{"id":25071,"date":"2022-01-25T10:51:23","date_gmt":"2022-01-25T09:51:23","guid":{"rendered":"https:\/\/www.avanet.com\/shop\/sophos-central-intercept-x-advanced\/"},"modified":"2024-04-19T08:10:09","modified_gmt":"2024-04-19T07:10:09","slug":"sophos-central-intercept-x-advanced","status":"publish","type":"product","link":"https:\/\/www.avanet.com\/en\/shop\/sophos-central-intercept-x-advanced\/","title":{"rendered":"Sophos Central Intercept X Advanced"},"content":{"rendered":"<div data-block=\"hook:108441\" class=\"alignfull\"><article id=\"post-108441\" class=\"post-108441\"><div class=\"entry-content is-layout-constrained\">\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer ava-card-shadow-bottom\"><\/div>\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer ava-card-spacer\"><\/div>\n<div class=\"gb-container gb-container-a50b114d overflow-x-auto ava-card-spacer\">\n<div class=\"gb-container gb-container-57c73bc9\">\n<div class=\"gb-container gb-container-5e6c23b9\">\n\n<a class=\"gb-button gb-button-75931100 gb-button-text\" href=\"#product-description\">Description<\/a>\n\n\n\n<a class=\"gb-button gb-button-684575e7 gb-button-text\" href=\"#avanet-services\">Services<\/a>\n\n\n\n<a class=\"gb-button gb-button-8f7ca155 gb-button-text\" href=\"#info-materials\">Resources<\/a>\n\n\n\n<a class=\"gb-button gb-button-826fa0e4 gb-button-text\" href=\"#trial-version\">Trial version<\/a>\n\n\n\n<a class=\"gb-button gb-button-fda0e505 gb-button-text\" href=\"#help-for-buying\">Help with purchase<\/a>\n\n<\/div>\n<\/div>\n<\/div><div class=\"gb-container gb-container-29320c59\" id=\"product-description\">\n\n<p class=\"gb-headline gb-headline-8fb21070\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path clip-rule=\"evenodd\" d=\"M4.5 2A1.5 1.5 0 003 3.5v13A1.5 1.5 0 004.5 18h11a1.5 1.5 0 001.5-1.5V7.621a1.5 1.5 0 00-.44-1.06l-4.12-4.122A1.5 1.5 0 0011.378 2H4.5zm2.25 8.5a.75.75 0 000 1.5h6.5a.75.75 0 000-1.5h-6.5zm0 3a.75.75 0 000 1.5h6.5a.75.75 0 000-1.5h-6.5z\" fill-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Description<\/span><\/p>\n\n\n<div class=\"gb-container gb-container-6dc0b96f wp-embed-aspect-16-9 wp-has-aspect-ratio\"><a class=\"gb-container-link\" href=\"https:\/\/vimeo.com\/180172282\" target=\"_blank\" rel=\"noopener\"><\/a>\n<div class=\"gb-container gb-container-871ddeb5\">\n\n<h2 class=\"wp-block-heading\" id=\"h-gonne-dir-den-totalen-schutz\" style=\"font-size:clamp(15.747px, 0.984rem + ((1vw - 3.2px) * 0.645), 24px);\">Treat yourself to total protection<\/h2>\n\n\n\n<p>Sophos Central Intercept X Advanced is a combination of <a href=\"https:\/\/www.avanet.com\/en\/shop\/sophos-central-intercept-x-essentials\/\">Sophos Central Endpoint Protection<\/a> and <a href=\"https:\/\/www.avanet.com\/en\/shop\/sophos-central-intercept-x-essentials\/\">Intercept X<\/a> products.<\/p>\n\n\n\n<p>With Sophos Central Intercept X Advanced, you get all the features of Sophos Central Endpoint Protection and Intercept X in one product.<\/p>\n\n\n\n<p>On the one hand, you benefit from great functions such as \"Peripheral Control\" or \"Malicious Traffic Detection\", and at the same time you get a specialist on your computer with Intercept X, which uses a technology called \"CryptoGuard\" to detect as soon as malware tries to encrypt files on your computer and stops this process immediately.\nFiles that have already been encrypted are then automatically restored, so there is no data loss. <\/p>\n\n\n\n<p>Would you like to see the Sophos Central user interface live?\nJust go to <a title=\"\" href=\"\" target=\"\" rel=\"noopener\">central.sophos.com<\/a> and use the demo account.  Username: demo@sophos.com \/ Password: Demo@sophos.com<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-f44e0cf5\">\n\n<figure class=\"wp-block-embed is-type-video is-provider-vimeo wp-block-embed-vimeo wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Sophos Intercept X: CryptoGuard Anti-Ransomware in 60 Seconds\" src=\"https:\/\/player.vimeo.com\/video\/180040392?h=305b771f87&amp;dnt=1&amp;app_id=122963\" width=\"1280\" height=\"720\" frameborder=\"0\" allow=\"autoplay; fullscreen; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-1077be02 wp-embed-aspect-16-9 wp-has-aspect-ratio\"><a class=\"gb-container-link\" href=\"https:\/\/vimeo.com\/180172282\" target=\"_blank\" rel=\"noopener\"><\/a>\n<div class=\"gb-container gb-container-f41e2168\">\n\n<figure class=\"wp-block-embed is-type-video is-provider-vimeo wp-block-embed-vimeo wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Sophos Intercept X: Signatureless Exploit Prevention in 60 Seconds\" src=\"https:\/\/player.vimeo.com\/video\/180172281?h=8b0800d8d0&amp;dnt=1&amp;app_id=122963\" width=\"1280\" height=\"720\" frameborder=\"0\" allow=\"autoplay; fullscreen; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n<\/div>\n\n<div class=\"gb-container gb-container-811049ef\">\n\n<h2 class=\"wp-block-heading\" id=\"h-die-einzige-wirklich-umfassende-exploit-prevention\" style=\"font-size:clamp(15.747px, 0.984rem + ((1vw - 3.2px) * 0.645), 24px);\">The only truly comprehensive exploit prevention<\/h2>\n\n\n\n<p>Preventing the exploitation of security vulnerabilities.<\/p>\n\n\n\n<p>Sophos Exploit Protection is a unique technology in Intercept X that prevents previously unknown or unpatched vulnerabilities in applications or operating system components from being exploited.\nWith Intercept X, every application is monitored in the background and every action is checked to see if an exploit technique is being attempted. <\/p>\n\n\n\n<p>If such a technique is detected, Exploit Prevention prevents a vulnerability from being exploited and restores the system to a secure state.