Menu

Stormshield Endpoint Security

The ultimate protection against unknown and sophisticated attacks
because it is more than just a simple antivirus

The security level of a network generally depends on the distinguishability of users and the effectiveness of signature-based tools, such as an antivirus. Despite investments in traditional security solutions, companies remain vulnerable. Stormshield Endpoint Security offers an additional layer of protection to compensate for these weaknesses: continuous monitoring of the behaviour of servers, workstations, and terminal devices according to meticulously configurable security policies introduced by the administrator.

Based on a unique system analysis technology, Stormshield Endpoint Security is the only solution that provides proven protection against both known and unknown targeted attacks and APTs (more: Advanced Persistent Threat).

Stormshield Endpoint Security seamlessly and perfectly adapts to large-scale deployments and integrates the necessary security services for the protection of workstations and servers into a single agent, from peripheral device control to disk encryption.

 

Full Protect

The Full Protect product utilizes a unique, proactive signature-less technology that effectively protects against both unknown and sophisticated attacks.

Intrusion prevention

Protection Against Unknown Threats

Protection of Terminals, Workstations, and Servers

 

Advantages of Proactive Behaviour Protection

To protect against sophisticated and targeted attacks, it is crucial to monitor and block suspiciously behaving programs in real-time. This includes actions such as unjustified memory access, keylogging, or the exploitation of vulnerabilities (exploits), including the misuse of legitimate software. By operating as close as possible to the operating system, this solution achieves unique effectiveness against zero-day attacks and ransomware.

 

Protection of Offline and Industrial Environments

Without the need for a signature database update, Stormshield Endpoint Security is capable of maintaining optimal security conditions in environments subject to the strictest restrictions, such as industrial environments (operational technology, referring to hardware and software tools used to detect or alter physical processes, such as direct supervision and/or control of valves, pumps, etc.) or points of sale (e.g., POS terminals). This real-time protection is completely transparent and autonomous; it has no impact on workstations and does not require connection to external systems. Furthermore, in the event of an attack, the administrator is immediately notified of the unwanted event through the centralized console. In the absence of a signature database, this solution is perfectly suited to protect end-of-life, discontinued, or no longer supported systems.

 

Full Control

The Full Control product allows the meticulous configuration of workstation protection, aligning with the corporate security policy.

SES / Full Control

Peripheral Monitoring and Control

Communication Control

 

Managing Access to the Organization’s Assets

Stormshield Endpoint Security enables the monitoring and auditing of all physical, logical, and network access (wireless network, sharing, USB peripherals, etc.) from terminal devices. The solution automatically determines authorized operations depending on the context (at the workplace, on mobile devices, activation of administrator rights, etc.).

Benefits – Key Features

Today, more than ever, businesses are forced to adapt to changing circumstances and use innovative solutions to monitor and protect their networks.

Note: Click on the related header text to expand or collapse the accordion panels.

3rd-generation vulnerability protection: a combination of multiple layers of defense makes every attack detectable.

The Core Defense module covers all essential security solutions, such as

  • Application control
  • Firewall
  • HIPS (Host-based Intrusion Prevention System)
  • NIPS (Network-based Intrusion Prevention System)
  • etc

Full tracking of operations on any removable peripheral device.

Transparent disk encryption and centralized encryption policies based on files and folders.

Seamless management of the module through the Stormshield Endpoint Security management console.