Treat yourself to total protection
Sophos Central Intercept X Advanced is a combination of Sophos Central Endpoint Protection and Intercept X products.
With Sophos Central Intercept X Advanced, you get all the features of Sophos Central Endpoint Protection and Intercept X in one product.
On the one hand, you benefit from great functions such as "Peripheral Control" or "Malicious Traffic Detection", and at the same time you get a specialist on your computer with Intercept X, which uses a technology called "CryptoGuard" to detect as soon as malware tries to encrypt files on your computer and stops this process immediately. Files that have already been encrypted are then automatically restored, so there is no data loss.
Would you like to see the Sophos Central user interface live? Just go to central.sophos.com and use the demo account. Username: demo@sophos.com / Password: Demo@sophos.com
The only truly comprehensive exploit prevention
Preventing the exploitation of security vulnerabilities.
Sophos Exploit Protection is a unique technology in Intercept X that prevents previously unknown or unpatched vulnerabilities in applications or operating system components from being exploited. With Intercept X, every application is monitored in the background and every action is checked to see if an exploit technique is being attempted.
If such a technique is detected, Exploit Prevention prevents a vulnerability from being exploited and restores the system to a secure state.
Root Cause Analysis
Find out the cause of the attack.
Imagine that, despite all the protective measures, malware has made it into your network. How could this happen? Thanks to the root cause analysis in Intercept X, this mystery can be uncovered with an impressive 360-degree analysis. The Root Cause Analysis Tool can tell you in great detail how the malware got into your network, which devices were infected and what steps you should take now.
With root cause analysis, you'll never be in the dark again if your network has been infected by an unknown malware.
Sophos Clean
Restores the system to its original state after an attack.
With Intercept X, thanks to technologies like CryptoGuard, you are protected against signatureless malware, such as ransomware, but after an attempted attack, your system still needs to be cleaned of all remnants. Since there is no cleaning routine for unknown malware, the entire processes of the executed malware must be forensically examined. This task is performed by Sophos Clean.
Sophos Clean performs a complete cleaning of the system after an attack has been stopped. It not only removes the malware itself, but replaces infected Windows resources with more secure original versions and ultimately restores the system to its original state, as it was before the infection.
Technical Specifications
Compare the feature set of Sophos’s various endpoint products to protect your clients. Not sure which protection best suits your business? We advise you free of charge and completely without obligation.
Multiple guidelines | - | ✔ | ✔ | ✔ | ✔ |
Controlled updates | - | ✔ | ✔ | ✔ | ✔ |
Application Control | - | ✔ | ✔ | ✔ | ✔ |
Peripheral control | - | ✔ | ✔ | ✔ | ✔ |
Web Control/Category-based URL Filtering | - | ✔ | ✔ | ✔ | ✔ |
Download reputation | ✔ | ✔ | ✔ | ✔ | ✔ |
Web Security | ✔ | ✔ | ✔ | ✔ | ✔ |
