Stormshield

stormshield.com

Stormshield, a fully-owned subsidiary of Airbus CyberSecurity, offers innovative end-to-end security solutions to protect networks (Stormshield Network Security), computers (Stormshield Endpoint Security) and data (Stormshield Data Security).

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us

Events

Related News

ODIX JOINS THE MISA PROGRAM EXTENDING FILEWALL SECURITY LOGS TO MICROSOFT AZURE SENTINEL

prnewswire | September 30, 2020

news image

The Microsoft Intelligent Security Association was formed in 2018 to provide a community for premier cybersecurity companies to collaborate and better integrate their technologies with Microsoft Security products. By joining MISA, odix looks to advance its CDR solutions fluid integration into the range of widely used Microsoft software products.MISA uniquely fosters the critical relationships between innovative designers and developers creating cyber security products that integrate with Azure S...

Read More

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

PLAINID, THE AUTHORIZATION COMPANY™, ANNOUNCES THOUGHT LEADERSHIP COLLABORATION WITH THE CYBER HUT

PlainID | September 05, 2022

news image

PlainID, the Authorization Company™, announces today the release of "Build vs Buy: Guide to Evaluating Authorization" in collaboration with Simon Moffatt, founder and analyst of The Cyber Hut. The increase in remote work and digital commerce has created a proliferation of digital identities which demand secure, frictionless access to applications and the underlying data. The guide is designed to address and inform on key criteria when considering whe...

Read More

SOFTWARE SECURITY

PALO ALTO NETWORKS CALLS ON CYBERSECURITY INDUSTRY TO ADOPT ZTNA 2.0 -- ZERO TRUST WITH ZERO EXCEPTIONS

Palo Alto Networks | May 12, 2022

news image

Palo Alto Networks , the global cybersecurity leader, today urged the industry to move to Zero Trust Network Access 2.0 (ZTNA 2.0) — the foundation for a new era of secure access. ZTNA was developed as a replacement for virtual private networks (VPNs) when it became clear that most VPNs did not adequately scale and were overly permissive, but the first-generation ZTNA products (ZTNA 1.0) are too trusting and can put customers at significant risk. ZTNA 2.0 solves these problems by removing ...

Read More

CYBERTHREATS HOVERING OVER THE IMPENDING TAX SEASON

Infosecurity | February 19, 2020

news image

Cybercriminals are aggressively ju mping into the tax season," says Proofpoint's research. Attackers use tax-themed emails with enticingly titled malicious attachments.

  • Read More
  • news image

    ODIX JOINS THE MISA PROGRAM EXTENDING FILEWALL SECURITY LOGS TO MICROSOFT AZURE SENTINEL

    prnewswire | September 30, 2020

    The Microsoft Intelligent Security Association was formed in 2018 to provide a community for premier cybersecurity companies to collaborate and better integrate their technologies with Microsoft Security products. By joining MISA, odix looks to advance its CDR solutions fluid integration into the range of widely used Microsoft software products.MISA uniquely fosters the critical relationships between innovative designers and developers creating cyber security products that integrate with Azure S...

    Read More
    news image

    DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

    PLAINID, THE AUTHORIZATION COMPANY™, ANNOUNCES THOUGHT LEADERSHIP COLLABORATION WITH THE CYBER HUT

    PlainID | September 05, 2022

    PlainID, the Authorization Company™, announces today the release of "Build vs Buy: Guide to Evaluating Authorization" in collaboration with Simon Moffatt, founder and analyst of The Cyber Hut. The increase in remote work and digital commerce has created a proliferation of digital identities which demand secure, frictionless access to applications and the underlying data. The guide is designed to address and inform on key criteria when considering whe...

    Read More
    news image

    SOFTWARE SECURITY

    PALO ALTO NETWORKS CALLS ON CYBERSECURITY INDUSTRY TO ADOPT ZTNA 2.0 -- ZERO TRUST WITH ZERO EXCEPTIONS

    Palo Alto Networks | May 12, 2022

    Palo Alto Networks , the global cybersecurity leader, today urged the industry to move to Zero Trust Network Access 2.0 (ZTNA 2.0) — the foundation for a new era of secure access. ZTNA was developed as a replacement for virtual private networks (VPNs) when it became clear that most VPNs did not adequately scale and were overly permissive, but the first-generation ZTNA products (ZTNA 1.0) are too trusting and can put customers at significant risk. ZTNA 2.0 solves these problems by removing ...

    Read More
    news image

    CYBERTHREATS HOVERING OVER THE IMPENDING TAX SEASON

    Infosecurity | February 19, 2020

    Cybercriminals are aggressively ju mping into the tax season," says Proofpoint's research. Attackers use tax-themed emails with enticingly titled malicious attachments.

  • Read More
  • Resources

    Events

    C-Suite On Deck

    Responsive image

    Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

    Contact Us