Stormshield Datasheets

 

SES-RDe Datasheet

A single successful execution of a ransomware can have devastating consequences for an organization. SES-RDe recognizes this and has developed the ultimate barricade against the true ransomware threat – encryption of targeted data.  SES-RDe provides a unique Extension Whitelisting capability that limits the access to file extensions to specific applications (validated by executable signed certificate or checksum). This Extension Whitelisting barricade effective¬ly neuters the attempts of any ransomware to encrypt files while not disrupting the normal workflow of users and computers 

 

OVERVIEW: Next Generation Endpoint Protection

In order to provide Next Generation Endpoint Protection (NGEPP) effectiveness these new Stormshield protections are lightweight, work in the existing security ecosystem and work across platforms independent of a real-time connection. Learn how Stormshield continues to be a leader in providing proactive endpoint protection that leads the industry in applying next generation technology to provide unprecedented proactive security. 

 
advanced-detection.jpg

Advanced Detection

Learn how Stormshield brings this core foundational pillar of an NGEPP to life. This is the capability to monitor memory as to identify and stop malware that has slipped past other protection layers by using Memory Intrusion Prevention System technology (MIPS).

 
Risk Reduction.png

Risk Reduction

Learn how Stormshield reduces risk in the face of the advanced attacks that organizations are facing today by providing the granular tuning flexibility necessary to mitigate risk while maintaining computer usability for the workers and the systems they use. 

 
Malicious Process Defense.png

Malicious Process Defense

Learn how Stormshield monitors a range of actions that the malware will attempt, such as: APIs that can do keylogging, DLL injections, inappropriate processes trying to gain privilege, and dangerous behavior from drivers.

 
data protection.png

Data Protection

Learn how Stormshield enables broader and unhindered access to organizational data, enabling the employees themselves to define the rules around share their data with internal and external co-workers while maintaining IT control of the data.

 
prevention.png

Prevention

Learn how Stormshield uses a variety of defenses like a honeypot, monitoring of kernels and malwares that are executed by a trusted user to identify an attack and prevent it so that the authorized process will still run.

 
remediation.png

Remediation

Learn how Stormshield identifies presence of a threat and immediately and automatically quarantines the affected computer, placing limitations on functionality and connectivity correlated to the threat profile.

 
Threat Intell_Light Blue.png

Threat Intelligence

Learn about Stormshield's secure portal that includes detailed reports including all regular alert reports, analysis, trends and precautions related to all identified vulnerabilities and attacks across operating systems and a wide range of proven susceptible applications.

 

Stormshield Endpoint Security Brochure

 

Extended XP (Windows End of Life)

See how Stormshield's ExtendedXP solution provides for a longer migration runway and a more secure legacy path on Windows. Learn how to migrate off of an unsupported Microsoft OS on your timeframe – not Microsoft’s.

 

EWS2003 Effectiveness

What is the “proof” that EWS2003 provides protection superior to any other available in the industry?  This paper provides the data on the effectiveness of EWS2003 in protecting against vulnerabilities and stopping attacks without patches from Microsoft.  This paper includes actual statistical data on the attacks and how EWS2003 can provide assurance of the elimination of the Zero Day exposure for users of unsupported Microsoft products.

 

EWS2003 Data Sheet

Many organizations cannot move from WS2003 server and will continue to use it well past the July 2015 Microsoft support cutoff data due.  The most significant issue facing organizations with WS2003 Servers is operating securely despite the Zero Day forever scenario.  There is now an alternative that allows organizations to move from WS2003 on their own timeline and to be secure using WS2003 into the future: Extended Windows Server 2003 (EWS2003) from Stormshield. 

Stormshield Data Security for Cloud – Encryption Everywhere

Overview of the security solution that allows organizations to control the confidentiality of sensitive data while maximizing the benefits of working in the distributed mobile world of today.

 

Stormshield Data Security: 5 Misconceptions about Data Encryption

 

 

Stormshield Data Security: Overview Brochure

 

Stormshield Data Security: Datasheet

 

Stormshield Endpoint Security: Backoff Malware analysis and how to stop it

 

Stormshield Endpoint Security: Carbanak Malware analysis and how to stop it

 

Stormshield Endpoint Security: Cloud Version Overview

 

Stormshield Endpoint Security: Poseidon Malware analysis and how to stop it

 

Stormshield Endpoint Security: 5 Points – Stormshield Endpoint Security is more effective than an antivirus

 
Malicious_Process_Defense.png

Stormshield Cloud Services for Network, Data and Endpoints

 

Stormshield Management Center Datasheet

 

Whitepapers

Here you'll find a collection of whitepapers from expert security researchers and some of the world's most respected analyst firms.

