18 - 20 October 2016 // Nuremberg

Posting print layout

What information should be shown in the print layout?

Create print layout
Zoom product LOGO_Endpoint Protection

Endpoint Protection

LOGO_Endpoint Protection

Endpoint Protection

Request information Request information

Contact us

Please enter your personal information and desired appointment. You can also leave us a message.

Your personal information

Your message for us

Desired appointment during the exhibition

* Compulsory fields you must fill in.
Send
Your message has been sent.

Would you like to use more facilities and advantages of the platform? Then please log in – or register here.

An error has occurred.

Attacks these days have become increasingly targeted and sophisticated in order to bypass conventional protection systems. They use advanced infection techniques such as the exploitation of unknown vulnerabilities and implement complex mechanisms to go undetected in the operating system.

Relying on a unique system analysis technology, Stormshield Endpoint Security is the only solution that provides proven protection against these sophisticated attacks.


Stormshield Endpoint Security Full Protect

The Full Protect product utilizes a unique proactive signature-less technology  which protects efficiently against unknown and sophisticated attacks.

Protection from unknown threats

  • Protect your computers against the exploitation of vulnerabilities on the operating system and the exploitation of vulnerabilities on third-party applications

  • Control integrity of the system’s memory

Protection for terminals, workstations & servers

  • Detect of malicious programs through behavioral analysis and reinforcement of the operating system

  • Manage your workstations thanks to application control (whitelisting or blacklisting), granular control over user privileges and granular control over the exfiltration of sensitive data

Intrusion prevention

  • Secure your computers with a firewall and network intrusion prevention

Stormshield Endpoint Security Full Control

The Full Control product allows the granular definition of workstation protection in a context that complies with the corporate security policy.

Peripheral device monitoring and audit

  • Allow or block peripheral devices according to their type or serial number

  • Protect against infection by external peripheral devices (e.g. by an infected USB key)

Communication control

  • Quarantine infected PCs

  • Authorize public Wi-Fi hotspots only when your corporate VPN is used

  • Manage access with the whitelisting of corporate Wi-Fi access points

Data Protection

LOGO_Datenschutz

Stormshield Network Protection

LOGO_Stormshield Netzwerkschutz

There are no entries in your notes.

Show notes

Order your it-sa ticket online in our TicketShop. Save your ticket now!



top

The selected entry has been placed in your notes!

If you register you can save your notes permanently and access all entries even when underway – via laptop or tablet.

You can register an account here to save your settings in the Exhibitors and Products Database and as well as in the Supporting Programme.The registration is not for the TicketShop and ExhibitorShop.

Register now

Your advantages at a glance:

  • Advantage Save your notes permanently. Use the instant access to exhibitors or products saved – mobile too, anytime and anywhere – incl. memo function.
  • Advantage The optional newsletter gives you regular up-to-date information about new exhibitors and products – matched to your interests.
  • Advantage Call up your notes mobile too! Simply log in and access them at anytime.