About
Stormshield
The European cybersecurity choice
Our staff
Our ecosystem
Our history
Our sales offices
Our environmental approach
Join us
Contact
En
Fr
De
It
Es
Menu
Our difference
Our solutions & products
By industry
Aviation
Public Administration and Government
Critical communication
Defense and Military Organizations
Water Industry
Facility Management & Warehouse
Electric utilities
Navy
Health and Healthcare Facilities
Land transport
MSSPs and Other Service Providers
Close
All our products
Network security
Hardware firewalls
Virtual Appliances
Administration tools
Firmware
VPN Client
Features
Firewall comparison
Data security
Data encryption in Google Workspace
Data encryption in Gmail
Data encryption in Outlook
Data encryption in SharePoint and OneDrive
Data encryption on workstations
SDS range
Endpoint security
EDR
Protection for terminals
Protection for servers
Operational security
Features
Product range
Buy a solution Stormshield
Close
Close
Our support
With our partners
Services
Maintenance
Technical Support
Training
Professional Services
Threat Intelligence
Stormshield Academy
Close
Marketing documentation
Technical documentation
Cybersecurity, first steps
Close
Partner
Why become a partner
Join our network
All our partners
Supporting your customers
Close
News
Cybersecurity, by Stormshield
Cybersecurity, first steps
Corporate
Recruitment news
Partner news
Products & Services
Alert
Security Monitoring
Opinion articles
Technical posts
Close
Menu
Our difference
Our solutions & products
By industry
Aviation
Public Administration and Government
Critical communication
Defense and Military Organizations
Water Industry
Facility Management & Warehouse
Electric utilities
Navy
Health and Healthcare Facilities
Land transport
MSSPs and Other Service Providers
Close
All our products
Network security
Hardware firewalls
Virtual Appliances
Administration tools
Firmware
VPN Client
Features
Firewall comparison
Data security
Data encryption in Google Workspace
Data encryption in Gmail
Data encryption in Outlook
Data encryption in SharePoint and OneDrive
Data encryption on workstations
SDS range
Endpoint security
EDR
Protection for terminals
Protection for servers
Operational security
Features
Product range
Buy a solution Stormshield
Close
Close
Our support
With our partners
Services
Maintenance
Technical Support
Training
Professional Services
Threat Intelligence
Stormshield Academy
Close
Marketing documentation
Technical documentation
Cybersecurity, first steps
Close
Partner
Why become a partner
Join our network
All our partners
Supporting your customers
Close
News
Cybersecurity, by Stormshield
Cybersecurity, first steps
Corporate
Recruitment news
Partner news
Products & Services
Alert
Security Monitoring
Opinion articles
Technical posts
Close
Home
>
Resource Center
Resource Center
Find all our existing marketing documentation
Type security
Data (12)
Endpoint (46)
Network (26)
Training (4)
Type files
Brochure (4)
Case studies (3)
Datasheet (1)
Infographic (3)
Opinion article (13)
Threat Advisory (7)
Training (3)
Video (6)
Webinar (3)
Whitepaper (8)
Product
Breach Fighter (5)
Data Connector (3)
Data Enterprise (10)
Data for Cloud & Mobility (8)
Data for Google Workspace (7)
SN-M-Series 520 (9)
SN-M-Series 720 (9)
SN-M-Series 920 (9)
SN-S-Series 220 (8)
SN-S-Series 320 (8)
SN1100 (8)
SN160 (7)
SN160W (2)
SN2000 (1)
SN210 (6)
SN2100 (15)
SN210W (2)
SN3000 (1)
SN310 (7)
SN3100 (13)
SN510 (8)
SN6000 (2)
SN6100 (12)
SN710 (11)
SN910 (5)
SNi20 (21)
SNi40 (27)
SNxr1200 (7)
Stormshield Data Security (33)
Stormshield Endpoint Security (51)
Stormshield Log Supervisor (7)
Stormshield Management Center (10)
Stormshield Network Security (132)
Stormshield Visibility Center (2)
Stormshield XDR (3)
Virtual Appliances (8)
VPN Client (3)
Stormshield Endpoint Security receives CSPN (ANSSI certification)
See
Stormshield Endpoint Security Evolution, 3 minutes to convince
See
Whitepaper XDR | Why will eXtended Detection & Response become the new paradigm in cybersecurity?
See
A trusted EDR solution with Stormshield Endpoint Security Evolution
See
EU NIS2 directive: what’s changing?
Download
A fully integrated and controlled XDR offer with Stormshield
See
Will hospitals ever be free from cyber threats?
Download
Industry 5.0: where does cybersecurity fit in?
Download
Brochure – Protecting sensitive environments
Download
Endpoint protection solutions and antivirus: what’s the difference?
Download
Corporate use of hardened cybersecurity products: the way of the future?
Download
Ask Ze Expert: Threat Intelligence for your protection
See
Ransomware: many victims, very few solutions
Download
Ransomware LockBit 2.0
Download
Whitepaper | Cybersecurity and operational networks: How to begin factoring in risks for the industry of the future?
See
Public administrations | How a Ministry of Defense reconciles cyber protection and sovereignty
Download
Whitepaper | How to choose an Endpoint Protection solution?
See
Industry | How to renovate the control systems of power generation plants for more cybersecurity
Download
Technology Spotlight IDC | Context/Behavior-aware Endpoint Protection and response to meet digital and hybrid workforce requirements
See
Stormshield Endpoint Security Evolution Demo
See
Interactive website | Hospitals and cyber risk vectors
See
Stormshield training organisation – brochure
Download
Datasheet Stormshield Endpoint Security Evolution – SES
Download
Whitepaper | Corporate digital transformation: putting maturity to the test?
See
Workstations: exploring the world of suspicious behaviour
Download
Stormshield Endpoint Security Range Brochure – SES
Download
Industrial cybersecurity brochure – Security solutions for industrial networks
Download
How Stormshield change the game of OT Cybersecurity
See
Europe: a bastion of cybersecurity
Download
CSEA Course outline
Download
Cybersecurity: should staff be restricted for their own good?
Download
Lessons learned on OT cybersecurity
See
Stormshield Corporate Brochure
Download
Industrial cybersecurity: why should we stop talking about SCADA?
Download
Whitepaper | Corporate digital transformation: maturity and numerous questions
See
Ryuk – ransomware en EspaƱa (ES)
Download
The hospital sector: critical systems, highly sensitive to cyberattacks
Download
Top 6 most surprising entry points for cyberattacks
Download
Control as a central aspect in the protection of operational technology
See
RobbinHood ransomware: Why Baltimore ends up in the spot lights?
Download
Maritime | Pleasure boats: a comprehensive international protection
Download
Whitepaper | Corporate digital transformation; where does security fit in?
See
Qualified security solutions: choosing a trusted solution
Download
Industrial cybersecurity: a strategic project that must not be underestimated
Download
CSEE Course outline
Download
Shamoon Malware
Download
SES – Security Insider
Download
Stormshield Endpoint Security more than just a simple antivirus
Download
Carbanak Malware
Download
POSeidon Malware
Download
Backoff Malware
Download
Share on
[juiz_sps buttons="facebook, twitter, linkedin, mail"]
Looking for our technical documentation? Find our user manuals, installation guides and other release notes on our documentation site.
Check out the technical documentation website
Want to find out more? Fill in your preferences and keep up to date with our latest news
Update your email preferences