Sophos Central Intercept X Essentials for Server

SKU: sophos-central-intercept-x-essentials-for-server Category:

20.60 CHF - 157.10 CHF

Sophos Central Intercept X Essentials for servers – Powerful protection with a lower price tag!

Intercept X Essentials for Servers is the new entry-level server protection for small businesses at an affordable price. It offers the same protections as Intercept X Advanced for servers with deep-learning AI, anti-ransomware and anti-exploit capabilities, but without all the control and management features, which you probably won’t miss if your organization is small or perceives low risk.

The following features are not included in Intercept X Essentials for Servers

  • Multiple policies – customers must use the base policy.
  • Peripheral Control – Customers cannot set users to connect only certain devices.
  • Controlled updates – Customers cannot delay updates or decide when to deploy them.
  • Web Control – Customers cannot block access to inappropriate websites.
  • Application Control – Customers cannot control what types of applications are allowed to be installed and run.
  • Threat Cases – Customers do not have access to threat cases that show what happened during an incident.
  • File Integrity Monitoring (FIM) – Customers cannot monitor critical files on their servers for tampering attempts.
  • Cloud Security Posture Management (CSPM) – Customers cannot see their entire cloud environment, such as serverless functions and databases.
  • Server Lockdown – Customers cannot lock down their servers to a base configuration.

If you need multiple configurable policies or a higher level of manageability with Peripheral Control, Web Control, Application Control, etc., consider purchasing Intercept X Advanced for Server instead.

Technical specifications

Intercept X Advanced for Server Intercept X Advanced for Server with EDR Intercept X Advanced for servers with XDR¹ Intercept X Advanced for servers with MTR Standard Intercept X Advanced for servers with MTR Advanced
Web Security
Download reputation
Web Control/Category-based URL Blocking
Peripheral control
Application Control
Application Whitelisting (Server Lockdown)
"Deep Learning" malware detection
Anti-malware file scans
Live Protection
Behavioral analysis before execution (HIPS)
Blocking pot. unwanted applications (PUAs)
Intrusion Prevention System
Data Loss Prevention
Runtime behavior analysis (HIPS)
Antimalware Scan Interface (AMSI)
Malicious Traffic Detection (MTD)
Exploit Prevention (details on page 5)
Active Adversary Mitigations (details on page 5)
Ransomware File Protection (CryptoGuard)
Disk and Boot Record Protection (WipeGuard)
Man-in-the-Browser Protection (Safe Browsing)
Enhanced Application Lockdown
Live Discover (cross-environment SQL queries to the Threat Hunting and for security compliance). -
SQL query library (pre-formulated, customizable queries) -
Suspicious event detection and prioritization -
Data storage on hard disk (up to 90 days) with fast data access -
Cross-product data sources (e.g. firewall, e-mail) - - - see PDF
Cross-product queries - - - see PDF
Sophos Data Lake (cloud data storage) - 7 days 30 days see PDF see PDF
Scheduled queries -
Threat cases (root cause analysis)
Deep Learning Malware Analysis -
Advanced threat data from SophosLabs on demand -
Export of forensic data -
Automated malware removal
Synchronized Security Heartbeat
Sophos Clean
Remote terminal access (remote analysis and response) -
On-demand server isolation -
With one click "Remove and block -
Cloud Workload Protection (Amazon Web Services, Microsoft Azure, Google Cloud Platform)
Synchronized Application Control (Transparency via applications)
Managing your security status in the Cloud (Monitor and protect cloud hosts, serverless functions, S3 buckets etc.)
Server-specific policy management
Update cache and message relay
Automatic scan exceptions
File Integrity Monitoring
24/7 evidence-based threat hunting - - -
Security Health Checks - - -
Data storage - - -
Activity Reports - - -
Attack detection - - -
Threat elimination and cleanup - - -
24/7 circumstantial threat hunting - - - -
Proactive Security Posture Improvement - - - -
Direct telephone support - - - -
Threat Response Team Lead - - - -