Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Sophos Intercept X Thwarts Ransomware Before It Encrypts Files

    By
    Frank J. Ohlhorst
    -
    May 1, 2017
    Share
    Facebook
    Twitter
    Linkedin

      PrevNext

      1Sophos Intercept X Thwarts Ransomware Before It Encrypts Files

      Sophos Intercept X Thwarts Ransomware Before It Encrypts Files

      Ransomware may be the most perfect form of extortion the internet has ever seen. After all, attackers encrypt and lock files without warning and demand that ransom be paid using untraceable crypto-currencies, making it impossible for victims to trace the attackers, while those victims’ files are held hostage until the ransom is paid. Sophos aims to take the sting out of ransomware with Sophos Intercept X, a product designed to prevent ransomware from taking hold on endpoints, networks and other IT resources. Sophos Intercept X works alongside traditional antivirus or anti-malware solutions, bringing an extra layer of protection to the endpoint. That extra layer of protection is focused on identifying ransomware-like activity, something that traditional anti-malware products tend to lack.

      2Sophos Central Manages Intercept X Setup

      Sophos Central Manages Intercept X Setup

      Sophos Intercept X is installed from Sophos Central, a unified portal for controlling and managing Sophos’ security products. Getting started with Sophos Intercept X takes little more than registering with Sophos Central and selecting what product to deploy.

      3Choose How to Deploy Intercept X

      Choose How to Deploy Intercept X

      Sophos offers multiples methods for installing Sophos Intercept X. You can do so directly from Sophos Central or you can download installation files. Regardless of the method chosen, administrators can automate the process using policies, scripts or other deployment techniques, aiding the deployment of Sophos Intercept X across a dozen or even a thousand machines.

      4Sophos Keeps Installation, Update Processes Simple

      Sophos Keeps Installation, Update Processes Simple

      Sophos strives to keep things as simple as possible, and so Intercept X installation is wizard-driven and even accomplishes critical chores, such as updates and patches, automatically. Sophos has integrated the updating service directly into Sophos Intercept X, so end users don’t need to do anything to stay up to date with the product.

      5Keeping End Users Informed

      Keeping End Users Informed

      End users will find Sophos Intercept X simple to interact with. A basic dashboard alerts users to the status of the product, and large, easy-to-identify buttons make it simple to execute scans or track events on the system. Ideally, Sophos Intercept X just waits in the background, looking for threats, automatically mitigating those threats and then just letting end users know all is OK.

      6Scanning for Problems

      Scanning for Problems

      As part of the initial deployment, Sophos Intercept X can do a complete system scan to identify ransomware, malware or other threats. Scans are thorough, fast and fully logged.

      7Monitor System Status With Central Dashboard

      Monitor System Status With Central Dashboard

      An interactive dashboard, which rolls up events from deployed Sophos security products, enables administrators to check the security status of monitored systems with a single glance. Administrators can also drill down into individual systems, events and alerts to further investigate anomalies.

      8Manage Users Through Dashboard Too

      Manage Users Through Dashboard Too

      User management is critical when using Sophos Intercept X. And with the Sophos Central administration dashboard, administrators have the necessary tools to manage users and groups. Administrators can set default permissions, define group memberships and assign roles to users as well.

      9Managing System Endpoints

      Managing System Endpoints

      Although Sophos refers to managed systems as computers, endpoints are fully represented in the computer management dashboard. Important criteria, such as who used the system, when it was last accessed and more, are recorded for administrators to review. What’s more, software installed on endpoints can be managed from this dashboard as well.

      10Dashboard Handles All Software Management Chores

      Dashboard Handles All Software Management Chores

      The Sophos Central dashboard manages Sophos software installed on registered endpoints. Administrators can execute installations, patches and other software settings from the Manage Endpoint Software dashboard.

      11Policy Management Is Another Important Function

      Policy Management Is Another Important Function

      Policies are a key component of Sophos Intercept X, as well as the other endpoint applications offered by Sophos. Administrators can define policies for users, computers (endpoints) and servers from Sophos Central. Policy creation is wizard-driven, but administrators do have the option to manually configure policies as well.

      12You Can Define Scanning Exclusions

      You Can Define Scanning Exclusions

      Administrators can identify scanning exclusions, having the endpoint security products skip scanning specific directories or files. Exclusions come in handy for skipping over folders that are protected in other ways and may not be subject to ransomware.

      13Bandwidth Controls Avoid Performance Bottlenecks

      Bandwidth Controls Avoid Performance Bottlenecks

      Administrators can define how much bandwidth can be used on Windows systems for updates and software downloads. The ability to control bandwidth helps prevent “packet storms,” which may occur when hundreds of endpoints are attempting to download updates or new software simultaneously.

      14Sophos Keeps Logs of Endpoint Events

      Sophos Keeps Logs of Endpoint Events

      Sophos gives administrators extensive information on what is occurring on endpoints. That information can be used for forensic purposes or to define additional policies.

      PrevNext
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×