Threat Intelligence

Our Threat Intelligence team has two key missions: to study cyber threats in order to understand them, and to continuously improve the protection offered by Stormshield products. The goal in each case is to contribute to the cybersecurity community's effort to address cyber threats.

Stormshield Security Research · Stormshield Cyber Threat intelligence

Stormshield Customer Security Lab

We are committed to providing effective protection against cyber threats to business. This task is handled by a dedicated team: the Stormshield Customer Security Lab. Their everyday role: to conduct in-depth analysis into the technologies and mechanisms exploited by cybercriminals.

To improve our knowledge of IoCs (Indicators of Compromise), this Cyber Threat Intelligence team draws upon the vast amounts of information provided by our own UTM, EPP/EDR and sandboxing solutions, coupled with external data sources. Its focus is on the constant goal of improving the security of Stormshield solutions (Stormshield Security Research). And with our Product Security portal, we also conduct a mission of informing our partners and customers about the state of the cyber threat worldwide. Security services made available to all parties include identifying whether an IP address exists in our IP reputation databases, finding existing protection for our products (SNS signatures and SES rules) and accessing the list of CVEs detected by our Vulnerability Management module.

Cloud based sandboxing

Do you have doubts about a file? Test it with Breach Fighter

Not sure you trust that last e-mail you received? And the accompanying attachment looks even more suspicious? Enjoy cyber peace of mind with Breach Fighter – a research tool that uses a freely accessible portal to detect possible malicious behaviour. This malware detection service forms an integral part of our Breach Fighter sandboxing solution. The solution is based on behavioural analysis from our Stormshield Endpoint Security Evolution product and research from our Security Intelligence team. Breach Fighter can analyse and detect malicious behaviour in e-mails containing attachments and in file types such as Microsoft Office, PDF, JAR and Java files, scripts (PowerShell, JScript, etc.), Windows executable files, and even archives (ZIP, RAR, 7-Zip, etc.).

Cyber threat intelligence

Technical content for security experts

Lastly, our Threat Intelligence team also pays careful attention to the technical approach to cyber security. Our in-house cybersecurity experts make use of their hands-on coding experience to tackle malware mechanisms and deliver their high-level analysis – sometimes in exclusive scoops. Technical content for informed readers.

Do you have a question to ask or an incident to report? The members of our Security Intelligence team are waiting to hear from you.

  • * required fields
  • This field is for validation purposes and should be left unchanged.

Threat intelligence job

Cyber-situations vacant

New profiles are being added regularly to our Cyber Threat Intelligence team. Cyber experts, dedicated consultants and other profiles of all kinds: are you looking for a new adventure in cybersecurity? Take a look at our current vacancies and send in your application.