryption","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Data Security","sub_category_1":"Endpoint Encryption"},{"product_id":"1035","product_name":"Endpoint Protection","description":"Symantec Endpoint Protection 14 leverages the largest endpoint work together with advanced machine learning algorithms to protect you and your data.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/endpoint\/end-user","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"1036","product_name":"Endpoint Protection Small Business Edition","description":"Secure your small business desktops, laptops, and servers against cyber attacks, either on-premises or based in the cloud.","hyperlink":"https:\/\/support.broadcom.com\/security\/product-page.html?productName=Endpoint%20Protection%20Small%20Business%20Edition%20(Cloud)","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"1037","product_name":"File Share Encryption","description":"Protect specific files and folders before sharing across devices, servers and in the cloud, with DLP policy enforcement integration.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/file-share-encryption-en","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Data Security","sub_category_1":"File, Folder and\/or Email Encryption"},{"product_id":"1038","product_name":"Gateway Email Encryption","description":"Protect email as it leaves your network so it can be safely shared with customers and partners.","hyperlink":"https:\/\/community.broadcom.com\/symantecenterprise\/communities\/community-home?CommunityKey=6c3b4f1e-9a34-48a5-8855-c1b5d96fb81a","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_2":"Data Security","sub_category_1":"Email Security\/Gateway","sub_category_2":"File, Folder and\/or Email Encryption","category_1":"Network Security"},{"product_id":"1039","product_name":"Ghost Solution Suite","description":"Facilitate operating system deployment, migration, and cross-platform management for desktops, laptops, tablets, and servers.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/endpoint\/management\/ghost-solutions-suite","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Endpoint Security Management"},{"product_id":"1040","product_name":"Incident Response Retainers and Readiness Services","description":"Preempt attacks and lessen security incident impact through remote and on-site investigations by our Incident Response Teams.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/incident-response-ds-en","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"Incident Response","category_1":"Security Intelligence"},{"product_id":"1041","product_name":"Information Centric Analytics","description":"Information Centric Analytics provides centralized analysis and visualization of all user-driven risk. It allows pre-emptive action before a breach, or guides a rapid response during an incident.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/information-centric-analytics-en","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"Other","category_1":"Security Intelligence"},{"product_id":"1042","product_name":"Information Centric Tagging","description":"Enhance existing data protection solutions by incorporating user based data classification and tagging as your data is being created or at rest.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/information-centric-tagging-en","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"Data and Discovery Classification","category_1":"Data Security"},{"product_id":"1043","product_name":"IT Management Suite","description":"Securely manage your endpoints throughout their entire lifecycle across Windows, Mac, Linux, Unix, and virtual environments.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/it-management-suite-en","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Endpoint Security Management"},{"product_id":"1044","product_name":"Mail Security for Microsoft Exchange","description":"Protect against malware, phishing, and targeted attacks, blocking 99% of spam with less than one in 1 million false positives.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/web-and-email\/messaging\/mail-security-exchange","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"Email Security\/Gateway","category_1":"Network Security"},{"product_id":"1045","product_name":"Malware Analysis Service","description":"Symantec\u2019s cloud-delivered Malware Analysis Service uses threat intelligence, behavioral analysis, and sandboxing to provide scalable inline protection against zero-day, targeted, and advanced malware threats.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/malware-analysis-service","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Security Intelligence","sub_category_1":"Threat Intelligence"},{"product_id":"1046","product_name":"Management Center and Reporting","description":"Centralized Management and Reporting solutions for Symantec network security products simplify governance, mitigate cloud access risks, enhance threat defenses, improve visibility and reduce operational costs.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/web-and-email\/gateway\/management-center-and-reporting","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"Management","category_1":"Security Intelligence"},{"product_id":"1047","product_name":"Messaging Gateway","description":"Defend your email perimeter against spam, malware, and targeted attacks with content filtering, data loss prevention, and encryption.