The World’s Best Endpoint Protection
Malware • Ransomware • Exploits • Viruses
Extended Threat Response
Sophos Intercept X Advanced with XDR is the industry’s only XDR solution that synchronizes native endpoint, server, firewall, email, cloud and O365 security. Get a holistic view of your organization’s environment with the richest data set and deep analysis for threat detection, investigation and response for both dedicated SOC teams and IT admins.
Features | Intercept X Advanced | Intercept X Advanced with XDR | Intercept X Advanced with MTR Standard | Intercept X Advanced with MTR Advanced |
---|---|---|---|---|
ATTACK SURFACE | ||||
Web Security | ||||
Download Reputation | ||||
Web Control / Category-based URL Blocking | ||||
Peripheral Control | ||||
Application Control | ||||
BEFORE IT RUNS ON DEVICE | ||||
Deep Learning Malware Detection | ||||
Anti-Malware File Scanning | ||||
Live Protection | ||||
Pre-execution Behavior Analysis (HIPS) | ||||
Potentially Unwanted Application (PUA) Blocking | ||||
Intrusion Prevention System | ||||
STOP RUNNING THREAT | ||||
Data Loss Prevention | ||||
Runtime Behavior Analysis (HIPS) | ||||
Antimalware Scan Interface (AMSI) | ||||
Malicious Traffic Detection (MTD) | ||||
Exploit Prevention | ||||
Active Adversary Mitigations | ||||
Ransomware File Protection (CryptoGuard) | ||||
Disk and Boot Record Protection (WipeGuard) | ||||
Man-in-the-Browser Protection (Safe Browsing) | ||||
Enhanced Application Lockdown | ||||
DETECT | ||||
Live Discover (Cross Estate SQL Querying for Threat Hunting & IT Security Operations Hygiene) | ||||
SQL Query Library (pre-written, fully customizable queries) Suspicious Events Detection and Prioritization | ||||
Suspicious Events Detection and Prioritization | ||||
Fast Access, On-disk Data Storage (up to 90 days) | ||||
Cross-product Data Sources e.g. Firewall, Email (Sophos XDR) | ||||
Cross-product Querying (Sophos XDR) | ||||
Sophos Data Lake Cloud Storage | 30 days | 30 days | 30 days | |
Scheduled Queries | ||||
INVESTIGATE | ||||
Threat Cases (Root Cause Analysis) | ||||
Deep Learning Malware Analysis | ||||
Advanced On-demand SophosLabs Threat Intelligence | ||||
Forensic Data Export | ||||
REMEDIATE | ||||
Automated Malware Removal | ||||
Synchronized Security Heartbeat | ||||
Sophos Clean | ||||
Live Response (remotely investigate and take action) | ||||
On-demand Endpoint Isolation | ||||
Single-click “Clean and Block” | ||||
HUMAN-LED THREAT HUNTING AND RESPONSE | ||||
24/7 Lead-driven Threat Hunting | ||||
Security Health Checks | ||||
Data Retention | ||||
Activity Reporting | ||||
Adversarial Detections | ||||
Threat Neutralization & Remediation | ||||
24/7 Lead-less Threat Hunting | ||||
Threat Response Team Lead | ||||
Direct Call-in Support | ||||
Proactive Security Posture Management |