<\/p>\n\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-3706920d wp-embed-aspect-16-9 wp-has-aspect-ratio\"><a class=\"gb-container-link\" href=\"https:\/\/vimeo.com\/180172282\" target=\"_blank\" rel=\"noopener\"><\/a>\n<div class=\"gb-container gb-container-f741029e\">\n\n<h2 class=\"wp-block-heading\" id=\"h-root-cause-analysis\" style=\"font-size:clamp(15.747px, 0.984rem + ((1vw - 3.2px) * 0.645), 24px);\">Root Cause Analysis<\/h2>\n\n\n\n<p>Find out the cause of the attack.<\/p>\n\n\n\n<p>Imagine that, despite all the protective measures, malware has made it into your network.\nHow could this happen?\nThanks to the root cause analysis in Intercept X, this mystery can be uncovered with an impressive 360-degree analysis.\nThe Root Cause Analysis Tool can tell you in great detail how the malware got into your network, which devices were infected and what steps you should take now.   <\/p>\n\n\n\n<p>With root cause analysis, you'll never be in the dark again if your network has been infected by an unknown malware.<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-e84d15f8\">\n\n<figure class=\"wp-block-embed is-type-video is-provider-vimeo wp-block-embed-vimeo wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Sophos Intercept X: Root-Cause Analysis (RCA) in Two Minutes\" src=\"https:\/\/player.vimeo.com\/video\/180040393?h=aa36f826e3&amp;dnt=1&amp;app_id=122963\" width=\"1280\" height=\"720\" frameborder=\"0\" allow=\"autoplay; fullscreen; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-a9b43760 wp-embed-aspect-16-9 wp-has-aspect-ratio\"><a class=\"gb-container-link\" href=\"https:\/\/vimeo.com\/180172282\" target=\"_blank\" rel=\"noopener\"><\/a>\n<div class=\"gb-container gb-container-bf3899bc\">\n\n<figure class=\"wp-block-embed is-type-video is-provider-vimeo wp-block-embed-vimeo wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Sophos Intercept X: Advanced Cleanup in 60 Seconds\" src=\"https:\/\/player.vimeo.com\/video\/180172282?h=e1c9e1d024&amp;dnt=1&amp;app_id=122963\" width=\"1280\" height=\"720\" frameborder=\"0\" allow=\"autoplay; fullscreen; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n<\/div>\n\n<div class=\"gb-container gb-container-71c99621\">\n\n<h2 class=\"wp-block-heading\" id=\"h-sophos-clean\" style=\"font-size:clamp(15.747px, 0.984rem + ((1vw - 3.2px) * 0.645), 24px);\">Sophos Clean<\/h2>\n\n\n\n<p>Restores the system to its original state after an attack.<\/p>\n\n\n\n<p>With Intercept X, thanks to technologies like CryptoGuard, you are protected against signatureless malware, such as ransomware, but after an attempted attack, your system still needs to be cleaned of all remnants.\nSince there is no cleaning routine for unknown malware, the entire processes of the executed malware must be forensically examined.\nThis task is performed by Sophos Clean.  <\/p>\n\n\n\n<p>Sophos Clean performs a complete cleaning of the system after an attack has been stopped.\nIt not only removes the malware itself, but replaces infected Windows resources with more secure original versions and ultimately restores the system to its original state, as it was before the infection. <\/p>\n\n<\/div>\n<\/div>\n\n<div data-block=\"hook:108306\" class=\"alignfull\"><article id=\"post-108306\" class=\"post-108306\"><div class=\"entry-content is-layout-constrained\">\n<style>.avanet-ct-container{overflow-x:auto}.avanet-ct-container tr>th:first-child,.avanet-ct-container tr>td:first-child{position:relative;background-color:#FFFFFF;font-size:.8rem}.avanet-ct-container table,.avanet-ct-container th,.avanet-ct-container td{border:0}.avanet-ct-header{position:relative;width:220px;min-height:360px;padding:40px 20px 20px;border-right:1px solid rgb(232,235,236);background-color:#fff;display:flex;flex-direction:column;align-items:center;justify-content:space-between}.avanet-ct-cell-title{font-size:1.2rem;line-height:1.2rem;color:#475569;margin-bottom:0rem!important}.avanet-ct-container td,.avanet-ct-container th{vertical-align:top}.avanet-ct-row td,.avanet-ct-row th{border-bottom:1px solid rgb(232,235,236)}.avanet-ct-row td:nth-child(n+2){border-right:1px solid rgb(232,235,236);background:rgb(255,255,255);padding:20px 20px;font-size:.8rem}.avanet-ct-row th:nth-child(n+2){padding:0}.avanet-ct-row td:first-child{padding:20px 20px 20px 0;font-weight:600;color:#475569}.avanet-ct-row td:last-child,.avanet-ct-row th:last-child{border-right:none}.avanet-ct-row th:last-child .avanet-ct-header{border-right:none}.avanet-ct-row:last-child td{border-bottom:none}.avanet-ct-selected-product{width:146px;height:34px;color:rgb(255,255,255);font-size:14px;display:flex;align-items:center;justify-content:center;background:#f59e0b;position:absolute;border-radius:2px;top:-1rem;left:50%;transform:translateX(-50%);text-transform:uppercase}.avanet-ct-cta-button{display:inline-block;padding:5px 30px;background-color:#f4f4f5;border-radius:2px;color:#a1a1aa;text-decoration:none!important;font-weight:600;text-transform:uppercase;font-size:.8rem}.avanet-ct-header img{margin-bottom:0rem}.avanet-ct-spacer{height:1rem;background-color:#FFFFFF}@media screen and (min-width:1200px){.avanet-ct-container table{table-layout:fixed}.avanet-ct-container tr>th:first-child,.avanet-ct-container tr>td:first-child{position:relative;font-size:.8rem;width:180px}.avanet-ct-header{width:100%}.avanet-ct-cta-button{padding:5px 20px;font-size:.6rem}}@media screen and (min-width:768px) and (max-width:1199px){.avanet-ct-container tr>th:first-child,.avanet-ct-container tr>td:first-child{position:sticky;left:0;z-index:1}}<\/style>\n\n<h2 class=\"gb-headline gb-headline-522654b5 gb-headline-text\">Technical Specifications<\/h2>\n\n<p class=\"gb-headline gb-headline-2fcf27cb gb-headline-text\">Compare the feature set of Sophos\u2019s various <strong>endpoint products<\/strong> to protect your clients. Not sure which protection best suits your business? We advise you free of charge and completely without obligation.  <\/p>\n\n<div class=\"avanet-ct-container\" itemtype=\"http:\/\/schema.org\/Table\">\n  <table>\n    <thead>\n      <tr class=\"avanet-ct-row\">\n        <th><\/th>\n        <th>\n          <div class=\"avanet-ct-spacer\"><\/div>\n          <div class=\"avanet-ct-header\">\n            <p class=\"avanet-ct-cell-title\">Intercept X Essentials<\/p>\n            <img loading=\"lazy\" decoding=\"async\" width=\"128\" height=\"128\" src=\"https:\/\/www.avanet.com\/assets\/sophos-central-intercept-x-essentials-cover-600x600.png\" alt=\"Sophos Central Intercept X Essentials\"\/>\n            <a class=\"avanet-ct-cta-button\" href=\"https:\/\/www.avanet.com\/en\/shop\/sophos-central-intercept-x-essentials\/\">\n About the product\n            <\/a>\n          <\/div>\n        <\/th>\n        <th>\n          <div class=\"avanet-ct-spacer\"><\/div>\n          <div class=\"avanet-ct-header\">\n            <p class=\"avanet-ct-cell-title\">Intercept X Advanced<\/p>\n            <img loading=\"lazy\" decoding=\"async\" width=\"128\" height=\"128\" src=\"https:\/\/www.avanet.com\/assets\/sophos-central-intercept-x-advanced-cover-600x600.png\" alt=\"Sophos Central Intercept X Advanced\"\/>\n            <a class=\"avanet-ct-cta-button\" href=\"https:\/\/www.avanet.com\/en\/shop\/sophos-central-intercept-x-advanced\/\">\n About the product\n            <\/a>\n          <\/div>\n        <\/th>\n        <th>\n          <div class=\"avanet-ct-spacer\"><\/div>\n          <div class=\"avanet-ct-header\">\n            <p class=\"avanet-ct-cell-title\">Intercept X Advanced with XDR<\/p>\n            <img loading=\"lazy\" decoding=\"async\" width=\"128\" height=\"128\" src=\"https:\/\/www.avanet.com\/assets\/sophos-central-intercept-x-advanced-with-xdr-cover-600x600.png\" alt=\"Sophos Central Intercept X Advanced with XDR\"\/>\n            <a class=\"avanet-ct-cta-button\" href=\"https:\/\/www.avanet.com\/en\/shop\/sophos-central-intercept-x-advanced-with-xdr\/\">\n About the product\n            <\/a>\n          <\/div>\n        <\/th>\n        <th>\n          <div class=\"avanet-ct-spacer\"><\/div>\n          <div class=\"avanet-ct-header\">\n            <p class=\"avanet-ct-cell-title\">Sophos MDR Essentials<\/p>\n            <img loading=\"lazy\" decoding=\"async\" width=\"128\" height=\"128\" src=\"https:\/\/www.avanet.com\/assets\/sophos-central-managed-detection-and-response-cover-600x600.png\" alt=\"Sophos Managed Detection and Response\"\/>\n            <a class=\"avanet-ct-cta-button\" href=\"https:\/\/www.avanet.com\/en\/shop\/sophos-central-managed-detection-and-response\/\">\n About the product\n            <\/a>\n          <\/div>\n        <\/th>\n        <th>\n          <div class=\"avanet-ct-spacer\"><\/div>\n          <div class=\"avanet-ct-header\">\n            <span class=\"avanet-ct-selected-product\">Recommended<\/span>\n            <p class=\"avanet-ct-cell-title\">Sophos MDR Complete<\/p>\n            <img loading=\"lazy\" decoding=\"async\" width=\"128\" height=\"128\" src=\"https:\/\/www.avanet.com\/assets\/sophos-central-managed-detection-and-response-complete-cover-600x600.png\" alt=\"Sophos Managed Detection and Response Complete\"\/>\n            <a class=\"avanet-ct-cta-button\" href=\"https:\/\/www.avanet.com\/en\/shop\/sophos-central-managed-detection-and-response-complete\/\">\n About the product\n            <\/a>\n          <\/div>\n        <\/th>\n      <\/tr>\n    <\/thead>\n    <tbody>\n      <!-- ROWS -->\n      <tr class=\"avanet-ct-row\">\n        <td>Multiple guidelines<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Controlled updates<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Application Control<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Peripheral control<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Web Control\/Category-based URL Filtering<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Download reputation<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Web Security<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Deep learning malware detection<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Anti-malware file scans<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Live Protection<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Behavioral analysis before execution (HIPS)<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Blocking potent.\nUnwanted applications (PUAs) <\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Intrusion Prevention System (IPS)<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Data Loss Prevention<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Runtime behavior analysis (HIPS)<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Antimalware Scan Interface (AMSI)<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Malicious Traffic Detection (MTD)<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Exploit Prevention<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Active Adversary Mitigations<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Ransomware File Protection (CryptoGuard)<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Disk and Boot Record Protection (WipeGuard)<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Man-in-the-Browser Protection (Safe Browsing)<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Improved application lockdown<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>\n  Live Discover (cross-environmental SQL queries for threat hunting\n and security compliance)\n \n        <\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>\n  SQL query library (pre-formulated, customizable queries)\n        <\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>\n  Data storage on hard disk (up to 90 days) with fast\n data