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/web-and-email\/messaging\/gateway","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_2":"Data Loss Prevention","category_2":"Data Security","sub_category_1":"Email Security\/Gateway","category_1":"Network Security"},{"product_id":"1048","product_name":"Network Forensics & Security Analytics","description":"Security Analytics arms incident response teams with enriched, full-packet capture for complete security visibility, advanced network forensics, and real-time threat detection.","hyperlink":"https:\/\/www.broadcom.com\/info\/symantec\/security-analytics-key-features","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"Forensics","category_1":"Security Intelligence"},{"product_id":"1049","product_name":"Patch Management Solution","description":"Manage patches and software updates by automating the collection, analysis, and delivery processes across your enterprise.","hyperlink":"https:\/\/support.broadcom.com\/security\/product-page.html?productName=Patch%20Management%20Solution%20for%20Windows","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Vulnerability Management\/Patching"},{"product_id":"1050","product_name":"Phishing Readiness","description":"Improve your employees\u2019 recognition and reporting of phishing attacks so they are better equipped as your first line of defense.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/web-and-email\/messaging\/phishing-readiness","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"Education","category_1":"Security Strategy"},{"product_id":"1051","product_name":"Protection Suite Enterprise Edition","description":"Secure your endpoint and email infrastructure with advanced protection against complex malware, data loss and spam threats.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/protection-suite-enterprise-edition-en","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"1052","product_name":"Risk Insight","description":"Automated, cloud-based risk assessment allows you to proactively monitor and analyze your enterprise, industry, and global risks to refine and improve your security posture.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/risk-insight-en","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"Governance, Risk, Compliance, & Audit","category_1":"Security Intelligence"},{"product_id":"1053","product_name":"RuleSpace","description":"Filter malicious or inappropriate content with categorization databases, ensuring a safe web environment for 350 million+ users.","hyperlink":"https:\/\/www.broadcom.com\/company\/partners\/symantec\/programs\/oem-sales-program\/rulespace","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"URL Filtering\/Web Gateway"},{"product_id":"1054","product_name":"Secure Web Gateway (SWG) Solutions","description":"Symantec secure web gateway offers the industry\u2019s most sophisticated ecosystem to protect your organization\u2019s cloud use.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/web-and-email\/gateway","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"URL Filtering\/Web Gateway"},{"product_id":"1055","product_name":"Security Awareness Service","description":"Mitigate information risk by educating your employees through the Symantec Security Awareness Program. Contact Symantec Education to register.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/security-awareness-service-en","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"Education","category_1":"Security Strategy"},{"product_id":"1056","product_name":"Server Management Suite","description":"Provision, control, automate, and monitor physical and virtual servers from a central console across a wide array of platforms.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/endpoint\/management\/server-management-suite","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Endpoint Security Management"},{"product_id":"1057","product_name":"ServiceDesk","description":"Automate incident response and resolution to reduce service interruptions, accelerate restoration, and correct systemic problems.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/endpoint\/management\/service-desk","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Endpoint Security","sub_category_1":"Endpoint Security Management"},{"product_id":"1058","product_name":"Shared Service Provider PKI: Federal and Non-Federal","description":"Achieve Federal agency compliance with FIPS 201 and HSPD-12 requirements through our highly scalable cloud-based PKI Service.","hyperlink":"https:\/\/community.broadcom.com\/symantecenterprise\/communities\/community-home\/librarydocuments\/viewdocument?DocumentKey=ca689f42-70a8-41f6-8a00-1ff13812bf08&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab=librarydocuments","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Data Security","sub_category_1":"Encyption Key Management"},{"product_id":"1059","product_name":"Storage Protection","description":"Scalable, high-performance malware detection and prevention for cloud services, NAS devices, and SharePoint servers.