Deep learning malware detection | ✔ | ✔ | ✔ | ✔ | ✔ |
Anti-malware file scans | ✔ | ✔ | ✔ | ✔ | ✔ |
Live Protection | ✔ | ✔ | ✔ | ✔ | ✔ |
Behavioral analysis before execution (HIPS) | ✔ | ✔ | ✔ | ✔ | ✔ |
Blocking potent. Unwanted applications (PUAs) | ✔ | ✔ | ✔ | ✔ | ✔ |
Intrusion Prevention System (IPS) | ✔ | ✔ | ✔ | ✔ | ✔ |
Data Loss Prevention | ✔ | ✔ | ✔ | ✔ | ✔ |
Runtime behavior analysis (HIPS) | ✔ | ✔ | ✔ | ✔ | ✔ |
Antimalware Scan Interface (AMSI) | ✔ | ✔ | ✔ | ✔ | ✔ |
Malicious Traffic Detection (MTD) | ✔ | ✔ | ✔ | ✔ | ✔ |
Exploit Prevention | ✔ | ✔ | ✔ | ✔ | ✔ |
Active Adversary Mitigations | ✔ | ✔ | ✔ | ✔ | ✔ |
Ransomware File Protection (CryptoGuard) | ✔ | ✔ | ✔ | ✔ | ✔ |
Disk and Boot Record Protection (WipeGuard) | ✔ | ✔ | ✔ | ✔ | ✔ |
Man-in-the-Browser Protection (Safe Browsing) | ✔ | ✔ | ✔ | ✔ | ✔ |
Improved application lockdown | ✔ | ✔ | ✔ | ✔ | ✔ |
Live Discover (cross-environmental SQL queries for threat hunting and security compliance) | - | - | ✔ | ✔ | ✔ |
SQL query library (pre-formulated, customizable queries) | - | - | ✔ | ✔ | ✔ |
Data storage on hard disk (up to 90 days) with fast data access | - | - | ✔ | ✔ | ✔ |
Cross-product data sources (e.g. firewall, e-mail) | - | - | ✔ | ✔ | ✔ |
Cross-product queries | - | - | ✔ | ✔ | ✔ |
Sophos Data Lake (cloud data storage) | - | - | 30 days | 90 days | 90 days |
Scheduled queries | - | - | ✔ | ✔ | ✔ |
Threat cases (root cause analysis) | - | ✔ | ✔ | ✔ | ✔ |
Deep Learning Malware Analysis | - | - | ✔ | ✔ | ✔ |
Advanced threat data from SophosLabs on demand | - | - | ✔ | ✔ | ✔ |
Export of forensic data | - | - | ✔ | ✔ | ✔ |
Automated malware removal | ✔ | ✔ | ✔ | ✔ | ✔ |
Synchronized Security Heartbeat | ✔ | ✔ | ✔ | ✔ | ✔ |
Sophos Clean | ✔ | ✔ | ✔ | ✔ | ✔ |
Live Response (remote terminal access for further analysis and Response measures) | - | - | ✔ | ✔ | ✔ |
On-Demand Endpoint Isolation | - | - | ✔ | ✔ | ✔ |
With one click "Remove and block | - | - | ✔ | ✔ | ✔ |
24/7 evidence-based threat hunting | - | - | - | ✔ | ✔ |
Compatible with third-party security tools | - | - | - | ✔ | ✔ |
Security Health Checks | - | - | - | ✔ | ✔ |
Activity Reports | - | - | - | ✔ | ✔ |
Sophos MDR ThreatCast | - | - | - | ✔ | ✔ |
Attack detection | - | - | - | ✔ | ✔ |
Stop and contain threats | - | - | - | ✔ | ✔ |
Direct telephone support for incidents | - | - | - | ✔ | ✔ |
24/7 circumstantial threat hunting | - | - | - | - | ✔ |
Proactive Security Posture Management | - | - | - | - | ✔ |
Full incident response: complete neutralization of Threats | - | - | - | - | ✔ |
Root cause analysis – and how can renewed attacks be prevented? | - | - | - | - | ✔ |
Dedicated contact person at the Incident Response Team | - | - | - | - | ✔ |
Resources
Sophos Managed Detection and Response (MDR) – Datasheet
Sophos Managed Detection and Response (MDR) – Buyer's Guide
Sophos Breach Protection Warranty – Datasheet
Sophos Rapid Response – Datasheet
Extended Detection and Response (XDR) – Beginner’s Guide
Sophos Network Detection and Response (NDR) – Datasheet
Sophos Network Detection and Response (NDR) – Solution Brief
Sophos Endpoint Security – Buyer's Guide
Cybersecurity System – Buyer's Guide
Sophos Intercept X – Datasheet
Sophos Intercept X – Solution Brief
Sophos Intercept X Deep Learning
FAQs zu Intercept X Essentials und Intercept X Essentials for Server