Content | Central Intercept X Essentials for Server is an entry level offering with a single policy that features the world’s best protection against ransomware, malware, and exploits. Organizations that require multiple or bespoke policies should consider Central Intercept X Advanced for Server instead. Deployment is available for Windows and Linux devices (note – Linux uses a separate agent, see the license guide for details on Linux capabilities). For virtual environments, a light agent for Windows Servers running on VMware ESXi and Microsoft Hyper-V provides off-board scanning and protection. | Central Intercept X Advanced for Server is the industry’s most comprehensive server protection built to stop the widest range of threats. Includes all features in Central Intercept X Essentials for Server plus multiple policies, control capabilities (Web, Peripheral, Application, DLP), and threat cases. Cloud Security Posture Management (CSPM) service for AWS, Azure, and Google Cloud includes Inventory of cloud resources, identification of insecure workload configuration, suspicious access events, and unusual network traffic vulnerabilities.
Features |
Intercept X Advanced for Server
|
Intercept X Advanced for Server with XDR
|
Intercept X Advanced for Server with MDR
|
Intercept X Advanced for Server with MDR Complete
|
ATTACK SURFACE REDUCTION |
Web Security |
|
|
|
|
Download Reputation |
|
|
|
|
Web Control / Category-based URL Blocking |
|
|
|
|
Peripheral Control |
|
|
|
|
Application Control |
|
|
|
|
Application Whitelisting (Server Lockdown) |
|
|
|
|
BEFORE IT RUNS ON DEVICE |
Deep Learning Malware Detection |
|
|
|
|
Anti-Malware File Scanning |
|
|
|
|
Live Protection |
|
|
|
|
Pre-execution Behavior Analysis (HIPS) |
|
|
|
|
Potentially Unwanted Application (PUA) Blocking |
|
|
|
|
Intrusion Prevention System |
|
|
|
|
STOP RUNNING THREAT |
Data Loss Prevention |
|
|
|
|
Runtime Behavior Analysis (HIPS) |
|
|
|
|
Antimalware Scan Interface (AMSI) |
|
|
|
|
Malicious Traffic Detection (MTD) |
|
|
|
|
Exploit Prevention |
|
|
|
|
Active Adversary Mitigations |
|
|
|
|
Ransomware File Protection (CryptoGuard) |
|
|
|
|
Disk and Boot Record Protection (WipeGuard) |
|
|
|
|
Man-in-the-Browser Protection (Safe Browsing) |
|
|
|
|
Enhanced Application Lockdown |
|
|
|
|
DETECT |
Linux Host and Container Behavioral and Exploit Runtime Decisions |
|
|
|
|
Live Discover (Cross Estate SQL Querying for Threat Hunting and IT Security Operations Hygiene) |
|
|
|
|
SQL Query Library (pre-written, fully customizable queries) |
|
|
|
|
Suspicious Events Detection and Prioritization |
|
|
|
|
Fast Access, On-disk Data Storage (up to 90 days) |
|
|
|
|
Cross-product Data Sources e.g. Firewall, Email |
|
|
|
|
Cross-product Querying |
|
|
|
|
Sophos Data Lake (Cloud Data Storage) |
|
30 days
|
30 days
|
30 days
|
Scheduled Queries |
|
|
|
|
INVESTIGATE |
Threat Cases (Root Cause Analysis) |
|
|
|
|
Deep Learning Malware Analysis |
|
|
|
|
Advanced On-demand SophosLabs Threat Intelligence |
|
|
|
|
Forensic Data Export |
|
|
|
|
REMEDIATE |
Automated Malware Removal |
|
|
|
|
Synchronized Security Heartbeat |
|
|
|
|
Sophos Clean |
|
|
|
|
Live Response (remotely investigate and take action) |
|
|
|
|
On-demand Endpoint Isolation |
|
|
|
|
Single-click “Clean and Block” |
|
|
|
|
VISIBILITY |
Cloud Workload Protection (Amazon Web Services, Microsoft Azure, Google Cloud Platform) |
|
|
|
|
Synchronized Application Control (visibility of applications) |
|
|
|
|
Cloud Security Posture Management (monitor AWS, Azure, GCP environments) |
|
|
|
|
CONTROL |
Server-specific Policy Management |
|
|
|
|
Update Cache and Message Relay |
|
|
|
|
Automatic Scanning Exclusions |
|
|
|
|
File Integrity Monitoring |
|
|
|
|
MANAGED SERVICE |
24/7 Lead-driven Threat Hunting |
|
|
|
|
Security Health Checks |
|
|
|
|
Data Retention |
|
|
|
|
Activity Reporting |
|
|
|
|
Adversarial Detections |
|
|
|
|
Threat Neutralization and Remediation |
|
|
|
|
Full-scale Incident Response: threats are fully eliminated
Requires full Sophos XDR agent (protection, detection and response)
|
|
|
|
|
Root Cause Analysis: performed to prevent future recurrence |
|
|
|
|
Dedicated Incident Response Lead |
|
|
|
|
| Includes: XGS 116 Appliance and Xstream Protection subscription.
