The ultimate protection against unknown and sophisticated attacks
because it’s more than just a simple antivirus
A security environment generally depends on the discernment of users and the responsiveness of signature-based tools, such as antivirus. Despite their investments into traditional security solutions, companies remain vulnerable. Stormshield Endpoint Security offers a complementary layer of security to compensate these weaknesses: by ensuring continuous control over behaviors on servers, workstations, and terminal devices according to fine-grained security policies put in place by the administrator.
Drawing on a unique system analysis technology, Stormshield Endpoint Security is the only solution that provides proven protection from both known and unknown targeted attacks and APTs (more: Advanced Persistent Threat).
Seamless and perfectly adapted for large-scale deployments, Stormshield Endpoint Security integrates into a single agent all the security services needed for protecting workstations and servers, ranging from peripheral device control to the encryption of disks.
The Full Protect product utilizes a unique proactive signature-less technology which protects efficiently against unknown and sophisticated attacks.
Faced with sophisticated or targeted attacks, the solution monitors and blocks programs’ suspicious behavior – such as memory access, keylogging, or exploiting vulnerabilities (including the misuse of legitimate software) – in real time. By operating as close as possible to the OS, this solution gains unique effectiveness against zero-day attacks and ransomware.
Without signature database updates, Stormshield Endpoint Security maintains optimal security conditions for environments that are subject to the strictest constraints, such as operational technology (the hardware and software dedicated to detecting or causing changes in physical processes through direct monitoring and/or control of physical devices such as valves, pumps, etc.) or point-of-sales terminals. This real-time protection is completely transparent and autonomous; it has no impact on workstations nor requires connections to external systems. Moreover, in the event of an attack, the administrator is immediately informed via the centralized console. Lacking a signature database to maintain, this solution is perfectly suited for end-of-life, discontinued or no-longer supported systems.
The Full Control product allows the granular definition of workstation protection in a context that complies with the corporate security policy.
Stormshield Endpoint Security ensures that all physical, logical, and network access from terminal devices (wireless network, sharing, USB peripheral devices, etc.) is monitored and audited. The solution automatically determines authorized operations depending on the context (on the workplace, the mobile device, after activating the administrator rights).
Now, more than ever, businesses are forced to adapt to this context and come up with innovative ways to protect and monitor the network.
Note: Click on the linked heading text to expand or collapse accordion panels.
3rd-generation vulnerability protection: several layers of protection make it possible to detect each attack.
A Core Defense module covering all basic security needs such as
Full tracking of operations on any type of removable peripheral device.
Transparent disk encryption and centralized encryption policies based on the file/folder.
Seamless management of the module by the Stormshield Endpoint Security management console.