Intercept X protects Snapdragon computing platforms

Intercept X protects Snapdragon computing platforms

Share post

Sophos Intercept X keeps Qualcomm's Snapdragon computing platforms safe. Next generation cybersecurity for PCs with 5G technology.

Sophos today announced its plans to provide Intercept X endpoint protection for 5G PCs based on Qualcomm® Snapdragon ™ computing platforms from Qualcomm Technologies Inc. The combination of Sophos Intercept X with the Snapdragon computing platforms provides users with a next-generation security environment in a PC environment that is active around the clock and constantly connected to the Internet. Sophos Intercept X for Snapdragon compute platforms is expected to be available in the second half of 2021.

Protected 5G connectivity

Snapdragon computing platforms enable 5G connectivity based on smartphone technology to offer the best possible performance and efficiency on slim, fanless laptops connected to 4G and 5G cellular networks. Sophos Intercept X protects modern computer systems and endpoints. Deep learning, artificial intelligence (AI) and anti-ransomware functions eliminate current cybersecurity threats.

"An always-on, connected, interactive computing environment that combines smartphone and PC technologies offers unique security capabilities and opportunities," said Joe Levy, chief technology officer at Sophos. “In the past, there were far fewer security incidents on mobile devices than on PCs with traditional architectures. This is certainly not due to a lower frequency of use, but rather to its modern architecture with better predictability compared to the PC. This fact enables developers to develop powerful and secure software when designing applications. The Snapdragon computing platforms represent a decisive step forward as they combine the benefits and performance of a PC with the advantages of modern, mobile devices. Security loves predictability and we at Sophos are proud to play an important role in securing these next generation computing platforms. "

Other features of Sophos Intercept X

  • Connected standby for continuous communication with many PCs that are operated with Snapdragon. In this way, security investigations can be carried out more efficiently, since no information or data is missing from devices that are in offline mode.
  • AI acceleration through the Qualcomm® AI Engine to compile AI-dependent software in real time on the device. The optimization ensures faster and more energy-efficient use of these devices, which is particularly important when using batteries.
  • "Root of Trust"-Use at the hardware level to ensure device and cryptographic integrity to create strong identity bindings.

"Our 5G-enabled Snapdragon computing platforms not only enable PCs to be permanently switched on and connected, they now also provide innovative next-generation security based on our advanced AI and 5G connectivity capabilities," says Miguel Nunes, Senior Director, Product Management, Qualcomm Technologies, Inc. “Working with Sophos, we're taking integrated device security to the next level by adding industry-leading endpoint protection with AI-accelerated threat detection to our solutions. We look forward to Sophos transforming the computing experience on Snapdrago computing platforms, including 5G support, with its next-generation enterprise-class security. "

 

More on this at Sophos.com

 


About Sophos

More than 100 million users in 150 countries trust Sophos. We offer the best protection against complex IT threats and data loss. Our comprehensive security solutions are easy to deploy, use and manage. They offer the lowest total cost of ownership in the industry. Sophos offers award-winning encryption solutions, security solutions for endpoints, networks, mobile devices, email and the web. In addition, there is support from SophosLabs, our worldwide network of our own analysis centers. The Sophos headquarters are in Boston, USA and Oxford, UK.


 

Matching articles on the topic

Executive floor: Important cybersecurity does not bring any competitive advantages

As a survey shows, although C-suites see good cybersecurity infrastructure as extremely important for business relationships, at the same time the majority can ➡ Read more

Risk: High API growth without sufficient IT security 

A study shows that nine out of ten decision makers know that APIs are a Trojan horse for cyberattacks - but the ➡ Read more

Major hack at Dropbox Sign

Sign, the Dropbox service for legally binding electronic signatures on contracts and the like, must report a cyberattack. E-mail addresses, user names, ➡ Read more

Cybersecurity through anomaly threat detection

Claroty's Medigate platform receives an important expansion with the Advanced Anomaly Threat Detection (ATD) module for anomaly threat detection. Obtained thereby ➡ Read more

LockBit is back: cyber attack on KJF with 17 clinics and schools 

The KJF - the headquarters of the Catholic Youth Welfare Department of the Diocese of Augsburg e. V. suffered an extensive cyber attack. The hackers around ➡ Read more

EU cybersecurity certification

With the “European Cybersecurity Scheme on Common Criteria” (EUCC), there is now a first systematic approach to certifying cybersecurity. ➡ Read more

Encrypt sensitive Microsoft 365 data

For public sector entities and systemically important utilities that fall under KRITIS guidelines, the rules for data security are repeated ➡ Read more

DORA in response to cyber attacks in the financial sector

The number of cyber attacks on the financial sector is increasing worldwide, and according to financial regulators, cyber attacks are also occurring in Germany ➡ Read more