Workload Protection
Tech Specs
Strongest Protection. Simple Licensing.
Sophos Intercept X delivers unparalleled protection from advanced attacks against your Windows and Linux server workloads. Benefit from comprehensive detection and response capabilities with an upgrade to Sophos XDR, or free up your staff with Sophos MDR, our 24/7 managed security service.
Intercept X Advanced for Server |
Intercept X Advanced
|
Intercept X Advanced
|
||
---|---|---|---|---|
THREAT SURFACE REDUCTION | ||||
Web Protection |
|
|||
Web Control |
|
|||
Download Reputation |
|
|||
Application Control |
|
|||
Peripheral Control |
|
|||
Data Loss Prevention |
|
|||
Server Lockdown (application whitelisting) |
|
|||
THREAT PREVENTION | ||||
Ransomware file protection (CryptoGuard) |
|
|||
Remote ransomware protection (CryptoGuard) Watch Video |
|
|||
Ransomware Master Boot Record (MBR) protection |
|
|||
Context-sensitive Defense: Adaptive Attack Protection Watch Video |
|
|||
Context-sensitive Defense: Estate-wide Critical Attack Warnings |
|
|||
Deep Learning AI-powered malware prevention |
|
|||
Anti-malware file scanning |
|
|||
Potentially Unwanted App (PUA) blocking |
|
|||
Live Protection cloud-lookups |
|
|||
Behavioral Analysis |
|
|||
Anti-Exploitation (60+ mitigations) |
|
|||
Application Lockdown |
|
|||
Anti-malware Scan Interface (AMSI) |
|
|||
Malicious Traffic Detection |
|
|||
Intrusion Prevention System (IPS) |
|
|||
File Integrity Monitoring |
|
Intercept X Advanced for Server |
Intercept X Advanced
|
Intercept X Advanced
|
||
---|---|---|---|---|
Extensive data on-device and in the cloud |
- |
|||
Cloud data retention |
- |
90 days |
90 days |
|
Additional cloud storage available |
- |
1 Year (Add-on) |
1 Year (Add-on) |
|
Rich on-device data for real-time insights |
- |
|
||
Compatible with non-Sophos solutions |
- |
|||
DETECTION | ||||
Suspicious event detections |
- |
|||
AI-powered prioritization of detections |
- |
|
||
Automatic MITRE Framework mapping |
- |
|
||
Linux container behavioral and exploit detections |
- |
|
||
Cross-product event correlation and analysis |
- |
|||
INVESTIGATION | ||||
RCA threat graphs |
|
|||
Automatic and manual case creation |
- |
|
||
Live Discover query tool |
- |
|
||
Scheduled queries |
- |
|
||
Simple (SQL-less) search |
- |
|
||
Forensic data export |
- |
|
||
On-demand Sophos X-Ops threat intelligence |
- |
|
||
RESPONSE | ||||
Automatic malware cleanup |
|
|||
Automatic ransomware file encryption roll-back |
|
|||
Automatic process termination |
|
|||
Synchronized Security: Automatic device isolation via Sophos Firewall |
|
|||
On-demand device isolation |
- |
|
||
Live Response remote terminal access |
- |
|
Intercept X Advanced for Server |
Intercept X Advanced
|
Intercept X Advanced
|
||
---|---|---|---|---|
24/7 threat monitoring and response |
- |
- |
||
Weekly and monthly reporting |
- |
- |
||
Health Check |
- |
- |
||
Expert-led threat hunting |
- |
- |
||
Threat containment |
- |
- |
||
Direct call-in support during active incidents |
- |
- |
||
Full-scale incident response: threats are fully eliminated |
- |
- |
||
Root cause analysis |
- |
- |
||
Dedicated Incident Response Lead |
- |
- |
||
$1M Breach Protection Warranty |
- |
- |
Try Sophos Workload Protection for Free
Sign up for a free no-obligation 30-day trial.