Harness the Power of a Deep Learning Neural Network
The pricing for Intercept X Endpoint is varied and depends on the client's environment and needs. Some find the price fair and reasonable, while others consider it expensive. The solution offers both annual and three-year licenses. It is not overly expensive compared to the market, however, some customers feel it could be more competitive. There are no additional costs besides the licensing price.
Users have experienced positive outcomes with Intercept X Endpoint. It effectively prevents viruses and offers strong protection against anti-ransomware and zero-day threats, resulting in a favorable ROI for the solution.
The primary use case of Intercept X Endpoint is for endpoint security, antivirus threat detection and response, complete surface deployment, server security, mobile management, managing endpoints, creating a software center, stopping ransomware, analyzing and identifying infections, synchronized security, protecting end-user PCs and servers, and endpoint protection.
The most valuable features of Intercept X Endpoint are threat protection, common dashboard feature, ease of use, policy options, ability to interact directly with potentially infected machines, the central view of all endpoints, web content filtering, multi-platform support, anti-ransomware capability, cloud management, performance, anti-malware feature, scalability capabilities, and synchronization with other solutions.
Users also appreciate the ease of setup, stability, reporting capabilities, and reasonable pricing of the solution. It is considered a complete antivirus solution with good technicality and machine-learning capabilities.
Additionally, the solution's CryptoGuard feature, security metrics, and information-gathering capabilities are highly valued.
Improvements needed for Intercept X Endpoint include:
- The option to list all installed applications on the client's side, similar to Kaspersky.
- Better pricing for the solution.
- Compatibility with Linux and Microsoft operating systems.
- The ability to merge sub-estates more easily, instead of manual merging.
- Improved performance to the endpoints, as there were initial performance challenges.
- Compatibility with Google, in addition to Microsoft, for Sophos Zero Trust.
- Enhanced graphical interface.
- Support for less expensive mobile devices.
- A clearer understanding of what features need improvement. -
Reduction in CPU memory usage and resource consumption.
- Nicer management of policies, users, and groups.
- Better API access into Azure and InTune.
- More notifications or emails about global threats, such as phishing campaigns or ransomware.
- Faster support for new macOS versions and Apple hardware.
- The simplified and faster installation process.
- Improved detection and AI capabilities, as well as broader attack coverage.
- Consolidation of features into one package.
- Better support for virtual and desktop infrastructures.
The initial setup for Intercept X Endpoint was described as straightforward and not overly complex. The deployment process was generally quick, taking around 10 minutes to an hour. Maintenance was often automated, requiring minimal effort from administrators. Some users mentioned that the setup could be improved with clearer instructions or more training resources.
Intercept X Endpoint is highly scalable. Users have reported that it is easy to scale and increase the capacity, and they haven't experienced any issues with scalability.
The service and support for Intercept X Endpoint have received positive feedback overall. Users have mentioned that technical support is tremendously helpful. They have also praised the responsiveness of the support team and their ability to solve installation-related issues. However, there are a few users who believe that the support could be improved in terms of responsiveness and speed.
Intercept X Endpoint is highly stable and reliable. Users have reported that there are no bugs, glitches, crashes, or freezes. Some minor scalability elements could be improved, however, overall the stability is good. The solution is not resource-intensive and has been working well during deployment.
The pricing for Intercept X Endpoint is varied and depends on the client's environment and needs. Some find the price fair and reasonable, while others consider it expensive. The solution offers both annual and three-year licenses. It is not overly expensive compared to the market, however, some customers feel it could be more competitive. There are no additional costs besides the licensing price.
Users have experienced positive outcomes with Intercept X Endpoint. It effectively prevents viruses and offers strong protection against anti-ransomware and zero-day threats, resulting in a favorable ROI for the solution.
The primary use case of Intercept X Endpoint is for endpoint security, antivirus threat detection and response, complete surface deployment, server security, mobile management, managing endpoints, creating a software center, stopping ransomware, analyzing and identifying infections, synchronized security, protecting end-user PCs and servers, and endpoint protection.
The most valuable features of Intercept X Endpoint are threat protection, common dashboard feature, ease of use, policy options, ability to interact directly with potentially infected machines, the central view of all endpoints, web content filtering, multi-platform support, anti-ransomware capability, cloud management, performance, anti-malware feature, scalability capabilities, and synchronization with other solutions.
Users also appreciate the ease of setup, stability, reporting capabilities, and reasonable pricing of the solution. It is considered a complete antivirus solution with good technicality and machine-learning capabilities.