WP.png

The Growing Threat of Ransomware: Analysis & Stopping it with SES-RDe Extension Whitelisting

Ransomware is a real and growing threat to organizations across the world – all industries, all sizes. The economics of ransomware (low operating costs, easy access to attack software, insignificant chance of legal jeopardy, victims paying the ransoms and large profits) ensure that the growth trend will continue. The current security protections that are being used by most organizations cannot stop ransomware from executing on the targeted computer and encrypting critical data and most of the new, seemingly innovative, techniques are also not providing real protection.

The only security product today that can assure organizations that ransomware will not encrypt and hold their data hos­tage is Stormshield – it is the leader in stopping ransomware from executing and also uniquely stops ransomware from achieving their goal: accessing and encrypting data.

Learn how to stop ransomwares on two levels:

• Level 1 - Stop the ransomware from executing on a computer

• Level 2 - Stop the ransomware from encrypting data with Extension Whitelisting

 

The Growing Threat of Ransomware: Analysis & Stopping it with SES-RDe Extension Whitelisting (ABSTRACT)

This white paper is an abstract of the full white paper (above) with a focus on the technical issues around understanding and stopping ransomware using the simple, yet highly effective, Extension Whitelisting technology.

 

Stormshield Next Generation White Paper

Organizations across the world are frustrated with the ineffectiveness of traditional endpoint security products and their inability to stop the increasing in volume and ever-more sophisticated attacks. As a result, a new generation of endpoint solutions has been created by innovative companies like Stormshield that can provide effective security. In order to provide NGEPP effectiveness these new Stormshield protections are lightweight, work in the existing security ecosystem and work across platforms independent of a real-time connection.

 

Stormshield Next Generation Endpoint and Data Protection White Paper

This white paper describes the challenges and shortcomings of traditional endpoint protection products and how they are ineffective against the “next generation” attacks.  Then, the foundational capabilities of what you should look for when you are evaluating a Next Generation Endpoint Protection platform are presented and analyzed.  Last, the Stormshield Next Generation Endpoint and Data Protection is presented and reviewed as an effective solution to stopping Next Generation attacks.

 

Organizations are facing “next generation” malware attacks like Rombertik. How can stormshield next generation endpoint protection make a difference?

This paper describes the challenges and shortcomings of traditional endpoint protection products and how they are ineffective against the “next generation” attacks. Then, the foundational capabilities of what you should look for when you are evaluating a Next Generation Endpoint Protection platform are presented and analyzed. A real representative of “Next Generation” attacks, Rombertik, is analyzed to illustrate the strengths and weaknesses of traditional and NGEPP security.attacks.

 

Organizations are facing “next generation” malware attacks like PhaseBot. How can stormshield next generation endpoint protection make a difference?

This paper describes the challenges and shortcomings of traditional endpoint protection products and how they are ineffective against the “next generation” attacks. Then, the foundational capabilities of what you should look for when you are evaluating a Next Generation Endpoint Protection platform are presented and analyzed. A real representative of “Next Generation” attacks, PhaseBot, is analyzed to illustrate the strengths and weaknesses of traditional and NGEPP security.attacks.

 

Protecting XP PCs with ExtendedXP After Microsoft Support Ends

A professional security analysis by Evolution demonstrating how Stormshield ExtendedXP provides organizations with the appropriate compensating controls to allow them to comply with the Payment Card Industry Data Security Standard (PCI DSS) after the Microsoft XP support ended.

 

Backoff - The Biggest Threat to Retail Data Ever

Retailers are under an unprecedented wave of IT security attacks. Despite significant investments in a multi-layered IT security system and IT security staff and being PCI DSS compliant, the headlines seem to have a new victim listed every week with larger and larger credit card data losses. The estimates are that Backoff alone has infected over 1,000 retail organizations and only a few hundred of these retailers are currently aware of it in their systems. Memory scraping is a real and significant threat to retail organizations and it is not being stopped by traditional security products. However there is an answer.

 

Bridging the Gap - A Look Inside MIPS (Memory Intrusion Prevention System)

The current PC and Server security standards are no longer adequate to stop the current generation of attackers. Despite your investments in security you are at greater risk than ever. The “Gap” is the time window between when an attack has breached your defenses and the days/weeks/months before you can determine that you have been attacked.

 

White Paper: SMOOTH TRANSITION TO A SECURE CLOUD

 

White Paper: VISION: MULTILAYER COLLABORATIVE SECURITY - COORDINATING PROTECTION SYSTEMS IN ORDER TO RAISE THE OVERALL LEVEL OF SECURITY AND COUNTER THE MOST SOPHISTICATED ATTACKS



Case Studies

Here you'll find a collection of customer success stories from a few of the clients Matrix and Stormshield work with.

