Secure your Windows and Linux servers whether in the cloud, on-premises, virtual or mixed environments.
Get details on system requirements and supported operating systems for Windows and Linux.
Solution Comparison
Features | Intercept X Advanced for Server | Intercept X Advanced for Server with XDR | Intercept X Advanced for Server with MTR Standard | Intercept X Advanced for Server with MTR Advanced |
---|
ATTACK SURFACE REDUCTION | ||||
Web Security | ✓ | ✓ | ✓ | ✓ |
Download Reputation | ✓ | ✓ | ✓ | ✓ |
Web Control / Category-based URL Blocking | ✓ | ✓ | ✓ | ✓ |
Peripheral Control | ✓ | ✓ | ✓ | ✓ |
Application Control | ✓ | ✓ | ✓ | ✓ |
Application Whitelisting (Server Lockdown) | ✓ | ✓ | ✓ | ✓ |
BEFORE IT RUNS ON DEVICE | ||||
Deep Learning Malware Detection | ✓ | ✓ | ✓ | ✓ |
Anti-Malware File Scanning | ✓ | ✓ | ✓ | ✓ |
Live Protection | ✓ | ✓ | ✓ | ✓ |
Pre-execution Behavior Analysis (HIPS) | ✓ | ✓ | ✓ | ✓ |
Potentially Unwanted Application (PUA) Blocking | ✓ | ✓ | ✓ | ✓ |
Intrusion Prevention System | ✓ | ✓ | ✓ | ✓ |
STOP RUNNING THREAT | ||||
Data Loss Prevention | ✓ | ✓ | ✓ | ✓ |
Runtime Behavior Analysis (HIPS) | ✓ | ✓ | ✓ | ✓ |
Antimalware Scan Interface (AMSI) | ✓ | ✓ | ✓ | ✓ |
Malicious Traffic Detection (MTD) | ✓ | ✓ | ✓ | ✓ |
Exploit Prevention | ✓ | ✓ | ✓ | ✓ |
Active Adversary Mitigations | ✓ | ✓ | ✓ | ✓ |
Ransomware File Protection (CryptoGuard) | ✓ | ✓ | ✓ | ✓ |
Disk and Boot Record Protection (WipeGuard) | ✓ | ✓ | ✓ | ✓ |
Man-in-the-Browser Protection (Safe Browsing) | ✓ | ✓ | ✓ | ✓ |
Enhanced Application Lockdown | ✓ | ✓ | ✓ | ✓ |
DETECT | ||||
Live Discover (Cross Estate SQL Querying for Threat Hunting & IT Security Operations Hygiene) | ✓ | ✓ | ✓ | |
SQL Query Library (pre-written, fully customizable queries) Suspicious Events Detection and Prioritization | ✓ | ✓ | ✓ | |
Suspicious Events Detection and Prioritization | ✓ | ✓ | ✓ | |
Fast Access, On-disk Data Storage (up to 90 days) | ✓ | ✓ | ✓ | |
Cross-product Data Sources e.g. Firewall, Email | ✓ | ✓ | ✓ | |
Cross-product Querying | ✓ | ✓ | ✓ | |
Sophos Data Lake (Cloud Data Storage) | 30 days | 30 days | 30 days | |
Scheduled Queries | ✓ | ✓ | ✓ |
INVESTIGATE | ||||
Threat Cases (Root Cause Analysis) | ✓ | ✓ | ✓ | ✓ |
Deep Learning Malware Analysis | ✓ | ✓ | ✓ | |
Advanced On-demand SophosLabs Threat Intelligence | ✓ | ✓ | ✓ | |
Forensic Data Export | ✓ | ✓ | ✓ |
REMEDIATE | ||||
Automated Malware Removal | ✓ | ✓ | ✓ | ✓ |
Synchronized Security Heartbeat | ✓ | ✓ | ✓ | ✓ |
Sophos Clean | ✓ | ✓ | ✓ | ✓ |
Live Response (remotely investigate and take action) | ✓ | ✓ | ✓ | |
On-demand Endpoint Isolation | ✓ | ✓ | ✓ | |
Single-click “Clean and Block” | ✓ | ✓ | ✓ |
VISIBILITY | ||||
Cloud Workload Protection (Amazon Web Services, Microsoft Azure, Google Cloud Platform) | ✓ | ✓ | ✓ | ✓ |
AWS Map, Multi-region Visualization | ✓ | ✓ | ✓ | ✓ |
Synchronized Application Control (visibility of applications) | ✓ | ✓ | ✓ | ✓ |
Cloud Security Posture Management (monitor and secure cloud hosts, serverless functions, S3 buckets and more) | ✓ | ✓ | ✓ | ✓ |
CONTROL | ||||
Server-specific Policy Management | ✓ | ✓ | ✓ | ✓ |
Update Cache and Message Relay | ✓ | ✓ | ✓ | ✓ |
Automatic Scanning Exclusions | ✓ | ✓ | ✓ | ✓ |
File Integrity Monitoring | ✓ | ✓ | ✓ | ✓ |
MANAGED SERVICE | ||||
24/7 Lead-driven Threat Hunting | ✓ | ✓ | ||
Security Health Checks | ✓ | ✓ | ||
Data Retention | ✓ | ✓ | ||
Activity Reporting | ✓ | ✓ | ||
Adversarial Detections | ✓ | ✓ | ||
Threat Neutralization & Remediation | ✓ | ✓ | ||
24/7 Lead-less Threat Hunting | ✓ | |||
Threat Response Team Lead | ✓ | |||
Direct Call-in Support | ✓ | |||
Proactive Security Posture Management | ✓ | |||
Buy Intercept X | Buy Intercept X with XDR | Buy Intercept X with MTR | Buy Intercept X with MTR Adv |
!