1 Sophos Intercept X Matt Cooke – Senior Product Marketing Manager
2
3 Endpoint Security has reached a Tipping PointAttacks are from within the perimeter, focused on Software Exploits Ransomware reaches $1.2B in damages Lack of Threat Intelligence after a Breach
4 Driving the Paradigm Shift to Next-GenerationADVANCED MALWARE ZERO DAY EXPLOITS LIMITED VISIBILITY
5 Technique IdentificationThe Evolution of Sophos Endpoint Security From Anti-Malware to Anti-Exploit to Next-Generation Exposure Prevention URL Blocking Web Scripts Download Rep Pre-Exec Analytics Generic Matching Heuristics Core Rules File Scanning Signatures Known Malware Malware Bits Trojan Spyware Virus Worm Run-Time Signatureless Behavior Analytics Runtime Behavior Exploit Detection Technique Identification RATs Ransomware Exploit Kits Traditional Malware Advanced Threats
6 Next Generation EndpointExecutable Files Malicious URLs Unauthorized Apps Removable Media Exploit Prevention MS Files & PDF ! Advanced Clean Ransomware Incident Response 90% of Data Breaches are From Exploits Kits >90% Of Exploit Attempts Use Known Vulnerabilities And Yet… More Than 60% of IT Staff Lack Incident Response Skills Prevent Before it reaches device Before it runs on device Detect Respond Next Generation Endpoint
7
8 Introducing Sophos Intercept XDetect Next-Gen Threats Stops Malicious Encryption Behavior Based Conviction Automatically Reverts Affected Files Identifies source of Attack Anti-Ransomware Prevent Ransomware Attacks Roll-Back Changes Attack Chain Analysis Anti-Exploit Prevent Exploit Techniques Signatureless Exploit Prevention Protects Patient-Zero / Zero-Day Blocks Memory-Resident Attacks Tiny Footprint & Low False Positives No User/Performance Impact No File Scanning No Signatures Automated Incident Response IT Friendly Incident Response Process Threat Chain Visualization Prescriptive Remediation Guidance Advanced Malware Clean Root-Cause Analysis Faster Incident Response Root-Cause Visualization Forensic Strength Clean ADVANCED MALWARE ZERO DAY EXPLOITS LIMITED VISIBILITY
9 Sophos Intercept X Detect Next-Gen Threats Anti-RansomwareStops Malicious Encryption Behavior Based Conviction Automatically Reverts Affected Files Identifies source of Attack Anti-Ransomware Prevent Ransomware Attacks Roll-Back Changes Attack Chain Analysis Anti-Exploit Prevent Exploit Techniques Signatureless Exploit Prevention Protects Patient-Zero / Zero-Day Blocks Memory-Resident Attacks Tiny Footprint & Low False Positives No User/Performance Impact No File Scanning No Signatures Automated Incident Response IT Friendly Incident Response Process Threat Chain Visualization Prescriptive Remediation Guidance Advanced Malware Clean Root-Cause Analysis Faster Incident Response Root-Cause Visualization Forensic Strength Clean ADVANCED MALWARE ZERO DAY EXPLOITS LIMITED VISIBILITY
10 Deployment Options SOPHOS INTERCEPT XSophos Central Endpoint Advanced Antivirus and endpoint solutions from other vendors
11 Taking Your Endpoints To The Next-GenerationADVANCED MALWARE ZERO DAY EXPLOITS LIMITED VISIBILITY
12
13 Start Trial Now: www.sophos.com/intercept-x