About
Stormshield
The European cybersecurity choice
Our staff
Our ecosystem
Our history
Our sales offices
Our environmental approach
Join us
Contact
En
Fr
De
It
Es
Menu
Our difference
Our solutions & products
By industry
Aviation
Public Administration and Government
Critical communication
Defense and Military Organizations
Water Industry
Facility Management & Warehouse
Electric utilities
Navy
Health and Healthcare Facilities
Land transport
MSSPs and Other Service Providers
Close
All our products
Network security
Hardware firewalls
Virtual Appliances
Administration tools
Firmware
VPN Client
Features
Firewall comparison
Data security
Data encryption in Google Workspace
Data encryption in Gmail
Data encryption in Outlook
Data encryption in SharePoint and OneDrive
Data encryption on workstations
SDS range
Endpoint security
EDR
Protection for terminals
Protection for servers
Operational security
Features
Product range
Buy a solution Stormshield
Close
Close
Our support
With our partners
Services
Maintenance
Technical Support
Training
Professional Services
Threat Intelligence
Stormshield Academy
Close
Marketing documentation
Technical documentation
Cybersecurity, first steps
Close
Partner
Why become a partner
Join our network
All our partners
Supporting your customers
Close
News
Cybersecurity, by Stormshield
Cybersecurity, first steps
Corporate
Recruitment news
Partner news
Products & Services
Alert
Security Monitoring
Opinion articles
Technical posts
Close
Menu
Our difference
Our solutions & products
By industry
Aviation
Public Administration and Government
Critical communication
Defense and Military Organizations
Water Industry
Facility Management & Warehouse
Electric utilities
Navy
Health and Healthcare Facilities
Land transport
MSSPs and Other Service Providers
Close
All our products
Network security
Hardware firewalls
Virtual Appliances
Administration tools
Firmware
VPN Client
Features
Firewall comparison
Data security
Data encryption in Google Workspace
Data encryption in Gmail
Data encryption in Outlook
Data encryption in SharePoint and OneDrive
Data encryption on workstations
SDS range
Endpoint security
EDR
Protection for terminals
Protection for servers
Operational security
Features
Product range
Buy a solution Stormshield
Close
Close
Our support
With our partners
Services
Maintenance
Technical Support
Training
Professional Services
Threat Intelligence
Stormshield Academy
Close
Marketing documentation
Technical documentation
Cybersecurity, first steps
Close
Partner
Why become a partner
Join our network
All our partners
Supporting your customers
Close
News
Cybersecurity, by Stormshield
Cybersecurity, first steps
Corporate
Recruitment news
Partner news
Products & Services
Alert
Security Monitoring
Opinion articles
Technical posts
Close
Home
>
Resource Center
Resource Center
Find all our existing marketing documentation
Type security
Data (66)
Endpoint (91)
Network (180)
Training (15)
Type files
Brochure (2)
Case studies (7)
Datasheet (3)
Infographic (9)
Opinion article (27)
Solution Brief (1)
Training (2)
Video (4)
Webinar (3)
Whitepaper (8)
Product
Breach Fighter (1)
Data Connector (3)
Data Enterprise (10)
Data for Cloud & Mobility (8)
Data for Google Workspace (7)
SN2100 (2)
SN310 (1)
SN510 (1)
SN710 (1)
SNi20 (1)
SNi40 (2)
SNxr1200 (1)
Stormshield Data Security (32)
Stormshield Endpoint Security (12)
Stormshield Network Security (16)
Whitepaper | Cybersecurity for local authorities: a challenge that can’t wait the smart city
See
Will hospitals ever be free from cyber threats?
Download
Media | How “Le Monde” protects the work of journalists
Download
Cybersecurity and quantum: beware of simplifications
Download
Ransomware: what measures can be taken to counter the threat?
Download
Whitepaper | Cybersecurity: its central role in the ransomware industry
See
Ask Ze Expert: Threat Intelligence for your protection
See
Whitepaper | Cybersecurity in sensitive environments: immersion in the world of healthcare
See
Data Protection in the Cloud: discover Stormshield Data Security for Google Workspace
See
Yes, you can share sensitive data with the outside world
Download
Is cloud computing now simply a non-negotiable?
Download
Cybersecurity for industrial systems: the deployment challenge
Download
Cyberattack: when communication becomes a tactical crisis management tool
Download
Cybersecurity in OT: is industry ready?
Download
Which employees in companies are most at risk from cyberattacks?
Download
Do we have a firewall on board?
Download
Can european digital soverignty really exist?
Download
What are the cybersecurity trends for 2022?
Download
What is data encryption?
See
Datasheet SDS for Google Workspace – Stormshield Data Security
Download
Data encryption with SDS
See
Twenty years of cyber attacks on the water world
Download
Defence | How a leader in satellite operations protects its datacenters
Download
How do you define sensitive data?
Download
Attacks against cybersecurity providers and solutions: evidence of a trend?
Download
Can we really protect the smart city of tomorrow?
Download
Interactive website | Hospitals and cyber risk vectors
See
Public administrations | A new VPN infrastructure for an ever-changing network
Download
Zero Trust Network: should you (really) trust nothing?
Download
Datasheet SDS Enterprise – Stormshield Data Security
Download
The key role played by UX in cybersecurity
Download
What sort of cybersecurity is required for industrial systems in the industry 4.0 era?
Download
The paradox of USB drives in the industrial world
Download
One company in four reports having made cybersecurity compromises to ensure business continuity
Download
What progress has been made in terms of digital transformation?
Download
What are the main cybersecurity challenges in the years to come?
Download
What are the most vulnerable elements of cybersecurity?
Download
Whitepaper | Corporate digital transformation: putting maturity to the test?
See
How the IEC 61850 standard structures the electrical industry
Download
Healthcare | Regional hospital groups: how to optimise the security of unified information systems
Download
Water infrastructure: when states and cyber attacks rear their ugly heads
Download
Industry | Global visibility of information systems to improve cybersecurity
Download
Why do updates pose a problem in the cybersecurity world?
Download
The fusion of yesterday’s skills with tomorrow’s technologies
Download
Europe: a bastion of cybersecurity
Download
CISO: a profession on a knife edge
Download
Cybersecurity: should staff be restricted for their own good?
Download
Lessons learned on OT cybersecurity
See
Stormshield Data Security Range Brochure – SDS
Download
Stormshield Corporate Brochure
Download
Whitepaper | Corporate digital transformation: maturity and numerous questions
See
Easy Encryption is possible
Download
Protect the sensitive data you need to externally share
See
White paper | Data protection solutions: Toward deployment without constraints?
See
The hospital sector: critical systems, highly sensitive to cyberattacks
Download
Industry | Energy sector: a comprehensive solution to improve Data Privacy
Download
Industry | Data Protection: an agnostic solution to guarantee Data Privacy
Download
Top 5 myths about data encryption
Download
Whitepaper | Corporate digital transformation; where does security fit in?
See
Qualified security solutions: choosing a trusted solution
Download
Stormshield Data Connector with Intel McAfee DLP
Download
CSDE Course outline
Download
CSDA Course outline
Download
5 misconceptions about data encryption
Download
Datasheet Stormshield Data Connector – Stormshield Data Security
Download
Data in business: a security story with Stormshield.
See
Share on
[juiz_sps buttons="facebook, twitter, linkedin, mail"]
Looking for our technical documentation? Find our user manuals, installation guides and other release notes on our documentation site.
Check out the technical documentation website
Want to find out more? Fill in your preferences and keep up to date with our latest news
Update your email preferences