access\n \n        <\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Cross-product data sources (e.g. firewall, e-mail)<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Cross-product queries<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Sophos Data Lake (cloud data storage)<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>30 days<\/td>\n        <td>90 days<\/td>\n        <td>90 days<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Scheduled queries<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Threat cases (root cause analysis)<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Deep Learning Malware Analysis<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Advanced threat data from SophosLabs on demand<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Export of forensic data<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Automated malware removal<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Synchronized Security Heartbeat<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Sophos Clean<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>\n Live Response (remote terminal access for further analysis and Response measures)\n \n        <\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>On-Demand Endpoint Isolation<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>With one click \"Remove and block<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>24\/7 evidence-based threat hunting<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Compatible with third-party security tools<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Security Health Checks<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Activity Reports<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Sophos MDR ThreatCast<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Attack detection<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Stop and contain threats<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Direct telephone support for incidents<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>24\/7 circumstantial threat hunting<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Proactive Security Posture Management<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>\n Full incident response: complete neutralization of Threats\n \n        <\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>\n Root cause analysis \u2013 and how can renewed attacks be prevented?\n        <\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Dedicated contact person at the Incident Response Team<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n    <\/tbody>\n  <\/table>\n<\/div>\n<\/div><\/article><\/div>\n\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer ava-card-shadow-bottom\"><\/div>\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer ava-card-spacer\"><\/div>\n<div class=\"gb-container gb-container-9133b606 ava-card-spacer\" id=\"avanet-services\">\n<div class=\"gb-container gb-container-62905ae0\">\n\n<h2 class=\"gb-headline gb-headline-8d5720e2\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 20 20\" fill=\"currentColor\" class=\"w-5 h-5\">   <path fill-rule=\"evenodd\" d=\"M9.661 2.237a.531.531 0 01.678 0 11.947 11.947 0 007.078 2.749.5.5 0 01.479.425c.069.52.104 1.05.104 1.59 0 5.162-3.26 9.563-7.834 11.256a.48.48 0 01-.332 0C5.26 16.564 2 12.163 2 7c0-.538.035-1.069.104-1.589a.5.5 0 01.48-.425 11.947 11.947 0 007.077-2.75zm4.196 5.954a.75.75 0 00-1.214-.882l-3.483 4.79-1.88-1.88a.75.75 0 10-1.06 1.061l2.5 2.5a.75.75 0 001.137-.089l4-5.5z\" clip-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Avanet Services<\/span><\/h2>\n\n\n\n<h2 class=\"gb-headline gb-headline-c000922f gb-headline-text\">Let us <strong>improve<\/strong> your safety<\/h2>\n\n\n\n<p class=\"gb-headline gb-headline-85bf1781 gb-headline-text\">Our services are designed to help you keep your Sophos products running securely and reliably. In addition to the classic support for Sophos Firewalls or the Central platform, we offer the following services, which can be requested from us at any time:<\/p>\n\n\n\n<p class=\"gb-headline gb-headline-37947fc7\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path clip-rule=\"evenodd\" d=\"M16.704 4.153a.75.75 0 01.143 1.052l-8 10.5a.75.75 0 01-1.127.075l-4.5-4.5a.75.75 0 011.06-1.06l3.894 3.893 7.48-9.817a.75.75 0 011.05-.143z\" fill-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Setup Services<\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-a5890901\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path clip-rule=\"evenodd\" d=\"M16.704 4.153a.75.75 0 01.143 1.052l-8 10.5a.75.75 0 01-1.127.075l-4.5-4.5a.75.75 0 011.06-1.06l3.894 3.893 7.48-9.817a.75.75 0 011.05-.143z\" fill-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Health Check<\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-469c99da\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path clip-rule=\"evenodd\" d=\"M16.704 4.153a.75.75 0 01.143 1.052l-8 10.5a.75.75 0 01-1.127.075l-4.5-4.5a.75.75 0 011.06-1.06l3.894 3.893 7.48-9.817a.75.75 0 011.05-.143z\" fill-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Upgrades<\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-23394641\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path clip-rule=\"evenodd\" d=\"M16.704 4.153a.75.75 0 01.143 1.052l-8 10.5a.75.75 0 01-1.127.075l-4.5-4.5a.75.75 0 011.06-1.06l3.894 3.893 7.48-9.817a.75.75 0 011.05-.143z\" fill-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Workshops<\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-bf0d08bf\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path clip-rule=\"evenodd\" d=\"M16.704 4.153a.75.75 0 01.143 1.052l-8 10.5a.75.75 0 01-1.127.075l-4.5-4.5a.75.75 0 011.06-1.06l3.894 3.893 7.48-9.817a.75.75 0 