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/endpoint\/hybrid-cloud\/protection-engine","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"1060","product_name":"Trust Center Account for Enterprise","description":"Manage your enterprise website security and SSL certificates from a single sign-on, cloud-based platform with 100 percent uptime.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/vpat-symantec-trust-center-for-enterprise-en","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Data Security","sub_category_1":"Encyption Key Management"},{"product_id":"1061","product_name":"Trusted Mobile Device Security Service","description":"Symantec\u2019s cloud-delivered Mobile Device Security Service brings enterprise-grade threat protection and policy controls to mobile devices, no matter where your employees are using them","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/web-and-email\/gateway\/trusted-mobile-device-security-service","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Mobile Security","category_2":"Mobile Security","sub_category_1":"Mobility Management","sub_category_2":"Mobility Security"},{"product_id":"1062","product_name":"VDI Security - Endpoint Protection For VDI","description":"Boost the performance of your VDI and keep a high level of security with agentless anti-malware and complete threat protection.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/endpoint-protection-vdi-en","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"Endpoint Anti-Virus\/Anti-Malware","category_1":"Endpoint Security"},{"product_id":"1063","product_name":"VIP","description":"Prevent unauthorized access to networks, applications, and the cloud with easy to use multi-factor and risk-based authentication.","hyperlink":"https:\/\/docs.broadcom.com\/docs\/symantec-vip-en","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"MultiFactor and Advanced Authentication"},{"product_id":"1064","product_name":"VIP Access Manager","description":"Protect your enterprise\u2019s data through Single Sign-On (SSO) with strong authentication, access control, and user management.","hyperlink":"https:\/\/www.broadcom.com\/info\/symantec\/vip-access-manager","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Identity and Access","sub_category_1":"MultiFactor and Advanced Authentication"},{"product_id":"1065","product_name":"Virtual Secure Web Gateway","description":"Symantec\u2019s award-winning Secure Web Gateway in a virtual appliance form factor for VMWare, Hyper-V and AWS environments","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/web-and-email\/gateway","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"URL Filtering\/Web Gateway"},{"product_id":"1066","product_name":"Web Application Firewall and Reverse Proxy","description":"Built on the industry-leading ProxySG platform, Symantec Web Application Firewall offers full protection with advanced policy, control, accountability, and performance features.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/web-and-email\/gateway\/web-application-firewall-reverse-proxy","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"Web Application Firewall","category_1":"Web Security"},{"product_id":"1067","product_name":"Web Isolation","description":"Symantec Web Isolation prevents malware and phishing threats while allowing broad web access through the isolation of uncategorized and potentially risky traffic.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/web-and-email\/gateway\/web-isolation","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"URL Filtering\/Web Gateway"},{"product_id":"1068","product_name":"Web Security Service","description":"Symantec's advanced cloud delivered network security service enforces consistent web and cloud application security, and compliance policies, for all users regardless of location and device.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/web-and-email\/gateway\/web-security-service","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"Web Application Protection","category_1":"Web Security"},{"product_id":"1069","product_name":"Web Security.cloud","description":"Protect your organization from web-based threats and enforce acceptable use policies with our cloud-based application.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/web-and-email\/gateway\/web-security-service","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_1":"Web Application Protection","category_1":"Web Security"},{"product_id":"1070","product_name":"WebFilter \/ Intelligence Services","description":"Proven solutions that enable IT managers to deliver effective, real-time web protection with security categorization, web application control, and threat risk levels.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/web-and-email\/gateway\/webfilter-intelligent-services","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","category_1":"Network Security","sub_category_1":"URL Filtering\/Web Gateway"},{"product_id":"1071","product_name":"Email Security.cloud","description":"Symantec Email Security.cloud is a complete email security solution that safeguards Office 365, G Suite and on-premises email. It blocks sophisticated email threats such as ransomware, spear phishing, and business email compromise with multi-layered defense and insights from the world\u2019s largest civilian global intelligence network. Email Security.cloud also keeps emails secure and confidential with built-in DLP & encryption controls, which includes tight integration with Symantec DLP.