Content | Central Intercept X Essentials is an entry level offering with a single policy that features the world’s best protection against ransomware, malware, and exploits. Organizations that require multiple or bespoke policies should consider Central Intercept X Advanced instead. Deployment is available for Windows and macOS devices. Share health state information with other Sophos products using the Security heartbeat (XG Firewall, APX Access Point). | Includes: Email threat protection: Mailflow Rule integration and post-delivery protection for Microsoft 365, phishing impersonation protection, cloud sandboxing, state-of-the-art machine learning, URL protection, SPF, DKIM and DMARC sender authentication. Data loss prevention: Flexible DLP and Content Control Policies with integrated encryption (TLS, push-based, and S/MIME). | Central Intercept X Advanced for Server with Extended Detection and Response (XDR) is built for both cybersecurity analysts and IT administrators. Includes all features in Central Intercept X Advanced for Server, as well as additional, powerful features for detection and remediation. Ask and answer business critical IT operations and threat hunting questions with Live Discover and respond remotely with Live Response. Includes 30 days of storage in the Sophos Data Lake and enables queries across the data collected from any Sophos XDR-ready product.
Features |
Intercept X Advanced for Server
|
Intercept X Advanced for Server with XDR
|
Intercept X Advanced for Server with MDR
|
Intercept X Advanced for Server with MDR Complete
|
ATTACK SURFACE REDUCTION |
Web Security |
|
|
|
|
Download Reputation |
|
|
|
|
Web Control / Category-based URL Blocking |
|
|
|
|
Peripheral Control |
|
|
|
|
Application Control |
|
|
|
|
Application Whitelisting (Server Lockdown) |
|
|
|
|
BEFORE IT RUNS ON DEVICE |
Deep Learning Malware Detection |
|
|
|
|
Anti-Malware File Scanning |
|
|
|
|
Live Protection |
|
|
|
|
Pre-execution Behavior Analysis (HIPS) |
|
|
|
|
Potentially Unwanted Application (PUA) Blocking |
|
|
|
|
Intrusion Prevention System |
|
|
|
|
STOP RUNNING THREAT |
Data Loss Prevention |
|
|
|
|
Runtime Behavior Analysis (HIPS) |
|
|
|
|
Antimalware Scan Interface (AMSI) |
|
|
|
|
Malicious Traffic Detection (MTD) |
|
|
|
|
Exploit Prevention |
|
|
|
|
Active Adversary Mitigations |
|
|
|
|
Ransomware File Protection (CryptoGuard) |
|
|
|
|
Disk and Boot Record Protection (WipeGuard) |
|
|
|
|
Man-in-the-Browser Protection (Safe Browsing) |
|
|
|
|
Enhanced Application Lockdown |
|
|
|
|
DETECT |
Linux Host and Container Behavioral and Exploit Runtime Decisions |
|
|
|
|
Live Discover (Cross Estate SQL Querying for Threat Hunting and IT Security Operations Hygiene) |
|
|
|
|
SQL Query Library (pre-written, fully customizable queries) |
|
|
|
|
Suspicious Events Detection and Prioritization |
|
|
|
|
Fast Access, On-disk Data Storage (up to 90 days) |
|
|
|
|
Cross-product Data Sources e.g. Firewall, Email |
|
|
|
|
Cross-product Querying |
|
|
|
|
Sophos Data Lake (Cloud Data Storage) |
|
30 days
|
30 days
|
30 days
|
Scheduled Queries |
|
|
|
|
INVESTIGATE |
Threat Cases (Root Cause Analysis) |
|
|
|
|
Deep Learning Malware Analysis |
|
|
|
|
Advanced On-demand SophosLabs Threat Intelligence |
|
|
|
|
Forensic Data Export |
|
|
|
|
REMEDIATE |
Automated Malware Removal |
|
|
|
|
Synchronized Security Heartbeat |
|
|
|
|
Sophos Clean |
|
|
|
|
Live Response (remotely investigate and take action) |
|
|
|
|
On-demand Endpoint Isolation |
|
|
|
|
Single-click “Clean and Block” |
|
|
|
|
VISIBILITY |
Cloud Workload Protection (Amazon Web Services, Microsoft Azure, Google Cloud Platform) |
|
|
|
|
Synchronized Application Control (visibility of applications) |
|
|
|
|
Cloud Security Posture Management (monitor AWS, Azure, GCP environments) |
|
|
|
|
CONTROL |
Server-specific Policy Management |
|
|
|
|
Update Cache and Message Relay |
|
|
|
|
Automatic Scanning Exclusions |
|
|
|
|
File Integrity Monitoring |
|
|
|
|
MANAGED SERVICE |
24/7 Lead-driven Threat Hunting |
|
|
|
|
Security Health Checks |
|
|
|
|
Data Retention |
|
|
|
|
Activity Reporting |
|
|
|
|
Adversarial Detections |
|
|
|
|
Threat Neutralization and Remediation |
|
|
|
|
Full-scale Incident Response: threats are fully eliminated
Requires full Sophos XDR agent (protection, detection and response)
|
|
|
|
|
Root Cause Analysis: performed to prevent future recurrence |
|
|
|
|
Dedicated Incident Response Lead |
|
|
|
|
| | Includes: Management of Full Disk Encryption in Sophos Central. Supports BitLocker on Windows and FileVault on macOS. Self-help recovery with Sophos Central Self Service portal | Includes: XGS 107 Appliance and Xstream Protection subscription.
