About
Stormshield
The European cybersecurity choice
Our staff
Our ecosystem
Our history
Our sales offices
Our environmental approach
Join us
Contact
En
Fr
De
It
Es
Menu
Our difference
Our solutions & products
By industry
Aviation
Public Administration and Government
Critical communication
Defense and Military Organizations
Water Industry
Facility Management & Warehouse
Electric utilities
Navy
Health and Healthcare Facilities
Land transport
MSSPs and Other Service Providers
Close
All our products
Network security
Hardware firewalls
Virtual Appliances
Administration tools
Firmware
VPN Client
Features
Firewall comparison
Data security
Data encryption in Google Workspace
Data encryption in Gmail
Data encryption in Outlook
Data encryption in SharePoint and OneDrive
Data encryption on workstations
SDS range
Endpoint security
EDR
Protection for terminals
Protection for servers
Operational security
Features
Product range
Buy a solution Stormshield
Close
Close
Our support
With our partners
Services
Maintenance
Technical Support
Training
Professional Services
Threat Intelligence
Stormshield Academy
Close
Marketing documentation
Technical documentation
Close
Partner
Why become a partner
Join our network
All our partners
Close
News
Cybersecurity, by Stormshield
Cybersecurity, first steps
Corporate
Recruitment news
Partner news
Products & Services
Alert
Security Monitoring
Opinion articles
Technical posts
Close
Menu
Our difference
Our solutions & products
By industry
Aviation
Public Administration and Government
Critical communication
Defense and Military Organizations
Water Industry
Facility Management & Warehouse
Electric utilities
Navy
Health and Healthcare Facilities
Land transport
MSSPs and Other Service Providers
Close
All our products
Network security
Hardware firewalls
Virtual Appliances
Administration tools
Firmware
VPN Client
Features
Firewall comparison
Data security
Data encryption in Google Workspace
Data encryption in Gmail
Data encryption in Outlook
Data encryption in SharePoint and OneDrive
Data encryption on workstations
SDS range
Endpoint security
EDR
Protection for terminals
Protection for servers
Operational security
Features
Product range
Buy a solution Stormshield
Close
Close
Our support
With our partners
Services
Maintenance
Technical Support
Training
Professional Services
Threat Intelligence
Stormshield Academy
Close
Marketing documentation
Technical documentation
Close
Partner
Why become a partner
Join our network
All our partners
Close
News
Cybersecurity, by Stormshield
Cybersecurity, first steps
Corporate
Recruitment news
Partner news
Products & Services
Alert
Security Monitoring
Opinion articles
Technical posts
Close
Home
>
Resource Center
Resource Center
Find all our existing marketing documentation
Type security
Data (8)
Endpoint (10)
Network (13)
Type files
Brochure (11)
Case studies (26)
Datasheet (54)
Infographic (21)
Library (3)
Opinion article (48)
Solution Brief (4)
Threat Advisory (7)
Training (14)
Video (39)
Webinar (18)
Whitepaper (18)
Product
Data Enterprise (1)
Data for Cloud & Mobility (1)
Data for Google Workspace (1)
SN160 (1)
SN160W (1)
SN210 (1)
SN2100 (1)
SN210W (1)
SN310 (1)
SN3100 (1)
SN510 (1)
SN6100 (1)
SN710 (1)
SN910 (1)
SNi20 (4)
SNi40 (4)
Stormshield Data Security (5)
Stormshield Endpoint Security (8)
Stormshield Log Supervisor (1)
Stormshield Network Security (10)
Stormshield XDR (1)
Whitepaper | Cybersecurity for local authorities: a challenge that can’t wait the smart city
See
Whitepaper XDR | Why will eXtended Detection & Response become the new paradigm in cybersecurity?
See
Whitepaper | Cybersecurity: its central role in the ransomware industry
See
Whitepaper | Cybersecurity in sensitive environments: immersion in the world of healthcare
See
Whitepaper | Trusted SDWAN: combining performance and security
See
Whitepaper | Cybersecurity and operational networks: How to begin factoring in risks for the industry of the future?
See
Whitepaper | How to choose an Endpoint Protection solution?
See
Technology Spotlight IDC | Context/Behavior-aware Endpoint Protection and response to meet digital and hybrid workforce requirements
See
Whitepaper | Cybersecurity in sensitive environments: immersion in the water industry
See
Interactive website | Hospitals and cyber risk vectors
See
Yearbook | A 2020-year full of news
Download
Whitepaper | Corporate digital transformation: putting maturity to the test?
See
Whitepaper | From 2015 to tomorrow: cyber intrusions in electrical grids
See
Whitepaper | DPI systems and network security: IPS Stateful DPI technology in OT environments
See
Whitepaper | Corporate digital transformation: maturity and numerous questions
See
Yearbook | A 2019-year full of news
Download
White paper | Data protection solutions: Toward deployment without constraints?
See
Whitepaper | Corporate digital transformation; where does security fit in?
See
Share on
[juiz_sps buttons="facebook, twitter, linkedin, mail"]
Looking for our technical documentation? Find our user manuals, installation guides and other release notes on our documentation site.
Check out the technical documentation website
Want to find out more? Fill in your preferences and keep up to date with our latest news
Update your email preferences