Tech Data offers our partners many different types of security services which may be used with their customers. For a complete list of these services, check out our Tech Data Security Services website.
The services listed below are all delivered by our Tech Data security team and are a mix of time and materials and fixed price engagements.
For pricing information, please reach out to your Tech Data Sales Representative or contact us.
Incident Response Experience
Partners are able to sell an Incident Response Simulation Experience to their customers which provides a company with the opportunity to consider their response to a potential threat such as ransomware or a data breach.
Hosted at the Tech Data Cyber Range, this half-day experience begins with Cyber Range engineers initiating a cyber attack in the room and then walking with the customer through their response. An Incident Response Experience is similar to a traditional tabletop exercise, however, Tech Data incorporates a choose-your-own-adventure gamification in which every choice you make solicits a reaction during the course of the experience. In the end, the goal is for the customer to exit the experience with a grasp of their incident response preparedness and the next steps to improve. The partner has the opportunity to ensure their customer has a documented and modular runbook to ensure success in responding to the inevitable threat. Download our Incident Response Experience Datasheet.
Incident Response Services
Tech Data has three Incident Response (IR) services that will help ensure that your customers have the right capabilities in place to effectively respond and recover to cyber threats.
- Plan Development: IR Plan Development can work directly with your customer on your behalf to deliver a cyber resilience policy and playbooks which integrate seamlessly with your customers’ people and processes This plan includes customized technical and strategic guidance on effectively identifying, containing, and neutralizing suspected incidents to quickly help your customer to quickly recover and resume their operation with minimal impact.
- Readiness Review: IR Readiness Review provides your customer with strategic guidance on effectively detecting, containing, eradicating, and remediating suspected incidents and limiting their impact on the business. Our IR Readiness Assessment can also test for specific scenarios, which is an essential step to building robust incident response plans for your customer.
- Emergency: Incident Response Emergency service helps ensure your customers have the right cyber expert capabilities in place to quickly and effectively respond and recover from cyber threats. Our Incident responders quickly engage your customer to rapidly provide immediate breach remediation assistance for swift resolution.
Remote Home Secure Program
As the current health crisis continues to change our definition of a company’s network, it is time for every company to proactively assess their security risks – specifically targeting their remote workforce. The remote workforce home network has become the new attack surface. These simple networks are easy targets for cybercriminals because they typically lack corporate-grade security standards and employees don’t always recognize the importance of following the same security practices at home as they do in the office.
Because the remote workforce accesses corporate resources such as confidential business information and customer/employee data directly from their own home network, they are becoming a high-value target for cybercriminals. Your customers need to be prepared to mitigate these threats by assessing the types of employee workforce risks that may be introduced by their remote home office networks.
Tech Data’s Remote Home Secure (RHS) Program is a new offering that focuses on evaluating a company’s security policies, technologies, and security practices as it pertains to securing their remote workforce. Performed by our team of cybersecurity experts, employers will be able to evaluate individual remote employees to gauge their understanding, implementation, and adherence to company security policies and the security configuration of their home networks. Through this non-invasive method, these interviews identify and assess key security risk areas and provide high-level recommendations to address identified risk gaps.
Usually performed before a penetration test, this hourly engagement identifies how susceptible a customer’s network is to a cyber-attack. We leverage best-in-class scanning toolsets and techniques to identify detailed vulnerability findings. The results are reviewed by our security experts, then a detailed report is generated for the customer. This is designed to help end-customers reach a superior security posture as it identifies where they have risks and exposures in order to secure their network from advanced cyber threats.
This hourly engagement is a real-world simulation of how an attacker would gain access to a customer network. This service leverages both technical and social engineering penetration testing techniques that an attacker may leverage in order to penetrate the customer’s network. A report is generated and delivered to the customer that details how our attack penetrated the network. Not only does this service help our partners identify new security solutions opportunities, but it also lays a path to help the customer on their security posture maturity.Differences between a vulnerability assessment and penetration testing:
ISAO Threat Feed
By Presidential order, Information Sharing and Analysis Organizations (ISAO) were created in 2015. These organizations allow companies, local governments, and security professionals to form communities that collaborate, share intelligence, and deliver training and conferences to take place under the veil of mutual non-disclosure agreements. This allows the participants to freely share timely, analyzed, and highly relevant data amongst each other.
There are too many threats, threat actors and new threat vectors for any entity to fend off alone. With the massive and growing cybersecurity skills gap, every company needs extra help from competent cybersecurity professionals. Tech Data’s ISAO Threat Feed solution draws from a very large community of members and leverages competent analysis through our collaboration with The Arizona Cyber Warfare Range and National Cyber Warfare Foundation. By joining the ISAO Threat Feed, your customers are leveraging mutual collaboration for their cyber defense.
For more information about our Security Services, please reach out to SecurityServices@techdata.com.