Secure your Windows and Linux servers whether in the cloud, on-premises, virtual or mixed environments.

Get details on system requirements and supported operating systems for Windows and Linux.

Solution Comparison

Features Intercept X Advanced for Server Intercept X Advanced for Server with XDR Intercept X Advanced for Server with MTR Standard Intercept X Advanced for Server with MTR Advanced
ATTACK SURFACE REDUCTION
Web Security
Download Reputation
Web Control / Category-based URL Blocking
Peripheral Control
Application Control
Application Whitelisting (Server Lockdown)
BEFORE IT RUNS ON DEVICE
Deep Learning Malware Detection
Anti-Malware File Scanning
Live Protection
Pre-execution Behavior Analysis (HIPS)
Potentially Unwanted Application (PUA) Blocking
Intrusion Prevention System
STOP RUNNING THREAT
Data Loss Prevention
Runtime Behavior Analysis (HIPS)
Antimalware Scan Interface (AMSI)
Malicious Traffic Detection (MTD)
Exploit Prevention
Active Adversary Mitigations
Ransomware File Protection (CryptoGuard)
Disk and Boot Record Protection (WipeGuard)
Man-in-the-Browser Protection (Safe Browsing)
Enhanced Application Lockdown
DETECT
Live Discover (Cross Estate SQL Querying for Threat Hunting & IT Security Operations Hygiene)
SQL Query Library (pre-written, fully customizable queries) Suspicious Events Detection and Prioritization
Suspicious Events Detection and Prioritization
Fast Access, On-disk Data Storage (up to 90 days)
Cross-product Data Sources e.g. Firewall, Email
Cross-product Querying
Sophos Data Lake (Cloud Data Storage) 30 days 30 days 30 days
Scheduled Queries
INVESTIGATE
Threat Cases (Root Cause Analysis)
Deep Learning Malware Analysis
Advanced On-demand SophosLabs Threat Intelligence
Forensic Data Export
REMEDIATE
Automated Malware Removal
Synchronized Security Heartbeat
Sophos Clean
Live Response (remotely investigate and take action)
On-demand Endpoint Isolation
Single-click “Clean and Block”
VISIBILITY
Cloud Workload Protection (Amazon Web Services, Microsoft Azure, Google Cloud Platform)
AWS Map, Multi-region Visualization
Synchronized Application Control (visibility of applications)
Cloud Security Posture Management (monitor and secure cloud hosts, serverless functions, S3 buckets and more)
CONTROL
Server-specific Policy Management
Update Cache and Message Relay
Automatic Scanning Exclusions
File Integrity Monitoring
MANAGED SERVICE
24/7 Lead-driven Threat Hunting
Security Health Checks
Data Retention
Activity Reporting
Adversarial Detections
Threat Neutralization & Remediation
24/7 Lead-less Threat Hunting
Threat Response Team Lead
Direct Call-in Support
Proactive Security Posture Management
Buy Intercept X Buy Intercept X with XDR Buy Intercept X with MTR Buy Intercept X with MTR Adv