Description
The Central Intercept X Advanced is a 2-year subscription for a virtual product that provides security for desktop environments. It includes features such as malicious traffic detection, web filtering, application control, and data loss prevention. The license is valid for 1 user for 24 months and can be used for up to 9 seats. The product is not compatible with Windows 7 and below or Server 2008 R2 and below. It can be managed through Sophos Central or Sophos Enterprise Console. The purchase is final and non-refundable, and there is a 48-72 hour provisioning window for activation.
Not sure which option is the best for you? Looking for alternative Sophosproducts? Contact us: sophos@fsclouds.co.za
Important Notifications:
This is a virtual product
This license is valid for 1user/seatfor 24 months
This license pricing is valid for up to 9 seats only - should additional seats be required, please contact us
A 48-72hour provisioning window applies during normal working office hours Monday to Friday 8am-5pm
Once the provisioning is complete you will receive a PDF document with instructions and activationlinks
THIS ITEM IS NON RETURNABLE
Unless otherwise provided by law or by a particular Service offer, all purchases are final and non-refundable. Please note that according to the Consumer Protection Act and its relevant regulations, all purchases pertaining to digital content provided via intangible form and/or on-line services are final and non-refundable when such content or service has been provided online.
Restrictions:
Windows 7 and below not supported
Server 2008 R2 and below not supported
Should extended support be required for Windows 7 and below as well as Server 2008 R2 and below please contact us
Sophos Central Intercept X Advanced
Sophisticated yet simple security for your desktop environment.
Sophos Endpoint Protection makes it simple to secure your Windows, Mac and Linux systems against malware and other endpoint threats. Sophos endpoint protection integrates proven technology like malicious traffic detection with real-time threat intelligence from SophosLabs to help you prevent, detect and remediate threats with ease. Web, application, and peripheral access policies can follow your users anywhere they go. And, your firewall and endpoints can share a security heartbeat.
Innovative protection
Sophos Endpoint Protection goes far beyond signature-based prevention of known malware. It correlates suspicious behaviors and activities using real-time threat intelligence from SophosLabs. From malicious URLs to web exploit code, unexpected system changes to command-and-control traffic, well connect the dots so your endpoints and data are protected. The result is fewer infected computers and better protection against attacks and data breaches.
Complete control
Enforce your web, application, device and data policies with ease, thanks to seamless integration within the endpoint agent and the management console.
Web Control Category-based web filtering enforced on and off the corporate network
Application Control Point-and-click blocking of applications by category or name
Peripheral Control Managed access to removable media and mobile devices
Data Loss Prevention (DLP) Restrict unauthorized data flow using prebuilt or custom rules
Lightning performance
Sophos Endpoint Protection is continually tuned for the best performance. The lightweight agent keeps users secure without slowing them down. Protection updates are small typically under 30 KB so updates are easy on your network and your endpoints.
Sophisticated simplicity
Sophos Endpoint Protection delivers sophisticated functionality coupled with a simple, intuitive user experience. Quick and easy deployment, well-balanced default policies and automatic configuration of HIPS are just a few examples of how we do things differently.
Flexible licensing and deployment
Choose Sophos Central cloud-based management or deploy Sophos Enterprise Console software to apply policy, updates, and gather reporting. Upgrade to Sophos Intercept X Advanced to combine foundation endpoint security with modern techniques.
Prevent
Attack Surface Reduction
Web Security
Download Reputation
Web Control / Category-based URL Blocking
Peripheral Control (e.g. USB)
Application Control
Before it runs on device
Deep Learning malware detection
Anti-Malware File Scanning
Live Protection
Pre-execution Behavior Analysis (HIPS)
Potentially Unwanted Application (PUA) Blocking
Data Loss Prevention
Exploit Prevention
Detect
Stop Running Threat
Malicious Traffic Detection (MTD)
Active Adversary Mitigations
Ransomware File Protection (CryptoGuard)
Disk and Boot Recor