Additionally, the solution's CryptoGuard feature, security metrics, and information-gathering capabilities are highly valued.
Improvements needed for Intercept X Endpoint include:
- The option to list all installed applications on the client's side, similar to Kaspersky.
- Better pricing for the solution.
- Compatibility with Linux and Microsoft operating systems.
- The ability to merge sub-estates more easily, instead of manual merging.
- Improved performance to the endpoints, as there were initial performance challenges.
- Compatibility with Google, in addition to Microsoft, for Sophos Zero Trust.
- Enhanced graphical interface.
- Support for less expensive mobile devices.
- A clearer understanding of what features need improvement. -
Reduction in CPU memory usage and resource consumption.
- Nicer management of policies, users, and groups.
- Better API access into Azure and InTune.
- More notifications or emails about global threats, such as phishing campaigns or ransomware.
- Faster support for new macOS versions and Apple hardware.
- The simplified and faster installation process.
- Improved detection and AI capabilities, as well as broader attack coverage.
- Consolidation of features into one package.
- Better support for virtual and desktop infrastructures.
The initial setup for Intercept X Endpoint was described as straightforward and not overly complex. The deployment process was generally quick, taking around 10 minutes to an hour. Maintenance was often automated, requiring minimal effort from administrators. Some users mentioned that the setup could be improved with clearer instructions or more training resources.
Intercept X Endpoint is highly scalable. Users have reported that it is easy to scale and increase the capacity, and they haven't experienced any issues with scalability.
The service and support for Intercept X Endpoint have received positive feedback overall. Users have mentioned that technical support is tremendously helpful. They have also praised the responsiveness of the support team and their ability to solve installation-related issues. However, there are a few users who believe that the support could be improved in terms of responsiveness and speed.
Intercept X Endpoint is highly stable and reliable. Users have reported that there are no bugs, glitches, crashes, or freezes. Some minor scalability elements could be improved, however, overall the stability is good. The solution is not resource-intensive and has been working well during deployment.
Achieve unmatched endpoint threat prevention. Intercept X uses deep learning, an advanced form of machine learning to detect both known and unknown malware without relying on signatures.
Deep learning makes Intercept X smarter, more scalable, and more effective against never-seen-before threats. Intercept X leverages deep learning to outperform endpoint security solutions that use traditional machine learning or signature-based detection alone.
Stop Ransomware in Its Tracks
Block ransomware attacks before they wreak havoc on your organization. Intercept X with XDR includes anti-ransomware technology that detects malicious encryption processes and shuts them down before they can spread across your network. It prevents both file-based and master boot record ransomware.
Any files that were encrypted are rolled back to a safe state, meaning your employees can continue working uninterrupted, with minimal impact to business continuity. You get detailed post-cleanup information, so you can see where the threat got in, what it touched, and when it was blocked.
Intelligent Endpoint Detection and Response (EDR)
The first EDR designed for security analysts and IT administrators
Intercept X Advanced with EDR allows you to ask any question about what has happened in the past, and what is happening now on your endpoints. Hunt threats to detect active adversaries, or leverage for IT operations to maintain IT security hygiene. When an issue is found remotely respond with precision. By starting with the strongest protection, Intercept X stops breaches before they start. It cuts down the number of items to investigate and saves you time.
Extended Detection and Response (XDR)
Intercept X Advanced with XDR is the industry’s only XDR solution that synchronizes native endpoint, server, firewall, email, cloud and O365 security. Get a holistic view of your organization’s environment with the richest data set and deep analysis for threat detection, investigation and response for both dedicated SOC teams and IT admins.
Managed Detection and Response
Intercept X Endpoint was previously known as Sophos Intercept X.
Intercept X Endpoint is the #3 ranked solution in top Ransomware Protection tools, #4 ranked solution in EDR tools, #5 ranked solution in endpoint security software, #6 ranked solution in top ZTNA tools, #6 ranked solution in XDR Security products, and #7 ranked solution in top Managed Detection and Response (MDR) tools. PeerSpot users give Intercept X Endpoint an average rating of 8.4 out of 10. Intercept X Endpoint is most commonly compared to Microsoft Defender for Endpoint: Intercept X Endpoint vs Microsoft Defender for Endpoint. Intercept X Endpoint is popular among the large enterprise segment, accounting for 43% of users researching this solution on PeerSpot. The top industry researching this solution are professionals from a computer software company, accounting for 19% of all views.Flexible Systems