Server Protection
Tech Specs
Workload Protection
Tech Specs
Secure your Windows and Linux servers whether in the cloud, on-premises, virtual, or mixed environments.
For further information, please see the Intercept X for Server datasheet, EDR/XDR datasheet, and Linux datasheet.
Get details on system requirements and supported operating systems for Windows and Linux.
Solution Comparison
Features |
Intercept X Advanced for Server |
Intercept X Advanced for Server with XDR |
Intercept X Advanced for Server with MTR Standard |
Intercept X Advanced for Server with MTR Advanced |
---|---|---|---|---|
ATTACK SURFACE REDUCTION | ||||
Web Security |
|
|
|
|
Download Reputation |
|
|
|
|
Web Control / Category-based URL Blocking |
|
|
|
|
Peripheral Control |
|
|
|
|
Application Control |
|
|
|
|
Application Whitelisting (Server Lockdown) |
|
|
|
|
BEFORE IT RUNS ON DEVICE | ||||
Deep Learning Malware Detection |
|
|
|
|
Anti-Malware File Scanning |
|
|
|
|
Live Protection |
|
|
|
|
Pre-execution Behavior Analysis (HIPS) |
|
|
|
|
Potentially Unwanted Application (PUA) Blocking |
|
|
|
|
Intrusion Prevention System |
|
|
|
|
STOP RUNNING THREAT | ||||
Data Loss Prevention |
|
|
|
|
Runtime Behavior Analysis (HIPS) |
|
|
|
|
Antimalware Scan Interface (AMSI) |
|
|
|
|
Malicious Traffic Detection (MTD) |
|
|
|
|
Exploit Prevention |
|
|
|
|
Active Adversary Mitigations |
|
|
|
|
Ransomware File Protection (CryptoGuard) |
|
|
|
|
Disk and Boot Record Protection (WipeGuard) |
|
|
|
|
Man-in-the-Browser Protection (Safe Browsing) |
|
|
|
|
Enhanced Application Lockdown |
|
|
|
|
DETECT | ||||
Live Discover (Cross Estate SQL Querying for Threat Hunting & IT Security Operations Hygiene) |
|
|
|
|
SQL Query Library (pre-written, fully customizable queries) |
|
|
|
|
Suspicious Events Detection and Prioritization |
|
|
|
|
Fast Access, On-disk Data Storage (up to 90 days) |
|
|
|
|
Cross-product Data Sources e.g. Firewall, Email |
|
|
|
|
Cross-product Querying |
|
|
|
|
Sophos Data Lake (Cloud Data Storage) |
30 days |
30 days |
30 days |
|
Scheduled Queries |
|
|
|
|
INVESTIGATE | ||||
Threat Cases (Root Cause Analysis) |
|
|
|
|
Deep Learning Malware Analysis |
|
|
|
|
Advanced On-demand SophosLabs Threat Intelligence |
|
|
|
|
Forensic Data Export |
|
|
|
|
REMEDIATE | ||||
Automated Malware Removal |
|
|
|
|
Synchronized Security Heartbeat |
|
|
|
|
Sophos Clean |
|
|
|
|
Live Response (remotely investigate and take action) |
|
|
|
|
On-demand Endpoint Isolation |
|
|
|
|
Single-click “Clean and Block” |
|
|
|
|
VISIBILITY | ||||
Cloud Workload Protection (Amazon Web Services, Microsoft Azure, Google Cloud Platform) |
|
|
|
|
AWS Map, Multi-region Visualization |
|
|
|
|
Synchronized Application Control (visibility of applications) |
|
|
|
|
Cloud Security Posture Management (monitor and secure cloud hosts, serverless functions, S3 buckets and more) |
|
|
|
|
CONTROL | ||||
Server-specific Policy Management |
|
|
|
|
Update Cache and Message Relay |
|
|
|
|
Automatic Scanning Exclusions |
|
|
|
|
File Integrity Monitoring |
|
|
|
|
MANAGED SERVICE | ||||
24/7 Lead-driven Threat Hunting |
|
|
||
Security Health Checks |
|
|
||
Data Retention |
|
|
||
Activity Reporting |
|
|
||
Adversarial Detections |
|
|
||
Threat Neutralization & Remediation |
|
|
||
24/7 Lead-less Threat Hunting |
|
|||
Threat Response Team Lead |
|
|||
Direct Call-in Support |
|
|||
Proactive Security Posture Management |
|
For supported Linux features see the license guide.
