Sophos Central Intercept X Advanced for servers

SKU: sophos-central-intercept-x-advanced-for-server Category:

37.42 CHF - 314.39 CHFplus 7.7% VATgross price: 40.30 CHF - 338.60 CHF

Protect your servers from malware and ransomware

With Sophos Central Intercept X for Server, you benefit from all the features of Central Server Protection, plus all the new features of Intercept X. With it, you equip your servers with the maximum protection Sophos has to offer for servers. Included in Intercept X is “CryptoGuard”, the breakthrough protection against ransomware, which allows you to protect your server environment from encryption Trojans.

Try Sophos Central for free!

Create a free Sophos Central account now and try all products, including Central Intercept X Advanced for servers for 30 days without obligation. If you are convinced of the solution after your test period, you can easily order the licenses from us.

Server Lockdown

Server Lockdown brings you the benefit of one-click whitelisting. Once you enable lockdown for your server, it will first check if the system is threat-free. After that, it is necessary to record the current state of your server and create the whitelisting. All this happens in the background and does not affect the availability of your server. After one to two hours, indexing is usually complete and the system is in lockdown mode. From this point on, no software, including malware, can be installed on the system.

After lockdown, you can define so-called “update applications”. For example, an update of an ERP can be such an update application. Windows updates are already automatically whitelisted and allowed to update system components of Windows.


A classic antivirus doesn’t stand a chance against encryption Trojans such as Petya, WannaCry or Locky. With CryptoGuard you get a technology on your server that detects when a ransomware tries to encrypt files on your server and stops this process immediately. Already encrypted files are automatically restored afterwards, so that no data loss occurs.

CryptoGuard is the ideal complement to classic virus detection and is included as an additional layer of protection in Sophos intercept X for Server.

Root Cause Analysis

Find out the cause of the attack.

Imagine that, despite all the protective measures, malware has made it into your network. How could this happen? Thanks to the root cause analysis in Intercept X, this secret can be uncovered with an impressive 360-degree analysis. The Root Cause Analysis Tool can tell you in great detail how the malware got into the network, which devices were infected and what steps you should take now.

With root cause analysis, you’ll never be in the dark again if your network has been infected by an unknown malware.

Exploit Protection

Preventing the exploitation of security vulnerabilities.

Sophos Exploit Protection is a unique technology in Intercept X that prevents previously unknown or unpatched vulnerabilities in applications or operating system components from being exploited. With Intercept X, every application is monitored in the background and every action is checked to see if an exploit technique is being attempted.

If such a technique is detected, Exploit Prevention prevents a vulnerability from being exploited and restores the system to a secure state.

Technical Specifications

Compare the feature set of Sophos’s various Server to protect your infrastructure.
Not sure which protection best suits your business?
We can advise you free of charge and with no obligation.

Intercept X Essentials for Server

Sophos Central Intercept X Essentials for Server About the product

Intercept X Advanced for Server

Sophos Central Intercept X Advanced for servers About the product

Intercept X Advanced for Server with XDR

Sophos Central Intercept X Advanced for servers with XDR About the product

Intercept X Advanced with XDR and MTR Standard

Sophos Central Intercept X Advanced for servers with XDR and MTR Standard About the product

Intercept X Advanced with XDR and MTR Advanced

Sophos Central Intercept X Advanced for servers with XDR and MTR Advanced About the product
Multiple guidelines -
Controlled updates -
Web Security
Download reputation
Web Control/Category-based URL Blocking -
Peripheral control -
Application Control -
Application Whitelisting (Server Lockdown) -
Deep Learning Malware Detection
Anti-malware file scans
Live Protection
Behavioral analysis before execution (HIPS)
Blocking potent. Unwanted applications (PUAs)
Intrusion Prevention System
Data Loss Prevention
Runtime behavior analysis (HIPS)
Antimalware Scan Interface (AMSI)
Malicious Traffic Detection (MTD)
Exploit Prevention
Active Adversary Mitigations
Ransomware File Protection (CryptoGuard)
Disk and Boot Record Protection (WipeGuard)
Man-in-the-Browser Protection (Safe Browsing)
Enhanced Application Lockdown
Live Discover (cross-environmental SQL queries for threat hunting and security compliance) - -
SQL query library (pre-formulated, customizable queries) - -
Suspicious event detection and prioritization - -
Data storage on hard disk (up to 90 days) with fast data access - -
Cross-product data sources (e.g. firewall, e-mail) - -
Cross-product queries - -
Sophos Data Lake (cloud data storage) - - 30 days 30 days 30 days
Scheduled queries - -
Threat cases (root cause analysis) -
Deep Learning Malware Analysis - -
Advanced threat data from SophosLabs on demand - -
Export of forensic data - -
Automated malware removal
Synchronized Security Heartbeat
Sophos Clean
Remote terminal access (remote analysis and response) - -
On-demand server isolation - -
With one click "Remove and block - -
Cloud Workload Protection (Amazon Web Services, Microsoft Azure, Google Cloud Platform)
Synchronized Application Control (transparency over applications)
Management of your security status in the cloud (cloud hosts monitor and protect, serverless functions, S3 buckets, etc.). -
Server-specific policy management
Update cache and message relay
Automatic scan exceptions
File Integrity Monitoring - -
24/7 evidence-based threat hunting - - -
Security Health Checks - - -
Data storage - - -
Activity Reports - - -
Attack detection - - -
Threat elimination and cleanup - - -
24/7 circumstantial threat hunting - - - -
Proactive Security Posture Improvement - - - -
Direct telephone support - - - -
Threat Response Team Lead - - - -

Shopping Cart