Contact Details

Sophos Ltd

Located in United Kingdom, England, Abingdon

Founded in 1985

Best For User Type

  • Managed Threat Response
  • Synchronized Security
Search

Compare product ratings to similar products Find other products with similar features to suit your business

contact us

Have you used this product before? Find other productswith similar features to suit your business

Write a review

Does this product belong to you

Alternatives to Sophos Intercept X

SentinelOne Active EDR

SentinelOne Active EDR

No ratings yet!
Falcon Insight

Falcon Insight

No ratings yet!
Blackberry optics

Blackberry optics

No ratings yet!
MVISION EDR

MVISION EDR

No ratings yet!
Cisco Secure Endpoint

Cisco Secure Endpoint

No ratings yet!
Cortex XDR

Cortex XDR

No ratings yet!
Cynet 360

Cynet 360

No ratings yet!
Apex One

Apex One

No ratings yet!
Binary Defense MDR

Binary Defense MDR

No ratings yet!
FireEye Endpoint Security

FireEye Endpoint Security

No ratings yet!
View all alternatives

What is Sophos Intercept X?

Show Less

Contact Details

Sophos Ltd

Located in United Kingdom, England, Abingdon

Founded in 1985

Best For User Type

  • Managed Threat Response
  • Synchronized Security

Top Industries Represented

Data from Grid Report for Endpoint Detection and Response (Edr) Software

View grid data

Deployment & Support

Deployment

  • Cloud, Saas, Web-based
  • Desktop-mac
  • Desktop-Windows
  • Desktop-Linux
  • Desktop-Chromebook
  • On Promise Windows
  • On Premise Linux
  • Mobile-Android
  • Mobile-Iphone
  • Mobile-Ipad

Support

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live Recap)

Training

  • In Person
  • Live Online
  • Webinars
  • Documentation
  • Videos

Sophos Intercept X Pricing

Check out our offers for each of our packages to get best out of the software

Visit us on our website to know more

Get a custom quote

Sophos Intercept X Features

Primary Features

Behavioral Analytics

EDR uses behavioral analysis to analyze and connect the activity of individual users on your system.

Prioritization

Prioritization is the process by which most critical vulnerabilities are ranked in order of importance.

Remediation Management

Endpoint Remediation is the process of resolving a cybersecurity threat once it has been identified to have infiltrated an endpoint device, such as a PC, laptop, mobile phone, tablet or even IoT device.

Vulnerability Scanning

Vulnerability scanning is an inspection of the potential points of exploit on a computer or network to identify security holes.

Endpoint Management

Endpoint management is an IT and cybersecurity process that consists of two main tasks: evaluating, assigning and overseeing the access rights of all endpoints; and applying security policies and tools that will reduce the risk of an attack or prevent such events.

Access Controls/Permissions

Access control is a fundamental component of data security that dictates who's allowed to access and use company information and resources.

Anomaly/Malware Detection

EDR technology pairs comprehensive visibility across all endpoints with IOAs and applies behavioral analytics that analyze billions of events in real time to automatically detect traces of malicious activities.

Activity Dashboard

It allows staff members to utilize the built-in search and filter functionality to consolidate and view log events and unexpected events across multiple endpoint devices

Secondary Features

  • Reporting & Statistics
  • Maintenance Scheduling
  • Compliance Tracking
  • Remote Monitoring & Management
  • Third Party Integrations
  • Encryption

Compare with Similar Products

SentinelOne Active EDR

SentinelOne Active EDR

Falcon Insight

Falcon Insight

Blackberry optics

Blackberry optics

MVISION EDR

MVISION EDR

Cisco Secure Endpoint

Cisco Secure Endpoint

Cortex XDR

Cortex XDR

Cynet 360

Cynet 360

Apex One

Apex One

Binary Defense MDR

Binary Defense MDR

FireEye Endpoint Security

FireEye Endpoint Security

Show Comparisons