011.05-.143z\" fill-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Migrations<\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-0a3902cc\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path clip-rule=\"evenodd\" d=\"M16.704 4.153a.75.75 0 01.143 1.052l-8 10.5a.75.75 0 01-1.127.075l-4.5-4.5a.75.75 0 011.06-1.06l3.894 3.893 7.48-9.817a.75.75 0 011.05-.143z\" fill-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Firewall maintenance<\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-9b54ea89\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path clip-rule=\"evenodd\" d=\"M16.704 4.153a.75.75 0 01.143 1.052l-8 10.5a.75.75 0 01-1.127.075l-4.5-4.5a.75.75 0 011.06-1.06l3.894 3.893 7.48-9.817a.75.75 0 011.05-.143z\" fill-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">SLA<\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-d867028f\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path clip-rule=\"evenodd\" d=\"M16.704 4.153a.75.75 0 01.143 1.052l-8 10.5a.75.75 0 01-1.127.075l-4.5-4.5a.75.75 0 011.06-1.06l3.894 3.893 7.48-9.817a.75.75 0 011.05-.143z\" fill-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Security audits<\/span><\/p>\n\n\n\n<a class=\"gb-button gb-button-a1b7de4e gb-button-text\" href=\"https:\/\/www.avanet.com\/en\/contact\/\">Request more information<\/a>\n\n<\/div>\n\n<div class=\"gb-container gb-container-7499e21c\">\n<div class=\"gb-container gb-container-5c65e230\">\n\n<h2 class=\"gb-headline gb-headline-87d289ed\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" clip-rule=\"evenodd\" fill-rule=\"evenodd\" stroke-linejoin=\"round\" stroke-miterlimit=\"2\" viewbox=\"0 0 34 44\"><path d=\"m1.299.002c-.738.077-1.303.708-1.299 1.45v40.601c0 .795.655 1.45 1.45 1.45h30.934c.796 0 1.45-.655 1.45-1.45v-26.101c0-.006 0-.013 0-.02 0-.796-.654-1.45-1.45-1.45-.795 0-1.45.654-1.45 1.45v.02 24.651h-28.034v-37.701h18.367v8.217c0 .795.655 1.45 1.45 1.45h9.667.003c.796 0 1.451-.655 1.451-1.45 0-.385-.154-.755-.427-1.027l-9.667-9.667c-.272-.272-.642-.424-1.027-.423h-21.267c-.05-.003-.101-.003-.151 0zm22.868 4.939 4.728 4.728h-4.728zm-4.833 9.561c-3.72 0-6.767 3.047-6.767 6.767 0 1.031.294 1.978.71 2.855-.143.278-.311.617-.544 1.057-.527.996-1.25 2.317-1.963 3.64-1.428 2.647-2.855 5.287-2.855 5.287-.382.692-.13 1.576.559 1.964l4.35 2.416c.215.12.458.183.705.183.53 0 1.02-.291 1.273-.757l5.438-9.969c3.292-.45 5.861-3.266 5.861-6.676 0-3.72-3.047-6.767-6.767-6.767zm0 2.9c.192 0 .375.019.559.046-.308.588-.708 1.34-1.178 2.205-.151.234-.231.506-.231.784 0 .796.655 1.451 1.45 1.451.566 0 1.082-.331 1.318-.845.451-.829.832-1.541 1.148-2.145.504.653.801 1.473.801 2.371 0 2.153-1.714 3.867-3.867 3.867-.528.001-1.016.291-1.269.755l-5.105 9.35-1.813-1.012c.461-.848 1.087-2.016 2.175-4.033.716-1.327 1.43-2.646 1.964-3.655.267-.505.491-.928.649-1.239.079-.155.145-.284.197-.393.025-.054.046-.108.075-.181.015-.036.033-.072.061-.166.013-.047.029-.094.045-.227.008-.066.012-.158 0-.302-.012-.143-.226-.664-.227-.664-.393-.607-.619-1.321-.619-2.1 0-2.153 1.714-3.867 3.867-3.867z\" fill-rule=\"nonzero\"><\/path><\/svg><\/span><\/h2>\n\n\n\n<h3 class=\"gb-headline gb-headline-c8e59303 gb-headline-text\">Setup Services<\/h3>\n\n\n\n<p class=\"gb-headline gb-headline-849d50d0 gb-headline-text\">Want to have your Sophos products set up by professionals? We support you during commissioning and configuration for smooth operation.<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-919c66aa\">\n\n<h2 class=\"gb-headline gb-headline-b70595a3\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" clip-rule=\"evenodd\" fill-rule=\"evenodd\" stroke-linejoin=\"round\" stroke-miterlimit=\"2\" viewbox=\"0 0 33 43\"><g fill-rule=\"nonzero\"><path d=\"m7.81 17.518c.327.327.763.509 1.235.509s.872-.182 1.235-.509c.69-.69.69-1.78 0-2.434l-4.359-4.322h24.411c.945 0 1.744-.763 1.744-1.744s-.763-1.744-1.744-1.744h-24.411l4.323-4.323c.69-.69.69-1.779 0-2.433-.69-.691-1.78-.691-2.434 0l-7.265 7.265c-.69.69-.69 1.78 0 2.434z\"><\/path><path d=\"m24.302 24.51c-.69-.691-1.78-.691-2.434 0-.69.69-.69 1.78 0 2.433l4.323 4.323h-24.447c-.945 0-1.744.763-1.744 1.744 0 .944.763 1.744 1.744 1.744h24.411l-4.323 4.322c-.69.691-.69 1.78 0 2.434.327.327.763.509 1.235.509s.872-.182 1.235-.509l7.265-7.301c.69-.691.69-1.78 0-2.434z\"><\/path><\/g><\/svg><\/span><\/h2>\n\n\n\n<h3 class=\"gb-headline gb-headline-a5c7ecbc gb-headline-text\">Migrations<\/h3>\n\n\n\n<p class=\"gb-headline gb-headline-99426999 gb-headline-text\">You would like to change from your SG Firewall (UTM) to a XGS Firewall with the SFOS operating system? Thanks to our experience, we can also manage your changeover without any worries.<\/p>\n\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-547ef5b2\">\n<div class=\"gb-container gb-container-fe09310a\">\n\n<h2 class=\"gb-headline gb-headline-bd3b1646\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" clip-rule=\"evenodd\" fill-rule=\"evenodd\" stroke-linejoin=\"round\" stroke-miterlimit=\"2\" viewbox=\"0 0 39 46\"><g><circle cx=\"6.354\" cy=\"6.354\" r=\"1.271\"><\/circle><circle cx=\"31.771\" cy=\"6.354\" r=\"1.271\"><\/circle><circle cx=\"31.771\" cy=\"34.313\" r=\"1.271\"><\/circle><circle cx=\"6.354\" cy=\"34.313\" r=\"1.271\"><\/circle><g fill-rule=\"nonzero\"><path d=\"m19.063 10.167c-5.606 0-10.167 4.56-10.167 10.166s4.561 10.167 10.167 10.167c5.605 0 10.166-4.561 10.166-10.167s-4.561-10.166-10.166-10.166zm-.854 14.505-4.493-4.493 1.797-1.797 2.696 2.696 4.493-4.493 1.797 1.797z\"><\/path><path d=\"m34.313 0h-30.501c-2.102 0-3.812 1.71-3.812 3.813v38.125c0 2.102 1.71 3.812 3.812 3.812h30.501c2.102 0 3.812-1.71 3.812-3.812v-38.126c0-2.102-1.71-3.812-3.812-3.812zm-24.146 43.208h-6.355c-.7 0-1.27-.57-1.27-1.27v-1.494c.398.142.824.223 1.27.223h6.355zm3.812 0h-1.271v-2.541h1.271zm3.813 0h-1.271v-2.541h1.271zm3.812 0h-1.271v-2.541h1.271zm3.813 0h-1.271v-2.541h1.271zm10.166-1.27c0 .7-.57 1.27-1.27 1.27h-6.355v-2.541h6.355c.446 0 .872-.081 1.27-.223zm0-38.126v33.042c0 .701-.57 1.271-1.27 1.271h-30.501c-.7 0-1.27-.57-1.27-1.271v-33.042c0-.7.57-1.27 1.27-1.27h30.501c.7 0 1.27.57 1.27 1.27z\"><\/path><\/g><\/g><\/svg><\/span><\/h2>\n\n\n\n<h3 class=\"gb-headline gb-headline-b2a78fde gb-headline-text\">Health Check<\/h3>\n\n\n\n<p class=\"gb-headline gb-headline-d7a0b735 gb-headline-text\">You have set up your Sophos products yourself and would like us to check the configuration? We will check your settings and give our recommendation.