0% found this document useful (0 votes)
117 views2 pages

Sophos Endpoint Dsna

Uploaded by

Kevin Dsouza
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
117 views2 pages

Sophos Endpoint Dsna

Uploaded by

Kevin Dsouza
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Endpoint Protection

Sophisticated yet simple security for your desktop environment.


Sophos Endpoint Protection makes it simple to secure your Windows, Mac and Linux
systems against malware and advanced threats, such as targeted attacks. Our next-
generation endpoint protection integrates innovative technology like malicious traffic
detection with real-time threat intelligence from SophosLabs to help you prevent,
detect and remediate threats with ease. Web, application, and peripheral access
policies can follow your users anywhere they go. And, your firewall and endpoints can
share a security heartbeat.

Highlights Innovative protection


ÌÌ Innovative protection Sophos Endpoint Protection goes far beyond signature-based prevention of known
including anti-malware, malware. It correlates suspicious behaviors and activities using real-time threat
HIPS and malicious traffic intelligence from SophosLabs. From malicious URLs to web exploit code, unexpected
detection system changes to command-and-control traffic, we’ll connect the dots so your
endpoints and data are protected. The result is fewer infected computers and better
ÌÌ Web, application, device
protection against targeted attacks and data breaches.
and data control for
comprehensive policy
Complete control
enforcement
Enforce your web, application, device and data policies with ease, thanks to seamless
ÌÌ Web filtering enforced on integration within the endpoint agent and the management console.
the endpoint whether users
ÌÌ Web Control Category-based web filtering enforced on and off the corporate network
are on or off the corporate
network ÌÌ Application Control Point-and-click blocking of applications by category or name

ÌÌ Stops crypto-ransomware ÌÌ Peripheral Control Managed access to removable media and mobile devices
and automatically rolls any
ÌÌ Data Loss Prevention (DLP) Restrict unauthorized data flow using prebuilt
impacted files back
or custom rules
ÌÌ Exploit Prevention
mitigates the methods Lightning performance
attackers use to exploit Sophos Endpoint Protection is continually tuned for the best performance. The
software vulnerabilities lightweight agent keeps users secure without slowing them down. Protection updates
are small — typically under 30 KB — so updates are easy on your network and your
ÌÌ Forensic-level system
endpoints.
cleanup
ÌÌ Choose cloud-based “We have found the Sophos endpoint solutions to be
Sophos Central or install
Sophos Enterprise
easy, smooth and consistent. Having Sophos deployed
Console to manage your has increased our security posture ten-fold.”
deployment
Christopher Prewitt, Manager IT Security and Disaster Recovery, The Lincoln Electric Co.
Endpoint Protection

Sophisticated simplicity Flexible licensing and deployment


Sophos Endpoint Protection delivers sophisticated Choose Sophos Central cloud-based management or deploy
functionality coupled with a simple, intuitive user experience. Sophos Enterprise Console software to apply policy, updates,
Quick and easy deployment, well-balanced default policies and gather reporting. Root Cause analysis capabilities of
and automatic configuration of HIPS are just a few examples Sophos Intercept X are exclusively available when managing
of how we do things differently. endpoints in Sophos Central where the benefits of cloud scale,
performance, and analytics can be leveraged.

ENDPOINT PROTECTION INTERCEPT X

ENDPOINT ENDPOINT ENDPOINT CENTRAL CENTRAL


CENTRAL
SKU PROTECTION PROTECTION EXPLOIT ENDPOINT ENDPOINT
INTERCEPT X
STANDARD ADVANCED PREVENTION STANDARD ADVANCED

Web Security    
Download Reputation    
ATTACK SURFACE
REDUCTION

Web Control / Category-based URL Blocking   


Peripheral Control (e.g. USB)   
Application Control   
Client Firewall  
PREVENT

Deep Learning malware detection 


Anti-Malware File Scanning    
BEFORE IT RUNS ON DEVICE

Live Protection    
Pre-execution Behavior Analysis (HIPS)    
Potentially Unwanted Application (PUA) Blocking    
Patch Assessment 
Data Loss Prevention  
Exploit Prevention  
Runtime Behavior Analysis (HIPS)    
STOP RUNNING THREAT

Malicious Traffic Detection (MTD)   



DETECT

Active Adversary Mitigations

Ransomware File Protection (CryptoGuard)  


Disk and Boot Record Protection (WipeGuard) 
Man-in-the-Browser Protection (Safe Browsing)  
Automated Malware Removal     
AND REMOVE
INVESTIGATE
RESPOND

Synchronized Security Heartbeat  


Root Cause Analysis 
Sophos Clean  

United Kingdom and Worldwide Sales North American Sales Australia and New Zealand Sales Asia Sales
Tel: +44 (0)8447 671131 Toll Free: 1-866-866-2802 Tel: +61 2 9409 9100 Tel: +65 62244168
Email: sales@sophos.com Email: nasales@sophos.com Email: sales@sophos.com.au Email: salesasia@sophos.com

Oxford, UK
© Copyright 2017. Sophos Ltd. All rights reserved.
Registered in England and Wales No. 2096520, The Pentagon, Abingdon Science Park, Abingdon, OX14 3YP, UK
Sophos is the registered trademark of Sophos Ltd. All other product and company names mentioned are
trademarks or registered trademarks of their respective owners.

2017-15-09 DSNA (NP)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy