Content | Includes: Award-winning Mobile Threat Defense for Android, iOS, iPadOS, and Chromebook with Device, Network, and App Security. Centralized deployment, configuration, and reporting. Integrates with Sophos Mobile UEM or third party EMM solutions. | | Central Intercept X Essentials for Server is an entry level offering with a single policy that features the world’s best protection against ransomware, malware, and exploits. Organizations that require multiple or bespoke policies should consider Central Intercept X Advanced for Server instead. Deployment is available for Windows and Linux devices (note – Linux uses a separate agent, see the license guide for details on Linux capabilities). For virtual environments, a light agent for Windows Servers running on VMware ESXi and Microsoft Hyper-V provides off-board scanning and protection. | Central Intercept X Advanced is the industry’s most comprehensive endpoint protection built to stop the widest range of threats. Includes all features in Central Intercept X Essentials plus multiple policies, control capabilities (Web, Peripheral, Application, DLP) and threat cases. For virtual environments, a light agent for Windows Desktop VM’s provides off-board scanning and protection.
Features |
Intercept X Advanced
|
Intercept X Advanced with XDR
|
Intercept X Advanced with MDR
|
Intercept X Advanced with MDR Complete
|
ATTACK SURFACE |
Web Security |
|
|
|
|
Download Reputation |
|
|
|
|
Web Control / Category-based URL Blocking |
|
|
|
|
Peripheral Control |
|
|
|
|
Application Control |
|
|
|
|
BEFORE IT RUNS ON DEVICE |
Deep Learning Malware Detection |
|
|
|
|
Anti-Malware File Scanning |
|
|
|
|
Live Protection |
|
|
|
|
Pre-execution Behavior Analysis (HIPS) |
|
|
|
|
Potentially Unwanted Application (PUA) Blocking |
|
|
|
|
Intrusion Prevention System |
|
|
|
|
STOP RUNNING THREAT |
Data Loss Prevention |
|
|
|
|
Runtime Behavior Analysis (HIPS) |
|
|
|
|
Antimalware Scan Interface (AMSI) |
|
|
|
|
Malicious Traffic Detection (MTD) |
|
|
|
|
Exploit Prevention |
|
|
|
|
Active Adversary Mitigations |
|
|
|
|
Ransomware File Protection (CryptoGuard) |
|
|
|
|
Disk and Boot Record Protection (WipeGuard) |
|
|
|
|
Man-in-the-Browser Protection (Safe Browsing) |
|
|
|
|
Enhanced Application Lockdown |
|
|
|
|
DETECT |
|
|
|
SQL Query Library (pre-written, fully customizable queries) Suspicious Events Detection and Prioritization |
|
|
|
|
Suspicious Events Detection and Prioritization |
|
|
|
|
Fast Access, On-disk Data Storage (up to 90 days) |
|
|
|
|
Cross-product Data Sources e.g. Firewall, Email (Sophos XDR) |
|
|
|
|
Cross-product Querying (Sophos XDR) |
|
|
|
|
Sophos Data Lake Cloud Storage |
|
30 days
|
30 days
|
30 days
|
Scheduled Queries |
|
|
|
|
INVESTIGATE |
Threat Cases (Root Cause Analysis) |
|
|
|
|
Deep Learning Malware Analysis |
|
|
|
|
Advanced On-demand Sophos X-Ops Threat Intelligence |
|
|
|
|
Forensic Data Export |
|
|
|
|
REMEDIATE |
Automated Malware Removal |
|
|
|
|
Synchronized Security Heartbeat |
|
|
|
|
Sophos Clean |
|
|
|
|
Live Response (remotely investigate and take action) |
|
|
|
|
On-demand Endpoint Isolation |
|
|
|
|
Single-click “Clean and Block” |
|
|
|
|
HUMAN-LED THREAT HUNTING AND RESPONSE |
24/7 Lead-driven Threat Hunting |
|
|
|
|
Security Health Checks |
|
|
|
|
Data Retention |
|
|
|
|
Activity Reporting |
|
|
|
|
Adversarial Detections |
|
|
|
|
Threat Neutralization & Remediation |
|
|
|
|
Full-scale Incident Response: threats are fully eliminated
Requires full Sophos XDR agent (protection, detection and response)
|
|
|
|
|
Root Cause Analysis: performed to prevent future recurrence |
|
|
|
|
Dedicated Incident Response Lead |
|
|
|
|
ZERO TRUST NETWORK ACCESS |
Integrated ZTNA agent |
|
|
|
|
ZTNA Access Policy and Control |
Optional |
Optional |
Optional |
Optional |
| Central Intercept X Advanced with Extended Detection and Response (XDR) is built for both cybersecurity analysts and IT administrators. Includes all features in Central Intercept X Advanced, as well as additional, powerful features for detection and remediation. Ask and answer business critical IT operations and threat hunting questions with Live Discover and respond remotely with Live Response. Includes 30 days of storage in the Sophos Data Lake and enables queries across the data collected from any Sophos XDR-ready product.
