Better defense against cyber threats at the endpoint

Better defense against cyber threats at the endpoint

Share post

With many advancements to its endpoint security portfolio, such as Adaptive Active Adversary Protection, Linux malware protection enhancements, health check capabilities, built-in ZTNA agent and more, Sophos improves its defense against cyber threats.

Sophos is introducing several enhancements to its endpoint security portfolio to improve protection against advanced cyber threats and streamline endpoint security management. These include new Adaptive Active Adversary Protection, improvements in protection against Linux malware, account health check functions and an integrated Zero Trust Network Access (ZTNA) agent for Windows and macOS devices.

Ransomware remains threat #1

“Ransomware remains one of the most prevalent and damaging cyber threats facing businesses, and now is not the time to let go of vigilance just because the number of attacks seems to be decreasing. Rather, companies should strengthen their defensive measures. Attacks are now more complex and difficult to detect. This requires advanced security techniques that provide rapid detection and adaptation,” said Raja Patel, senior vice president of products at Sophos.

The new Sophos endpoint innovations

Adaptive Active Adversary Protection

Adaptive Active Adversary Protection is a key part of Sophos' Shields Up methodology, giving defenders additional time to respond to current, targeted attacks. Sophos Intercept X immediately activates defenses as soon as it detects a hands-on keyboard intrusion at the endpoint. This deprives an attacker of the opportunity to carry out further actions. It reduces the attack surface and attacks are interrupted or contained before the response team intervenes. It also provides the insights needed to fully remediate the attack.

Improved protection against Linux malware

On-access malware scanning and quarantine capabilities improve real-time prevention for Linux environments. The new capabilities complement Sophos Intercept X Advanced for Server, including detection of and response to container escapes, cryptominers, data destruction and kernel exploits.

Health Check

Intuitive, real-time monitoring of security configurations and policy settings provides the ability to automatically revert to recommended settings with a single click to optimize security posture. For example, the assessments ensure that devices are running the required security components, that policies follow the recommended settings, that tamper protection is active, or that exceptions are not vulnerable.

Built-in ZTNA agent for Windows and macOS devices

Sophos Intercept X is an endpoint protection solution with a modular ZTNA agent. Organizations can now extend their Sophos ZTNA protection across entire organizations without deploying an additional agent.

Fast, lean agent

The new agent reduces memory requirements on Windows by 40 percent and reduces the number of processes by more than 30 percent. Sophos has also introduced a new option for using XDR (Extended Detection and Response) sensors, which is approximately 80 percent slimmer than the previous full agent.

Sophos' fully integrated portfolio of endpoint, network and cloud solutions as well as managed security services is part of the Sophos Adaptive Cybersecurity Ecosystem. The solutions are powered by Threat Intelligence from Sophos X Ops supported to enable faster and contextual protection, detection and response.

More at Sophos.com

 


About Sophos

More than 100 million users in 150 countries trust Sophos. We offer the best protection against complex IT threats and data loss. Our comprehensive security solutions are easy to deploy, use and manage. They offer the lowest total cost of ownership in the industry. Sophos offers award-winning encryption solutions, security solutions for endpoints, networks, mobile devices, email and the web. In addition, there is support from SophosLabs, our worldwide network of our own analysis centers. The Sophos headquarters are in Boston, USA and Oxford, UK.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

[starbox id=USER_ID] <🔎> ff7f00