Sophos Central Intercept X Essentials for servers – Powerful protection with a lower price tag!
Intercept X Essentials for Servers is the new entry-level server protection for small businesses at an affordable price. It offers the same protections as Intercept X Advanced for servers with deep-learning AI, anti-ransomware and anti-exploit capabilities, but without all the control and management features, which you probably won’t miss if your organization is small or perceives low risk.
The following features are not included in Intercept X Essentials for Servers
- Multiple policies – customers must use the base policy.
- Peripheral Control – Customers cannot set users to connect only certain devices.
- Controlled updates – Customers cannot delay updates or decide when to deploy them.
- Web Control – Customers cannot block access to inappropriate websites.
- Application Control – Customers cannot control what types of applications are allowed to be installed and run.
- Threat Cases – Customers do not have access to threat cases that show what happened during an incident.
- File Integrity Monitoring (FIM) – Customers cannot monitor critical files on their servers for tampering attempts.
- Cloud Security Posture Management (CSPM) – Customers cannot see their entire cloud environment, such as serverless functions and databases.
- Server Lockdown – Customers cannot lock down their servers to a base configuration.
If you need multiple configurable policies or a higher level of manageability with Peripheral Control, Web Control, Application Control, etc., consider purchasing Intercept X Advanced for Server instead.
Technical Specifications
Compare the feature set of Sophos’s various Server to protect your infrastructure. Not sure which protection best suits your business? We can advise you free of charge and with no obligation.
Multiple guidelines | - | ✔ | ✔ | ✔ | ✔ |
Controlled updates | - | ✔ | ✔ | ✔ | ✔ |
Web Security | ✔ | ✔ | ✔ | ✔ | ✔ |
Download reputation | ✔ | ✔ | ✔ | ✔ | ✔ |
Web Control/Category-based URL Blocking | - | ✔ | ✔ | ✔ | ✔ |
Peripheral control | - | ✔ | ✔ | ✔ | ✔ |
Application Control | - | ✔ | ✔ | ✔ | ✔ |
Application Whitelisting (Server Lockdown) | - | ✔ | ✔ | ✔ | ✔ |
Deep Learning Malware Detection | ✔ | ✔ | ✔ | ✔ | ✔ |
Anti-malware file scans | ✔ | ✔ | ✔ | ✔ | ✔ |
Live Protection | ✔ | ✔ | ✔ | ✔ | ✔ |
Behavioral analysis before execution (HIPS) | ✔ | ✔ | ✔ | ✔ | ✔ |
Blocking potent. Unwanted applications (PUAs) | ✔ | ✔ | ✔ | ✔ | ✔ |
Intrusion Prevention System | ✔ | ✔ | ✔ | ✔ | ✔ |
Data Loss Prevention | ✔ | ✔ | ✔ | ✔ | ✔ |
Runtime behavior analysis (HIPS) | ✔ | ✔ | ✔ | ✔ | ✔ |
Antimalware Scan Interface (AMSI) | ✔ | ✔ | ✔ | ✔ | ✔ |
Malicious Traffic Detection (MTD) | ✔ | ✔ | ✔ | ✔ | ✔ |
Exploit Prevention | ✔ | ✔ | ✔ | ✔ | ✔ |
Active Adversary Mitigations | ✔ | ✔ | ✔ | ✔ | ✔ |
Ransomware File Protection (CryptoGuard) | ✔ | ✔ | ✔ | ✔ | ✔ |
Disk and Boot Record Protection (WipeGuard) | ✔ | ✔ | ✔ | ✔ | ✔ |
Man-in-the-Browser Protection (Safe Browsing) | ✔ | ✔ | ✔ | ✔ | ✔ |
Enhanced Application Lockdown | ✔ | ✔ | ✔ | ✔ | ✔ |
Live Discover (cross-environmental SQL queries for threat hunting and security compliance) | - | - | ✔ | ✔ | ✔ |
SQL query library (pre-formulated, customizable queries) | - | - | ✔ | ✔ | ✔ |
Suspicious event detection and prioritization | - | - | ✔ | ✔ | ✔ |
Data storage on hard disk (up to 90 days) with fast data access | - | - | ✔ | ✔ | ✔ |
Cross-product data sources (e.g. firewall, e-mail) | - | - | ✔ | ✔ | ✔ |
Cross-product queries | - | - | ✔ | ✔ | ✔ |
Sophos Data Lake (cloud data storage) | - | - | 30 days | 30 days | 30 days |
Scheduled queries | - | - | ✔ | ✔ | ✔ |
Threat cases (root cause analysis) | - | ✔ | ✔ | ✔ | ✔ |
Deep Learning Malware Analysis | - | - | ✔ | ✔ | ✔ |
Advanced threat data from SophosLabs on demand | - | - | ✔ | ✔ | ✔ |
Export of forensic data | - | - | ✔ | ✔ | ✔ |
Automated malware removal | ✔ | ✔ | ✔ | ✔ | ✔ |
Synchronized Security Heartbeat | ✔ | ✔ | ✔ | ✔ | ✔ |
Sophos Clean | ✔ | ✔ | ✔ | ✔ | ✔ |
Remote terminal access (remote analysis and response) | - | - | ✔ | ✔ | ✔ |
On-demand server isolation | - | - | ✔ | ✔ | ✔ |
With one click "Remove and block | - | - | ✔ | ✔ | ✔ |
Cloud Workload Protection (Amazon Web Services, Microsoft Azure, Google Cloud Platform) | ✔ | ✔ | ✔ | ✔ | ✔ |
Synchronized Application Control (transparency over applications) | ✔ | ✔ | ✔ | ✔ | ✔ |
Management of your security status in the cloud (cloud hosts monitor and protect, serverless functions, S3 buckets, etc.). | - | ✔ | ✔ | ✔ | ✔ |
Server-specific policy management | ✔ | ✔ | ✔ | ✔ | ✔ |
Update cache and message relay | ✔ | ✔ | ✔ | ✔ | ✔ |
Automatic scan exceptions | ✔ | ✔ | ✔ | ✔ | ✔ |
File Integrity Monitoring | - | - | ✔ | ✔ | ✔ |
24/7 evidence-based threat hunting | - | - | - | ✔ | ✔ |
Compatible with third-party security tools | - | - | - | ✔ | ✔ |
Security Health Checks | - | - | - | ✔ | ✔ |
Activity Reports | - | - | - | ✔ | ✔ |
Sophos MDR ThreatCast | - | - | - | ✔ | ✔ |
Attack detection | - | - | - | ✔ | ✔ |
Stop and contain threats | - | - | - | ✔ | ✔ |
Direct telephone support for incidents | - | - | - | ✔ | ✔ |
24/7 circumstantial threat hunting | - | - | - | - | ✔ |
Proactive Security Posture Improvement | - | - | - | - | ✔ |
Full incident response: complete neutralization of Threats | - | - | - | - | ✔ |
Root cause analysis – and how can renewed attacks be prevented? | - | - | - | - | ✔ |
Dedicated contact person at the Incident Response Team | - | - | - | - | ✔ |
Resources
- Sophos Central – Datasheet
- Sophos Managed Detection and Response (MDR) – Datasheet
- Sophos Managed Detection and Response (MDR) – Buyer's Guide
- Extended Detection and Response (XDR) – Beginner’s Guide
- Sophos XDR – Licensing Guide
- Sophos XDR – Use Cases
- Sophos Network Detection and Response (NDR) – Datasheet
- Sophos Network Detection and Response (NDR) – Solution Brief
- Sophos Server Protection – Buyer's Guide
- Cybersecurity System – Buyer's Guide
- Sophos Intercept X for Server – Datasheet
- Sophos Intercept X – Solution Brief
- Sophos Protection for Linux
- Sophos Intercept X Deep Learning
- FAQs zu Intercept X Essentials und Intercept X Essentials for Server
- Sophos Intercept X, XDR and MTR Feature Overview