Features |
Intercept X Advanced
|
Intercept X Advanced with XDR
|
Intercept X Advanced with MDR
|
Intercept X Advanced with MDR Complete
|
ATTACK SURFACE |
Web Security |
|
|
|
|
Download Reputation |
|
|
|
|
Web Control / Category-based URL Blocking |
|
|
|
|
Peripheral Control |
|
|
|
|
Application Control |
|
|
|
|
BEFORE IT RUNS ON DEVICE |
Deep Learning Malware Detection |
|
|
|
|
Anti-Malware File Scanning |
|
|
|
|
Live Protection |
|
|
|
|
Pre-execution Behavior Analysis (HIPS) |
|
|
|
|
Potentially Unwanted Application (PUA) Blocking |
|
|
|
|
Intrusion Prevention System |
|
|
|
|
STOP RUNNING THREAT |
Data Loss Prevention |
|
|
|
|
Runtime Behavior Analysis (HIPS) |
|
|
|
|
Antimalware Scan Interface (AMSI) |
|
|
|
|
Malicious Traffic Detection (MTD) |
|
|
|
|
Exploit Prevention |
|
|
|
|
Active Adversary Mitigations |
|
|
|
|
Ransomware File Protection (CryptoGuard) |
|
|
|
|
Disk and Boot Record Protection (WipeGuard) |
|
|
|
|
Man-in-the-Browser Protection (Safe Browsing) |
|
|
|
|
Enhanced Application Lockdown |
|
|
|
|
DETECT |
|
|
|
SQL Query Library (pre-written, fully customizable queries) Suspicious Events Detection and Prioritization |
|
|
|
|
Suspicious Events Detection and Prioritization |
|
|
|
|
Fast Access, On-disk Data Storage (up to 90 days) |
|
|
|
|
Cross-product Data Sources e.g. Firewall, Email (Sophos XDR) |
|
|
|
|
Cross-product Querying (Sophos XDR) |
|
|
|
|
Sophos Data Lake Cloud Storage |
|
30 days
|
30 days
|
30 days
|
Scheduled Queries |
|
|
|
|
INVESTIGATE |
Threat Cases (Root Cause Analysis) |
|
|
|
|
Deep Learning Malware Analysis |
|
|
|
|
Advanced On-demand Sophos X-Ops Threat Intelligence |
|
|
|
|
Forensic Data Export |
|
|
|
|
REMEDIATE |
Automated Malware Removal |
|
|
|
|
Synchronized Security Heartbeat |
|
|
|
|
Sophos Clean |
|
|
|
|
Live Response (remotely investigate and take action) |
|
|
|
|
On-demand Endpoint Isolation |
|
|
|
|
Single-click “Clean and Block” |
|
|
|
|
HUMAN-LED THREAT HUNTING AND RESPONSE |
24/7 Lead-driven Threat Hunting |
|
|
|
|
Security Health Checks |
|
|
|
|
Data Retention |
|
|
|
|
Activity Reporting |
|
|
|
|
Adversarial Detections |
|
|
|
|
Threat Neutralization & Remediation |
|
|
|
|
Full-scale Incident Response: threats are fully eliminated
Requires full Sophos XDR agent (protection, detection and response)
|
|
|
|
|
Root Cause Analysis: performed to prevent future recurrence |
|
|
|
|
Dedicated Incident Response Lead |
|
|
|
|
ZERO TRUST NETWORK ACCESS |
Integrated ZTNA agent |
|
|
|
|
ZTNA Access Policy and Control |
Optional |
Optional |
Optional |
Optional |
| Includes: Email threat protection: Mailflow Rule integration and post-delivery protection for Microsoft 365, phishing impersonation protection, cloud sandboxing, state-of-the-art machine learning, URL protection, SPF, DKIM and DMARC sender authentication. Data loss prevention: Flexible DLP and Content Control Policies with integrated encryption (TLS, push-based, and S/MIME). |
Additional information |
Product Type |
Security |
Form Factor |
Subscription |
Model Number |
CIXMOB |
Brand |
Sophos |
Subscription |
1 Year, 2 Years, 3 Years |
Number of Users |
1 User, 5 Users, 10 Users, 15 Users, 20 Users, 30 Users, 40 Users, 50 Users, 60 Users, 70 Users, 80 Users, 90 Users, 100 Users |
|
|
Product Type |
Security |
Form Factor |
Subscription |
Subscription |
1 Year, 2 Years, 3 Years |
Number of Users |
1 User, 5 Users, 10 Users, 15 Users, 20 Users, 30 Users, 40 Users, 50 Users, 60 Users, 70 Users, 80 Users, 90 Users, 100 Users |
Model Number |
SVRCIXE |
Brand |
Sophos |
|
Product Type |
Security |
Form Factor |
Subscription |
Model Number |
CIXA |
Brand |
Sophos |
Subscription |
1 Year, 2 Years, 3 Years |
Number of Users |
1 User, 5 Users, 10 Users, 15 Users, 20 Users, 30 Users, 40 Users, 50 Users, 60 Users, 70 Users, 80 Users, 90 Users, 100 Users |
|
Product Type |
Security |
Form Factor |
Subscription |
Model Number |
CIXAXDR |
Brand |
Sophos |
Subscription |
1 Year, 2 Years, 3 Years |
Number of Users |
1 User, 5 Users, 10 Users, 15 Users, 20 Users, 30 Users, 40 Users, 50 Users, 60 Users, 70 Users, 80 Users, 90 Users, 100 Users |
|
Product Type |
Security |
Form Factor |
Subscription |
Brand |
Sophos |
Model Number |
CEMA |
Subscription |
1 Year, 2 Years, 3 Years |
Number of Users |
1 User, 5 Users, 10 Users, 15 Users, 20 Users, 30 Users, 40 Users, 50 Users, 60 Users, 70 Users, 80 Users, 90 Users, 100 Users |
|
Reviews
There are no reviews yet.