Sophos Exploit Prevention

Intercept X prevents the exploits hackers rely on

While there have been countless types of cyberattacks and more are created every minute, hackers rely on key security software vulnerabilities to spread malware, ransomware, and more.

The abuse of a software vulnerability by an attacker is called an exploit. While there are millions of pieces of malware in existence, and thousands of software vulnerabilities waiting to be exploited, there are only handful of exploit techniques attackers rely on as part of the attack chain – and by taking away the key tools hackers love to use, Intercept X stops exploits and zero-day attacks before they can get started.

Intercept XSophos MTR

Block zero-day attacks by blocking exploits

Attackers want to distribute and install their malware, steal your data, and evade detection. Using a relatively short list of highly effective exploit techniques enables them to do just this.

With Intercept X, evasive hackers and zero-day attacks can’t get through – because rather than focusing solely on stopping malware, Intercept X tracks the behavior that indicates an attack is underway and stops it dead in its tracks.

Vulnerabilities occur in software at an alarming rate, often requiring patches from the vendor – and before those patches, those vulnerabilities remain. While installing the latest patches as quickly as possible is always a recommended best practice, Intercept X offers a layer of protection against unpatched devices. By intercepting the techniques attackers use to take advantage of these and other vulnerabilities, Sophos is able to stop attackers from abusing a computer to do something it should not be doing.

Sophos Intercept X includes:

Exploit Protection

Deny attackers their favorite tools for conducting attacks by blocking the exploits and techniques used in both malware-based and file-less attacks.

Active Adversary Mitigations

Intercept X utilizes a range of techniques, including credential theft prevention, code cave utilization detection, and APC protection used to gain a presence and remain undetected on victim networks.

Deep Learning

Intercept X uses a deep learning neural network, an advanced form of machine learning, to detect known and unknown malware without signatures.

Vulnerabilities vs. Exploits vs. Exploit Techniques

Image
Exploit Techniques

Vulnerability

A weakness in the design or implementation of a piece of hardware/software.

Exploit

A specific successful and reliable use of one or more exploit techniques against one of thousands of potential target vulnerabilities.

Exploit Technique

The underlying way in which an attacker can abuse a vulnerability to make a computer do something it shouldn’t

Prevent Exploits in Your Organization with Sophos Intercept X

 

Sophos Intercept X Advanced

Sophos Intercept X Advanced with XDR

Sophos MTR Standard

Sophos MTR Advanced

Foundational techniques

 

 

 

 

Deep learning

 

 

 

 

Anti-exploit

 

 

 

 

CryptoGuard anti-ransomware

 

 

 

 

Extended detection and response (XDR)  

 

 

 

24/7 Monitoring and Response    

 

 

Lead-driven threat hunting    

 

 

Advanced lead-less threat hunting      

 

 

Free TrialExploit Paper