Hi. Welcome to Ingram Micro.

Please choose your role, so we can direct you to what you’re looking for.

If you’d like to learn more about Ingram Micro global initiatives and operations, visit ingrammicro.com.

Rules of Engagement for Twenty-First Century Security Threats

April 04, 2017

Rules of Engagement for Twenty-First Century Security Threats



By Mickey Woods, Technology Consultant, Ingram Micro

For your C-level executive customers, charting a course is never easy or predictable. Clear skies can fade quickly, and before they know it, they’re back on defense, trying to protect their environments from threats that seem to come out of nowhere. As they prepare their teams to fight back, they sense that victory will be a short-term milestone—and accept that another crisis is just beyond the horizon.Like sudden and violent storms at sea, discovery of malicious software in their networks has become commonplace. Some exploits lie dormant for several months, but are ready to explode like ticking time bombs. As a result, your customers must delay mapping out their next important initiatives in order to deal with intruders who want to cripple their businesses. While this effort is a priority for their response teams, it doesn’t help them meet client SLAs and can bring other projects to a grinding halt.

How can you help them navigate the troubled waters?

Start by partnering with a technology manufacturer that specializes in isolating zero-day (unknown) threats, and avoiding organizations claiming to be “the next best thing.” Using a security company with decades of experience and a proven architecture will help you keep breaches in their data centers to a minimum. Plus, by saving engineering resources from working through false positives, you will gain more detailed and comprehensive Intelligence using a proven premise-based or cloud solution.

When evaluating your customers’ security policies during an annual audit, make sure your network point products are meeting their expectations. For executives seeking market advantages, select a technology leader that uses a proprietary hypervisor with private code to stop malware and prevent access for “Command and Control” hackers. As you become more efficient at stopping threats, the increased security awareness may foster adoption of a continuous improvement philosophy that can influence the bad guys to pick alternative targets.

The world has changed and the battle lines are getting blurry. Advanced persistent threats affect every type of industry and are here to stay. Executive teams must act now to defend their networks—whether from inside the firewall or against billions of remote endpoints that represent a challenging number of potential attack vectors. Like a fast ship going in harm’s way, the speed of business demands that organizations harden their security efforts or face an uncertain future. It is important to remember that harmful software on network, compute, and storage systems is a deliberate act to impact consumer confidence and the bottom line. How quickly you help your customers adopt an advanced security practice to combat these threats may mean the difference between reaching the destination and sinking to the bottom. The choice is yours.