Cannot be un-bundled.
Xstream Protection Bundle:
Base License:
Networking, wireless, Xstream Architecture, unlimited remote access VPN, site-to-site VPN, reporting
Network Protection:
Xstream TLS and DPI engine, IPS, ATP, Security Heartbeat, manage SD-RED, reporting
Web Protection:
Xstream TLS and DPI engine, Web Security and Control, Application Control, reporting
Zero-Day:
Protection Machine Learning and Sandboxing File Analysis, reporting
Central Orchestration:
SD-WAN VPN Orchestration, Central Firewall Advanced Reporting (30-days), MDR/XDR Connector
Enhanced Support:
24/7 support, feature updates, advanced replacement hardware warranty for term
Includes: XGS 116 Appliance and Standard Protection subscription.
Cannot be un-bundled.
Standard Protection Bundle:
Base License:
Networking, wireless, Xstream Architecture, Xstream SD-WAN, unlimited remote access VPN, site-to-site VPN
Network Protection:
Xstream TLS and DPI engine, IPS, ATP, Security Heartbeat, manage SD-RED, reporting
Web Protection:
Xstream TLS and DPI engine, Web Security and Control, Application Control, reporting
Enhanced Support:
24/7 support, feature updates, advanced replacement hardware warranty for term |
Tech Specs & Customization
Processor
One Intel® Xeon® E-2300 series processor with up to 8 cores per processor
One Intel® Pentium® processor with up to 2 cores per processor
Operating System
Canonical ® Ubuntu ® Server LTS
Citrix ® Hypervisor
Microsoft ® Windows Server ® with Hyper-V
RedHat ® Enterprise Linux
SUSE ® Linux Enterprise Server
VMware ® ESXi ®i
For specifications and interoperability details, see
Chipset
Intel® C256 series
Memoryi
DIMM Speed
Up to 3200 MT/s
Note: For Pentium® processor, maximum memory speed supported is 2666 MT/s
Memory Type
UDIMM
Memory Module Slots
4 DDR4 DIMM slots
Maximum RAM
UDIMM 128 GB
Storage
Front Bays
Up to 4 x 3.5-inch hot swap SAS/SATA (HDD/SSD) max 30.72 TB
Storage Controllers
Internal Controllers
PERC H345, PERC H755, HBA355i
External Controllers
HBA355e, 12 Gbps SAS Ext. HBA
Software RAID
S150
Internal Boot
USB or Boot Optimized Storage Subsystem (BOSS-S1): HWRAID 2 x M.2 SSDs 240 GB or 480 GB
Security
Cryptographically signed firmware
Secure Boot
Secure Erase
Silicon Root of Trust
System Lockdown (requires iDRAC9 Enterprise or Datacenter)
TPM 1.2/2.0 FIPS, CC-TCG certified, TPM 2.0 China NationZ
Management
Embedded / At-the-Server
iDRAC9
iDRAC Service Module
iDRAC Direct
Consoles
OpenManage Enterprise
OpenManage Power Manager plugin
OpenManage SupportAssist plugin
OpenManage Update Manager plugin
Mobility
OpenManage Mobile
Tools
iDRAC RESTful API with Redfish
RACADM CLI
IPMI
System Update Utility
Update Catalogs
OpenManage Integrations
BMC Truesight
Microsoft® System Center
RedHat® Ansible Modules
VMware® vCenter and vRealize Operations Manager
OpenManage connections
