Sophos Central Intercept X Essentials - Powerful protection with a lower price tag!
Intercept X Essentials is the new entry-level endpoint protection for small businesses at an affordable price. It offers the same protections as Intercept X Advanced with deep-learning AI, anti-ransomware, and anti-exploit capabilities, but without all the control and management features, which you probably won't miss if your organization is small or perceives low risk.
The following features are not included in Intercept X Essentials
- Multiple policies - customers must use the base policy.
- Peripheral Control - Customers cannot set users to connect only certain devices.
- Controlled updates - Customers cannot delay updates or decide when to deploy them.
- Web Control - Customers cannot block access to inappropriate websites.
- Application Control - Customers cannot control what types of applications are allowed to be installed and run.
- Threat Cases - Customers do not have access to threat cases that show what happened during an incident.
If you need multiple configurable policies or a higher level of manageability with Peripheral Control, Web Control, Application Control, etc., consider purchasing Intercept X Advanced instead.
Technical Specifications
Compare the feature set of Sophos’s various endpoint products to protect your clients. Not sure which protection best suits your business? We advise you free of charge and completely without obligation.
Multiple guidelines | - | ✔ | ✔ | ✔ | ✔ |
Controlled updates | - | ✔ | ✔ | ✔ | ✔ |
Application Control | - | ✔ | ✔ | ✔ | ✔ |
Peripheral control | - | ✔ | ✔ | ✔ | ✔ |
Web Control/Category-based URL Filtering | - | ✔ | ✔ | ✔ | ✔ |
Download reputation | ✔ | ✔ | ✔ | ✔ | ✔ |
Web Security | ✔ | ✔ | ✔ | ✔ | ✔ |
Deep learning malware detection | ✔ | ✔ | ✔ | ✔ | ✔ |
Anti-malware file scans | ✔ | ✔ | ✔ | ✔ | ✔ |
Live Protection | ✔ | ✔ | ✔ | ✔ | ✔ |
Behavioral analysis before execution (HIPS) | ✔ | ✔ | ✔ | ✔ | ✔ |
Blocking potent. Unwanted applications (PUAs) | ✔ | ✔ | ✔ | ✔ | ✔ |
Intrusion Prevention System (IPS) | ✔ | ✔ | ✔ | ✔ | ✔ |
Data Loss Prevention | ✔ | ✔ | ✔ | ✔ | ✔ |
Runtime behavior analysis (HIPS) | ✔ | ✔ | ✔ | ✔ | ✔ |
Antimalware Scan Interface (AMSI) | ✔ | ✔ | ✔ | ✔ | ✔ |
Malicious Traffic Detection (MTD) | ✔ | ✔ | ✔ | ✔ | ✔ |
Exploit Prevention | ✔ | ✔ | ✔ | ✔ | ✔ |
Active Adversary Mitigations | ✔ | ✔ | ✔ | ✔ | ✔ |
Ransomware File Protection (CryptoGuard) | ✔ | ✔ | ✔ | ✔ | ✔ |
Disk and Boot Record Protection (WipeGuard) | ✔ | ✔ | ✔ | ✔ | ✔ |
Man-in-the-Browser Protection (Safe Browsing) | ✔ | ✔ | ✔ | ✔ | ✔ |
Improved application lockdown | ✔ | ✔ | ✔ | ✔ | ✔ |
Live Discover (cross-environmental SQL queries for threat hunting and security compliance) | - | - | ✔ | ✔ | ✔ |
SQL query library (pre-formulated, customizable queries) | - | - | ✔ | ✔ | ✔ |
Data storage on hard disk (up to 90 days) with fast data access | - | - | ✔ | ✔ | ✔ |
Cross-product data sources (e.g. firewall, e-mail) | - | - | ✔ | ✔ | ✔ |
Cross-product queries | - | - | ✔ | ✔ | ✔ |
Sophos Data Lake (cloud data storage) | - | - | 30 days | 90 days | 90 days |
Scheduled queries | - | - | ✔ | ✔ | ✔ |
Threat cases (root cause analysis) | - | ✔ | ✔ | ✔ | ✔ |
Deep Learning Malware Analysis | - | - | ✔ | ✔ | ✔ |
Advanced threat data from SophosLabs on demand | - | - | ✔ | ✔ | ✔ |
Export of forensic data | - | - | ✔ | ✔ | ✔ |
Automated malware removal | ✔ | ✔ | ✔ | ✔ | ✔ |
Synchronized Security Heartbeat | ✔ | ✔ | ✔ | ✔ | ✔ |
Sophos Clean | ✔ | ✔ | ✔ | ✔ | ✔ |
Live Response (remote terminal access for further analysis and Response measures) | - | - | ✔ | ✔ | ✔ |
On-Demand Endpoint Isolation | - | - | ✔ | ✔ | ✔ |
With one click "Remove and block | - | - | ✔ | ✔ | ✔ |
24/7 evidence-based threat hunting | - | - | - | ✔ | ✔ |
Compatible with third-party security tools | - | - | - | ✔ | ✔ |
Security Health Checks | - | - | - | ✔ | ✔ |
Activity Reports | - | - | - | ✔ | ✔ |
Sophos MDR ThreatCast | - | - | - | ✔ | ✔ |
Attack detection | - | - | - | ✔ | ✔ |
Stop and contain threats | - | - | - | ✔ | ✔ |
Direct telephone support for incidents | - | - | - | ✔ | ✔ |
24/7 circumstantial threat hunting | - | - | - | - | ✔ |
Proactive Security Posture Management | - | - | - | - | ✔ |
Full incident response: complete neutralization of Threats | - | - | - | - | ✔ |
Root cause analysis – and how can renewed attacks be prevented? | - | - | - | - | ✔ |
Dedicated contact person at the Incident Response Team | - | - | - | - | ✔ |
Resources
Deepen your knowledge and learn more about “Sophos Central Endpoint Protection”
Sophos Managed Detection and Response (MDR) – Datasheet
Sophos Managed Detection and Response (MDR) – Buyer's Guide
Sophos Breach Protection Warranty – Datasheet
Sophos Rapid Response – Datasheet
Extended Detection and Response (XDR) – Beginner’s Guide
Sophos Network Detection and Response (NDR) – Datasheet
Sophos Network Detection and Response (NDR) – Solution Brief
Sophos Endpoint Security – Buyer's Guide
Cybersecurity System – Buyer's Guide
Sophos Intercept X – Datasheet
Sophos Intercept X – Solution Brief
Sophos Intercept X Deep Learning
FAQs zu Intercept X Essentials und Intercept X Essentials for Server

Help with purchase
Are there any questions about the product?
It is better to ask again before buying, before you end up holding the wrong product in your hands.
Ask question