FUNKTIONEN | INTERCEPT X ESSENTIALS | Intercept X Advanced | Intercept X Advanced mit XDR | Intercept X Advanced mit MDR Standard | Intercept X Advanced mit MDR Complete |
---|---|---|---|---|---|
VERWALTUNG | |||||
Mehrere Richtlinien | |||||
Gesteuerte Updates | |||||
REDUKTION DER ANGRIFFSFLÄCHE | |||||
Application Control | |||||
Peripheriekontrolle | |||||
Web Control/Kategoriebasierte URL-Filterung | |||||
Download Reputation | |||||
Web Security | |||||
VOR AUSFÜHRUNG AUF DEM GERÄT | |||||
Deep-Learning-Malware-Erkennung | |||||
Anti-Malware-Dateiscans | |||||
Live Protection | |||||
Verhaltensanalysen vor Ausführung (HIPS) | |||||
Blockierung pot. unerwünschter Anwendungen (PUAs) | |||||
Intrusion Prevention System (IPS) | |||||
STOPPEN VON BEDROHUNGEN BEI AUSFÜHRUNG | |||||
Data Loss Prevention | |||||
Laufzeit-Verhaltensanalyse (HIPS) | |||||
Antimalware Scan Interface (AMSI) | |||||
Malicious Traffic Detection (MTD) | |||||
Exploit Prevention | |||||
Active Adversary Mitigations | |||||
Ransomware File Protection (CryptoGuard) | |||||
Disk and Boot Record Protection (WipeGuard) | |||||
Man-in-the-Browser Protection (Safe Browsing) | |||||
Verbesserter Application Lockdown | |||||
ERKENNUNG | |||||
Live Discover (umgebungsübergreifende SQL-Abfragen zum Threat Hunting und zur Einhaltung von Sicherheitsvorgaben) | |||||
SQL-Abfragen-Library (vorformulierte, individuell anpassbare Abfragen) | |||||
Datenspeicherung auf Festplatte (bis zu 90 Tage) mit schnellem Datenzugriff | |||||
Produktübergreifende Datenquellen (z. B. Firewall, E-Mail) | |||||
Produktübergreifende Abfragen | |||||
Sophos Data Lake (Cloud-Datenspeicher) | 30 Tage | 30 Tage | 30 Tage | ||
Geplante Abfragen | |||||
ANALYSE | |||||
Bedrohungsfälle (Ursachenanalyse) | |||||
Deep Learning-Malware-Analyse | |||||
Erweiterte Bedrohungsdaten aus den SophosLabs auf Abruf | |||||
Export forensischer Daten | |||||
BEREINIGUNG | |||||
Automatisierte Malware-Entfernung | |||||
Synchronized Security Heartbeat | |||||
Sophos Clean | |||||
Live Response (Remote-Terminal-Zugriff für weitere | |||||
On-Demand-Endpoint-Isolation | |||||
Mit einem Klick „Entfernen und blockieren“ | |||||
THREAT HUNTING UND REAKTION DURCH EXPERTEN | |||||
24/7 indizienbasiertes Threat Hunting | |||||
Security Health Checks | |||||
Datenspeicherung | |||||
Aktivitätsreports | |||||
Angriffserkennung | |||||
Beseitigung von Bedrohungen und ihren Folgen | |||||
24/7 indizienloses Threat Hunting | |||||
Threat Response Team Lead | |||||
Direkter Telefon-Support | |||||
Proaktives Security Posture Management |
CIXE0U01AARCAA
CIXE0U12AARCAA
CIXE0U24AARCAA
CIXE0U36AARCAA
CIXE0U48AARCAA
CIXE0U60AARCAA
CIXE0U01ABRCAA
CIXE0U12ABRCAA
CIXE0U24ABRCAA
CIXE0U36ABRCAA
CIXE0U48ABRCAA
CIXE0U60ABRCAA
CIXE0U01ACRCAA
CIXE0U12ACRCAA
CIXE0U24ACRCAA
CIXE0U36ACRCAA
CIXE0U48ACRCAA
CIXE0U60ACRCAA
CIXE0U01ADRCAA
CIXE0U12ADRCAA
CIXE0U24ADRCAA
CIXE0U36ADRCAA
