Tech Data offers our partners many different types of security services which may be used with their customers. For a complete list of these services, check out our Tech Data Security Services website .
The services listed below are all delivered by our Tech Data security team and are a mix of time and materials and fixed price engagements.
For pricing information, please reach out to your Tech Data Sales Representative or contact us .
Incident Response Experience
Partners are able to sell an Incident Response Simulation Experience to their customers which provides a company with the opportunity to consider their response to a potential threat such as ransomware or a data breach.
Hosted at the Tech Data Cyber Range, this half-day experience begins with Cyber Range engineers initiating a cyber attack in the room and then walking with the customer through their response. An Incident Response Experience is similar to a traditional table top exercise, however, Tech Data incorporates a choose-you-own-adventure gamification in which every choice you make solicits a reaction during the course of the experience. In the end, the goal is for the customer to exit the experience with a grasp of their incident response preparedness and the next steps to improve. The partner has the opportunity to ensure their customer has a documented and modular runbook to ensure success in responding to the inevitable threat.
Usually performed before a penetration test, this hourly engagement identifies how susceptible a customer’s network is to a cyber-attack. We leverage best-in-class scanning toolsets and techniques to identify detailed vulnerability findings. The results are reviewed by our security experts, then a detailed report is generated for the customer. This is designed to help end customers reach a superior security posture as it identifies where they have risks and exposures in order to secure their network from advanced cyber threats.
This hourly engagement is a real world simulation of how an attacker would gain access to a customer network. This service leverages both technical and social engineering penetration testing techniques that an attacker may leverage in order to penetrate the customer’s network. A report is generated and delivered to the customer that details how our attack penetrated the network. Not only does this service help our partners identify new security solutions opportunities, it also lays a path to help the customer on their security posture maturity.
By Presidential order, Information Sharing and Analysis Organizations (ISAO) were created in 2015. These organizations allow companies, local governments, and security professionals to form communities that collaborate, share intelligence, and deliver training and conferences to take place under the veil of mutual non-disclosure agreements. This allows the participants to freely share timely, analyzed, and highly relevant data amongst each other.
There are too many threats, threat actors and new threat vectors for any entity to fend off alone. With the massive and growing cybersecurity skills gap, every company needs extra help from competent cybersecurity professionals. Tech Data’s RECON™ ISAO solution draws from a very large community of members and leverages competent analysis through our collaboration with The Arizona Cyber Warfare Range and National Cyber Warfare Foundation. By joining the RECON ISAO, your customers are leveraging mutual collaboration for their cyber defense.
For more information about our Security Services, please reach out to SecurityServices@techdata.com.