Sophos Intercept X
Sophos Intercept X employs a comprehensive defence-in-depth approach to endpoint protection, rather than simply relying on one primary security technique. This is the “the power of the plus” – a combination of leading foundational and modern techniques.
Modern techniques include deep learning malware detection, exploit prevention, and anti-ransomware specific features. Foundational techniques include signature-based malware detection, behaviour analysis, malicious traffic detection, device control, application control, web filtering, data loss prevention, and more.
Deep Learning Malware Detection
The artificial intelligence built into Intercept X is a deep learning neural network, an advanced form of machine learning that detects both known and unknown malware without relying on signatures. Built into Intercept X is the industry’s best malware detection engine, as validated by third-party testing authorities. This allows Intercept X to detect malware that slips by other endpoint security tools.
Stop the Exploit, Stop the Attack
Vulnerabilities show up at an alarming rate in software and need to be constantly patched by vendors. New exploit techniques, on the other hand, are much rarer and are used over and over again by attackers with each vulnerability discovered. Exploit Prevention denies attackers by blocking the exploit tools and techniques used to distribute malware, steal credentials, and escape detection. This allows Sophos to ward off evasive hackers and zero-day attacks in your network.
Proven Ransomware Protection
Intercept X utilizes behavioural analysis to stop never-before-seen ransomware and boot-record attacks, making it the most advanced anti-ransomware technology available. Even if trusted files or processes are abused or hijacked, CryptoGuard will stop and revert them without any interaction from users or IT support personnel. CryptoGuard works silently at the file system level, keeping track of remote computers and local processes that attempt to modify your documents and other files.