CIXE0U48ADRCAA
CIXE0U60ADRCAA
CIXE0U01AERCAA
CIXE0U12AERCAA
CIXE0U24AERCAA
CIXE0U36AERCAA
CIXE0U48AERCAA
CIXE0U60AERCAA
CIXE0U01AFRCAA
CIXE0U12AFRCAA
CIXE0U24AFRCAA
CIXE0U36AFRCAA
CIXE0U48AFRCAA
CIXE0U60AFRCAA
CIXE0U01AGRCAA
CIXE0U12AGRCAA
CIXE0U24AGRCAA
CIXE0U36AGRCAA
CIXE0U48AGRCAA
CIXE0U60AGRCAA
CIXE0U01AHRCAA
CIXE0U12AHRCAA
CIXE0U24AHRCAA
CIXE0U36AHRCAA
CIXE0U48AHRCAA
CIXE0U60AHRCAA
CIXE0U01AIRCAA
CIXE0U12AIRCAA
CIXE0U24AIRCAA
CIXE0U36AIRCAA
CIXE0U48AIRCAA
CIXE0U60AIRCAA
CIXE0U01AJRCAA
CIXE0U12AJRCAA
CIXE0U24AJRCAA
CIXE0U36AJRCAA
CIXE0U48AJRCAA
CIXE0U60AJRCAA
CIXE0U01AKRCAA
CIXE0U12AKRCAA
CIXE0U24AKRCAA
CIXE0U36AKRCAA
CIXE0U48AKRCAA
CIXE0U60AKRCAA
CIXE0U01AZRCAA
CIXE0U12AZRCAA
CIXE0U24AZRCAA
CIXE0U36AZRCAA
CIXE0U48AZRCAA
CIXE0U60AZRCAA
CIXE0U01AANCAA
CIXE0U12AANCAA
CIXE0U24AANCAA
CIXE0U36AANCAA
CIXE0U48AANCAA
CIXE0U60AANCAA
CIXE0U01AANCCU
CIXE0U12AANCCU
CIXE0U24AANCCU
CIXE0U36AANCCU
CIXE0U48AANCCU
CIXE0U60AANCCU
CIXE0U01ABNCAA
CIXE0U12ABNCAA
CIXE0U24ABNCAA
CIXE0U36ABNCAA
CIXE0U48ABNCAA
CIXE0U60ABNCAA
CIXE0U01ABNCCU
CIXE0U12ABNCCU
CIXE0U24ABNCCU
CIXE0U36ABNCCU
CIXE0U48ABNCCU
CIXE0U60ABNCCU
CIXE0U01ACNCAA
CIXE0U12ACNCAA
CIXE0U24ACNCAA
CIXE0U36ACNCAA
CIXE0U48ACNCAA
CIXE0U60ACNCAA
CIXE0U01ACNCCU
CIXE0U12ACNCCU
CIXE0U24ACNCCU
CIXE0U36ACNCCU
CIXE0U48ACNCCU
CIXE0U60ACNCCU
CIXE0U01ADNCAA
CIXE0U12ADNCAA
CIXE0U24ADNCAA
CIXE0U36ADNCAA
CIXE0U48ADNCAA
CIXE0U60ADNCAA
CIXE0U01ADNCCU
CIXE0U12ADNCCU
CIXE0U24ADNCCU
CIXE0U36ADNCCU
CIXE0U48ADNCCU
CIXE0U60ADNCCU
CIXE0U01AENCAA
CIXE0U12AENCAA
CIXE0U24AENCAA
CIXE0U36AENCAA
CIXE0U48AENCAA
CIXE0U60AENCAA
CIXE0U01AENCCU
CIXE0U12AENCCU
CIXE0U24AENCCU
CIXE0U36AENCCU
CIXE0U48AENCCU
CIXE0U60AENCCU
CIXE0U01AFNCAA
CIXE0U12AFNCAA
CIXE0U24AFNCAA
CIXE0U36AFNCAA
CIXE0U48AFNCAA
CIXE0U60AFNCAA
CIXE0U01AFNCCU
CIXE0U12AFNCCU
CIXE0U24AFNCCU
CIXE0U36AFNCCU
CIXE0U48AFNCCU
CIXE0U60AFNCCU
CIXE0U01AGNCAA
CIXE0U12AGNCAA
CIXE0U24AGNCAA
CIXE0U36AGNCAA
CIXE0U48AGNCAA
CIXE0U60AGNCAA
CIXE0U01AGNCCU
CIXE0U12AGNCCU
CIXE0U24AGNCCU
CIXE0U36AGNCCU
CIXE0U48AGNCCU
CIXE0U60AGNCCU
CIXE0U01AHNCAA
CIXE0U12AHNCAA
CIXE0U24AHNCAA
CIXE0U36AHNCAA
CIXE0U48AHNCAA
CIXE0U60AHNCAA
CIXE0U01AHNCCU
CIXE0U12AHNCCU
CIXE0U24AHNCCU
CIXE0U36AHNCCU
CIXE0U48AHNCCU
CIXE0U60AHNCCU
CIXE0U01AINCAA
CIXE0U12AINCAA
CIXE0U24AINCAA
CIXE0U36AINCAA
CIXE0U48AINCAA
CIXE0U60AINCAA
CIXE0U01AINCCU
CIXE0U12AINCCU
CIXE0U24AINCCU
CIXE0U36AINCCU
CIXE0U48AINCCU
CIXE0U60AINCCU
CIXE0U01AJNCAA
CIXE0U12AJNCAA
CIXE0U24AJNCAA
CIXE0U36AJNCAA
CIXE0U48AJNCAA
CIXE0U60AJNCAA
CIXE0U01AJNCCU
CIXE0U12AJNCCU
CIXE0U24AJNCCU
CIXE0U36AJNCCU
CIXE0U48AJNCCU
CIXE0U60AJNCCU
CIXE0U01AKNCAA
CIXE0U12AKNCAA
CIXE0U24AKNCAA
CIXE0U36AKNCAA
CIXE0U48AKNCAA
CIXE0U60AKNCAA
CIXE0U01AKNCCU
CIXE0U12AKNCCU
CIXE0U24AKNCCU
CIXE0U36AKNCCU
CIXE0U48AKNCCU
CIXE0U60AKNCCU
CIXE0U01AZNCAA
CIXE0U12AZNCAA
CIXE0U24AZNCAA
CIXE0U36AZNCAA
CIXE0U48AZNCAA
CIXE0U60AZNCAA
CIXE0U01AZNCCU
CIXE0U12AZNCCU
CIXE0U24AZNCCU
CIXE0U36AZNCCU
CIXE0U48AZNCCU
CIXE0U60AZNCCU