Intercept X features CryptoGuard, which prevents the malicious spontaneous encryption of data by ransomware.
Next-Generation Anti-Exploit, Anti-Ransomware, and Root Cause Analysis Intercept X adds next-generation signatureless technologies on top of your current endpoint security to give you complete, layered protection.
The days of straightforward file scanning are long gone. Your endpoint security goal is now to prevent threats from reaching your devices, stop them before they run, detect them if they have bypassed preventative methods, and not just clean up malware, but analyze and undo everything it does to your endpoints.
Anti-exploit technology stops threats before they become an issue by recognizing and blocking common malware delivery techniques, thus protecting your endpoints from unknown threats and zero-day vulnerabilities.
CryptoGuard technology detects spontaneous malicious data encryption to stop ransomware in its tracks. Even if trusted files or processes are abused or hijacked, CryptoGuard will stop and revert them without any interaction from users or IT support personnel. CryptoGuard works silently at the file system level, keeping track of remote computers and local processes that attempt to modify your documents and other files.
Identifying malware and isolating and removing it solves the immediate problem. But do you really know what the malware did before it was removed, or how it was introduced in the first place? Root cause analysis shows you all the events that led up to a detection. You’ll be able to understand what files, processes, and registry keys were touched by the malware and activate your advanced system clean to rewind time.
Intercept X compliments existing anti-malware and antivirus implementations delivering powerful next-gen anti-exploit and anti-ransomware protection traditional products lack. By eliminating the attack vectors which traditional solutions don’t block, Sophos Intercept X helps to harden your security posture and increase resilience.
Managing your security from Sophos Central means you no longer have to install or deploy servers to secure your endpoints. Sophos Central provides default policies and recommended configurations to ensure that you get the most effective protection from day one.
Ransomware like Cryptolocker is the number one malware attack affecting organizations today. It encrypts your files and holds them hostage until the ransom is paid, causing massive disruption to business productivity.
Intercept X uses multiple layers of technology, allowing you to create your own tailored next-generation endpoint security solution.
Intercept X supports Windows 7 and above, 32 and 64 bit. It can run alongside Sophos Endpoint Protection Standard or Advanced, when managed by Sophos Central.
It can also run alongside third party Endpoint and antivirus products to add anti-exploit, anti-ransomware, and root cause analysis.
Sophos XG Series firewalls come pre-loaded with the Sophos Firewall OS to provide optimal performance to meet today’s network security requirements.
Existing Sophos Endpoint Protection customers using Enterprise Console or UTM to manage their endpoints must switch their endpoints to be managed by Sophos Central. See http://www.sophos.com/migrate for more info.
We've assembled some product videos to give you basic information on Intercept X.
With Intercept X, Sophos is redefining what customers should expect from next-generation endpoint security products. No other vendor offers signatureless exploit prevention, ransomware detection, visual root-cause analysis, and advanced cleanup technology.
Intercept X is a next-generation endpoint detection and response platform designed to stop ransomware, zero-day exploits, and provide detailed threat intelligence.
This short video showcases the signatureless protection capabilities of Intercept X. The Petya/Petna/PetrWrap outbreak that made headlines on June 27th, 2017 not only attempted to encrypt documents, it also infected the master boot record to encrypt the master file table and prevent users from using their machines.
The RCA feature found in Intercept X helps administrators quickly identify all attributes of an attack from beginning to end.
Email any time or call 877.386.3763 (call answer guarantee, 8am - 5pm MDT, M-F)
© 2021 Optrics.com - Optrics Inc. * All Registered Logos and Trademarks displayed on this site are the property of their respective owners.