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/web-and-email\/messaging\/email-security-cloud","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"Per user subscription pricing","partner_benefits":" \u2022 Prevent threats with the highest efficacy and accuracy with multi-layered defense and strong email isolation<\/p>\n \u2022 Realize integrated cyber defense at scale<\/p>\n \u2022 Stop spear phishing attacks with the most comprehensive defense<\/p>","typeof_service":" Managed Security Services Building Block Solution: <\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 Block ransomware and emerging threats with the highest effectiveness and accuracy<\/p>\n \u2022 Stop spear phishing with comprehensive defense<\/p>\n \u2022 Accelerate your threat response with Integrated Cyber Defense<\/p>\n \u2022 Ensure safe cloud adoption with the industry\u2019s strongest controls<\/p>","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_3":"Building Block Solution","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","category_1":"Cloud Security","category_3":"Managed Security Service","category_2":"Network Security"},{"product_id":"1072","product_name":"Endpoint Protection Cloud","description":"Symantec Endpoint Protection Cloud (SEP Cloud) is an easy to use security-as-a-service that protects and manages PC, Mac, mobile devices and servers from a single console, making it the ideal solution for organizations with limited IT security resources. SEP Cloud effectively stops today\u2019s ransomware, zero-day threats and other sophisticated attacks using advanced multi-layered technologies including advanced machine learning and behavior analysis. Utilizing SEP Cloud\u2019s, default security settings and user self-enrollment capabilities, this solution quickly protects your endpoints.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/endpoint\/end-user","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"Per user or per device subscription pricing","partner_benefits":" \u2022 Advanced Endpoint<\/p>\n \u2022 Easy to Use<\/p>\n \u2022 Low IT overhead<\/p>","typeof_service":" Managed Security Services Building Block Solution: <\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" Why Endpoint Security is Criticial<\/p>\n \u2022 Closest termination point to the end-user<\/p>\n \u2022 The ultimate destination for the criminal (last line of defense)<\/p>\n \u2022 Data lives for most of its life on endpoints<\/p>\n \u2022 Proliferation of devices - we live in the \"Cloud Genration\"<\/p>","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_3":"Building Block Solution","sub_category_1":"Building Block Solution","sub_category_2":"Building Block Solution","category_2":"Cloud Security","category_1":"Endpoint Security","category_3":"Managed Security Service"},{"product_id":"1073","product_name":"Endpoint Protection Mobile","description":"Symantec Endpoint Protection Mobile (SEP Mobile) offers comprehensive mobile threat defense solution for both managed and unmanaged devices, delivering superior depth of threat intelligence to help predict, detect and prevent an extensive range of known and unknown threats. SEP Mobile's advanced technology uses a layered approach that leverages massive crowd-sourced threat intelligence, in addition to both device- and server- based analysis, to proactively help protect enterprise mobile devices against malware, network threats, and vulnerability exploits.","hyperlink":"https:\/\/www.broadcom.com\/products\/cyber-security\/endpoint\/end-user\/protection-mobile","td_contact":"cybersecurityeurope@techdata.com","td_extension":"+31 40 2502 620","vendor_id":"61","service_tiering":"Per device subscription pricing","partner_benefits":" \u2022 Holistic, Layered Mobile Security <\/p>\n \u2022 Public App<\/p>\n \u2022 Proactive Protections, Not Just Detections<\/p>\n \u2022 Enterprise Readiness<\/p>","typeof_service":" Managed Security Services Building Block Solution: <\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 Protect BYOD and corporate managed mobile devices <\/p>\n \u2022 Predictive technology with high efficacy<\/p>\n \u2022 Productive and unobtrusive to enable seamless mobile experience<\/p>\n \u2022 Scalable and effortless deployment<\/p>","mssp_available":"0","org_id":"1","vendor_name":"Symantec (Broadcom)","region":"","solutions_practice":"","sub_category_2":"Building Block Solution","sub_category_3":"Building Block Solution","sub_category_1":"Building Block Solution","category_1":"Endpoint Security","category_2":"Identity and Access","category_4":"Managed Security Services","sub_category_4":"Managed Security Services Building Block Solution","category_3":"Mobile Security"},{"product_id":"1074","product_name":"RECON Policy - Powered by Security Colony","description":"Online subscription portal service which provides access to ready-made security policy templates that are challenging and time consuming to develop on your own.