OUR PRODUCTS
Sophos Protection
SOPHOS EndPoint Protection
Sophos EndPoint protection integrates proven technology like malicious traffic detection with real-time threat intelligence from SophosLabs to help you prevent, detect and remediate threats with ease.
Sophos Products
Sophos EndPoint Protection
Sophisticated yet simple security for your desktop environment.
Sophos Endpoint Protection makes it simple to secure your Windows, Mac and Linux systems against malware and other endpoint threats. Sophos endpoint protection integrates proven technology like malicious traffic detection with real-time threat intelligence from SophosLabs to help you prevent, detect and remediate threats with ease. Web, application, and peripheral access policies can follow your users anywhere they go. And, your firewall and endpoints can share a security heartbeat
Intercept X
Sophos Intercept X employs a comprehensive, defense in depth approach to endpoint protection, rather than relying on one primary security technique. This layered approach combines modern and traditional techniques to stop the widest range of threats.
Stop Unknown Threats
Deep learning AI in Intercept X excels at detecting and blocking malware even when it hasn’t been seen before. It does this by scrutinizing file attributes from hundreds of millions of samples to identify threats without the need for a signature.
Block Ransomware
Intercept X includes advanced anti-ransomware capabilities that detect and block the malicious encryption processes used in ransomware attacks. Files that have been encrypted will be rolled back to a safe state, minimizing any impact to business productivity.
Prevent Exploits
Anti-exploit technology stops the exploit techniques that attackers rely on to compromise devices, steal credentials and distribute malware. By stopping the techniques used throughout the attack chain Intercept X keeps your organization secure against file-less attacks and zero-day exploits.
Layered Defenses
In addition to powerful modern functionality, Intercept X also utilizes proven traditional techniques. Example features include application lockdown, web control, data loss prevention and signature-based malware detection. This combination of modern and traditional techniques reduces the attack surface, and provides the best defense in depth.
Synchronized Security
Sophos solutions work better together. For example, Intercept X and Sophos Firewall will share data to automatically isolate compromised devices while cleanup is performed, then return network access when the threat is neutralized. All without the need for admin intervention
Endpoint Detection and Response (EDR)
Designed for IT admins and cybersecurity specialists, Sophos EDR answers critical IT operations and threat hunting questions. For example, identify devices with performance issues or suspicious processes trying to connect on non-standard ports, then remotely access the device to take remedial actions.
Managed Threat Response (MTR)
24/7/365 threat hunting detection and response service that’s delivered by a team of Sophos experts. Sophos analysts respond to potential threats, look for indicators of compromise and provide detailed analysis on events including what happened, where, when, how and why.
Extended Detection and Response (XDR)
Go beyond endpoints and servers, pulling in firewall, email and other data sources* . You get a holistic view of your organization’s cybersecurity posture with the ability to drill down into granular detail. For example, understand office network issues and what application is causing them.
Straightforward Management
Intercept X is managed via Sophos Central, the cloud-management platform for all Sophos solutions. It’s a single pane of glass for all of your devices and
products, making it easy to deploy, configure and manage your environment even in remote working setups.
Intercept X for Server
Sophos Intercept X for Server employs a comprehensive, defense in depth
approach to server security. A combination of powerful defensive techniques and visibility capabilities give organizations the very best protection against the latest threats.
Stop Unknown Threats
Deep learning AI in Intercept X for Server excels at detecting and blocking malware even when it hasn’t been seen before. It does this by scrutinizing file attributes from hundreds of millions of samples to identify threats without the need for a signature
Block Ransomware
Intercept X for Server includes advanced anti-ransomware capabilities that detect and block the malicious encryption processes used in ransomware attacks. Files that have been encrypted will be rolled back to a safe state, minimizing any impact to business productivity.
Prevent Exploits
Anti-exploit technology stops the exploit techniques that attackers rely on to compromise devices, steal credentials and distribute malware. By stopping the techniques used throughout the attack chain Intercept X for Server keeps your organization secure against file-less attacks and zero-day exploits
Control Your Servers
Ensure only what you want can run. Server Lockdown (whitelisting) makes sure that only applications you have approved can run on a server. File Integrity Monitoring will notify you if there are unauthorized attempts to change critical files.
See Your Wider Cloud Environment
Understand and secure your entire multi-cloud inventory. You can detect your cloud workloads as well as critical cloud services including S3 buckets, databases and serverless functions, identify suspicious activity, spot insecure deployments and close security gaps.
Endpoint Detection and Response (EDR)
Designed for IT admins and cybersecurity specialists Sophos EDR answers critical IT operations and threat hunting questions. For example, identify servers that have active RDP sessions or analyze cloud security groups to
identify resources exposed to the public internet
Managed Threat Response (MTR)
24/7/365 threat hunting detection and response service that’s delivered by a team of Sophos experts. Sophos analysts respond to potential threats, look for indicators of compromise and provide detailed analysis on events including what happened, where, when, how and why.
