Ignition has collaboration agreements with more than thirty manufacturers to work with them as Value Added Distributor of their cybersecurity, OT/ICS cybersecurity, IoT, IMoT and XIoT and cyber intelligence solutions. Currently, Ingecom distributes solutions from Akamai-Guardicore, Algosec, AlienVault, Allot, Bitdefender, CATO Networks, Cymulate, Corero, Delinea, Enthec, ExtraHop, Forcepoint, Forescout, Four9s, Garland Technology, Hackrocks, Ironscales, Ivanti, KELA, Medigate, Netwrix, Okta, Rapid7, SealPath, Stellar Cyber, Tehtris, ThreatQuotient, TRM, Varonis, Yubico and ZeroFox.
Depending on the agreement reached with each manufacturer, Ignition can distribute the solutions in the three countries where it has a presence – Spain, Italy and Portugal – or in one of them. Ingecom has a partner network of more than 600 integrators worldwide.
CYBERSECURITY OT/ICS, IoT, IoMT
Enterprise-Oriented Security Management
Network intelligence and application monitoring, enabling QoS
Cybersecurity asset management and SaaS management.
Identity and privileged access management.
Leading technology in automatic protection against real-time, high-performance DDoS attacks, on-premise and cloud, with comprehensive visibility, analytics, and reporting
CrowdStrike has established itself as a global leader in cybersecurity, specializing in endpoint protection, identity …
Read more
Continuous Security Validation Platform
PAM (Privilege Account Manager) technology. Password security, endpoint protection, and access control
Comprehensive security: firewall, web, DLP, email and workstation
Password Management Service
Technology to protect sensitive and business-critical data, no matter where it is
Technology to protect sensitive and business-critical data, no matter where it is
Identity and Access Management (IAM). Unified platform to secure the entire identity of companies.
Threat Exposure Management, Incident Detection and Response, and Compliance
Technology to protect sensitive and business-critical data, no matter where it is
Protection and control of corporate information. Cloud and on-premise solutions.
Prioritize & Fix Your Critical Exposures Faster with Actionable Risk Context XM Cyber delivers a …
Read more
Security key that enables secure two-factor or multi-factor authentication, without a password
CrowdStrike has established itself as a global leader in cybersecurity, specializing in endpoint protection, identity …
Read more
The Kartos cyber surveillance and cyber intelligence platform analyzes the Internet, the Deep Web and the Dark Web.
Improve security operations processes, delivering immediate value and significant value through multiple initiatives
Threat Exposure Management, Incident Detection and Response, and Compliance
Digital Risk Protection (DRP) Solution
Collects, detects, and analyzes darknet sources, providing targeted intelligence
Agentless visibility, segmentation, and enforcement of compliance, control, and orchestration across your heterogeneous network from campus to cloud
Provides complete network visibility and ensures packets are not dropped
Visibility, detection, and protection of IoT devices in medical environments
Technology for advanced attack detection and remediation using network behavioral analysis (NDR)