Solution Comparison
Features |
Intercept X Advanced for Server |
Intercept X Advanced for Server with XDR |
Intercept X Advanced for Server with MTR Standard |
Intercept X Advanced for Server with MTR Advanced |
---|---|---|---|---|
ATTACK SURFACE REDUCTION | ||||
Web Security |
|
|
|
|
Download Reputation |
|
|
|
|
Web Control / Category-based URL Blocking |
|
|
|
|
Peripheral Control |
|
|
|
|
Application Control |
|
|
|
|
Application Whitelisting (Server Lockdown) |
|
|
|
|
BEFORE IT RUNS ON DEVICE | ||||
Deep Learning Malware Detection |
|
|
|
|
Anti-Malware File Scanning |
|
|
|
|
Live Protection |
|
|
|
|
Pre-execution Behavior Analysis (HIPS) |
|
|
|
|
Potentially Unwanted Application (PUA) Blocking |
|
|
|
|
Intrusion Prevention System |
|
|
|
|
STOP RUNNING THREAT | ||||
Data Loss Prevention |
|
|
|
|
Runtime Behavior Analysis (HIPS) |
|
|
|
|
Antimalware Scan Interface (AMSI) |
|
|
|
|
Malicious Traffic Detection (MTD) |
|
|
|
|
Exploit Prevention |
|
|
|
|
Active Adversary Mitigations |
|
|
|
|
Ransomware File Protection (CryptoGuard) |
|
|
|
|
Disk and Boot Record Protection (WipeGuard) |
|
|
|
|
Man-in-the-Browser Protection (Safe Browsing) |
|
|
|
|
Enhanced Application Lockdown |
|
|
|
|
DETECT | ||||
Linux Host and Container Behavioral and Exploit Runtime Decisions |
|
|
|
|
Live Discover (Cross Estate SQL Querying for Threat Hunting and IT Security Operations Hygiene) |
|
|
|
|
SQL Query Library (pre-written, fully customizable queries) |
|
|
|
|
Suspicious Events Detection and Prioritization |
|
|
|
|
Fast Access, On-disk Data Storage (up to 90 days) |
|
|
|
|
Cross-product Data Sources e.g. Firewall, Email |
|
|
|
|
Cross-product Querying |
|
|
|
|
Sophos Data Lake (Cloud Data Storage) |
30 days |
30 days |
30 days |
|
Scheduled Queries |
|
|
|
|
INVESTIGATE | ||||
Threat Cases (Root Cause Analysis) |
|
|
|
|
Deep Learning Malware Analysis |
|
|
|
|
Advanced On-demand SophosLabs Threat Intelligence |
|
|
|
|
Forensic Data Export |
|
|
|
|
REMEDIATE | ||||
Automated Malware Removal |
|
|
|
|
Synchronized Security Heartbeat |
|
|
|
|
Sophos Clean |
|
|
|
|
Live Response (remotely investigate and take action) |
|
|
|
|
On-demand Endpoint Isolation |
|
|
|
|
Single-click “Clean and Block” |
|
|
|
|
VISIBILITY | ||||
Cloud Workload Protection (Amazon Web Services, Microsoft Azure, Google Cloud Platform) |
|
|
|
|
Synchronized Application Control (visibility of applications) |
|
|
|
|
Cloud Security Posture Management (monitor AWS, Azure, GCP environments) |
|
|
|
|
CONTROL | ||||
Server-specific Policy Management |
|
|
|
|
Update Cache and Message Relay |
|
|
|
|
Automatic Scanning Exclusions |
|
|
|
|
File Integrity Monitoring |
|
|
|
|
MANAGED SERVICE | ||||
24/7 Lead-driven Threat Hunting |
|
|
||
Security Health Checks |
|
|
||
Data Retention |
|
|
||
Activity Reporting |
|
|
||
Adversarial Detections |
|
|
||
Threat Neutralization and Remediation |
|
|
||
24/7 Lead-less Threat Hunting |
|
|||
Threat Response Team Lead |
|
|||
Direct Call-in Support |
|
|||
Proactive Security Posture Management |
|
For supported Linux features see the license guide.