Sophos Endpoint Protection

Sophos Intercept X Endpoint

J&M Eastern Group is a Sophos supplier in Malaysia that specialises in Sophos Solutions. As a Sophos partner and reseller in Malaysia, we carry a wide range of Sophos products to meet your requirements and quickly respond to the demands of your business. Our team is well experienced with Sophos products, solutions and services.

Powered by threat intelligence, AI and machine learning from SophosLabs and SophosAI, Sophos delivers a broad portfolio of advanced products and services to secure users, networks and endpoints against ransomware, malware, exploits, phishing and the wide range of other cyberattacks. Sophos provides a single integrated cloud-based management console, Sophos Central – the centerpiece of an adaptive cybersecurity ecosystem that features a centralized data lake that leverages a rich set of open APIs available to customers, partners, developers, and other cybersecurity vendors. Sophos sells its products and services through reseller partners and managed service providers (MSPs) worldwide.

Best Endpoint Security 2018 / 2019 / 2020

Leader 2021

4.8/5 Customer Rating Endpoint Protection Platforms

Best Managed Security Service 2020

Best Product Small Business Endpoint

#1 Exploit Protection

Editor's Choice

Endpoint Protection #1, Perfect Score

INTERCEPT X ENDPOINT FEATURES

INTERCEPT X ENDPOINT TECHNICAL SPECIFICATIONS

Features

Intercept X Advanced

Intercept X Advanced with XDR

Intercept X Advanced with MTR Standard

Intercept X Advanced with MTR Advanced

ATTACK SURFACE
Web Security
Download Reputation
Web Control / Category-based URL Blocking
Peripheral Control
Application Control
BEFORE IT RUNS ON DEVICE
Deep Learning Malware Detection
Anti-Malware File Scanning
Live Protection
Pre-execution Behavior Analysis (HIPS)
Potentially Unwanted Application (PUA) Blocking
Intrusion Prevention System
STOP RUNNING THREAT
Data Loss Prevention
Runtime Behavior Analysis (HIPS)
Antimalware Scan Interface (AMSI)
Malicious Traffic Detection (MTD)
Exploit Prevention
Active Adversary Mitigations
Ransomware File Protection (CryptoGuard)
Disk and Boot Record Protection (WipeGuard)
Man-in-the-Browser Protection (Safe Browsing)
Enhanced Application Lockdown
DETECT
Live Discover (Cross Estate SQL Querying for Threat Hunting & IT Security Operations Hygiene)
SQL Query Library (pre-written, fully customizable queries) Suspicious Events Detection and Prioritization
Suspicious Events Detection and Prioritization
Fast Access, On-disk Data Storage (up to 90 days)
Cross-product Data Sources e.g. Firewall, Email (Sophos XDR)
Cross-product Querying (Sophos XDR)
Sophos Data Lake Cloud Storage30 days30 days30 days
Scheduled Queries
INVESTIGATE
Threat Cases (Root Cause Analysis)
Deep Learning Malware Analysis
Advanced On-demand SophosLabs Threat Intelligence
Forensic Data Export
REMEDIATE
Automated Malware Removal
Synchronized Security Heartbeat
Sophos Clean
Live Response (remotely investigate and take action)
On-demand Endpoint Isolation
Single-click “Clean and Block”
HUMAN-LED THREAT HUNTING AND RESPONSE
24/7 Lead-driven Threat Hunting
Security Health Checks
Data Retention
Activity Reporting
Adversarial Detections
Threat Neutralization & Remediation
24/7 Lead-less Threat Hunting
Threat Response Team Lead
Direct Call-in Support
Proactive Security Posture Management
ZERO TRUST NETWORK ACCESS
Integrated ZTNA agent
ZTNA Access Policy and ControlOptionalOptionalOptionalOptional

GET Sophos Intercept X Endpoint Pricing

To receive Sophos Intercept X Endpoint price, please send us a message.