<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-9fe28494\">\n\n<h2 class=\"gb-headline gb-headline-aedf3cc2\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" clip-rule=\"evenodd\" fill-rule=\"evenodd\" stroke-linejoin=\"round\" stroke-miterlimit=\"2\" viewbox=\"0 0 49 60\"><path d=\"m22.586 4.304v-2.805c0-.822.677-1.499 1.499-1.499.823 0 1.499.677 1.499 1.499v2.805h21.087.007c.819.015 1.482.698 1.473 1.513v33.066c0 .822-.677 1.499-1.499 1.499h-14.283l7.015 14.711c.103.208.156.436.156.668 0 .822-.676 1.499-1.499 1.499-.586 0-1.122-.345-1.362-.873l-7.614-16.005h-3.481v17.668c0 .823-.676 1.499-1.499 1.499-.822 0-1.499-.676-1.499-1.499v-17.668h-3.488l-7.624 15.972c-.241.533-.773.878-1.36.881-.221 0-.439-.048-.644-.142-.52-.249-.853-.776-.853-1.353 0-.224.05-.446.147-.648l7.017-14.717h-14.282c-.822 0-1.499-.677-1.499-1.499v-33.073c0-.822.677-1.499 1.499-1.499zm-19.588 2.998v30.062h42.174v-30.062zm17.121 13.135c-.879-.961-1.374-2.223-1.374-3.54 0-2.879 2.369-5.248 5.248-5.248s5.248 2.369 5.248 5.248c0 1.317-.496 2.579-1.374 3.54 3.86 1.452 3.899 5.554 3.886 7.305v3.385c0 .822-.677 1.499-1.499 1.499h-12.523c-.822 0-1.499-.677-1.499-1.499v-3.385c0-1.753.048-5.852 3.887-7.305zm8.632 9.191-.022-1.886c0-1.884-.191-3.262-1.128-4.053-.619-.521-1.551-.769-2.921-.769h-1.421c-1.373 0-2.307.248-2.926.77-.938.79-1.129 2.168-1.129 4.052v1.886zm-4.758-14.973c-1.246 0-2.27 1.024-2.27 2.27 0 1.245 1.024 2.269 2.27 2.269h.014c1.239-.008 2.255-1.029 2.255-2.269 0-1.241-1.016-2.262-2.255-2.27z\" fill-rule=\"nonzero\"><\/path><\/svg><\/span><\/h2>\n\n\n\n<h3 class=\"gb-headline gb-headline-9fce7ef8 gb-headline-text\">Workshops<\/h3>\n\n\n\n<p class=\"gb-headline gb-headline-fc658173 gb-headline-text\">Is it your job to be knowledgeable about Sophos products in your organization? We offer targeted training that is completely tailored to your needs.<\/p>\n\n<\/div>\n<\/div>\n<\/div><div class=\"gb-container gb-container-a7fa59d1 ava-card-zero-margin\" id=\"info-materials\">\n<div class=\"gb-container gb-container-8aeebd39\">\n\n<p class=\"gb-headline gb-headline-8b3709cd\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M4.125 3C3.089 3 2.25 3.84 2.25 4.875V18a3 3 0 003 3h15a3 3 0 01-3-3V4.875C17.25 3.839 16.41 3 15.375 3H4.125zM12 9.75a.75.75 0 000 1.5h1.5a.75.75 0 000-1.5H12zm-.75-2.25a.75.75 0 01.75-.75h1.5a.75.75 0 010 1.5H12a.75.75 0 01-.75-.75zM6 12.75a.75.75 0 000 1.5h7.5a.75.75 0 000-1.5H6zm-.75 3.75a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5H6a.75.75 0 01-.75-.75zM6 6.75a.75.75 0 00-.75.75v3c0 .414.336.75.75.75h3a.75.75 0 00.75-.75v-3A.75.75 0 009 6.75H6z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M18.75 6.75h1.875c.621 0 1.125.504 1.125 1.125V18a1.5 1.5 0 01-3 0V6.75z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Resources<\/span><\/p>\n\n\n\n<h2 class=\"gb-headline gb-headline-ae48c488 gb-headline-text\"><strong>Deepen<\/strong> your knowledge and learn more about \u201cSophos Central Endpoint Protection\u201d<\/h2>\n\n\n\n<p class=\"gb-headline gb-headline-bc37bd7b\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-central-en.pdf\">Sophos Central \u2013 Datasheet<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-85a1944c\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-managed-detection-and-response-ds-en.pdf\">Sophos Managed Detection and Response (MDR) \u2013 Datasheet<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-fb499f6c\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-managed-detection-and-response-br-en.pdf\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-managed-detection-and-response-br-en.pdf\">Sophos Managed Detection and Response (MDR) - Solution brochure<\/a><\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-c1c993ca\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-mdr-services-buyers-guide-en.pdf\">Sophos Managed Detection and Response (MDR) \u2013 Buyer's Guide<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-42159a0b\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-mdr-breach-protection-warranty-ds-en.pdf\">Sophos Breach Protection Warranty \u2013 Datasheet<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-7204cb0e\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-rapid-response-ds-en.pdf\">Sophos Rapid Response \u2013 Datasheet<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-8a0162a8\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-xdr-beginner-guide-en.pdf\">Extended Detection and Response (XDR) \u2013 Beginner\u2019s Guide<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-489e1c67\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-xdr-licensing-guide-en.pdf\">Sophos XDR \u2013 Licensing Guide<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-6272d76b\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-intercept-x-xdr-use-cases-en.pdf\">Sophos XDR \u2013 Use Cases<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-07e816fa\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-network-detection-and-response-ds-en.pdf\">Sophos Network Detection and Response (NDR) \u2013 Datasheet<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-1f137b06\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-network-detection-and-response-deskaid-en.pdf\">Sophos