Ingram Micro, a technology distributors in Middle East, Turkey and Africa, announced it has signed a distribution agreement with FireEye, a global vendor in cybersecurity and malware protection. With this agreement, Ingram Micro is authorised to distribute FireEye products in Gulf countries, Egypt, Libya, Lebanon, Jordan, North African French speaking countries Morocco, Tunisia, and Algeria, as well as South Africa.
FireEye is the leader in intelligence-led security-as-a-service. Working as a scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and Mandiant consulting.
With this approach, FireEye eliminates the complexity and burden of cyber security for organisations struggling to prepare for, prevent, and respond to cyberattacks. FireEye provides solutions for datacentre security, industrial systems and critical infrastructure security, enterprise network security and endpoint security, as well as solutions for small and midsize businesses.
“Partnering with FireEye, one of the market leaders in the threat protection, is for us a major step in building our cyber security capabilities,” said Ali Baghdadi, Senior Vice President and Chief Executive of Ingram Micro’s META region.
“Our target is to enhance the value proposition to our business partners with a dedicated range of services and more relevant blue chip vendors. With FireEye, we are reaching the front runner position as a value added distributor of cyber security solutions,” added Marc Kassis, Cyber Security Director, Ingram Micro META region.
“Organisations in the region can benefit from a partner to help them contend with an ever-evolving threat landscape and fend off increasingly sophisticated adversaries,” says Mohammed Abukhater, Regional Director for the Middle East and Africa at FireEye. “We are pleased to partner with Ingram Micro and believe that with this partnership, we can help enterprises improve their security posture and take a more holistic approach to cyber security.”
Click below to share this article