A global leader in network and end point security, has announced Sophos Intercept X, a next-generation endpoint security product that stops zero-day malware, unknown exploit variants and stealth attacks, and includes an advanced anti-ransomware feature that can detect previously unknown ransomware within seconds.
Sophos Intercept X installs alongside existing endpoint security software from any vendor, immediately boosting endpoint protection by stopping malicious code before it executes.
According to a statement, Sophos Intercept X combines four critical security components that IT administrators should expect from next-generation endpoint protection. They are: Signatureless Threat and Exploit Detection- anti-malware and anti-hacker defense that block zero-day, unknown and memory resident attacks and threat variants without the need for file scanning; CryptoGuard- an anti-ransomware innovation that identifies and intercepts malicious encryption activity, blocks ransomware before it can lock and cripple systems and can roll backmaliciously encrypted files to their pre-attack state; Root Cause Analytics- a 360 degree visual analysis of attack events that shows where the attack came in, what it affected, where it may have stopped and recommended actions to prevent a similar attack in the future and Sophos Clean- a powerful utility that hunts for and removes any trace of spyware and deeply embedded, lingering malware.
“Sophos is a next-generation security company that has stayed at the forefront of the industry by understanding the threat landscape, changing business needs and customer challenges. Using big data analytics along with our deep understanding of threat patterns, attack vectors and criminal motivations, we designed Intercept X from the ground up to recognise malicious behaviors and stop potential attacks much sooner in the kill-chain, without the need for updates or signatures,” said Dan Schiappa, senior vice president of the Enduser Security Group at Sophos.
“IT professionals know that there is no single equation that stops all attacks, so we developed Intercept X to combine several techniques for faster identification and response that are coordinated to better support IT professionals without the need for specialised security staff.”
Developed as a core component of Sophos’ synchronized security strategy, Sophos Intercept X is enabled with the Security Heartbeat to share threat intelligence with Sophos’ next generation XG Firewall and SafeGuard Encryption solutions for a coordinated and automated response to attack. The product can be installed and managed remotely through the Sophos Central cloud-based management console that allows administrators to control and configure settings, distribute licenses, add new endpoints and track all activity. In addition, the single pane of glass dashboard designed for Sophos partners shows all Sophos Central services available to provide higher levels of customer protection while offering partners additional recurring revenue opportunities.
Tony Palmer, senior Lab analyst at ESG commented: “According to ESG research, many organisations have extensively adopted advanced prevention products, such as next-gen antivirus and even more are planning to ease their way into advanced detection and response. Unfortunately, many enterprises simply lack the right level of security analytics skills or staff to perform these tasks effectually, thanks to a global, problematic shortage of cybersecurity skills. With Intercept X Sophos looks to provide a fast-track to achieving advanced protection and response capabilities while minimising the need for specialized security consultants to administer it. In ESG Lab’s opinion, Sophos Intercept X has made excellent progress closing many of the endpoint security gaps that still exist for organisations worldwide.”
Customers and partners who participated in the public beta program experienced the next-generation protection capabilities of Sophos Intercept X, including the ability to help to eliminate the impact of ransomware by almost immediately recognising and stopping malicious encryption activity and preventing the attack from spreading across the network. Once the threat is neutralised, affected files can be rolled back to the pre-attack state, saving considerable time, resources and money.