Hi. Welcome to Ingram Micro.

Please choose your role, so we can direct you to what you’re looking for.

If you’d like to learn more about Ingram Micro global initiatives and operations, visit ingrammicro.com.

Email and endpoint protection: today’s threats require a new approach

July 08, 2021

Email and endpoint protection: today’s threats require a new approach
Attackers are using more sophisticated ways than ever to get into networks and organizations need advanced toolsets to defeat the threat actors. Email and endpoint protection are solutions that you should be offering to your customers; however, the tools of yesterday aren’t going to protect against the threats of today. We talked to Ingram Micro’s Jacob White, technology consultant II, to learn more about the importance of email and endpoint protection and what to look for in the tools you’re choosing to deploy. 
According to the 2021 Verizon Data Breach Investigation Report, email remains the #1 threat vector that attackers use to breach customer networks 
Email continues to be a main pain point for customers. They may feel they are protected with current tools and trust their users to make good decisions when it comes to opening attachments and clicking links, however this is not always the case. Customers are apt to have endpoint security tools in place but they are out of date, they don’t deal with current threats well or don’t give visibility into the endpoints.
How do today’s email threat vectors work? How do they differ from the past? 
Today’s email threat vectors can be considered metamorphic, meaning that attackers make small changes to code to evade older signature-based detection tools. Once users activate the malware that arrives via email either by clicking on a link or downloading an attachment, it runs on the endpoint carte blanche. The older endpoint protection tools are looking for a specific signature, which has now been slightly edited and no longer will be caught. Overall, customers need a “one-two punch” solution that can block attacks before they arrive in the inbox, then also stops malware from activating if it sneaks past email controls or arrives via the web or external jump drive. 
Email and endpoint need to work together to create a holistic solution  
As we learned previously, many customers are likely to have endpoint controls that are aged and don’t deal well with the most current set of threatsConsider a holistic refresh on your customer’s control set that combines email controls with new, advanced endpoint controls that deal with modern threats like ransomware or other adaptive malware. 
What action should resellers take?  
Review your customer base and determine the last time their security tools were updated. Have a conversation about how past solutions won’t keep up with what today’s hackers are doing and introduce the idea of a holistic email and endpoint security refresh. It’s imperative that customers are protected with tools that take today’s threats like malware, metamorphic malware and ransomware into account.  
Ingram Micro’s Cybersecurity Delta Force is here to help connect you to the endpoint and email security solutions that make the most sense for your specific desired business outcomes. Leverage our team to help work through available options that meet your needs. 


Email and endpoint protection 101:
Get an introduction from Jacob White, sr. technology consultant at Ingram Micro, on email and endpoint protection for today’s threats.

Watch Video


Email and endpoint protection 201:
Take a deeper dive into email and endpoint protection with Jacob White, sr. technology consultant at Ingram Micro.


Watch Video

Our security experts have provided additional resources to help you further understand the needs of dynamic email and endpoint protection for today’s threats.
Case studies/examples in action:
Don’t just take it from us—hear from industry experts about the importance of adopting strong, dynamic email and endpoint protection with case studies and other media.

Recent media:
  • Email 
  1. IT Business Edge: “Email Security Tips to Prevent Phishing and Malware” 
  2. Solutions Review: “Mimecast State of Email Security 2021 Shows Surge During Pandemic” 
  3. Help Net Security: “Email Security is a Human Issue”
  • Endpoint 
  1. IT Business Edge: “How to Protect Endpoints While Your Employees Work Remotely” 
  2. SonicWall Security News: Darkside Ransomware Targets Large Corporations. Charges up to $2M” 
Training resources:
Learn more from industry experts and trusted vendor partners.
  • Email 
  1. Proofpoint Training Resources 
  2. Fortinet Training Resources 
  3. Mimecast Training Resources 
  4. What is Phishing? How to Spot a Phishing Attack 
  5. What is Email Spoofing? Spoofing Email Explained 
  6. What is SMTP (Simple Mail Transfer Protocol)? 
  • Endpoint 
  1. Check Point Training Resources 
  2. Fortinet Training Resources 
  3. Professor Messer Training 
  4. VMware Carbon Black 
  5. FireEye 
  6. What is Malware? Types and Dangers of Malware 
  7. What is Spyware? Spyware and Cybercrime 
  8. What is Ransomware? How Does Ransomware Work? 
Selected Vendor Partners:
  • Secure Email Gateway 
  1. Proofpoint 
  2. Mimecast 
  3. Juniper 
  4. Zerospam 
  • Endpoint Protection 
  1. Bitdefender 
  2. VMware Carbon Black 
  3. Trend Micro 
  4. Microsoft 
  5. McAfee 
  6. ESET 
  7. Acronis 
  • Both 
  1. Palo Alto 
  2. Fortinet 
  3. Cisco 
  4. SonicWall 
  5. Sophos 
  6. WatchGuard 
  7. Check Point 
  8. FireEye 


Contact Us