\nIt includes an extensive resource library of documents that have been developed for real world organizations that paid to have them developed and are now available to our customers at a fraction of the cost. The service also enables collaboration with a community of customers and consultants who share best practices and common challenges. It's a great way to jumpstart your customer with tested security policies and controls and it plays a critical role in helping your customer develop a solid security posture.","hyperlink":"https:\/\/tdcontent.techdata.com\/techsolutions\/security\/recon_security_suite.aspx","td_contact":"securitycolony@techdata.com\n(727) 539-7429 x-84008","td_extension":"800-237-8931 ext. 5540508","vendor_id":"62","service_tiering":"No Tiering. Annual Subscription","partner_benefits":" \u2022 Jumpstart a security consultancy practice <\/p>\n \u2022 Establish credibility and reputation with your clients <\/p>\n \u2022 Upsell policy customization consulting <\/p>\n \u2022 Subscription service delivering Monthly Recurring Revenue (MRR) <\/p>","typeof_service":" Managed Security Services Building Block Solution: <\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 Vetted Library of security policies<\/p>\n \u2022 Assess supply chain security<\/p>\n \u2022 Preformatted compliance material<\/p>\n \u2022 Accessible community of contributors<\/p>","mssp_available":"0","org_id":"1","vendor_name":"Tech Data","region":"","solutions_practice":"","category_2":"Managed Security Service","category_1":"Security Intelligence","sub_category_1":"Turn-Key Solution","sub_category_2":"Turn-Key Solution"},{"product_id":"1075","product_name":"RECON Priority - Powered by Cyr3con","description":"Provides monthly subscription services to prioritize vulnerabilities specific to an organization based on which ones hackers are most likely to exploit according to deep and dark web searches. \nUses a CyRating system to document how often a vulnerability is mentioned on the dark web as well as providing customers with supporting data to prioritize their deployed patches. \nA REST-based API is also available for consuming the threat intelligence information.","hyperlink":"https:\/\/tdcontent.techdata.com\/techsolutions\/security\/recon_security_suite.aspx","td_contact":"cyr3con@techdata.com\n(727) 539-7429 x-84008","td_extension":"800-237-8931 ext. 5540508","vendor_id":"62","service_tiering":"No Tiering. Monthly subscription","partner_benefits":" \u2022 Subscription service delivering Monthly Recurring Revenue (MRR) <\/p>\n \u2022 Upsell to a patch management solution<\/p>\n \u2022 Ready made managed security service<\/p>\n \u2022 Drives additional security opportunity<\/p>","typeof_service":" Managed Security Services Building Block Solution: <\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 Reduce breaches by prioritizing vulnerabilities <\/p>\n \u2022 Patch management prioritization<\/p>\n \u2022 Subscription pricing (OpEx)<\/p>\n \u2022 Actionable step after vulnerability assessment<\/p>","mssp_available":"0","org_id":"1","vendor_name":"Tech Data","region":"","solutions_practice":"","category_1":"Endpoint Security","category_2":"Managed Security Service","sub_category_1":"Turn-Key Solution","sub_category_2":"Turn-Key Solution"},{"product_id":"1076","product_name":"RECON Radar - Powered by Pwnie Express","description":"RECON\u2122 Radar is built for company security teams to discover, assess, and analyze all the wireless and wired devices accessing their network. Leveraging technology from Pwnie Express, RECON\u2122 Radar enables central management of wireless devices from a single cloud dashboard for scalable, continuous intelligence around BYOD across the enterprise, as well as remote and branch locations.","hyperlink":"https:\/\/tdcontent.techdata.com\/techsolutions\/security\/recon_security_suite.aspx","td_contact":"pwnieexpress@techdata.com\n(727) 539-7429 x-84008","td_extension":"800-237-8931 ext. 5540508","vendor_id":"62","service_tiering":"No Tiering. Monthly subscription","partner_benefits":" \u2022 Uncover \"blind spots\" on customer networks <\/p>\n \u2022 Subscription service delivering MRR<\/p>\n \u2022 Upsell to networking projects<\/p>\n \u2022 Assist your customers in complying with regulations<\/p>","typeof_service":" Managed Security Services Building Block Solution: <\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 Asset Discovery, Classification and Assessment<\/p>\n \u2022 Rogue Devices and Networks<\/p>\n \u2022 Wireless Monitoring and Control<\/p>\n \u2022 Cloud based dashboard for complete visibility<\/p>\n \u2022 Add Security to IoT architectures<\/p>","mssp_available":"0","org_id":"1","vendor_name":"Tech Data","region":"","solutions_practice":"","category_1":"Endpoint Security","category_2":"Identity and Access","category_4":"Managed Security Service","category_3":"Network Security","sub_category_2":"Turn-Key Solution","sub_category_3":"Turn-Key Solution","sub_category_4":"Turn-Key Solution","sub_category_1":"Turn-Key Solution"},{"product_id":"1077","product_name":"RECON Range - Powered by Cloud Range","description":"A hosted cyber range providing hyper-realistic security operations training in a simulated, live-combat environment. SOC operations teams gain the necessary skills to detect and respond to sophisticated cyber attacks. Service includes fully licensed security tools (SIEM, firewall, EDR, etc) to