Content | Includes: Mobile Device Management (MDM), Mobile Application Management (MAM), Mobile Content Management (MCM), Mobile Email Management (MEM), Mobile Threat Defense (MTD). Intercept X for Mobile, Secure Workspace and Secure Email container apps, and Sophos Mobile SDK. For BYOD or business-owned Android, iOS, iPadOS, Windows 10, macOS and Chromebook devices. Some features are Not available on all platforms. [Managed on premises] | Central Intercept X Essentials is an entry level offering with a single policy that features the world’s best protection against ransomware, malware, and exploits. Organizations that require multiple or bespoke policies should consider Central Intercept X Advanced instead. Deployment is available for Windows and macOS devices. Share health state information with other Sophos products using the Security heartbeat (XG Firewall, APX Access Point). | Central Intercept X Advanced is the industry’s most comprehensive endpoint protection built to stop the widest range of threats. Includes all features in Central Intercept X Essentials plus multiple policies, control capabilities (Web, Peripheral, Application, DLP) and threat cases. For virtual environments, a light agent for Windows Desktop VM’s provides off-board scanning and protection.
Features |
Intercept X Advanced
|
Intercept X Advanced with XDR
|
Intercept X Advanced with MDR
|
Intercept X Advanced with MDR Complete
|
ATTACK SURFACE |
Web Security |
|
|
|
|
Download Reputation |
|
|
|
|
Web Control / Category-based URL Blocking |
|
|
|
|
Peripheral Control |
|
|
|
|
Application Control |
|
|
|
|
BEFORE IT RUNS ON DEVICE |
Deep Learning Malware Detection |
|
|
|
|
Anti-Malware File Scanning |
|
|
|
|
Live Protection |
|
|
|
|
Pre-execution Behavior Analysis (HIPS) |
|
|
|
|
Potentially Unwanted Application (PUA) Blocking |
|
|
|
|
Intrusion Prevention System |
|
|
|
|
STOP RUNNING THREAT |
Data Loss Prevention |
|
|
|
|
Runtime Behavior Analysis (HIPS) |
|
|
|
|
Antimalware Scan Interface (AMSI) |
|
|
|
|
Malicious Traffic Detection (MTD) |
|
|
|
|
Exploit Prevention |
|
|
|
|
Active Adversary Mitigations |
|
|
|
|
Ransomware File Protection (CryptoGuard) |
|
|
|
|
Disk and Boot Record Protection (WipeGuard) |
|
|
|
|
Man-in-the-Browser Protection (Safe Browsing) |
|
|
|
|
Enhanced Application Lockdown |
|
|
|
|
DETECT |
|
|
|
SQL Query Library (pre-written, fully customizable queries) Suspicious Events Detection and Prioritization |
|
|
|
|
Suspicious Events Detection and Prioritization |
|
|
|
|
Fast Access, On-disk Data Storage (up to 90 days) |
|
|
|
|
Cross-product Data Sources e.g. Firewall, Email (Sophos XDR) |
|
|
|
|
Cross-product Querying (Sophos XDR) |
|
|
|
|
Sophos Data Lake Cloud Storage |
|
30 days
|
30 days
|
30 days
|
Scheduled Queries |
|
|
|
|
INVESTIGATE |
Threat Cases (Root Cause Analysis) |
|
|
|
|
Deep Learning Malware Analysis |
|
|
|
|
Advanced On-demand Sophos X-Ops Threat Intelligence |
|
|
|
|
Forensic Data Export |
|
|
|
|
REMEDIATE |
Automated Malware Removal |
|
|
|
|
Synchronized Security Heartbeat |
|
|
|
|
Sophos Clean |
|
|
|
|
Live Response (remotely investigate and take action) |
|
|
|
|
On-demand Endpoint Isolation |
|
|
|
|
Single-click “Clean and Block” |
|
|
|
|
HUMAN-LED THREAT HUNTING AND RESPONSE |
24/7 Lead-driven Threat Hunting |
|
|
|
|
Security Health Checks |
|
|
|
|
Data Retention |
|
|
|
|
Activity Reporting |
|
|
|
|
Adversarial Detections |
|
|
|
|
Threat Neutralization & Remediation |
|
|
|
|
Full-scale Incident Response: threats are fully eliminated
Requires full Sophos XDR agent (protection, detection and response)
|
|
|
|
|
Root Cause Analysis: performed to prevent future recurrence |
|
|
|
|
Dedicated Incident Response Lead |
|
|
|
|
ZERO TRUST NETWORK ACCESS |
Integrated ZTNA agent |
|
|
|
|
ZTNA Access Policy and Control |
Optional |
Optional |
Optional |
Optional |
| Includes: Mobile Device Management (MDM), Mobile Application Management (MAM), Mobile Email Management (MEM). For BYOD or business-owned Android, iOS, iPadOS, Windows 10 and macOS devices. Some features are Not available on all platforms. [Managed on premises] | | Includes: Email threat protection: Mailflow Rule integration and post-delivery protection for Microsoft 365, phishing impersonation protection, cloud sandboxing, state-of-the-art machine learning, URL protection, SPF, DKIM and DMARC sender authentication. Data loss prevention: Flexible DLP and Content Control Policies with integrated encryption (TLS, push-based, and S/MIME). |
Additional information |
Product Type |
Security |
Form Factor |
Subscription |
Model Number |
CMA |
Brand |
Sophos |
Subscription |
1 Year, 2 Years, 3 Years |
Number of Users |
1 User, 5 Users, 10 Users, 15 Users, 20 Users, 30 Users, 40 Users, 50 Users, 60 Users, 70 Users, 80 Users, 90 Users, 100 Users |
|
Product Type |
Security |
Form Factor |
Subscription |
Model Number |
CIXE |
Brand |
Sophos |
Subscription |
1 Year, 2 Years, 3 Years |
Number of Users |
1 User, 5 Users, 10 Users, 15 Users, 20 Users, 30 Users, 40 Users, 50 Users, 60 Users, 70 Users, 80 Users, 90 Users, 100 Users |
|
Product Type |
Security |
Form Factor |
Subscription |
Model Number |
CIXA |
Brand |
Sophos |
Subscription |
1 Year, 2 Years, 3 Years |
Number of Users |
1 User, 5 Users, 10 Users, 15 Users, 20 Users, 30 Users, 40 Users, 50 Users, 60 Users, 70 Users, 80 Users, 90 Users, 100 Users |
|
Product Type |
Security |
Form Factor |
Subscription |
Model Number |
CMS |
Brand |
Sophos |
Subscription |
1 Year, 2 Years, 3 Years |
Number of Users |
1 User, 5 Users, 10 Users, 15 Users, 20 Users, 30 Users, 40 Users, 50 Users, 60 Users, 70 Users, 80 Users, 90 Users, 100 Users |
|
|
Product Type |
Security |
Form Factor |
Subscription |
Brand |
Sophos |
Model Number |
CEMA |
Subscription |
1 Year, 2 Years, 3 Years |
Number of Users |
1 User, 5 Users, 10 Users, 15 Users, 20 Users, 30 Users, 40 Users, 50 Users, 60 Users, 70 Users, 80 Users, 90 Users, 100 Users |
|
Reviews
There are no reviews yet.