The World’s Best Endpoint Protection
Malware • Ransomware • Exploits • Viruses
Extended Threat Response
Sophos Intercept X Advanced with XDR is the industry’s only XDR solution that synchronizes native endpoint, server, firewall, email, cloud and O365 security. Get a holistic view of your organization’s environment with the richest data set and deep analysis for threat detection, investigation and response for both dedicated SOC teams and IT admins.
Features | Intercept X Advanced | Intercept X Advanced with XDR | Intercept X Advanced with MTR Standard | Intercept X Advanced with MTR Advanced |
|---|---|---|---|---|
| ATTACK SURFACE | ||||
| Web Security | ||||
| Download Reputation | ||||
| Web Control / Category-based URL Blocking | ||||
| Peripheral Control | ||||
| Application Control | ||||
| BEFORE IT RUNS ON DEVICE | ||||
| Deep Learning Malware Detection | ||||
| Anti-Malware File Scanning | ||||
| Live Protection | ||||
| Pre-execution Behavior Analysis (HIPS) | ||||
| Potentially Unwanted Application (PUA) Blocking | ||||
| Intrusion Prevention System | ||||
| STOP RUNNING THREAT | ||||
| Data Loss Prevention | ||||
| Runtime Behavior Analysis (HIPS) | ||||
| Antimalware Scan Interface (AMSI) | ||||
| Malicious Traffic Detection (MTD) | ||||
| Exploit Prevention | ||||
| Active Adversary Mitigations | ||||
| Ransomware File Protection (CryptoGuard) | ||||
| Disk and Boot Record Protection (WipeGuard) | ||||
| Man-in-the-Browser Protection (Safe Browsing) | ||||
| Enhanced Application Lockdown | ||||
| DETECT | ||||
| Live Discover (Cross Estate SQL Querying for Threat Hunting & IT Security Operations Hygiene) | ||||
| SQL Query Library (pre-written, fully customizable queries) Suspicious Events Detection and Prioritization | ||||
| Suspicious Events Detection and Prioritization | ||||
| Fast Access, On-disk Data Storage (up to 90 days) | ||||
| Cross-product Data Sources e.g. Firewall, Email (Sophos XDR) | ||||
| Cross-product Querying (Sophos XDR) | ||||
| Sophos Data Lake Cloud Storage | 30 days | 30 days | 30 days | |
| Scheduled Queries | ||||
| INVESTIGATE | ||||
| Threat Cases (Root Cause Analysis) | ||||
| Deep Learning Malware Analysis | ||||
| Advanced On-demand SophosLabs Threat Intelligence | ||||
| Forensic Data Export | ||||
| REMEDIATE | ||||
| Automated Malware Removal | ||||
| Synchronized Security Heartbeat | ||||
| Sophos Clean | ||||
| Live Response (remotely investigate and take action) | ||||
| On-demand Endpoint Isolation | ||||
| Single-click “Clean and Block” | ||||
| HUMAN-LED THREAT HUNTING AND RESPONSE | ||||
| 24/7 Lead-driven Threat Hunting | ||||
| Security Health Checks | ||||
| Data Retention | ||||
| Activity Reporting | ||||
| Adversarial Detections | ||||
| Threat Neutralization & Remediation | ||||
| 24/7 Lead-less Threat Hunting | ||||
| Threat Response Team Lead | ||||
| Direct Call-in Support | ||||
| Proactive Security Posture Management | ||||