emulate your customer\u2019s security environment. The service is subscription-based providing access to live, instructor-led sessions.","hyperlink":"https:\/\/tdcontent.techdata.com\/techsolutions\/security\/recon_security_suite.aspx","td_contact":"cyberrangecloudUS@techdata.com\n(727) 539-7429 x-84008","td_extension":"800-237-8931 ext. 5540508","vendor_id":"62","service_tiering":"No Tiering. Subscription based service with various options","partner_benefits":" \u2022 Be a hero; solve the #1 cybersecurity challenge, the Skills Shortage<\/p>\n \u2022 Introduce one of the most sought after services in the industry today<\/p>\n \u2022 Limited competition<\/p>\n \u2022 Enable and accelerate sales of other products<\/p>\n \u2022 Significant margin opportunity<\/p>","typeof_service":" Managed Security Services Building Block Solution: <\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 Helps to solve their most critical challenge: the shortage of skilled security operations staff <\/p>\n \u2022 Consumption and subscription pricing provide ongoing access to train on defending emerging threat vectors <\/p>\n \u2022 Like a fighter pilot, security teams train in a hyper-realistic simulation environment using real tools <\/p>\n \u2022 Remote access to live sessions reduce downtime <\/p>\n \u2022 Private customized subscriptions or out of the box options<\/p>","mssp_available":"0","org_id":"1","vendor_name":"Tech Data","region":"","solutions_practice":"","category_5":"Application Security","category_1":"Endpoint Security","category_6":"Managed Security Service","category_4":"Network Security","category_2":"Security Intelligence","sub_category_1":"Turn-Key Solution","sub_category_2":"Turn-Key Solution","sub_category_3":"Turn-Key Solution","sub_category_4":"Turn-Key Solution","sub_category_5":"Turn-Key Solution","sub_category_6":"Turn-Key Solution","category_3":"Web Security"},{"product_id":"1078","product_name":"RECON Risk - Powered by Arx Nimbus","description":"The results from a penetration test or vulnerability assessment don\u2019t necessarily imply a level of risk to an organization unless a corresponding threat is also identified. RECON Risk provides the financial impact of cybersecurity risk. Customers can load information about their threats, risks, vulnerabilities and capabilities into a quantitative modeling tool which then advises the executive team on how to make business decisions based on the financial impact of mitigating those risks\u2026or not. It also provides what-if scenarios which show the financial impact of deciding whether to mitigate some of the exposures.","hyperlink":"https:\/\/tdcontent.techdata.com\/techsolutions\/security\/recon_security_suite.aspx","td_contact":"arxnimbus@techdata.com\n(727) 539-7429 x-84008","td_extension":"800-237-8931 ext. 5540508","vendor_id":"62","service_tiering":"No Tiering. Annual Subscription","partner_benefits":" \u2022 Annual subscription service <\/p>\n \u2022 Assessments drive security sales<\/p>\n \u2022 Gain access to customer security budget <\/p>\n \u2022 Gain trust with your customer\u2019s executive team<\/p>\n \u2022 Prioritize customer security spending<\/p>","typeof_service":" Managed Security Services Building Block Solution: <\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 Financial Insight in Security Risk<\/p>\n \u2022 Documented Security Compliance & Traceability<\/p>\n \u2022 Cyber Insurance Analysis to determine target coverage <\/p>\n \u2022 Documents Security Risk Exposure <\/p>\n Graphical Assessment Results <\/p>","mssp_available":"0","org_id":"1","vendor_name":"Tech Data","region":"","solutions_practice":"","category_1":"Endpoint Security","category_4":"Managed Security Service","category_3":"Network Security","sub_category_2":"Turn-Key Solution","sub_category_3":"Turn-Key Solution","sub_category_4":"Turn-Key Solution","sub_category_1":"Turn-Key Solution","category_2":"Web Security"},{"product_id":"1079","product_name":"RECON SOC - Powered by StratoZen","description":"24\/7 cloud based monitoring of security infrastructure to correlate and identify threats as well as recommend remediation.","hyperlink":"https:\/\/tdcontent.techdata.com\/techsolutions\/security\/recon_security_suite.aspx","td_contact":"SecurityServices@TechData.com","td_extension":"800-237-8931 ext. 5540508","vendor_id":"62","service_tiering":"No Tiering. Monthly subscription based upon device count","partner_benefits":" \u2022 Upsell to security products<\/p>\n \u2022 Instant security credibility<\/p>\n \u2022 Ready made managed security services<\/p>\n \u2022 Subscription service delivering MRR<\/p>\n \u2022 Partner view to customer infrastructure<\/p>","typeof_service":" Managed Security Services Building Block Solution: <\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 Outsourced security monitoring<\/p>\n \u2022 Subsctription Pricing (OpEx)<\/p>\n \u2022 Aggregated security event perspective<\/p>\n \u2022 Instant security expertise<\/p>\n \u2022 Standard 30 day try before you buy<\/p>","mssp_available":"0","org_id":"1","vendor_name":"Tech Data","region":"","solutions_practice":"","category_5":"Application Security","category_1":"Managed Security Service","category_4":"Network Security","category_2":"Security Intelligence","sub_category_1":"Turn-Key