IBM Tivoli® Netcool/OMNIbus
IBM Tivoli® Network Manager IP Edition
Micro Focus® Operations Manager
Nagios® Core
Nagios® XI
Power Supplies
300 W Bronze AC/100-240 V
Cabled power supply
Ports
Network Options
2 x 1 GbE LOM
Front Ports
1 x Dedicated iDRAC Direct micro-USB
1 x USB 3.0
Rear Ports
5 x USB 2.0
1 x USB 3.0
1 x VGA
1 x Serial Port
1 x iDRAC dedicated NIC port
2 x NIC port
Internal ports
1 x USB 3.0 (optional)
Slots
PCIe
2 x PCIe Gen4 slots and 2 x PCIe Gen3 slots
Chassis
One fan
Bezel
Security bezel
Form Factor
4U mini tower server
Dimensions & Weight
Height: 360 mm (14.17 in.)
Width: 175 mm (6.88 in.)
Depth: 453.75 mm (33.48 in.) with bezel
Weight: 11.68 kg (25.74 lbs.) i
Rack Support
System is optimized to fit into EIA-310 spec Racks. Dell does not offer specific rails for this platform.
Recommended Support
Choose Dell ProSupport Plus for critical systems or Dell ProSupport for premium hardware and software support for your PowerEdge solution. Consulting and deployment offerings are also available. Contact your Dell representative today for more information. Availability and terms of Dell Services vary by region.
| Central Intercept X Advanced with Extended Detection and Response (XDR) is built for both cybersecurity analysts and IT administrators. Includes all features in Central Intercept X Advanced, as well as additional, powerful features for detection and remediation. Ask and answer business critical IT operations and threat hunting questions with Live Discover and respond remotely with Live Response. Includes 30 days of storage in the Sophos Data Lake and enables queries across the data collected from any Sophos XDR-ready product.
Features |
Intercept X Advanced
|
Intercept X Advanced with XDR
|
Intercept X Advanced with MDR
|
Intercept X Advanced with MDR Complete
|
ATTACK SURFACE |
Web Security |
|
|
|
|
Download Reputation |
|
|
|
|
Web Control / Category-based URL Blocking |
|
|
|
|
Peripheral Control |
|
|
|
|
Application Control |
|
|
|
|
BEFORE IT RUNS ON DEVICE |
Deep Learning Malware Detection |
|
|
|
|
Anti-Malware File Scanning |
|
|
|
|
Live Protection |
|
|
|
|
Pre-execution Behavior Analysis (HIPS) |
|
|
|
|
Potentially Unwanted Application (PUA) Blocking |
|
|
|
|
Intrusion Prevention System |
|
|
|
|
STOP RUNNING THREAT |
Data Loss Prevention |
|
|
|
|
Runtime Behavior Analysis (HIPS) |
|
|
|
|
Antimalware Scan Interface (AMSI) |
|
|
|
|
Malicious Traffic Detection (MTD) |
|
|
|
|
Exploit Prevention |
|
|
|
|
Active Adversary Mitigations |
|
|
|
|
Ransomware File Protection (CryptoGuard) |
|
|
|
|
Disk and Boot Record Protection (WipeGuard) |
|
|
|
|
Man-in-the-Browser Protection (Safe Browsing) |
|
|
|
|
Enhanced Application Lockdown |
|
|
|
|
DETECT |
|
|
|
SQL Query Library (pre-written, fully customizable queries) Suspicious Events Detection and Prioritization |