Network Detection and Response (NDR) \u2013 Solution Brief<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-d7c98875\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-endpoint-buyers-guide-en.pdf\">Sophos Endpoint Security \u2013 Buyer's Guide<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-ffb77489\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-security-cybersecurity-system-en.pdf\">Cybersecurity System \u2013 Buyer's Guide<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-023feebb\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-intercept-x-en.pdf\">Sophos Intercept X \u2013 Datasheet<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-7a7c7b98\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-intercept-x-solution-brief-en.pdf\">Sophos Intercept X \u2013 Solution Brief<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-385de979\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-intercept-x-for-mac-en.pdf\">Sophos Intercept X for macOS<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-19ae20bb\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-intercept-x-deep-learning-en.pdf\">Sophos Intercept X Deep Learning<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-f2fcb6b2\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-intercept-x-essentials-faq-en.pdf\">FAQs zu Intercept X Essentials und Intercept X Essentials for Server<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-621f9a29\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-endpoint-license-guide-en.pdf\">Sophos Intercept X, XDR and MTR Feature Overview<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-cf221c9f\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/support.sophos.com\/support\/s\/article\/KB-000035144?language=en_US\" target=\"_blank\" data-type=\"URL\" rel=\"noreferrer noopener nofollow\">Sophos Central Windows Endpoint: System Requirements<\/a><\/span><\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-7346e745\">\n\n<figure class=\"gb-block-image gb-block-image-b8173d28\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"1074\" class=\"gb-image gb-image-b8173d28\" src=\"https:\/\/www.avanet.com\/assets\/sophos-assets-central-endpoint-and-server-protection.png\" alt=\"Info Materials Sophos Central Endpoint and Server Protection Hero Image\" title=\"sophos-assets-central-endpoint-and-server-protection\" srcset=\"https:\/\/www.avanet.com\/assets\/sophos-assets-central-endpoint-and-server-protection.png 1280w, https:\/\/www.avanet.com\/assets\/sophos-assets-central-endpoint-and-server-protection-64x54.png 64w, https:\/\/www.avanet.com\/assets\/sophos-assets-central-endpoint-and-server-protection-300x252.png 300w, https:\/\/www.avanet.com\/assets\/sophos-assets-central-endpoint-and-server-protection-1024x859.png 1024w, https:\/\/www.avanet.com\/assets\/sophos-assets-central-endpoint-and-server-protection-768x644.png 768w, https:\/\/www.avanet.com\/assets\/sophos-assets-central-endpoint-and-server-protection-600x503.png 600w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/figure>\n\n<\/div>\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer ava-card-shadow-bottom\"><\/div>\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer ava-card-spacer\"><\/div>\n<div class=\"gb-container gb-container-7c6db709 ava-card-zero-margin ava-card-spacer\">\n<div class=\"gb-container gb-container-71364037\" id=\"education-government\">\n\n<p class=\"gb-headline gb-headline-61672cc7\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path clip-rule=\"evenodd\" d=\"M9.674 2.075a.75.75 0 01.652 0l7.25 3.5A.75.75 0 0117 6.957V16.5h.25a.75.75 0 010 1.5H2.75a.75.75 0 010-1.5H3V6.957a.75.75 0 01-.576-1.382l7.25-3.5zM11 6a1 1 0 11-2 0 1 1 0 012 0zM7.5 9.75a.75.75 0 00-1.5 0v5.5a.75.75 0 001.5 0v-5.5zm3.25 0a.75.75 0 00-1.5 0v5.5a.75.75 0 001.5 0v-5.5zm3.25 0a.75.75 0 00-1.5 0v5.5a.75.75 0 001.5 0v-5.5z\" fill-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">EDUCATION &amp; GOVERNMENT<\/span><\/p>\n\n\n\n<h2 class=\"gb-headline gb-headline-ec41806a gb-headline-text\">Special awards for educational and government institutions<\/h2>\n\n\n\n<p class=\"gb-headline gb-headline-9b651157 gb-headline-text\">Sophos offers special discounts for schools and government institutions to meet specific budget requirements. A discount of at least <strong>20&nbsp;%<\/strong> can be expected.*<\/p>\n\n\n\n<p class=\"gb-headline gb-headline-7dc152d1 gb-headline-text\">Ask us and we will prepare an offer for you completely free of charge and without obligation.<\/p>\n\n\n\n<p class=\"gb-headline gb-headline-896d83be gb-headline-text\">* Special pricing for educational and government institutions is only available in the DACH region.<\/p>\n\n\n\n<a class=\"gb-button gb-button-27b36d7e gb-button-text\" href=\"https:\/\/www.avanet.com\/en\/contact\/\">Request special prices<\/a>\n\n<\/div>\n\n<div class=\"gb-container gb-container-0ee14872\" id=\"trial-version\">\n\n<p class=\"gb-headline gb-headline-e79d319c\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path clip-rule=\"evenodd\" d=\"M10 1a.75.75 0 01.75.75v1.5a.75.75 0 01-1.5 0v-1.5A.75.75 0 0110 1zM5.05 3.05a.75.75 0 011.06 0l1.062 1.06A.75.75 0 116.11 5.173L5.05 4.11a.75.75 0 010-1.06zm9.9 0a.75.75 0 010 1.06l-1.06 1.062a.75.75 0 01-1.062-1.061l1.061-1.06a.75.75 0 011.06 0zM3 8a.75.75 0 01.75-.75h1.5a.75.75 0 010 1.5h-1.5A.75.75 0 013 8zm11 0a.75.75 0 01.75-.75h1.5a.75.75 0 010 1.5h-1.5A.75.75 0 0114 8zm-6.828 2.828a.75.75 0 010 1.061L6.11 12.95a.75.75 0 01-1.06-1.06l1.06-1.06a.75.75 0 011.06 0zm3.594-3.317a.75.75 0 00-1.37.364l-.492 6.861a.75.75 0 001.204.65l1.043-.799.985 3.678a.75.75 0 001.45-.388l-.978-3.646 1.292.204a.75.75 0 00.74-1.16l-3.874-5.764z\" fill-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Trial