Sophos Endpoint
Tech Specs
Strongest Protection. Simple Licensing.
Sophos Endpoint powered by Intercept X delivers unparalleled protection against advanced attacks. Benefit from comprehensive detection and response capabilities with an upgrade to Sophos XDR, or free up your staff with Sophos MDR, our 24/7 managed security service.
Sophos Endpoint System Requirements:
Protect your iOS and Android devices with Sophos Mobile.
Windows Server and Linux devices require a subscription to Intercept X for Server.
Intercept X Advanced |
Intercept X Advanced
|
Intercept X Advanced with MDR Complete
|
||
---|---|---|---|---|
THREAT SURFACE REDUCTION | ||||
Web Protection |
|
|||
Web Control |
|
|||
Download Reputation |
|
|||
Application Control |
|
|||
Peripheral Control |
|
|||
Data Loss Prevention |
|
|||
Server Lockdown (application whitelisting) |
|
|||
Full Disk Encryption |
Add-on |
Add-on |
Add-on |
|
THREAT PREVENTION | ||||
Ransomware file protection (CryptoGuard) |
|
|||
Remote ransomware protection (CryptoGuard) Watch Video |
|
|||
Ransomware Master Boot Record (MBR) protection |
|
|||
Context-sensitive Defense: Adaptive Attack Protection Watch Video |
|
|||
Context-sensitive Defense: Estate-wide Critical Attack Warnings |
|
|||
Deep Learning AI-powered malware prevention |
|
|||
Anti-malware file scanning |
|
|||
Potentially Unwanted App (PUA) blocking |
|
|||
Live Protection cloud-lookups |
|
|||
Behavioral Analysis |
|
|||
Anti-Exploitation (60+ mitigations) |
|
|||
Application Lockdown |
|
|||
Anti-malware Scan Interface (AMSI) |
|
|||
Malicious Traffic Detection |
|
|||
Intrusion Prevention System (IPS) |
|
|||
File Integrity Monitoring (Servers) |
|
Intercept X Advanced |
Intercept X Advanced
|
Intercept X Advanced with MDR Complete
|
||
---|---|---|---|---|
Extensive data on-device and in the cloud |
- |
|||
Cloud data retention |
- |
90 days |
90 days |
|
Additional cloud storage available |
- |
1 Year (Add-on) |
1 Year (Add-on) |
|
Rich on-device data for real-time insights |
- |
|
||
Compatible with non-Sophos solutions |
- |
|||
DETECTION | ||||
Suspicious event detections |
- |
|||
AI-powered prioritization of detections |
- |
|
||
Automatic MITRE Framework mapping |
- |
|
||
Linux container behavioral and exploit detections |
- |
|
||
Cross-product event correlation and analysis |
- |
|||
INVESTIGATION | ||||
RCA threat graphs |
|
|||
Automatic and manual case creation |
- |
|
||
Live Discover query tool |
- |
|
||
Scheduled queries |
- |
|
||
Simple (SQL-less) search |
- |
|
||
Forensic data export |
- |
|
||
On-demand Sophos X-Ops threat intelligence |
- |
|
||
RESPONSE | ||||
Automatic malware cleanup |
|
|||
Automatic ransomware file encryption roll-back |
|
|||
Automatic process termination |
|
|||
Synchronized Security: Automatic device isolation via Sophos Firewall |
|
|||
On-demand device isolation |
- |
|
||
Live Response remote terminal access |
- |
|
Intercept X Advanced |
Intercept X Advanced
|
Intercept X Advanced with MDR Complete
|
||
---|---|---|---|---|
24/7 threat monitoring and response |
- |
- |
||
Weekly and monthly reporting |
- |
- |
||
Health Check |
- |
- |
||
Expert-led threat hunting |
- |
- |
||
Threat containment |
- |
- |
||
Direct call-in support during active incidents |
- |
- |
||
Full-scale incident response: threats are fully eliminated |
- |
- |
||
Root cause analysis |
- |
- |
||
Dedicated Incident Response Lead |
- |
- |
||
$1M Breach Protection Warranty |
- |
- |
Intercept X Advanced |
Intercept X Advanced
|
Intercept X Advanced with MDR Complete
|
||
---|---|---|---|---|
Integrated ZTNA agent |
|
|||
ZTNA access policy and control |
Optional |
Optional |
Optional |
|