1Sophos Intercept X Thwarts Ransomware Before It Encrypts Files
Ransomware may be the most perfect form of extortion the internet has ever seen. After all, attackers encrypt and lock files without warning and demand that ransom be paid using untraceable crypto-currencies, making it impossible for victims to trace the attackers, while those victims’ files are held hostage until the ransom is paid. Sophos aims to take the sting out of ransomware with Sophos Intercept X, a product designed to prevent ransomware from taking hold on endpoints, networks and other IT resources. Sophos Intercept X works alongside traditional antivirus or anti-malware solutions, bringing an extra layer of protection to the endpoint. That extra layer of protection is focused on identifying ransomware-like activity, something that traditional anti-malware products tend to lack.
2Sophos Central Manages Intercept X Setup
3Choose How to Deploy Intercept X
Sophos offers multiples methods for installing Sophos Intercept X. You can do so directly from Sophos Central or you can download installation files. Regardless of the method chosen, administrators can automate the process using policies, scripts or other deployment techniques, aiding the deployment of Sophos Intercept X across a dozen or even a thousand machines.
4Sophos Keeps Installation, Update Processes Simple
Sophos strives to keep things as simple as possible, and so Intercept X installation is wizard-driven and even accomplishes critical chores, such as updates and patches, automatically. Sophos has integrated the updating service directly into Sophos Intercept X, so end users don’t need to do anything to stay up to date with the product.
5Keeping End Users Informed
End users will find Sophos Intercept X simple to interact with. A basic dashboard alerts users to the status of the product, and large, easy-to-identify buttons make it simple to execute scans or track events on the system. Ideally, Sophos Intercept X just waits in the background, looking for threats, automatically mitigating those threats and then just letting end users know all is OK.
6Scanning for Problems
7Monitor System Status With Central Dashboard
8Manage Users Through Dashboard Too
9Managing System Endpoints
Although Sophos refers to managed systems as computers, endpoints are fully represented in the computer management dashboard. Important criteria, such as who used the system, when it was last accessed and more, are recorded for administrators to review. What’s more, software installed on endpoints can be managed from this dashboard as well.
10Dashboard Handles All Software Management Chores
11Policy Management Is Another Important Function
Policies are a key component of Sophos Intercept X, as well as the other endpoint applications offered by Sophos. Administrators can define policies for users, computers (endpoints) and servers from Sophos Central. Policy creation is wizard-driven, but administrators do have the option to manually configure policies as well.
12You Can Define Scanning Exclusions
13Bandwidth Controls Avoid Performance Bottlenecks
14Sophos Keeps Logs of Endpoint Events
Sophos gives administrators extensive information on what is occurring on endpoints. That information can be used for forensic purposes or to define additional policies.