Secure your Windows and Linux servers whether in the cloud, on-premises, virtual or mixed environments.
Get details on system requirements and supported operating systems for Windows and Linux.
Solution Comparison
| Features | Intercept X Advanced for Server | Intercept X Advanced for Server with XDR | Intercept X Advanced for Server with MTR Standard | Intercept X Advanced for Server with MTR Advanced |
|---|
| ATTACK SURFACE REDUCTION | ||||
| Web Security | ✓ | ✓ | ✓ | ✓ |
| Download Reputation | ✓ | ✓ | ✓ | ✓ |
| Web Control / Category-based URL Blocking | ✓ | ✓ | ✓ | ✓ |
| Peripheral Control | ✓ | ✓ | ✓ | ✓ |
| Application Control | ✓ | ✓ | ✓ | ✓ |
| Application Whitelisting (Server Lockdown) | ✓ | ✓ | ✓ | ✓ |
| BEFORE IT RUNS ON DEVICE | ||||
| Deep Learning Malware Detection | ✓ | ✓ | ✓ | ✓ |
| Anti-Malware File Scanning | ✓ | ✓ | ✓ | ✓ |
| Live Protection | ✓ | ✓ | ✓ | ✓ |
| Pre-execution Behavior Analysis (HIPS) | ✓ | ✓ | ✓ | ✓ |
| Potentially Unwanted Application (PUA) Blocking | ✓ | ✓ | ✓ | ✓ |
| Intrusion Prevention System | ✓ | ✓ | ✓ | ✓ |
| STOP RUNNING THREAT | ||||
| Data Loss Prevention | ✓ | ✓ | ✓ | ✓ |
| Runtime Behavior Analysis (HIPS) | ✓ | ✓ | ✓ | ✓ |
| Antimalware Scan Interface (AMSI) | ✓ | ✓ | ✓ | ✓ |
| Malicious Traffic Detection (MTD) | ✓ | ✓ | ✓ | ✓ |
| Exploit Prevention | ✓ | ✓ | ✓ | ✓ |
| Active Adversary Mitigations | ✓ | ✓ | ✓ | ✓ |
| Ransomware File Protection (CryptoGuard) | ✓ | ✓ | ✓ | ✓ |
| Disk and Boot Record Protection (WipeGuard) | ✓ | ✓ | ✓ | ✓ |
| Man-in-the-Browser Protection (Safe Browsing) | ✓ | ✓ | ✓ | ✓ |
| Enhanced Application Lockdown | ✓ | ✓ | ✓ | ✓ |
| DETECT | ||||
| Live Discover (Cross Estate SQL Querying for Threat Hunting & IT Security Operations Hygiene) | ✓ | ✓ | ✓ | |
| SQL Query Library (pre-written, fully customizable queries) Suspicious Events Detection and Prioritization | ✓ | ✓ | ✓ | |
| Suspicious Events Detection and Prioritization | ✓ | ✓ | ✓ | |
| Fast Access, On-disk Data Storage (up to 90 days) | ✓ | ✓ | ✓ | |
| Cross-product Data Sources e.g. Firewall, Email | ✓ | ✓ | ✓ | |
| Cross-product Querying | ✓ | ✓ | ✓ | |
| Sophos Data Lake (Cloud Data Storage) | 30 days | 30 days | 30 days | |
| Scheduled Queries | ✓ | ✓ | ✓ | |
| INVESTIGATE | ||||
| Threat Cases (Root Cause Analysis) | ✓ | ✓ | ✓ | ✓ |
| Deep Learning Malware Analysis | ✓ | ✓ | ✓ | |
| Advanced On-demand SophosLabs Threat Intelligence | ✓ | ✓ | ✓ | |
| Forensic Data Export | ✓ | ✓ | ✓ | |
| REMEDIATE | ||||
| Automated Malware Removal | ✓ | ✓ | ✓ | ✓ |
| Synchronized Security Heartbeat | ✓ | ✓ | ✓ | ✓ |
| Sophos Clean | ✓ | ✓ | ✓ | ✓ |
| Live Response (remotely investigate and take action) | ✓ | ✓ | ✓ | |
| On-demand Endpoint Isolation | ✓ | ✓ | ✓ | |
| Single-click “Clean and Block” | ✓ | ✓ | ✓ | |
| VISIBILITY | ||||
| Cloud Workload Protection (Amazon Web Services, Microsoft Azure, Google Cloud Platform) | ✓ | ✓ | ✓ | ✓ |
| AWS Map, Multi-region Visualization | ✓ | ✓ | ✓ | ✓ |
| Synchronized Application Control (visibility of applications) | ✓ | ✓ | ✓ | ✓ |
| Cloud Security Posture Management (monitor and secure cloud hosts, serverless functions, S3 buckets and more) | ✓ | ✓ | ✓ | ✓ |
| CONTROL | ||||
| Server-specific Policy Management | ✓ | ✓ | ✓ | ✓ |
| Update Cache and Message Relay | ✓ | ✓ | ✓ | ✓ |
| Automatic Scanning Exclusions | ✓ | ✓ | ✓ | ✓ |
| File Integrity Monitoring | ✓ | ✓ | ✓ | ✓ |
| MANAGED SERVICE | ||||
| 24/7 Lead-driven Threat Hunting | ✓ | ✓ | ||
| Security Health Checks | ✓ | ✓ | ||
| Data Retention | ✓ | ✓ | ||
| Activity Reporting | ✓ | ✓ | ||
| Adversarial Detections | ✓ | ✓ | ||
| Threat Neutralization & Remediation | ✓ | ✓ | ||
| 24/7 Lead-less Threat Hunting | ✓ | |||
| Threat Response Team Lead | ✓ | |||
| Direct Call-in Support | ✓ | |||
| Proactive Security Posture Management | ✓ | |||
| Buy Intercept X | Buy Intercept X with XDR | Buy Intercept X with MTR | Buy Intercept X with MTR Adv | |
!