Extended Detection and Response (XDR)
Go beyond servers and endpoints, pulling in firewall, email and other data sources* . You get a holistic view of your organization’s cybersecurity posture with the ability to drill down into granular detail. For example, understand office network issues and what application is causing them.
Straightforward Management
Intercept X for Server is managed via Sophos Central, the cloud-management platform for all Sophos solutions. It’s a single pane of glass for all of you servers, devices and products, making it easy to deploy, configure and manage
in cloud, on-premises, virtual and mixed deployments
Sophos Mobile
Improve productivity with simpler Unified Endpoint Management. Sophos Mobile is a Unified Endpoint Management (UEM) and Mobile Threat Defense (MTD) solution that helps businesses spend less time and effort to manage and secure traditional and mobile endpoints. The only UEM solution that integrates natively with a leading next-gen endpoint security platform, Sophos Mobile manages and secures iOS, Android, Chrome OS, Windows 10 and macOS devices.
Simple Unified Endpoint Management
Manage and secure corporate-owned or personal Windows 10, macOS, and mobile endpoints in one system to ensure a simpler management strategy, ensuring uniform company security policies and secure access to company assets. For maximum productivity, organizations where BYOD is embraced can apply consistent policies regardless of device type or ownership. And, because everything we do at Sophos is about security, Sophos Mobile will keep business data, users, and their mobile devices protected and secure.
Modern Management with Mobile Threat Defense
Establish a robust line of defense at the mobile device level with industry-leading threat protection technology that leverages deep learning technology and web protection in the Sophos Intercept X for Mobile app. Enforce company policies with compliance checks that will automatically restrict access to business resources or initiate remediating actions in case of violations. For additional security, Sophos Mobile integrates natively with the leading next-gen endpoint protection solution for Windows and macOS in Sophos Central.
Keep business data protected and personal data private
Keeping business data protected and secure on personal or company-owned mobile devices is critical. To make sure that business data is safe and personal information is private, Sophos Mobile comes with a container for email and documents that can be deployed either with or without management of the device itself. Container-only management gives admins control over corporate content without intruding on the users’ privacy, ideal in BYOD scenarios.
Remote configuration and setup
Spend less time managing and securing traditional and mobile endpoints for increased productivity, and rest easier knowing that the associated risks are reduced. Configure BYOD or corporate-owned Android, iOS, Chrome OS, Windows 10 or macOS endpoints remotely with a powerful selection of policies, profiles, and configuration options. Reduce your help desk calls by helping your users help themselves with the flexible self-service portal, entirely
without IT involvement.
Productivity – Let your users work on any device they want
Sophos Mobile enables companies to improve productivity by letting employees use mobile devices for work. A wide range of security and management capabilities ensures that company data is secure, for example by configuring access to business information and email on personal or
business-owned mobile devices.
Security – For users, data, and devices
Sophos Mobile is the only Unified Endpoint Management product that integrates natively with a leading next-gen endpoint security platform, protecting users on traditional and mobile endpoints. Keep business email and documents on mobile devices in containers, making sure that access to company data is controlled and secure, even for users with personal devices that can have access to business information without intrusions upon their privacy. Leading mobile threat defense technology protects users from
malicious apps and websites
Simplicity – Easy to configure, manage, and maintain
Sophos Mobile lets you get started in minutes as a hosted solution in Sophos Central. The intuitive admin workflow, together with the flexible self-service portal, means your admins will spend less time on the day-to-day tasks of
securing and managing traditional and mobile endpoints, leading to a lower total cost of ownership. Sophos Mobile can also be used to manage and configure the Microsoft Office 365 apps on mobile devices. Admins will save time by using a single console, making policy creation and distribution simple in the Sophos Mobile admin interface
Value – Secure your mobile devices affordably
Sophos Mobile is licensed per user and delivers great value, enabling companies to manage and secure the devices of the whole organization without overspending on underutilized features
Straightforward Management
Intercept X for Server is managed via Sophos Central, the cloud-management platform for all Sophos solutions. It’s a single pane of glass for all of you servers, devices and products, making it easy to deploy, configure and manage
in cloud, on-premises, virtual and mixed deployments
Sophos Phish Threat
Outlook add-in for Windows and Mac Sophos Phish Threat Outlook add-in allows employees to report suspected phishing and spam messages with one click right, from Outlook. Available for Outlook for Windows and Mac, Outlook Web Access, Office 365, and Exchange environments, it turns all employees into an active line of defense against cyberattacks
Benefits of Sophos Outlook add-in
Now with over 500 email threat templates and 60 engaging training modules in 10 languages, Phish Threat’s single license already makes it simple to change employee behavior – existing customers see a 31% reduction in susceptibility to attacks in only four campaigns.
