Exchange and collaboration: key levers in the fight against cybercrime
The world of security includes a multitude of players with diverse and complementary expertise. Collaboration, information exchange, and partnerships are key assets when dealing with an increasing number of ever more sophisticated threats. As the European number one in infrastructure, Stormshield has decided to open up its ecosystem and join forces with other players with a view to developing solutions together, sharing information about threats, and improving our clients’ defenses as a collective unit.
In order to offer our customers the best possible level of security, we rely on recognized solutions on the market and combine our expertise with those of our technology partners using a product integration approach.
Stormshield Network Security is integrated with Centreon IMP, an IT supervision solution designed for small and midsized enterprises.
Stormshield Network Event Analyzer uses Click&DECiDE technology to meet security feature visibility requirements. The SNS product range satisfies these needs. Based on information gathered by network security equipment, this solution provides advanced reporting and analysis tools. Activity reports are sent automatically according to your role, which is a major benefit in decision-making.
Our customers no longer need to issue, deploy, or manage certificates on their terminal devices because the inWebo authentication method has been combined with Stormshield network protection devices.
Stormshield Network Security appliances come with Kaspersky antiviral technologies, which are recognized as being among the best on the market. They are constantly updated, and fight effectively against computer viruses.
As a European pioneer in SIEM and log management, LogPoint offers a platform that allows users to collect, analyze and correlate the logs generated by Stormshield Network Security appliances, to keep your networks at optimum security levels.
Stormshield has forged a partnership with ManagedMethods to integrate its Network Security appliances into the Cloud Access Monitor platform. Our customers can now use this CASB (Cloud Access Security Broker) solution to ensure they retain absolute visibility and total control over all their network traffic, and their use of Cloud applications (Office 365, Dropbox, Box, Slack, etc.).
Plixer’s Scrutinizer platform uses technologies such as NetFlow, IPFIX, sFlow, J-Flow and others to quickly collect, archive, and retrieve traffic information generated by Stormshield Network Security appliances. As a result, it is able to meet the networks’ requirements for investigation and performance.
Stormshield Network Security appliances are interoperable with Prelude, which is a French SIEM solution for critical infrastructures.
Stormshield users can benefit from RestorePoint’s ability to back up any appliance on their network. It’s a great way to shield your infrastructure against human error.
Schneider Electric is among the top rankers in automation and control, and has been involved with Stormshield since the very beginning in the resolution of industrial cybersecurity issues. The two players work together effectively, and that has led to the development of a firewall that is suitable for a large number of industrial infrastructures.
Siemens was one of the first companies in the industry to tackle the issue of industrial cyber security head on. So naturally, the Siemens Stormshield partnership was built on productive discussions aimed at improving methods of protection.
To make good use of the large volumes of logs from Stormshield Network Security and to provide our customers with clear and useful visuals, Stormshield has developed a plugin which is available through Splunk applications.
Stormshield Network Centralized Management was created in partnership with UBIqube, the centralized management solution. As a result, the management requirements of a very large number of network protection products can be met.
This long-term partner and France Cybersecurity-certified organization develops spam filtering solutions. Stormshield integrates these solutions into its Stormshield Network Security tool to provide better protection against cyberattacks sent by e-mail (phishing, malware, ransomware, etc.).
The benefits of this partnership are that our customers enjoy the best features of Stormshield and Panda Security solutions to safeguard their infrastructures and workstations.
Stormshield and TheGreenBow have been partners for a long time, and TheGreenBow’s certified VPN solutions ensure confidential data exchanges that meet the requirements of companies and critical infrastructures.
The Stormshield Data Security for Cloud & Mobility solution is fully integrated into Dropbox, ensuring end-to-end encryption of any documents that are exchanged on the platform.
For the most demanding environments, Stormshield Data Security for Cloud & Mobility relies on integration with Gemalto’s SafeNet MobilePKI hardware security solution, to safeguard even the most sensitive data.
This partnership allows the interoperability of McAfee’s Data Loss Prevention (DLP) solution with the ANSSI-certified Stormshield Data Security encryption technology. It helps our customers protect their documents to fit a defined security policy and their level of sensitivity.
Stormshield is also a long-term and active member of the Microsoft Active Protections Program. Stormshield has also developed an optimized version of its Stormshield Network Security firewall for Cloud infrastructures, including Microsoft Azure, which safeguards the security of information systems in a hybrid and outsourced model. Stormshield Data Security for Cloud & Mobility and Stormshield Data Security Enterprise respectively provide encryption for data exchanged within Office 365 (OneDrive, SharePoint Online) and encryption for e-mails and attachments exchanged from Outlook.
The integration of Stormshield Data Security for Cloud & Mobility within Oodrive’s PostFiles collaboration solution has created a new generation of secure collaboration. Users can collaborate effectively by implementing this service without worrying about compromising data protection and the privacy of their digital assets.