Solution","sub_category_2":"Turn-Key Solution","sub_category_3":"Turn-Key Solution","sub_category_4":"Turn-Key Solution","sub_category_5":"Turn-Key Solution","category_3":"Web Security"},{"product_id":"1080","product_name":"RECON SOC + Alert Response - Powered by StratoZen and STS International","description":"RECON SOC focuses on identification of Security Incidents and Alert Response delivers the expert response to those incidents in order to contain or immediately mitigate against cyber threat. \n\nService includes: \n(1) Remote Access to your network and systems\n(2) Expert personnel, responsible for responding to RECON SOC alerts\n(3) Perform remediation steps to contain or block outward network access","hyperlink":"","td_contact":"SecurityServices@TechData.com","td_extension":"800-237-8931 ext. 5540508","vendor_id":"62","service_tiering":"No Tiering. Monthly subscription based upon device count","partner_benefits":" \u2022 Ability to offer end-user critical remediation assistance if there is a breach or critical security issues needs to be addressed.<\/p>\n \u2022 Additional revenue stream without operational risk<\/p>\n \u2022 More entanglement in an account with visibility into key IT issues<\/p>","typeof_service":" Managed Security Services Building Block Solution: <\/strong> Component used by partner to build a Monthly Recurring Revenue (MRR) managed service<\/p>","end_user_benefits":" \u2022 Team of security professionals able to assist the end-user to immeditely mitigate against a cyber threat 24\/7.<\/p>\n \u2022 More cost effective than hiring own personnel<\/p>\n \u2022 Hired personnel don't have to be on call 24\/7 to handle an issue.<\/p>","mssp_available":"0","org_id":"1","vendor_name":"Tech Data","region":"","solutions_practice":"","category_5":"Application Security","category_1":"Managed Security Service","category_4":"Network Security","category_2":"Security Intelligence","sub_category_1":"Turn-Key Solution","sub_category_2":"Turn-Key Solution","sub_category_3":"Turn-Key Solution","sub_category_4":"Turn-Key Solution","sub_category_5":"Turn-Key Solution","category_3":"Web Security"},{"product_id":"1081","product_name":"Penetration Testing","description":"Real world simulation of how an attacker would gain access to a customer network. This service leverages both technical and social engineering penetration testing techniques that an attacker may leverage in order to penetrate the customer's network. A report is generated and delivered to the customer that details how our attack penetrated the network. Not only does this service help our partners identify new security solutions opportunities, it also lays a path to help the customer on their security posture maturity.","hyperlink":"https:\/\/tdcontent.techdata.com\/techsolutions\/security\/Services.aspx","td_contact":"SecurityServices@TechData.com","td_extension":"800-237-8931 ext. 5540508","vendor_id":"62","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Tech Data","region":"","solutions_practice":"","sub_category_1":"Assessment","category_1":"Tech Data Professional Services"},{"product_id":"1082","product_name":"Vulnerability Assessments","description":"This service identifies how susceptible a customer's network is to a cyber-attack. We leverage best-in-class scanning toolsets and techniques to identify detailed vulnerability findings, the results are reviewed by our Security Experts, then a detailed report is generated for the customer. This is designed to help End Customer\u2019s reach a superior security posture as it identifies where they have risks and exposures in order to secure their network from advanced cyber threats.","hyperlink":"https:\/\/tdcontent.techdata.com\/techsolutions\/security\/Services.aspx","td_contact":"SecurityServices@TechData.com","td_extension":"800-237-8931 ext. 5540508","vendor_id":"62","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Tech Data","region":"","solutions_practice":"","sub_category_1":"Assessment","category_1":"Tech Data Professional Services"},{"product_id":"1083","product_name":"Physical Penetration Testing","description":"A physical penetration assessment will evaluate how well the environment resists physical attack. By locating and exploiting vulnerabilities in physical security controls, technology, and personnel (also known as Social Engineering) the assessment team will attempt to gain access to pre-determined physical locations and capture approved evidence of compromise","hyperlink":"https:\/\/tdcontent.techdata.com\/techsolutions\/security\/Services.aspx","td_contact":"SecurityServices@TechData.com","td_extension":"800-237-8931 ext. 5540508","vendor_id":"62","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Tech Data","region":"","solutions_practice":"","sub_category_1":"Assessment","category_1":"Tech Data Professional Services"},{"product_id":"1084","product_name":"Cisco dCloud (POV)","description":"Cisco Managed Security Proof of Value (POV) Assessment is a no cost security assessment over the course of two weeks on your customers\u2019 premises. This service leverages an onsite Cisco ASA which acts a sensor with Firepower Services enabled. The collected data is then transmitted to a Cisco Firepower Management Center in the cloud, a risk report is then generated by our