Server Protection

Tech Specs

Secure your Windows and Linux servers whether in the cloud, on-premises, virtual or mixed environments.

For further information please see the Intercept X for Server datasheetEDR/XDR datasheet and Linux datasheet.

Get details on system requirements and supported operating systems for Windows and Linux.

Solution Comparison

 

Features

Intercept X Advanced for Server

Intercept X Advanced for Server with XDR

Intercept X Advanced for Server with MTR Standard

Intercept X Advanced for Server with MTR Advanced

ATTACK SURFACE REDUCTION
Web Security

 

 

 

 

Download Reputation

 

 

 

 

Web Control / Category-based URL Blocking

 

 

 

 

Peripheral Control

 

 

 

 

Application Control

 

 

 

 

Application Whitelisting (Server Lockdown)

 

 

 

 

BEFORE IT RUNS ON DEVICE
Deep Learning Malware Detection

 

 

 

 

Anti-Malware File Scanning

 

 

 

 

Live Protection

 

 

 

 

Pre-execution Behavior Analysis (HIPS)

 

 

 

 

Potentially Unwanted Application (PUA) Blocking

 

 

 

 

Intrusion Prevention System

 

 

 

 

STOP RUNNING THREAT
Data Loss Prevention

 

 

 

 

Runtime Behavior Analysis (HIPS)

 

 

 

 

Antimalware Scan Interface (AMSI)

 

 

 

 

Malicious Traffic Detection (MTD)

 

 

 

 

Exploit Prevention

 

 

 

 

Active Adversary Mitigations

 

 

 

 

Ransomware File Protection (CryptoGuard)

 

 

 

 

Disk and Boot Record Protection (WipeGuard)

 

 

 

 

Man-in-the-Browser Protection (Safe Browsing)

 

 

 

 

Enhanced Application Lockdown

 

 

 

 

DETECT
Live Discover (Cross Estate SQL Querying for Threat Hunting & IT Security Operations Hygiene)  

 

 

 

SQL Query Library (pre-written, fully customizable queries)  

 

 

 

Suspicious Events Detection and Prioritization  

 

 

 

Fast Access, On-disk Data Storage (up to 90 days)  

 

 

 

Cross-product Data Sources e.g. Firewall, Email  

 

 

 

Cross-product Querying  

 

 

 

Sophos Data Lake (Cloud Data Storage)  

30 days

30 days

30 days

Scheduled Queries  

 

 

 

INVESTIGATE
Threat Cases (Root Cause Analysis)

 

 

 

 

Deep Learning Malware Analysis  

 

 

 

Advanced On-demand SophosLabs Threat Intelligence  

 

 

 

Forensic Data Export  

 

 

 

REMEDIATE
Automated Malware Removal

 

 

 

 

Synchronized Security Heartbeat

 

 

 

 

Sophos Clean

 

 

 

 

Live Response (remotely investigate and take action)  

 

 

 

On-demand Endpoint Isolation  

 

 

 

Single-click “Clean and Block”  

 

 

 

VISIBILITY
Cloud Workload Protection (Amazon Web Services, Microsoft Azure, Google Cloud Platform)

 

 

 

 

AWS Map, Multi-region Visualization

 

 

 

 

Synchronized Application Control (visibility of applications)

 

 

 

 

Cloud Security Posture Management (monitor and secure cloud hosts, serverless functions, S3 buckets and more)

 

 

 

 

CONTROL
Server-specific Policy Management

 

 

 

 

Update Cache and Message Relay

 

 

 

 

Automatic Scanning Exclusions

 

 

 

 

File Integrity Monitoring

 

 

 

 

MANAGED SERVICE
24/7 Lead-driven Threat Hunting    

 

 

Security Health Checks    

 

 

Data Retention    

 

 

Activity Reporting    

 

 

Adversarial Detections    

 

 

Threat Neutralization & Remediation    

 

 

24/7 Lead-less Threat Hunting      

 

Threat Response Team Lead      

 

Direct Call-in Support      

 

Proactive Security Posture Management      

 

 

For supported Linux features see the license guide.