Stormshield Endpoint Security
The ultimate protection against unknown and sophisticated attacks
because it is more than just a simple antivirus
The security level of a network generally depends on the distinguishability of users and the effectiveness of signature-based tools, such as an antivirus. Despite investments in traditional security solutions, companies remain vulnerable. Stormshield Endpoint Security offers an additional layer of protection to compensate for these weaknesses: continuous monitoring of the behaviour of servers, workstations, and terminal devices according to meticulously configurable security policies introduced by the administrator.
Based on a unique system analysis technology, Stormshield Endpoint Security is the only solution that provides proven protection against both known and unknown targeted attacks and APTs (more: Advanced Persistent Threat).
Stormshield Endpoint Security seamlessly and perfectly adapts to large-scale deployments and integrates the necessary security services for the protection of workstations and servers into a single agent, from peripheral device control to disk encryption.

Full Protect
The Full Protect product utilizes a unique, proactive signature-less technology that effectively protects against both unknown and sophisticated attacks.
Intrusion prevention
- Protection of computers with a firewall and network intrusion prevention
Protection Against Unknown Threats
- Protection of computers against the exploitation of vulnerabilities in the operating system and third-party applications
- Monitoring the integrity of system memory
Protection of Terminals, Workstations, and Servers
- Detection of malicious software through behaviour analysis and hardening of the operating system
- Management of workstations thanks to application control (whitelisting and/or blacklisting), and protection of sensitive data with fine-tuned adjustments to user permissions

Advantages of Proactive Behaviour Protection
To protect against sophisticated and targeted attacks, it is crucial to monitor and block suspiciously behaving programs in real-time. This includes actions such as unjustified memory access, keylogging, or the exploitation of vulnerabilities (exploits), including the misuse of legitimate software. By operating as close as possible to the operating system, this solution achieves unique effectiveness against zero-day attacks and ransomware.

Protection of Offline and Industrial Environments
Without the need for a signature database update, Stormshield Endpoint Security is capable of maintaining optimal security conditions in environments subject to the strictest restrictions, such as industrial environments (operational technology, referring to hardware and software tools used to detect or alter physical processes, such as direct supervision and/or control of valves, pumps, etc.) or points of sale (e.g., POS terminals). This real-time protection is completely transparent and autonomous; it has no impact on workstations and does not require connection to external systems. Furthermore, in the event of an attack, the administrator is immediately notified of the unwanted event through the centralized console. In the absence of a signature database, this solution is perfectly suited to protect end-of-life, discontinued, or no longer supported system

Full Control
The Full Control product allows the meticulous configuration of workstation protection, aligning with the corporate security policy.
Peripheral Monitoring and Control
- Enable or block peripherals based on their type or serial number
- Protection against infections caused by external peripherals (e.g., an infected USB drive)
Communication Control
- Quarantine infected PCs
- Connection to public Wi-Fi networks is only permitted when using the corporate VPN
- Manage access by whitelisting corporate Wi-Fi access points


Managing Access to the Organization’s Assets
Stormshield Endpoint Security enables the monitoring and auditing of all physical, logical, and network access (wireless network, sharing, USB peripherals, etc.) from terminal devices. The solution automatically determines authorized operations depending on the context (at the workplace, on mobile devices, activation of administrator rights, etc.).

Benefits – Key Features
Today, more than ever, businesses are forced to adapt to changing circumstances and use innovative solutions to monitor and protect their networks.
Note: Click on the related header text to expand or collapse the accordion panels.
3rd-generation vulnerability protection: a combination of multiple layers of defense makes every attack detectable.
The Core Defense module covers all essential security solutions, such as
- Application control
- Firewall
- HIPS (Host-based Intrusion Prevention System)
- NIPS (Network-based Intrusion Prevention System)
- etc
Full tracking of operations on any removable peripheral device.
Transparent disk encryption and centralized encryption policies based on files and folders.
Seamless management of the module through the Stormshield Endpoint Security management console.