Security Engineers and reviewed in detailed with our Tech Data partner. This service helps to position Cisco Security Solutions to customers as it delivers threat-focused protection, real-time network visibility, and is the most robust next-generation firewalls and threat remediation systems in the industry with no need to purchase subscription licenses.","hyperlink":"https:\/\/tdcontent.techdata.com\/techsolutions\/security\/Services.aspx","td_contact":"SecurityServices@TechData.com","td_extension":"800-237-8931 ext. 5540508","vendor_id":"62","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Tech Data","region":"","solutions_practice":"","sub_category_1":"Assessment","category_1":"Tech Data Professional Services"},{"product_id":"1085","product_name":"GDPR Assessments","description":"Service that provides a customer's organization with an accurate and detailed assessment of where they stand in relation to the controls outlined in the GDPR framework. This service delivers both an executive summary document and a detailed technical report that describe all of the findings and technical recommendations needed to be compliant to GDPR. This assessment helps your customer ensure that they are prepared to be GDPR compliant as it applies to any company processing personal data or otherwise monitoring behavior of European Union (EU) residents.","hyperlink":"https:\/\/tdcontent.techdata.com\/techsolutions\/security\/Services.aspx","td_contact":"SecurityServices@TechData.com","td_extension":"800-237-8931 ext. 5540508","vendor_id":"62","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Tech Data","region":"","solutions_practice":"","sub_category_1":"Assessment","category_1":"Tech Data Professional Services"},{"product_id":"1086","product_name":"Governance, Risk and Compliance (GRC)","description":"Governance, Risk, and Compliance (GRC) is intended to help customers properly apply security controls and regulations within their organization that they must be compliant to, but find that their current security controls are disorganized, unnecessarily complex and fragmented. This service helps your customer first understand their risk tolerance and gaps, and then provide a plan of action to mitigate risks, achieve compliance against their required regulation, and maintain security posture through a Continuous Monitoring Strategy. This GRC complaint service is tailor-made for your end customer's enterprise so they can adopt a GRC program that quickly identifies risks automatically, helps them maintain compliance, as well as prepare for the next generation of GRC innovation.","hyperlink":"https:\/\/tdcontent.techdata.com\/techsolutions\/security\/Services.aspx","td_contact":"SecurityServices@TechData.com","td_extension":"800-237-8931 ext. 5540508","vendor_id":"62","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Tech Data","region":"","solutions_practice":"","sub_category_1":"Compliance","category_1":"Tech Data Professional Services"},{"product_id":"1087","product_name":"NERC CIP","description":"This is a vulnerability security assessment of CIP (Critical Infrastructure Protection) required for Electrical utilities as defined the governing body. NERC (North American Electric Reliability Corporation). Our assessment approach is based on the completion of the following four phases: NERC CIP Cyber Assessment Planning; NERC CIP-005 R4 Assessment; NERC CIP-007 R8 Assessment; Assessment Results and Documentation. The final assessment report will be delivered in accordance with NERC CIP-005 R4 & CIP-007 R8 and will assist Electrical utilities in passing their annual audit.","hyperlink":"https:\/\/tdcontent.techdata.com\/techsolutions\/security\/Services.aspx","td_contact":"SecurityServices@TechData.com","td_extension":"800-237-8931 ext. 5540508","vendor_id":"62","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Tech Data","region":"","solutions_practice":"","sub_category_1":"Compliance","category_1":"Tech Data Professional Services"},{"product_id":"1088","product_name":"PCI Audit","description":"PCI compliance audit is a routine audit required of merchants that process credit card transactions to make sure that they are compliant with the Payment Card Industry Data Security Standard (PCI DSS) set up by various credit card companies. This service examines the customer\u2019s environment, identifies vulnerabilities in order to prevent data from being compromised as it relates to a customer's point of sale system and delivers a detailed risk assessment report and guides customers to address problem areas that will improve data security. This service gives companies that must comply with the Payment Card Industry Data Security Standard (PCI DSS) a risk assessment that shows them where they stand in terms of PCI compliance.","hyperlink":"https:\/\/tdcontent.techdata.com\/techsolutions\/security\/Services.aspx","td_contact":"SecurityServices@TechData.com","td_extension":"800-237-8931 ext. 5540508","vendor_id":"62","service_tiering":"","partner_benefits":"","typeof_service":"","end_user_benefits":"","mssp_available":"0","org_id":"1","vendor_name":"Tech Data","region":"","solutions_practice":"","sub_category_1":"Compliance","category_1":"Tech Data Professional Services"},{"product_id":"1089","product_name":"Incident Response - Emergency