Sophos Central Intercept X Advanced
44,05 € - 158,40 €
Treat yourself to total protection
With Sophos Central Intercept X Advanced, you get all the features of Sophos Central Endpoint Protection and Intercept X in one product.
On the one hand, you benefit from great functions such as "Peripheral Control" or "Malicious Traffic Detection", and at the same time you get a specialist on your computer with Intercept X, which uses a technology called "CryptoGuard" to detect as soon as malware tries to encrypt files on your computer and stops this process immediately. Files that have already been encrypted are then automatically restored, so there is no data loss.
Would you like to see the Sophos Central user interface live? Just go to central.sophos.com and use the demo account. Username: firstname.lastname@example.org / Password: Demo@sophos.com
The only truly comprehensive exploit prevention
Preventing the exploitation of security vulnerabilities.
Sophos Exploit Protection is a unique technology in Intercept X that prevents previously unknown or unpatched vulnerabilities in applications or operating system components from being exploited. With Intercept X, every application is monitored in the background and every action is checked to see if an exploit technique is being attempted.
If such a technique is detected, Exploit Prevention prevents a vulnerability from being exploited and restores the system to a secure state.
Root Cause Analysis
Find out the cause of the attack.
Imagine that, despite all the protective measures, malware has made it into your network. How could this happen? Thanks to the root cause analysis in Intercept X, this mystery can be uncovered with an impressive 360-degree analysis. The Root Cause Analysis Tool can tell you in great detail how the malware got into your network, which devices were infected and what steps you should take now.
With root cause analysis, you'll never be in the dark again if your network has been infected by an unknown malware.
Restores the system to its original state after an attack.
With Intercept X, thanks to technologies like CryptoGuard, you are protected against signatureless malware, such as ransomware, but after an attempted attack, your system still needs to be cleaned of all remnants. Since there is no cleaning routine for unknown malware, the entire processes of the executed malware must be forensically examined. This task is performed by Sophos Clean.
Sophos Clean performs a complete cleaning of the system after an attack has been stopped. It not only removes the malware itself, but replaces infected Windows resources with more secure original versions and ultimately restores the system to its original state, as it was before the infection.
Compare the feature set of Sophos’s various endpoint products to protect your clients. Not sure which protection best suits your business? We advise you free of charge and completely without obligation.
Intercept X EssentialsAbout the product
Intercept X AdvancedAbout the product
Intercept X Advanced with XDRAbout the product
Sophos MDR EssentialsAbout the product
Sophos MDR CompleteAbout the product
|Web Control/Category-based URL Filtering||-||✔||✔||✔||✔|
|Deep learning malware detection||✔||✔||✔||✔||✔|
|Anti-malware file scans||✔||✔||✔||✔||✔|
|Behavioral analysis before execution (HIPS)||✔||✔||✔||✔||✔|
|Blocking potent. Unwanted applications (PUAs)||✔||✔||✔||✔||✔|
|Intrusion Prevention System (IPS)||✔||✔||✔||✔||✔|
|Data Loss Prevention||✔||✔||✔||✔||✔|
|Runtime behavior analysis (HIPS)||✔||✔||✔||✔||✔|
|Antimalware Scan Interface (AMSI)||✔||✔||✔||✔||✔|
|Malicious Traffic Detection (MTD)||✔||✔||✔||✔||✔|
|Active Adversary Mitigations||✔||✔||✔||✔||✔|
|Ransomware File Protection (CryptoGuard)||✔||✔||✔||✔||✔|
|Disk and Boot Record Protection (WipeGuard)||✔||✔||✔||✔||✔|
|Man-in-the-Browser Protection (Safe Browsing)||✔||✔||✔||✔||✔|
|Improved application lockdown||✔||✔||✔||✔||✔|
|Live Discover (cross-environmental SQL queries for threat hunting and security compliance)||-||-||✔||✔||✔|
|SQL query library (pre-formulated, customizable queries)||-||-||✔||✔||✔|
|Data storage on hard disk (up to 90 days) with fast data access||-||-||✔||✔||✔|
|Cross-product data sources (e.g. firewall, e-mail)||-||-||✔||✔||✔|
|Sophos Data Lake (cloud data storage)||-||-||30 days||90 days||90 days|
|Threat cases (root cause analysis)||-||✔||✔||✔||✔|
|Deep Learning Malware Analysis||-||-||✔||✔||✔|
|Advanced threat data from SophosLabs on demand||-||-||✔||✔||✔|
|Export of forensic data||-||-||✔||✔||✔|
|Automated malware removal||✔||✔||✔||✔||✔|
|Synchronized Security Heartbeat||✔||✔||✔||✔||✔|
|Live Response (remote terminal access for further analysis and Response measures)||-||-||✔||✔||✔|
|On-Demand Endpoint Isolation||-||-||✔||✔||✔|
|With one click "Remove and block||-||-||✔||✔||✔|
|24/7 evidence-based threat hunting||-||-||-||✔||✔|
|Compatible with third-party security tools||-||-||-||✔||✔|
|Security Health Checks||-||-||-||✔||✔|
|Sophos MDR ThreatCast||-||-||-||✔||✔|
|Stop and contain threats||-||-||-||✔||✔|
|Direct telephone support for incidents||-||-||-||✔||✔|
|24/7 circumstantial threat hunting||-||-||-||-||✔|
|Proactive Security Posture Management||-||-||-||-||✔|
|Full incident response: complete neutralization of Threats||-||-||-||-||✔|
|Root cause analysis – and how can renewed attacks be prevented?||-||-||-||-||✔|
|Dedicated contact person at the Incident Response Team||-||-||-||-||✔|
Deepen your knowledge and learn more about “Sophos Central Endpoint Protection”
Help with purchase
Are there any questions about the product?
It is better to ask again before buying, before you end up holding the wrong product in your hands.Ask question