Sophos MTR: Standard
                                24/7 Lead-Driven Threat Hunting
                                Confirmed malicious artifacts or activity (strong signals) are automatically blocked or terminated, freeing up threat hunters to conduct lead-driven threat hunts. This type of threat hunt involves the aggregation and investigation of causal and adjacent events (weak signals) to discover new Indicators of Attack (IoA) and Indicators of Compromise (IoC) that previously could not be detected.
                                Security Health Check
                                Keep your Sophos Central products - beginning with Intercept X Advanced with EDR - operating at peak performance with proactive examinations of your operating conditions and recommended configuration improvements.
                                Activity Reporting
                                Summaries of case activities enable prioritization and communication so your team knows what threats were detected and what response actions were taken within each reporting period.
                                Adversarial Detections
                                Most successful attacks rely on the execution of a process that can appear legitimate to monitoring tools. Using proprietary investigation techniques, our team determines the difference between legitimate behavior and the tactics, techniques, and procedures (TTPs) used by attackers.
                             
                            
                                Sophos MTR: Advanced
                                24/7 Leadless Threat Hunting
                                Applying data science, threat intelligence, and the intuition of veteran threat hunters, we combine your company profile, high-value assets, and high-risk users to anticipate attacker behavior and identify new Indicators of Attack (IoA).
                                Enhanced Telemetry
                                Threat investigations are supplemented with telemetry from other Sophos Central products extending beyond the endpoint to provide a full picture of adversary activities.
                                Proactive Posture Improvement
                                Proactively improve your security posture and harden your defenses with prescriptive guidance for addressing configuration and architecture weaknesses that diminish your overall security capabilities.
                                Activity Reporting
                                Summaries of case activities enable prioritization and communication so your team knows what threats were detected and what response actions were taken within each reporting period.
                                Adversarial Detections
                                Most successful attacks rely on the execution of a process that can appear legitimate to monitoring tools. Using proprietary investigation techniques, our team determines the difference between legitimate behavior and the tactics, techniques, and procedures (TTPs) used by attackers.
                                Dedicated Threat Response Lead
                                When an incident is confirmed, a dedicated threat response lead is provided to directly collaborate with your on-premises resources (internal team or external partner) until the active threat is neutralized.
                                Direct Call-In Support
                                Your team has direct call-in access to our security operations center (SOC). Our MTR Operations Team is available around-the-clock and backed by support teams spanning 26 locations worldwide.
                                Asset Discovery
                                From asset information covering OS versions, applications, and vulnerabilities to identifying managed and unmanaged assets, we provide valuable insights during impact assessments, threat hunts, and as part of proactive posture improvement recommendations.