News

Ingram Micro, CA Launch Enterprise Software Channel

Ingram Micro Inc. (Santa Ana, Calif., www.ingrammicro.com) and Computer Associates Intl. Inc. (CA, Islandia, N.Y., www.cai.com) today announced that Ingram Micro will expand its global enterprise solution offering. Under a U.S. software distribution agreement, CA has been named a provider of end-to-end enterprise management solutions for Ingram Micro's Advanced Software Division (ASD), a component of its global enterprise offering.

Ingram Micro will offer CA's Unicenter TNG and Enterprise Edition products as management solutions, and will distribute CA's software to resellers in strategic vertical markets. Ingram Micro will also distribute CA's Jasmine, Opal and Ingres II, components of CA's Harmony solution, to qualified resellers servicing the high-performance enterprise computing market.

Enterprise Edition products consist of enterprise-class solutions for specific management areas. Opal modernizes legacy applications while seamlessly integrating systems across multiple platforms and architectures. Jasmine, a pure object database, allows users to build and deploy multimedia applications over client/server and networked computing environments. Ingres II delivers a mission-critical relational database management system.

Ingram Micro also plans to offer a configuration program in which it will load and test Unicenter TNG on a customer's hardware, providing the customer a "turn-key" system. --Brian Ploskina, Assistant Editor

About the Author

Scott Bekker is editor in chief of Redmond Channel Partner magazine.

Featured

  • Tamper Protection Now Available to Microsoft Defender ATP Subscribers

    The Microsoft Defender Advanced Threat Protection (ATP) E5 subscription plan now has an optional "tamper protection" security feature, Microsoft announced on Monday.

  • Exploring OCR, a New Way To Get Data into Excel

    Microsoft recently added a new optical character recognition feature to Excel that lets users import data from a photograph taken from a smartphone. Here's how to use it.

  • Microsoft Authenticator App To Get Real-Time Phishing Protections

    Microsoft is working on adding capabilities to its Microsoft Authenticator app to help defeat security breaches enabled by advanced attack techniques, including phishing and man-in-the-middle methods.

  • A Quicker Way To Create Hyper-V Inventory Reports

    If you need to generate Hyper-V inventory reports but don't want the hassle of writing your own custom PowerShell script, here is a shortcut.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.