|
|
|
|
Suspicious Events Detection and Prioritization |
|
|
|
|
Fast Access, On-disk Data Storage (up to 90 days) |
|
|
|
|
Cross-product Data Sources e.g. Firewall, Email (Sophos XDR) |
|
|
|
|
Cross-product Querying (Sophos XDR) |
|
|
|
|
Sophos Data Lake Cloud Storage |
|
30 days
|
30 days
|
30 days
|
Scheduled Queries |
|
|
|
|
INVESTIGATE |
Threat Cases (Root Cause Analysis) |
|
|
|
|
Deep Learning Malware Analysis |
|
|
|
|
Advanced On-demand Sophos X-Ops Threat Intelligence |
|
|
|
|
Forensic Data Export |
|
|
|
|
REMEDIATE |
Automated Malware Removal |
|
|
|
|
Synchronized Security Heartbeat |
|
|
|
|
Sophos Clean |
|
|
|
|
Live Response (remotely investigate and take action) |
|
|
|
|
On-demand Endpoint Isolation |
|
|
|
|
Single-click “Clean and Block” |
|
|
|
|
HUMAN-LED THREAT HUNTING AND RESPONSE |
24/7 Lead-driven Threat Hunting |
|
|
|
|
Security Health Checks |
|
|
|
|
Data Retention |
|
|
|
|
Activity Reporting |
|
|
|
|
Adversarial Detections |
|
|
|
|
Threat Neutralization & Remediation |
|
|
|
|
Full-scale Incident Response: threats are fully eliminated
Requires full Sophos XDR agent (protection, detection and response)
|
|
|
|
|
Root Cause Analysis: performed to prevent future recurrence |
|
|
|
|
Dedicated Incident Response Lead |
|
|
|
|
ZERO TRUST NETWORK ACCESS |
Integrated ZTNA agent |
|
|
|
|
ZTNA Access Policy and Control |
Optional |
Optional |
Optional |
Optional |
| Includes: Management of Full Disk Encryption in Sophos Central. Supports BitLocker on Windows and FileVault on macOS. Self-help recovery with Sophos Central Self Service portal |
Additional information |
Product Type |
Security |
Form Factor |
Subscription |
Subscription |
1 Year, 2 Years, 3 Years |
Number of Users |
1 User, 5 Users, 10 Users, 15 Users, 20 Users, 30 Users, 40 Users, 50 Users, 60 Users, 70 Users, 80 Users, 90 Users, 100 Users |
Model Number |
SVRCIXE |
Brand |
Sophos |
|
Product Type |
Security |
Form Factor |
Subscription |
Model Number |
SVRCIXA |
Brand |
Sophos |
Subscription |
1 Year, 2 Years, 3 Years |
Number of Users |
1 User, 5 Users, 10 Users, 15 Users, 20 Users, 30 Users, 40 Users, 50 Users, 60 Users, 70 Users, 80 Users, 90 Users, 100 Users |
| |
|
Product Type |
Security |
Form Factor |
Subscription |
Model Number |
CIXAXDR |
Brand |
Sophos |
Subscription |
1 Year, 2 Years, 3 Years |
Number of Users |
1 User, 5 Users, 10 Users, 15 Users, 20 Users, 30 Users, 40 Users, 50 Users, 60 Users, 70 Users, 80 Users, 90 Users, 100 Users |
|
Product Type |
Security |
Form Factor |
Subscription |
Model Number |
CDE |
Brand |
Sophos |
Subscription |
1 Year, 2 Years, 3 Years |
Number of Users |
1 User, 5 Users, 10 Users, 15 Users, 20 Users, 30 Users, 40 Users, 50 Users, 60 Users, 70 Users, 80 Users, 90 Users, 100 Users |
|
Reviews
There are no reviews yet.