TECHNOLOGICAL ALLIANCES

Ingecom has collaboration agreements with more than thirty manufacturers to work with them as Value Added Distributor of their cybersecurity, OT/ICS cybersecurity, IoT, IMoT and XIoT and cyber intelligence solutions. Currently, Ingecom distributes solutions from Akamai-Guardicore, Algosec, AlienVault, Allot, Bitdefender, CATO Networks, Cymulate, Corero, Delinea, Enthec, ExtraHop, Forcepoint, Forescout, Four9s, Garland Technology, Hackrocks, Ironscales, Ivanti, KELA, Medigate, Netwrix, Okta, Rapid7, SealPath, Stellar Cyber, Tehtris, ThreatQuotient, TRM, Varonis, Yubico and ZeroFox.

Depending on the agreement reached with each manufacturer, Ingecom can distribute the solutions in the three countries where it has a presence – Spain, Italy and Portugal – or in one of them. Ingecom has a partner network of more than 600 integrators worldwide.

IT CYBERSECURITY
CYBER INTELLIGENCE
CYBERSECURITY OT/ICS, IoT, IoMT
Logotipo Akamai

Akamai-Guardicore

Software-based microsegmentation technology
Logotipo Algosec

AlgoSec

Enterprise-Oriented Security Management
Logotipo de nuestro fabricante Allot

Allot

Network intelligence and application monitoring, enabling QoS
Logotipo Axonius

Axonius

Cybersecurity asset management and SaaS management.
Logotipo de nuestro fabricante BeyondTrust

BeyondTrust

Identity and privileged access management.

Bitdefender

The only integrated cyber-resilience platform that covers desktops, servers, virtual machines, mobile devices, and cloud workloads.

CATO Networks

The World’s First SASE Platform to Converge SD-WAN and Cloud Security

Corero

Leading technology in automatic protection against real-time, high-performance DDoS attacks, on-premise and cloud, with comprehensive visibility, analytics, and reporting
Logotipo de nuestro fabricante Cyber Guru

Cyber Guru

Technology to protect sensitive and business-critical data, no matter where it is

Cymulate

Continuous Security Validation Platform

Delineates

PAM (Privilege Account Manager) technology. Password security, endpoint protection, and access control

Forcepoint

Comprehensive security: firewall, web, DLP, email and workstation
Logotipo del fabricante LastPass

LastPass

Password Management Service
Logotipo de nuestro fabricante Mimecast

Mimecast

Technology to protect sensitive and business-critical data, no matter where it is

Netwrix

Technology to protect sensitive and business-critical data, no matter where it is

Okta

Identity and Access Management (IAM). Unified platform to secure the entire identity of companies.

Rapid7

Threat Exposure Management, Incident Detection and Response, and Compliance
Logotipo de nuestro fabricante Riskrecon

Riskrecon

Technology to protect sensitive and business-critical data, no matter where it is

Sealpath

Protection and control of corporate information. Cloud and on-premise solutions.
Logotipo de nuestro fabricante Varonis

Varonis

Threat detection and information classification. Control and monitoring of data access, based on user analysis.

Yubico

Security key that enables secure two-factor or multi-factor authentication, without a password

Enthec

The Kartos cyber surveillance and cyber intelligence platform analyzes the Internet, the Deep Web and the Dark Web.

ThreatQuotient

Improve security operations processes, delivering immediate value and significant value through multiple initiatives
Logotipo de Hackrocks

HackRocks

Cybersecurity training

Rapid7

Threat Exposure Management, Incident Detection and Response, and Compliance

ZeroFox

Digital Risk Protection (DRP) Solution

Kela

Collects, detects, and analyzes darknet sources, providing targeted intelligence

Forescout

Agentless visibility, segmentation, and enforcement of compliance, control, and orchestration across your heterogeneous network from campus to cloud

Garland Technology

Provides complete network visibility and ensures packets are not dropped
Logotipo de  nuestro fabricante Claroty

Claroty

Visibility, detection, and protection of IoT devices in medical environments

ExtraHop

Technology for advanced attack detection and remediation using network behavioral analysis (NDR)