Retail Convenience Store Needed to Keep Their PCI DSS Certification While Using WIN XP

This convenience store chain faced a security crisis – they could not move off of their XP PC based PoS system but Microsoft support was ending on April 8, 2014. Without the Microsoft patches their systems would not be secure and they would not be able to keep their PCI DSS certification. The security team were interested in identifying a security option that had a provable capacity to protect their XP PCs. Despite lofty XP protection claims by the leading security software vendors, upon closer examination, it became clear that they were using their standard protections like AV and whitelisting that did not stop the Zero Day risk and would not allow them to keep their PCI certification. 

 

Regional Grocery Store Chain

Regional Grocery Store Chain Discovers That their Existing Security Will Not Stop Memory Scraping/Keylogging Malware like Backoff. After extensive research, evaluations and product pilots the security team selected Stormshield Endpoint Security (SES) because it was the only product that they found that in live attack testing identified and stopped the memory scraping and keylogging malware that is the most significant risk to the retail industry.


Sample Vulnerability Assessment Reports

Here you'll find a collection of sample vulnerability assessment reports from the experts at Stormshield.

XP End of Life – 1st Year Advanced Vulnerability Threat and Protection Report
(April 2014 – March 2015)

The Stormshield Monitoring Services Team has researched and analyzed identified XP vulnerabilities and concluded that their customers using ExtendedXP were proactively protected against 148 out of 149 out of Critical/High Risk Microsoft Vulnerabilities and 446 out of 451 out of all Critical/High Risk applications identified and tested.


 

Videos

 

What is Extension Whitelisting? Learn how Extension Whitelisting eliminates the threat of ransomware 

According to the CyberEdge Group’s 2017 Cyberthreat Defense Report, “Sixty-one percent of organizations polled in a new survey say they’d been hit by a ransomware demand.” The report details a disturbing trend stating that successful cyberattacks affecting organizations have risen for a third-consecutive year (cyberattack stats from the report – year over year increase).
This webcast was presented in March 2017 to address ransomware security issues and to present a new innovation to stop ransomware from encrypting files: “EXTENSION WHITELISTING”.  During the webcast a Live “ransomware” attack was launched and executed to demonstrate this new “unique” ransomware defense, Extension Whitelisting.

.

 
 

Stormshield Endpoint Security Product Overview

This brief 2 minute video provides an overview of the Stormshield Endpoint Security product.

 
 
 

HIPS versus MIPS

Most organizations are using HIPS as part of their “defense in depth” security plan but the protections are limited due to the HIPS dependence on signatures.  There is no a new protection called MIPS that actually monitors memory and virtually eliminates the risk if Zero Day attacks.  This webcast explores how both HIPS and MIPS work, How attacks can get past HIPS defenses and how MIPS works to provide protection against attacks – including unknown and fileless attacks.his brief 2 minute video provides an overview of the Stormshield Endpoint Security product.

 
 

Proven Security Windows Server 2003 After July EoL

Even though Microsoft support for Windows Server 2003 is ending in July 2015 many organizations are in a position where they must continue to use these servers in production. If migrating to a supported operating system is not possible, organizations are facing serious security and regulatory compliance challenges. WS2003 from Stormshield can provide the missing protection and assure no exposure to the risk of Zero Day Forever exposure.  This webcast reviews the threats and risks of continuing to use WS2003 as well as mitigation strategies and how the Stormshield EWS2003 MIPS can replace the missing Microsoft patches.

 
 

Proven Security WS2003 After July EoL - FOR RETAIL BUSINESSES

Even though Microsoft support for Windows Server 2003 is ending in July 2015 many retail organizations are in a position where they must continue to use these servers in production in the store as back office servers.  As a result there is a significant security risk without the patches from Microsoft.  WS2003 from Stormshield can provide retailers with the missing protection and assure no exposure to the risk of Zero Day Forever exposure and will stop memory scraping malware.  This webcast reviews the threats and risks of continuing to use WS2003 for retailers as well as mitigation strategies and how the Stormshield EWS2003 MIPS can replace the missing Microsoft patches in retail servers.

 
 

Without a Trace: Fileless Malware Found in the Wild.
How does it work? How can you stop it?

The ultimate test for your organization's endpoint security strategy: How do you stop fileless malware? Can you? This WEBCAST analyzes the growing fileless malware threat: what it is, how it works, who is using them, the scope of the threat and how it can be stopped. The webcast uses a review of Phase Bot as an example of this new and growing generation of malware that is fileless.