Ingram Micro signs on as FireEye distributor

0

Ingram Micro has signed distribution agreement with FireEye, the global leader in Cyber Security and Malware protection. With this agreement, Ingram Micro is authorized to distribute all FireEye products and solutions in Gulf countries, Egypt, Libya, Lebanon, Jordan, in North Africa French speaking countries Morocco, Tunisia, and Algeria, as well as South Africa.
FireEye is the leader in intelligence-led security-as-a-service. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant consulting. With this approach, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent, and respond to cyber attacks.
FireEye provides solutions for datacenter security, industrial systems and critical infrastructure security, enterprise network security and endpoint security, as well as solutions for small and midsize businesses.
“Partnering with FireEye, one of the market leaders in the threat protection, is for us a major step in building our cyber security capabilities,” said Ali Baghdadi, senior vice president and chief executive of Ingram Micro’s META region.
“Our target is to enhance the value proposition to our business partners with a dedicated range of services and more relevant blue chip vendors. With FireEye, we are reaching the front runner position as a value added distributor of cyber security solutions,” added Marc Kassis, Cyber Security Director, Ingram Micro META region.
“Organizations in the region can benefit from a partner to help them contend with an everevolving threat landscape and fend off increasingly sophisticated adversaries,” says Mohammed Abukhater, Regional Director for the Middle East and Africa at FireEye. “We are pleased to partner with Ingram Micro and believe that with this partnership, we can help enterprises improve their security posture and take a more holistic approach to cyber security.”