New generation cyber threats requires new generation security
Sophisticated malware of today has eroded the effectiveness of traditional defenses. Designed to use signatures to block known threats, traditional firewalls, IPS, AV, and gateways can do nothing when zero-day, unknown malware attacks, leaving a loophole vulnerable to attacks.
To fill this loophole, a new generation of signature-less security approach has emerged by applying advanced, coordinated techniques to identify, confirm and block the exploit activities of today's threats.
HGC partners with world-leading information security expert Sophos to introduce Sophos Intercept X. Sophos Intercept X is a brand new solution that stops ransomware in its tracks. It delivers proven anti-ransomware protection, keeping your data – and your business - safe.
- Stops ransomware by blocking the unauthorized encryption of files
- Automatically rolls back maliciously encrypted file changes1
- Protects against both local and remote encryption
Sophos is recognized as a leader in endpoint security by Gartner and Forrester
Gartner, the world's leading information technology research and advisory company, has recognized Sophos as a Leader once again in 2017, in the new Magic Quadrant for Endpoint Protection Platforms2.
Forrester Research, Inc. has recognized Sophos as a Leader in The Forrester WaveTM: Endpoint Security Suites, Q4 2016 report3.
The Forrester Wave™: Endpoint Security Suites, Q4 2016 by Chris Sherman, October 19, 2016
Loopholes of traditional security protection
Watch this video to learn loopholes of traditional security protections and how Sophos Intercept X fills these security loopholes.
Sophos Intercept X in action
Watch this 2-minute video to see the new security approach of Sophos Intercept X towards new attacks.
Stop ransomware before it takes your files hostage
Sophos Intercept X features CryptoGuard, which prevents the malicious encryption of your data and files by ransomware. And once ransomware gets intercepted, CryptoGuard can automatically rolls back maliciously encrypted file changes1.
Root cause analysis provides insight on threats
When your computer is attacked, you want to know how the attack got in, where it went, what else it touched and—most importantly—what you should do now. We’ve got you covered. Detailed, forensic-level analysis illuminates the root causes of attacks and their infection paths, and offers prescriptive guidance to help remediate infections today and bolster your security posture moving forward.
Exploit prevention stops modern threats
The unique technologies of Sophos Intercept X are designed to stop attackers before they have a chance to throw their first punch.
Rather than examining hundreds of millions of known malware samples, Intercept instead focuses on the relatively small collection of techniques used to spread malware. This way, we can ward off zero-day attacks without having even seen them first.
ESG Lab First Look: Intercept X
"ESG Lab found Sophos Intercept X to be simple enough for an IT generalist, while providing features and functionality advanced enough for the professional security analyst."
1. Rolling back of files will depend on the type and size of files. Please contact us for further information.
2. Gartner Magic Quadrant for Endpoint Protection Platforms, Eric Ouellet, Ian McShane, Avivah Litan, 30 January 2017.
3. The Forrester Wave™: Endpoint Security Suites, Q4 2016 by Chris Sherman, October 19, 2016
Warranty of Sophos products is provided by Sophos’ distributor, Apple Solution.