The Outlook add-in goes further to simplify the way employees report suspicious messages and simulated tests. With one click, users can report a message to the proper destination in the proper format and eliminate the need to remember a specific email address or how to properly forward unwanted messages.
You and your team will get better visibility into organizational awareness of
cybersecurity risks and the real threats you face. Phish Threat reports make it simple to view who, when, and on what device users receive their simulated attack – and who reported it.
Compatibility
Sophos Phish Threat Outlook add-in is compatible with the
following environments:
- Microsoft Office 365 Business subscription
(Microsoft Exchange Online) - Microsoft Exchange Server 2019 on-premises*
With support for a range of popular mail clients: - Microsoft Outlook for Windows 2013, 2016, and 2019
- Microsoft Outlook for Mac 2016 and 2019
- Microsoft Outlook on the Web (Microsoft
Office 365 or Outlook Web Access)
Sophos Central Device Encryption
The easiest way to manage full disk encryption
Each year, millions of laptop computers are misplaced, stolen, or lost; many
of them containing important and sensitive data. Full disk encryption is the
essential first line of defense to protect your data in any of these events.
Sophos Central gives you the ability to manage full disk encryption from a
single, integrated, web-based management center.
The easiest way to manage full disk encryption
The majority of mobile professionals carry laptops containing confidential company information. Passwords alone do not protect data. The best way to make sure your data is secure at rest is by encrypting the computer’s hard drive. As a part of compliance requirements, you are likely to be able to verify which computers in your organization are encrypted. And in the case of lost or stolen laptops, organizations also need to provide proof that these missing devices are encrypted.
Quick deployment
Sophos Central Device Encryption lets you centrally manage Windows BitLocker and macOS FileVault native device encryption. With Sophos Central’s web-based management, there is no server to deploy and no need to configure back-end key servers. You can deploy and start securing data in minutes. For existing Sophos Central Intercept X customers, there is no additional agent required. Over-the-air deployment means it takes only a couple of clicks to push out the new encryption policy. And, it lets you easily secure data on remote laptops
Secure document sharing
Effortlessly share files, safe in the knowledge they remain secure. With a few clicks, users can create a password-protected file securely contained within an HTML 5 wrapper. Encrypted files can only be opened by a recipient with the correct password, they simply need a web browser and valid password to access the documents. Furthermore, an Outlook add-in enables users to encrypt email attachments before sharing them with internal or external colleagues.
Sophos Email
Cloud email security powered by artificial intelligence
Sophos email is cloud email security delivered simply through Sophos Central’s easy-to-use single management console. Protect sensitive information, and your people, from unwanted and malicious email threats today, and tomorrow, with the latest artificial intelligence
Smarter Email Security
Today’s email threats move fast, and malicious files look more and more like benign files. Growing businesses need predictive email security – defeating today’s threats with an eye on tomorrow.
See the Future
Using the same technology as our award-winning Intercept X, the artificial
intelligence built into Sophos Email’s Sandstorm sandboxing technology is a deep learning neural network. It is able to detect suspicious payloads containing threats, malware, and unwanted applications, as well as high-level threats embedded in documents, including ransomware. Sophos Sandstorm detonates these files in series of virtual machines, simulating a real end-user environment where behavior can be monitored, delivering safe documents – not just PDFs
Stop Ransomware
The most advanced anti-ransomware technology available. Sophos Email security uses behavioral analysis to stop never-before-seen ransomware and boot record attacks.
Block Stealth Attacks
Protecting employees from malicious website links, our advanced URL protection is outsmarting attackers who slip phishing URLs past traditional gateways, delaying the upload of malware to websites until after the email is delivered. Sophos Time-of Click checks website reputation before delivery and at the time you click – blocking stealthy, delayed attacks.
Trust Your Inbox
Phishing imposter defense with Sophos Email uses a combination of SPF, DKIM, and DMARC authentication techniques, header anomaly analysis, as well as display name and lookalike domain checks. This allows you to identify and permit legitimate emails while blocking imposters – so you can trust your inbox again.
SophosLabs global threat intelligence network ensures you won’t miss the thousands of new spam and malware threats discovered every hour. IP reputation filtering blocks up to 90% of spam at the door, while Sophos anti-spam and antivirus engines catch the rest
Comprehensive Reporting
Sophos Email provides statistics reports within the Sophos Central console in the form of tables and graphs – and all with custom date ranges selectable. These reports include:
- Message history (messages deleted,
quarantined, processing, delivered successfully,
delivery failed, and queued for delivery) - Message details (sender/recipient info, status,
raw header details and attachments) - Message summary (message direction, # scanned,
# Legitimate, # spam, # virus, # DLP policy
violations, # advanced threat, # realtime blocklist,
# company blocklist, # authentication failures) - Message volume analyzed by sandbox
(Sophos Sandstorm) - Time-of-Click Protection URL protection
(top 100 URLs scanned)