Sophos Intercept X for Server

RM0.00

Whether in the cloud or on premises, you need to protect the critical applications and data at the core of your organization. Intercept X for Server offers a comprehensive, defense-in-depth approach using deep learning malware detection, exploit prevention, anti-ransomware technology, application white listing, active adversary protection, and in-depth root cause analysis.

Product Enquiry Form

OverviewFeaturesSpecificationsSupport
Cloud Ready
Whether in the cloud or on premises, you need to protect the critical applications and data at the core of your organization. Intercept X for Server offers a comprehensive, defense-in-depth approach using deep learning malware detection, exploit prevention, anti-ransomware technology, application white listing, active adversary protection, and in-depth root cause analysis.

Highlights

  • Discover and protect workloads in Microsoft Azure and Amazon Web Services
  • Protect against ransomware on servers, including remote attacks from rogue endpoints
  • Server Lockdown whitelists applications
  • Block advanced hacking techniques and exploits
  • Root cause analysis details the cause of attacks and infection path
  • Synchronized Security shares threat, health, and security information across multiple Sophos products
  • Simplified management from Sophos Central
  • Threat protection for Windows and Linux systems

Powerful server-specific protection

Intercept X for Server leverages a broad set of protections to stop zero-day attacks, exploits, and hackers. These protections prevent attacks from reaching servers in the first place, detect attacks before they run, or stop them and provide a thorough cleanup if they manage to evade protection. Its constantly updated artificial intelligence model is trained to look for suspicious attributes of potentially malicious code on servers. Plus, server-specific features such as Server Lockdown and Cloud Workload Discovery ensure that server configurations are safe.
Intercept X for Server discovers and protects workloads in the cloud, including Microsoft Azure and Amazon Web Services. By connecting Sophos Central with AWS and Azure, Intercept X for Server visually confirms that servers are protected, making management easier by displaying relevant information in Sophos Central.

Stop server-based ransomware

CryptoGuard defends against ransomware, working at the file system level to detect and intercept unsolicited file encryption, both on the server or from a remote endpoint connected to the server. WipeGuard similarly works to protect the master boot record from malicious encryption.
Sophos Intercept X for Server locks down your server with a single click, whitelisting your applications to secure servers in a safe state and preventing unauthorized applications from running. Sophos automatically scans the system and establishes an inventory (whitelist) of known good applications without the need for manual rule creation. Sophos creates an unbreakable bond between applications and associated files, such as DLLs, data files, and scripts.

Disrupt attacks: Deny hackers access to servers

Vulnerabilities appear at an alarming rate, and patching servers without disrupting users can be challenging. Exploit attacks can be devastating and are often undetectable by traditional server protection technologies. Intercept X for Server is designed to stop even the most stubborn hacker from using exploit techniques to harvest credentials, whether they try to remain hidden and persistent, or move laterally, Intercept X is designed to stop them.

Root cause analysis

Intercept X for Server also includes detection and response technology to provide complete visibility so admins will know how an attack got in, where it went, what it touched, and what you should do next. Intercept X for Server provides this without an additional agent or management console.

Synchronized Security

Synchronized Security is a best of breed security system that enables your defenses to be as coordinated as the attacks they protect against. It combines an intuitive security platform with award-winning products that actively work together to block advanced threats to give you unparalleled protection.

Easy to manage with Sophos Central

Managing your security from Sophos Central means you no longer need to deploy servers to secure your systems. Sophos Central, hosted by Sophos, provides instant access with no console servers to set up. Sophos Central provides out-of-the-box policies for servers while also managing other Sophos products, including Sophos Intercept X, Mobile, Wireless, Email, and Web — all from a single pane of glass.

Powerful, Server-Specific Protection

Protect the critical applications and data at the core of your organization, whether that data is on physical servers, virtual servers, or in the cloud. Intercept X for Server employs a comprehensive defense-in-depth approach including these essential protections:

Deep Learning Neural Network
Deep Learning Neural Network
Protects against never-before-seen malware
Our constantly updated artificial intelligence model that is trained to look for suspicious attributes of potentially malicious code
Anti-Exploit
Anti-Exploit
Prevents an attacker from leveraging common hacking techniques
Protects against browser, plugin, or Java-based exploit kits even if your servers are not fully patched
Root Cause Analysis
Root Cause Analysis
Incident response with forensic detail
Provides the who, what, when, where, and how of a given attack, allowing IT the ability to constantly improve upon their security posture
CryptoGuard and WipeGuard
CryptoGuard and WipeGuard
Stops ransomware and master boot record attacks
Automatically identifies and stops unwanted encryption attempts as well as system-crippling MBR attacks
Anti-Hacker Capabilities
Anti-Hacker Capabilities
Protects against the most persistent hacking attempts
Prevents pervasive, real-time hacking techniques such as credential harvesting, lateral movement, and code-caving
Server Lockdown
Server Lockdown
Provides application whitelisting with a single click
Reduces the attack surface by ensuring that only known and trusted application executables can be configured and run on a server