Sophos Intercept X Matt Cooke – Senior Product Marketing Manager
Endpoint Security has reached a Tipping Point Attacks are from within the perimeter, focused on Software Exploits Ransomware reaches $1.2B in damages Lack of Threat Intelligence after a Breach
Driving the Paradigm Shift to Next-Generation ADVANCED MALWARE ZERO DAY EXPLOITS LIMITED VISIBILITY
Technique Identification The Evolution of Sophos Endpoint Security From Anti-Malware to Anti-Exploit to Next-Generation Exposure Prevention URL Blocking Web Scripts Download Rep Pre-Exec Analytics Generic Matching Heuristics Core Rules File Scanning Signatures Known Malware Malware Bits Trojan Spyware Virus Worm Run-Time Signatureless Behavior Analytics Runtime Behavior Exploit Detection Technique Identification RATs Ransomware Exploit Kits Traditional Malware Advanced Threats
Next Generation Endpoint Executable Files Malicious URLs Unauthorized Apps Removable Media Exploit Prevention MS Files & PDF ! Advanced Clean Ransomware Incident Response 90% of Data Breaches are From Exploits Kits >90% Of Exploit Attempts Use Known Vulnerabilities And Yet… More Than 60% of IT Staff Lack Incident Response Skills Prevent Before it reaches device Before it runs on device Detect Respond Next Generation Endpoint
Introducing Sophos Intercept X Detect Next-Gen Threats Stops Malicious Encryption Behavior Based Conviction Automatically Reverts Affected Files Identifies source of Attack Anti-Ransomware Prevent Ransomware Attacks Roll-Back Changes Attack Chain Analysis Anti-Exploit Prevent Exploit Techniques Signatureless Exploit Prevention Protects Patient-Zero / Zero-Day Blocks Memory-Resident Attacks Tiny Footprint & Low False Positives No User/Performance Impact No File Scanning No Signatures Automated Incident Response IT Friendly Incident Response Process Threat Chain Visualization Prescriptive Remediation Guidance Advanced Malware Clean Root-Cause Analysis Faster Incident Response Root-Cause Visualization Forensic Strength Clean ADVANCED MALWARE ZERO DAY EXPLOITS LIMITED VISIBILITY
Sophos Intercept X Detect Next-Gen Threats Anti-Ransomware Stops Malicious Encryption Behavior Based Conviction Automatically Reverts Affected Files Identifies source of Attack Anti-Ransomware Prevent Ransomware Attacks Roll-Back Changes Attack Chain Analysis Anti-Exploit Prevent Exploit Techniques Signatureless Exploit Prevention Protects Patient-Zero / Zero-Day Blocks Memory-Resident Attacks Tiny Footprint & Low False Positives No User/Performance Impact No File Scanning No Signatures Automated Incident Response IT Friendly Incident Response Process Threat Chain Visualization Prescriptive Remediation Guidance Advanced Malware Clean Root-Cause Analysis Faster Incident Response Root-Cause Visualization Forensic Strength Clean ADVANCED MALWARE ZERO DAY EXPLOITS LIMITED VISIBILITY
Deployment Options SOPHOS INTERCEPT X Sophos Central Endpoint Advanced Antivirus and endpoint solutions from other vendors
Taking Your Endpoints To The Next-Generation ADVANCED MALWARE ZERO DAY EXPLOITS LIMITED VISIBILITY
Start Trial Now: www.sophos.com/intercept-x matt.cooke@sophos.com