Strongest protection. Simple licensing.
Sophos Endpoint delivers unparalleled defense against advanced cyberattacks on your endpoints and servers.
- Sophos Endpoint Detection and Response (EDR) elevates your endpoint defenses by enabling you to identify, investigate, and neutralize evasive threats.
- Sophos Extended Detection and Response (XDR) extends EDR to provide visibility across your entire attack surface.
- Organizations with limited in-house resources can engage Sophos’ Managed Detection and Response (MDR) services, delivered by a team of global cybersecurity experts that monitor your environment for threats 24/7.
Sophos Endpoint System Requirements:
Protect your iOS and Android devices with Sophos Mobile. 
Windows Server and Linux devices require a subscription to Sophos Workload Protection.
Sophos Endpoint for Legacy Platforms add-on available for critical systems running older operating systems.
|
Sophos Endpoint Endpoint protection and control |
Sophos EDR Complete endpoint protection, detection and response
|
Sophos XDR Comprehensive detection and response across the environment
|
Sophos MDR 24/7 expert-led threat monitoring and response service
|
||
|---|---|---|---|---|---|
Endpoint protection and control |
|||||
| THREAT SURFACE REDUCTION | |||||
| Web Protection |
|
||||
| Web Control |
|
||||
| Download Reputation |
|
||||
| Application Control |
|
||||
| Peripheral Control |
|
||||
| Data Loss Prevention |
|
||||
| Server Lockdown (application whitelisting) |
|
||||
| Full Disk Encryption |
Add-on |
Add-on |
Add-on |
Add-on |
|
| THREAT PREVENTION | |||||
| Ransomware file protection (CryptoGuard) |
|
||||
|
Remote ransomware protection (CryptoGuard) Watch video |
|
||||
| Ransomware Master Boot Record (MBR) protection |
|
||||
|
Context-sensitive Defense: Adaptive Attack Protection Watch video |
|
||||
|
Context-sensitive Defense: Estate-wide Critical Attack Warnings |
|
||||
| Deep Learning AI-powered malware prevention |
|
||||
| Anti-malware file scanning |
|
||||
| Potentially Unwanted App (PUA) blocking |
|
||||
| Live Protection cloud-lookups |
|
||||
| Behavioral Analysis |
|
||||
| Anti-Exploitation (60+ mitigations) |
|
||||
| Application Lockdown |
|
||||
| Anti-malware Scan Interface (AMSI) |
|
||||
| Malicious Traffic Detection |
|
||||
| Intrusion Prevention System (IPS) |
|
||||
| File Integrity Monitoring (Servers) |
|
||||
| Integrated ZTNA agent |
|
||||
|
Sophos Endpoint Endpoint protection and control |
Sophos EDR Complete endpoint protection, detection and response
|
Sophos XDR Comprehensive detection and response across the environment
|
Sophos MDR 24/7 expert-led threat monitoring and response service
|
||
|---|---|---|---|---|---|
Detection, investigation and response |
|||||
| DETECTION | |||||
| Rich on-device data for real-time insights |
— |
|
|||
| Suspicious event detections |
— | ||||
| AI-powered prioritization of detections |
— |
|
|||
| Automatic MITRE Framework mapping |
— |
|
|||
| Linux container behavioral and exploit detections |
— |
|
|||
| Device Exposure |
— |
|
|||
| Generate detections on integrated third-party data |
— |
— |
|||
| Cross-product event correlation and analysis |
— |
— |
|||
| INVESTIGATION | |||||
| RCA threat graphs |
|
||||
| Automatic and manual case creation |
— |
|
|||
| On-demand Sophos X-Ops threat intelligence |
— |
|
|||
| AI Case Summary |
— | ||||
| AI Command Analysis |
— | ||||
| AI Search |
— | ||||
| AI Assistant |
— |
— |
|||
| Forensic data export |
— |
— |
|
||
| RESPONSE | |||||
| Automatic malware cleanup |
|
||||
| Automatic ransomware file encryption roll-back |
|
||||
| Automatic process termination |
|
||||
| Synchronized Security: Automatic device isolation via Sophos Firewall |
|
||||
| On-demand Adaptive Attack Protection |
— |
|
|||
| On-demand device isolation |
— |
|
|||
| Live Response remote terminal access |
— |
|
|||
| Microsoft 365 response actions |
— |
— |
|
||
| DATA INGESTION | |||||
| Extensive data on-device and in the cloud (Sophos Products) | |||||
| Cloud data retention |
— |
30 days |
90 days |
90 days |
|
| Additional cloud storage retention |
— |
1 Year (Add-on) |
1 Year (Add-on) |
1 Year (Add-on) |
|
| Ingest and correlate data from your existing (non-Sophos) technology investments |
— |
— |
|||
|
Sophos Endpoint Endpoint protection and control |
Sophos EDR Complete endpoint protection, detection and response
|
Sophos XDR Comprehensive detection and response across the environment
|
Sophos MDR 24/7 expert-led threat monitoring and response service
|
||
|---|---|---|---|---|---|
24/7 managed detection and response service |
|||||
| 24/7 threat monitoring and response |
— |
— |
— |
||
| Weekly and monthly reporting |
— |
— |
— |
||
| Health Check |
— |
— |
— |
||
| Expert-led threat hunting |
— |
— |
— |
||
| Threat containment |
— |
— |
— |
||
| Direct call-in support during active incidents |
— |
— |
— |
||
| Full-scale incident response: threats are fully eliminated |
— |
— |
— |
||
| Root cause analysis |
— |
— |
— |
||
| Dedicated Incident Response Lead |
— |
— |
— |
||
| $1M Breach Protection Warranty |
— |
— |
— |
||
| Guided threat insights from Sophos X-Ops |
— |
— |
— |
||
|
Sophos Endpoint Endpoint protection and control |
Sophos EDR Complete endpoint protection, detection and response
|
Sophos XDR Comprehensive detection and response across the environment
|
Sophos MDR 24/7 expert-led threat monitoring and response service
|
||
|---|---|---|---|---|---|
Optional add-ons |
|||||
| Sophos Endpoint for Legacy Platforms |
Optional |
Optional |
Optional |
Optional |
|
| Sophos Device Encryption |
Optional |
Optional |
Optional |
Optional |
|
| Sophos Advisory Services |
Optional |
Optional |
Optional |
Optional |
|
| Sophos Incident Response (IR) Services Retainer |
Optional |
Optional |
Optional |
Optional |
|
| Additional cloud storage retention |
— |
Optional |
Optional |
Optional |
|
| Sophos Identity Threat Detection and Response (ITDR) |
— |
— |
Optional |
Optional |
|
| Sophos Network Detection and Response (NDR) |
— |
— |
Optional |
Optional |
|
| Sophos Managed Risk powered by Tenable |
— |
— |
— |
Optional |
|



