Blancco Technology Group, the de facto standard in data erasure and mobile device diagnostics, recently signed a distribution agreement with Ingram Micro Inc., the world’s largest wholesale technology distributor. The new relationship empowers Ingram Micro and its partners to provide customers with complete data sanitization from a single platform, including a digitally signed, tamper-proof certificate to verify sensitive data has been permanently erased and cannot be recovered.†
The new agreement reflects the growing need for organizations to prove compliance with strict industry regulations and standards. As a result, Ingram Micro’s partners can now enable customers to mitigate security risks, provide a verifiable audit trail to comply with the growing number of data protection regulations and standards around the world, including PCI DSS, HIPAA,†EU GDPR, ISO 27001, and NIST 800-53.
“Ingram Micro’s partner landscape is vast and can cover every technology aspect an enterprise requires to support their information and data security processes,” said†Alan Bentley, President of Global Sales, Blancco Technology Group,†”From focused service providers to value added resellers, our new agreement will allow Ingram Micro’s ecosystem to deliver an end-to-end security solution for their customers by adding secure data erasure to their existing portfolios. This new alliance aligns perfectly with Blancco’s focus on supporting enterprises at every touch point possible.”
“Ingram Micro is extremely excited to be entering into this relationship with Blancco and providing a best of breed, secure data erasure solution offering to our resellers and service providers,” said†Donald Scott, Sr.†Manager, Emerging Vendor Initiative, Advanced Solutions at Ingram Micro. “Their global leadership position in the data erasure space is a testament to their twenty years of experience and expertise of providing world class solutions to enterprise customers.†By enabling our channel with the Blancco suite of products, Ingram Micro partners can fully realize the end to end security of their data lifecycle.”