Sophos MTR: Standard
24/7 Lead-Driven Threat Hunting
Confirmed malicious artifacts or activity (strong signals) are automatically blocked or terminated, freeing up threat hunters to conduct lead-driven threat hunts. This type of threat hunt involves the aggregation and investigation of causal and adjacent events (weak signals) to discover new Indicators of Attack (IoA) and Indicators of Compromise (IoC) that previously could not be detected.
Security Health Check
Keep your Sophos Central products - beginning with Intercept X Advanced with EDR - operating at peak performance with proactive examinations of your operating conditions and recommended configuration improvements.
Activity Reporting
Summaries of case activities enable prioritization and communication so your team knows what threats were detected and what response actions were taken within each reporting period.
Adversarial Detections
Most successful attacks rely on the execution of a process that can appear legitimate to monitoring tools. Using proprietary investigation techniques, our team determines the difference between legitimate behavior and the tactics, techniques, and procedures (TTPs) used by attackers.
Sophos MTR: Advanced
24/7 Leadless Threat Hunting
Applying data science, threat intelligence, and the intuition of veteran threat hunters, we combine your company profile, high-value assets, and high-risk users to anticipate attacker behavior and identify new Indicators of Attack (IoA).
Enhanced Telemetry
Threat investigations are supplemented with telemetry from other Sophos Central products extending beyond the endpoint to provide a full picture of adversary activities.
Proactive Posture Improvement
Proactively improve your security posture and harden your defenses with prescriptive guidance for addressing configuration and architecture weaknesses that diminish your overall security capabilities.
Activity Reporting
Summaries of case activities enable prioritization and communication so your team knows what threats were detected and what response actions were taken within each reporting period.
Adversarial Detections
Most successful attacks rely on the execution of a process that can appear legitimate to monitoring tools. Using proprietary investigation techniques, our team determines the difference between legitimate behavior and the tactics, techniques, and procedures (TTPs) used by attackers.
Dedicated Threat Response Lead
When an incident is confirmed, a dedicated threat response lead is provided to directly collaborate with your on-premises resources (internal team or external partner) until the active threat is neutralized.
Direct Call-In Support
Your team has direct call-in access to our security operations center (SOC). Our MTR Operations Team is available around-the-clock and backed by support teams spanning 26 locations worldwide.
Asset Discovery
From asset information covering OS versions, applications, and vulnerabilities to identifying managed and unmanaged assets, we provide valuable insights during impact assessments, threat hunts, and as part of proactive posture improvement recommendations.