Ingecom has collaboration agreements with more than thirty manufacturers to work with them as Value Added Distributor of their cybersecurity, OT/ICS cybersecurity, IoT, IMoT and XIoT and cyber intelligence solutions. Currently, Ingecom distributes solutions from Akamai-Guardicore, Algosec, AlienVault, Allot, Bitdefender, CATO Networks, Cymulate, Corero, Delinea, Enthec, ExtraHop, Forcepoint, Forescout, Four9s, Garland Technology, Hackrocks, Ironscales, Ivanti, KELA, Medigate, Netwrix, Okta, Rapid7, SealPath, Stellar Cyber, Tehtris, ThreatQuotient, TRM, Varonis, Yubico and ZeroFox.
Depending on the agreement reached with each manufacturer, Ingecom can distribute the solutions in the three countries where it has a presence – Spain, Italy and Portugal – or in one of them. Ingecom has a partner network of more than 600 integrators worldwide.
CYBERSECURITY OT/ICS, IoT, IoMT
Software-based microsegmentation technology
Enterprise-Oriented Security Management
Network intelligence and application monitoring, enabling QoS
Cybersecurity asset management and SaaS management.
Identity and privileged access management.
The only integrated cyber-resilience platform that covers desktops, servers, virtual machines, mobile devices, and cloud workloads.
The World’s First SASE Platform to Converge SD-WAN and Cloud Security
Leading technology in automatic protection against real-time, high-performance DDoS attacks, on-premise and cloud, with comprehensive visibility, analytics, and reporting
Technology to protect sensitive and business-critical data, no matter where it is
Continuous Security Validation Platform
PAM (Privilege Account Manager) technology. Password security, endpoint protection, and access control
Comprehensive security: firewall, web, DLP, email and workstation
Password Management Service
Technology to protect sensitive and business-critical data, no matter where it is
Technology to protect sensitive and business-critical data, no matter where it is
Identity and Access Management (IAM). Unified platform to secure the entire identity of companies.
Threat Exposure Management, Incident Detection and Response, and Compliance
Technology to protect sensitive and business-critical data, no matter where it is
Protection and control of corporate information. Cloud and on-premise solutions.
Threat detection and information classification. Control and monitoring of data access, based on user analysis.
Security key that enables secure two-factor or multi-factor authentication, without a password
The Kartos cyber surveillance and cyber intelligence platform analyzes the Internet, the Deep Web and the Dark Web.
Improve security operations processes, delivering immediate value and significant value through multiple initiatives
Threat Exposure Management, Incident Detection and Response, and Compliance
Digital Risk Protection (DRP) Solution
Collects, detects, and analyzes darknet sources, providing targeted intelligence
Agentless visibility, segmentation, and enforcement of compliance, control, and orchestration across your heterogeneous network from campus to cloud
Provides complete network visibility and ensures packets are not dropped
Visibility, detection, and protection of IoT devices in medical environments
Technology for advanced attack detection and remediation using network behavioral analysis (NDR)