version<\/span><\/p>\n\n\n\n<h2 class=\"gb-headline gb-headline-7d901e07 gb-headline-text\">Try Sophos Central <strong>for free<\/strong> <\/h2>\n\n\n\n<p class=\"gb-headline gb-headline-50c18159 gb-headline-text\">Try out the powerful platform for centralized security management free of charge <strong>for 30 days<\/strong>. <\/p>\n\n\n\n<p class=\"gb-headline gb-headline-dbbe2354\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"size-4\" fill=\"currentColor\" viewbox=\"0 0 16 16\">   <path clip-rule=\"evenodd\" d=\"M8 15A7 7 0 1 0 8 1a7 7 0 0 0 0 14Zm3.844-8.791a.75.75 0 0 0-1.188-.918l-3.7 4.79-1.649-1.833a.75.75 0 1 0-1.114 1.004l2.25 2.5a.75.75 0 0 0 1.15-.043l4.25-5.5Z\" fill-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><strong>All products<\/strong> - Test the complete protection package, including XDR protection for endpoints, email, mobile devices and servers.<\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-fae0bf75\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"size-4\" fill=\"currentColor\" viewbox=\"0 0 16 16\">   <path clip-rule=\"evenodd\" d=\"M8 15A7 7 0 1 0 8 1a7 7 0 0 0 0 14Zm3.844-8.791a.75.75 0 0 0-1.188-.918l-3.7 4.79-1.649-1.833a.75.75 0 1 0-1.114 1.004l2.25 2.5a.75.75 0 0 0 1.15-.043l4.25-5.5Z\" fill-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><strong>One console<\/strong> - work efficiently by managing all Sophos products from a single cloud platform.<\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-47c98d5f\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"size-4\" fill=\"currentColor\" viewbox=\"0 0 16 16\">   <path clip-rule=\"evenodd\" d=\"M8 15A7 7 0 1 0 8 1a7 7 0 0 0 0 14Zm3.844-8.791a.75.75 0 0 0-1.188-.918l-3.7 4.79-1.649-1.833a.75.75 0 1 0-1.114 1.004l2.25 2.5a.75.75 0 0 0 1.15-.043l4.25-5.5Z\" fill-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><strong>Immediate access<\/strong> - ready for use in just a few minutes.<\/span><\/p>\n\n\n<div class=\"gb-container gb-container-2f4b592c\">\n\n<a class=\"gb-button gb-button-3879b29b gb-button-text\" href=\"https:\/\/cloud.sophos.com\/manage\/login\" target=\"_blank\" rel=\"noopener\">Online demo<\/a>\n\n\n\n<a class=\"gb-button gb-button-4dfceed4\" href=\"https:\/\/www.sophos.com\/en-us\/products\/sophos-central\/free-trial?id=0013000001EjyeY\" target=\"_blank\" rel=\"noopener\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path d=\"M10.75 2.75a.75.75 0 00-1.5 0v8.614L6.295 8.235a.75.75 0 10-1.09 1.03l4.25 4.5a.75.75 0 001.09 0l4.25-4.5a.75.75 0 00-1.09-1.03l-2.955 3.129V2.75z\"><\/path>   <path d=\"M3.5 12.75a.75.75 0 00-1.5 0v2.5A2.75 2.75 0 004.75 18h10.5A2.75 2.75 0 0018 15.25v-2.5a.75.75 0 00-1.5 0v2.5c0 .69-.56 1.25-1.25 1.25H4.75c-.69 0-1.25-.56-1.25-1.25v-2.5z\"><\/path> <\/svg><\/span><span class=\"gb-button-text\">Open a free account<\/span><\/a>\n\n<\/div>\n\n\n<p class=\"gb-headline gb-headline-6c30642c gb-headline-text\">Use the following login details to start your online demo. <strong>Username<\/strong>: demo@sophos.com \/ <strong>Password<\/strong>: Demo@sophos.com<\/p>\n\n<\/div>\n<\/div><div class=\"gb-container gb-container-6291cecc ava-card-spacer last\" id=\"help-for-buying\">\n\n<p class=\"gb-headline gb-headline-04e182da\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 20 20\" fill=\"currentColor\" class=\"w-5 h-5\">   <path d=\"M3.505 2.365A41.369 41.369 0 019 2c1.863 0 3.697.124 5.495.365 1.247.167 2.18 1.108 2.435 2.268a4.45 4.45 0 00-.577-.069 43.141 43.141 0 00-4.706 0C9.229 4.696 7.5 6.727 7.5 8.998v2.24c0 1.413.67 2.735 1.76 3.562l-2.98 2.98A.75.75 0 015 17.25v-3.443c-.501-.048-1-.106-1.495-.172C2.033 13.438 1 12.162 1 10.72V5.28c0-1.441 1.033-2.717 2.505-2.914z\"><\/path>   <path d=\"M14 6c-.762 0-1.52.02-2.271.062C10.157 6.148 9 7.472 9 8.998v2.24c0 1.519 1.147 2.839 2.71 2.935.214.013.428.024.642.034.2.009.385.09.518.224l2.35 2.35a.75.75 0 001.28-.531v-2.07c1.453-.195 2.5-1.463 2.5-2.915V8.998c0-1.526-1.157-2.85-2.729-2.936A41.645 41.645 0 0014 6z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Help with purchase<\/span><\/p>\n\n\n\n<h2 class=\"gb-headline gb-headline-a74d99bb gb-headline-text\">Are there any <strong>questions about the product<\/strong>?<\/h2>\n\n\n\n<p class=\"gb-headline gb-headline-c5a9534f gb-headline-text\">It is better to ask again before buying, before you end up holding the wrong product in your hands.<\/p>\n\n\n\n<a class=\"gb-button gb-button-7a0bb7da gb-button-text\" href=\"https:\/\/www.avanet.com\/en\/contact\/\">Ask question<\/a>\n\n<\/div><\/div><\/article><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"featured_media":99089,"template":"","meta":{"_acf_changed":false},"product_brand":[],"product_cat":[347],"product_tag":[],"class_list":{"0":"post-25071","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-uncategorized","8":"first","9":"instock","10":"taxable","11":"shipping-taxable","12":"purchasable","13":"product-type-variable","14":"has-default-attributes"},"acf":[],"_links":{"self":[{"href":"https:\/\/www.avanet.com\/en\/wp-json\/wp\/v2\/product\/25071","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.avanet.com\/en\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/www.avanet.com\/en\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.avanet.com\/en\/wp-json\/wp\/v2\/media\/99089"}],"wp:attachment":[{"href":"https:\/\/www.avanet.com\/en\/wp-json\/wp\/v2\/media?parent=25071"}],"wp:term":[{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/www.avanet.com\/en\/wp-json\/wp\/v2\/product_brand?post=25071"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/www.avanet.com\/en\/wp-json\/wp\/v2\/product_cat?post=25071"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/www.avanet.com\/en\/wp-json\/wp\/v2\/product_tag?post=25071"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}