Security Services

Tech Data offers our partners many different types of security services which may be used with their customers. For a complete list of these services, check out our Tech Data Security Services website .

The services listed below are all delivered by our Tech Data security team and are a mix of time and materials and fixed price engagements.

For pricing information, please reach out to your Tech Data Sales Representative or contact us .

Incident Response Experience

Partners are able to sell an Incident Response Simulation Experience to their customers which provides a company with the opportunity to consider their response to a potential threat such as ransomware or a data breach.

Hosted at the Tech Data Cyber Range, this half-day experience begins with Cyber Range engineers initiating a cyber attack in the room and then walking with the customer through their response. An Incident Response Experience is similar to a traditional table top exercise, however, Tech Data incorporates a choose-you-own-adventure gamification in which every choice you make solicits a reaction during the course of the experience. In the end, the goal is for the customer to exit the experience with a grasp of their incident response preparedness and the next steps to improve. The partner has the opportunity to ensure their customer has a documented and modular runbook to ensure success in responding to the inevitable threat.

Vulnerability Assessment

Usually performed before a penetration test, this hourly engagement identifies how susceptible a customer’s network is to a cyber-attack. We leverage best-in-class scanning toolsets and techniques to identify detailed vulnerability findings. The results are reviewed by our security experts, then a detailed report is generated for the customer. This is designed to help end customers reach a superior security posture as it identifies where they have risks and exposures in order to secure their network from advanced cyber threats.

Penetration Testing

This hourly engagement is a real world simulation of how an attacker would gain access to a customer network. This service leverages both technical and social engineering penetration testing techniques that an attacker may leverage in order to penetrate the customer’s network. A report is generated and delivered to the customer that details how our attack penetrated the network. Not only does this service help our partners identify new security solutions opportunities, it also lays a path to help the customer on their security posture maturity.

For more information about our Security Services, please reach out to