About
Stormshield
The European cybersecurity choice
Our staff
Our ecosystem
Our history
Our sales offices
Our environmental approach
Join us
Contact
En
Fr
De
It
Es
Menu
Our difference
Our solutions & products
By industry
Aviation
Public Administration and Government
Critical communication
Defense and Military Organizations
Water Industry
Facility Management & Warehouse
Electric utilities
Navy
Health and Healthcare Facilities
Land transport
MSSPs and Other Service Providers
Close
All our products
Network security
Hardware firewalls
Virtual Appliances
Administration tools
Firmware
VPN Client
Features
Firewall comparison
Data security
Data encryption in Google Workspace
Data encryption in Gmail
Data encryption in Outlook
Data encryption in SharePoint and OneDrive
Data encryption on workstations
SDS range
Endpoint security
EDR
Protection for terminals
Protection for servers
Operational security
Features
Product range
Buy a solution Stormshield
Close
Close
Our support
With our partners
Services
Maintenance
Technical Support
Training
Professional Services
Threat Intelligence
Stormshield Academy
Close
Marketing documentation
Technical documentation
Cybersecurity, first steps
Close
Partner
Why become a partner
Join our network
All our partners
Supporting your customers
Close
News
Cybersecurity, by Stormshield
Cybersecurity, first steps
Corporate
Recruitment news
Partner news
Products & Services
Alert
Security Monitoring
Opinion articles
Technical posts
Close
Menu
Our difference
Our solutions & products
By industry
Aviation
Public Administration and Government
Critical communication
Defense and Military Organizations
Water Industry
Facility Management & Warehouse
Electric utilities
Navy
Health and Healthcare Facilities
Land transport
MSSPs and Other Service Providers
Close
All our products
Network security
Hardware firewalls
Virtual Appliances
Administration tools
Firmware
VPN Client
Features
Firewall comparison
Data security
Data encryption in Google Workspace
Data encryption in Gmail
Data encryption in Outlook
Data encryption in SharePoint and OneDrive
Data encryption on workstations
SDS range
Endpoint security
EDR
Protection for terminals
Protection for servers
Operational security
Features
Product range
Buy a solution Stormshield
Close
Close
Our support
With our partners
Services
Maintenance
Technical Support
Training
Professional Services
Threat Intelligence
Stormshield Academy
Close
Marketing documentation
Technical documentation
Cybersecurity, first steps
Close
Partner
Why become a partner
Join our network
All our partners
Supporting your customers
Close
News
Cybersecurity, by Stormshield
Cybersecurity, first steps
Corporate
Recruitment news
Partner news
Products & Services
Alert
Security Monitoring
Opinion articles
Technical posts
Close
Home
>
Resource Center
Resource Center
Find all our existing marketing documentation
Type security
Data (3)
Endpoint (4)
Network (12)
Training (1)
Type files
Brochure (11)
Case studies (26)
Datasheet (49)
Infographic (19)
Library (3)
Opinion article (48)
Solution Brief (4)
Threat Advisory (7)
Training (13)
Video (39)
Webinar (16)
Whitepaper (18)
Product
Data Enterprise (1)
Data for Cloud & Mobility (1)
Data for Google Workspace (1)
SNi20 (5)
SNi40 (5)
Stormshield Data Security (3)
Stormshield Endpoint Security (4)
Stormshield Log Supervisor (1)
Stormshield Network Security (12)
VPN Client (1)
Ask Ze Expert | The Stormshield EDR solution
See
Stormshield Academy partnership
See
Ask Ze Expert: Threat Intelligence for your protection
See
Stormshield Log Supervisor, our log management solution
See
Stormshield VPN Client: more information about the solution
See
Are you ready for SD-WAN?
See
Lessons learned on OT cybersecurity
See
2019 Barometer: Digital Transformation Within Businesses
See
Protect the sensitive data you need to externally share
See
Feedback on IT-OT interconnection
See
Reacting to cyberattacks
See
Control as a central aspect in the protection of operational technology
See
Protecting against cyberattacks
See
A brief history of operational technology risks
See
OT, IT, the not-so-convergent networks
See
Preventing cyberattacks
See
Share on
[juiz_sps buttons="facebook, twitter, linkedin, mail"]
Looking for our technical documentation? Find our user manuals, installation guides and other release notes on our documentation site.
Check out the technical documentation website
Want to find out more? Fill in your preferences and keep up to date with our latest news
Update your email preferences