Secure your Windows and Linux servers whether in the cloud, on-premises, virtual or mixed environments.
Get details on system requirements and supported operating systems for Windows and Linux.
Solution Comparison
Features | Intercept X Advanced for Server | Intercept X Advanced for Server with XDR | Intercept X Advanced for Server with MTR Standard | Intercept X Advanced for Server with MTR Advanced |
---|
ATTACK SURFACE REDUCTION | ||||
Web Security | ||||
Download Reputation | ||||
Web Control / Category-based URL Blocking | ||||
Peripheral Control | ||||
Application Control | ||||
Application Whitelisting (Server Lockdown) |
BEFORE IT RUNS ON DEVICE | ||||
Deep Learning Malware Detection | ||||
Anti-Malware File Scanning | ||||
Live Protection | ||||
Pre-execution Behavior Analysis (HIPS) | ||||
Potentially Unwanted Application (PUA) Blocking | ||||
Intrusion Prevention System |
STOP RUNNING THREAT | ||||
Data Loss Prevention | ||||
Runtime Behavior Analysis (HIPS) | ||||
Antimalware Scan Interface (AMSI) | ||||
Malicious Traffic Detection (MTD) | ||||
Exploit Prevention | ||||
Active Adversary Mitigations | ||||
Ransomware File Protection (CryptoGuard) | ||||
Disk and Boot Record Protection (WipeGuard) | ||||
Man-in-the-Browser Protection (Safe Browsing) | ||||
Enhanced Application Lockdown |
DETECT | ||||
Live Discover (Cross Estate SQL Querying for Threat Hunting & IT Security Operations Hygiene) | ||||
SQL Query Library (pre-written, fully customizable queries) Suspicious Events Detection and Prioritization | ||||
Suspicious Events Detection and Prioritization | ||||
Fast Access, On-disk Data Storage (up to 90 days) | ||||
Cross-product Data Sources e.g. Firewall, Email | ||||
Cross-product Querying | ||||
Sophos Data Lake (Cloud Data Storage) | 30 days | 30 days | 30 days | |
Scheduled Queries |
INVESTIGATE | ||||
Threat Cases (Root Cause Analysis) | ||||
Deep Learning Malware Analysis | ||||
Advanced On-demand SophosLabs Threat Intelligence | ||||
Forensic Data Export |
REMEDIATE | ||||
Automated Malware Removal | ||||
Synchronized Security Heartbeat | ||||
Sophos Clean | ||||
Live Response (remotely investigate and take action) | ||||
On-demand Endpoint Isolation | ||||
Single-click “Clean and Block” |
VISIBILITY | ||||
Cloud Workload Protection (Amazon Web Services, Microsoft Azure, Google Cloud Platform) | ||||
AWS Map, Multi-region Visualization | ||||
Synchronized Application Control (visibility of applications) | ||||
Cloud Security Posture Management (monitor and secure cloud hosts, serverless functions, S3 buckets and more) |
CONTROL | ||||
Server-specific Policy Management | ||||
Update Cache and Message Relay | ||||
Automatic Scanning Exclusions | ||||
File Integrity Monitoring |
MANAGED SERVICE | ||||
24/7 Lead-driven Threat Hunting | ||||
Security Health Checks | ||||
Data Retention | ||||
Activity Reporting | ||||
Adversarial Detections | ||||
Threat Neutralization & Remediation | ||||
24/7 Lead-less Threat Hunting | ||||
Threat Response Team Lead | ||||
Direct Call-in Support | ||||
Proactive Security Posture Management | ||||
Buy Intercept X | Buy Intercept X with XDR | Buy Intercept X with MTR | Buy Intercept X with MTR Adv |