Cannot be un-bundled.
Xstream Protection Bundle:
Base License:
Networking, wireless, Xstream Architecture, unlimited remote access VPN, site-to-site VPN, reporting
Network Protection:
Xstream TLS and DPI engine, IPS, ATP, Security Heartbeat, manage SD-RED, reporting
Web Protection:
Xstream TLS and DPI engine, Web Security and Control, Application Control, reporting
Zero-Day:
Protection Machine Learning and Sandboxing File Analysis, reporting
Central Orchestration:
SD-WAN VPN Orchestration, Central Firewall Advanced Reporting (30-days), MDR/XDR Connector
Enhanced Support:
24/7 support, feature updates, advanced replacement hardware warranty for term
Includes: XGS 107 Appliance and Standard Protection subscription.
Cannot be un-bundled.
Standard Protection Bundle:
Base License:
Networking, wireless, Xstream Architecture, Xstream SD-WAN, unlimited remote access VPN, site-to-site VPN
Network Protection:
Xstream TLS and DPI engine, IPS, ATP, Security Heartbeat, manage SD-RED, reporting
Web Protection:
Xstream TLS and DPI engine, Web Security and Control, Application Control, reporting
Enhanced Support:
24/7 support, feature updates, advanced replacement hardware warranty for term |
Additional information |
Product Type |
Security |
Form Factor |
Subscription |
Model Number |
CIXE |
Brand |
Sophos |
Subscription |
1 Year, 2 Years, 3 Years |
Number of Users |
1 User, 5 Users, 10 Users, 15 Users, 20 Users, 30 Users, 40 Users, 50 Users, 60 Users, 70 Users, 80 Users, 90 Users, 100 Users |
|
Product Type |
Security |
Form Factor |
Subscription |
Brand |
Sophos |
Model Number |
CEMA |
Subscription |
1 Year, 2 Years, 3 Years |
Number of Users |
1 User, 5 Users, 10 Users, 15 Users, 20 Users, 30 Users, 40 Users, 50 Users, 60 Users, 70 Users, 80 Users, 90 Users, 100 Users |
|
Product Type |
Security |
Form Factor |
Subscription |
Model Number |
SVRCIXAXDR |
Brand |
Sophos |
Subscription |
1 Year, 2 Years, 3 Years |
Number of Users |
1 User, 5 Users, 10 Users, 15 Users, 20 Users, 30 Users, 40 Users, 50 Users, 60 Users, 70 Users, 80 Users, 90 Users, 100 Users |
|
|
Product Type |
Security |
Form Factor |
Subscription |
Model Number |
CDE |
Brand |
Sophos |
Subscription |
1 Year, 2 Years, 3 Years |
Number of Users |
1 User, 5 Users, 10 Users, 15 Users, 20 Users, 30 Users, 40 Users, 50 Users, 60 Users, 70 Users, 80 Users, 90 Users, 100 Users |
|
Subscription |
1 Year, 3 Years, 5 Years |
Bundle Type |
Base Appliance, Standard Bundle, Xstream Bundle |
|
Reviews
There are no reviews yet.