Technical Specifications
Compare the feature set of Sophos’s various endpoint products to protect your clients. Not sure which protection best suits your business? We advise you free of charge and completely without obligation.
3-Year Subscription License. Includes all Product updates, Full version upgrades, Virus definition updates and technical support.
Prevent attacks early in the attack chain before a full breach occurs. Only Symantec delivers attack and breach prevention, response and remediation across the attack chain.
Symantec Endpoint Security Complete provides your organization with ultimate security at the endpoint. It stops endpoint compromise with superior next gen protection technologies that span the attack chain. Innovative prevention and proactive attack surface reduction technologies provide the strongest defense against the hardest to detect threats that rely on stealthy malware, credential theft, fileless, and “living off the land” attack methods. Symantec also prevents full-blown breaches before exfiltration can occur. Sophisticated attack analytics, automated investigation playbooks, and industry first lateral movement and credential theft prevention provide precise attack detections and proactive threat hunting to contain the attacker and resolve persistent threats in real time.
Protections for All Phases of the Attack Lifecycle
Pre-Attack Surface Reduction
Proactive endpoint defense with pre-attack surface reduction capabilities based on advanced policy controls and technologies continuously scan for vulnerabilities and misconfigurations across applications, Active Directory, and devices. With attack surface reduction defenses in-place, many attacker tactics and techniques cannot be leveraged on your endpoint estate.
Attack Prevention
Multilayer attack prevention immediately and effectively protects against file-based and fileless attack vectors and methods. Machine learning and artificial intelligence use advanced device and cloud-based detection schemes to identify evolving threats across device types, operating systems, and applications. Attacks are blocked in real-time to maintain endpoint integrity and avoid negative impacts.
Breach Prevention
Proactive endpoint defense with pre-attack surface reduction capabilities based on advanced policy controls and technologies continuously scan for vulnerabilities and misconfigurations across applications, Active Directory, and devices. With attack surface reduction defenses in-place, many attacker tactics and techniques cannot be leveraged on your endpoint estate.
Response and Remediation
Proactive endpoint defense with pre-attack surface reduction capabilities based on advanced policy controls and technologies continuously scan for vulnerabilities and misconfigurations across applications, Active Directory, and devices. With attack surface reduction defenses in-place, many attacker tactics and techniques cannot be leveraged on your endpoint estate.
Click here to download a datasheet on Symantec Endpoint Security.
1-Year Subscription License. Includes all Product updates, Full version upgrades, Virus definition updates and technical support.
Symantec Protection Suite Enterprise Edition - Multilayered Protection from Endpoint to Gateway
Securing your business is challenging, but made easier with Symantec Protection Suite Enterprise Edition. Protect against more threats and secure your environment against data loss, malware, and spam by accurately identifying and addressing risks consistently across different platforms. Multiple layers of protection fuse next generation and essential technologies to ensure you are accurately identifying and addressing risks while delivering consistent protection in both physical and virtual environments. Symantec combines the broad spectrum of necessary security protections across your endpoint with industry-leading messaging infrastructure to keep you safe.
The products included within the Symantec Protection Suite Enterprise Edition are:
3-Year Subscription License. Includes all Product updates, Full version upgrades, Virus definition updates and technical support.
Symantec Protection Suite Enterprise Edition - Multilayered Protection from Endpoint to Gateway
Securing your business is challenging, but made easier with Symantec Protection Suite Enterprise Edition. Protect against more threats and secure your environment against data loss, malware, and spam by accurately identifying and addressing risks consistently across different platforms. Multiple layers of protection fuse next generation and essential technologies to ensure you are accurately identifying and addressing risks while delivering consistent protection in both physical and virtual environments. Symantec combines the broad spectrum of necessary security protections across your endpoint with industry-leading messaging infrastructure to keep you safe.
The products included within the Symantec Protection Suite Enterprise Edition are:
Symantec Academic & Non-Profit licenses are for sale to K-12 Schools, Community Colleges, Universities, IRS 501c3 Non-Profit Organizations and Churches in the US only.
1-Year Subscription License
Symantec Ghost Solution Suite is an industry leading and award-winning solution for deploying and managing desktops, laptops, tablets, and servers. From a single management console, you can quickly and easily migrate to the latest operating systems, inventory machines, deploy software, and perform custom configurations across multiple hardware platforms and OS types including Windows, Mac, and Linux.
Easy to use Management Console
With Symantec Ghost Solution Suite 3.3 you can do everything you need to manage your systems to manage your systems from within a single console without leaving your desk. Use the intuitive and fast interface to build jobs to perform all of your computer management tasks. A single job can include every step needed to provision and manage a machine, including disk configuration, OS deployment, network configuration, and software deployment.
Simplified Inventory, Software, and Settings
OS deployment and configuration is only part of the battle. Once a computer is in day-to-day usage, ongoing tasks like inventory, software management, and basic asset management are also important areas that must be addressed.
Symantec Ghost Solution Suite 3.3 makes it fast and easy to deploy, configure, and upgrade software on managed devices including being able to group machines based on application versions for easy targeting.
Symantec Ghost Solution Suite also enables power users to perform advanced automation and customized scripting. Whether it is support for server-side scripting or conditional error handling, Ghost Solution Suite provides nparalleled job and task management.
Technician’s Web Console
Symantec Ghost Solution Suite 3.3 includes a web-based console designed specifically for technicians with minimal experience. It complements the full console and is simple to use with built-in wizards for common tasks such as Windows 10 migration and image deployment. The console also has a modern UI and works with any browser.
With the web console, frequently run jobs can be delegated to frontline technicians to optimize resources and reduce costs. The web console is also highly scalable, so a large number of technicians can use it simultaneously.
Quick Tasks
Quick tasks allow you to schedule existing jobs, move computers to groups or to add new computers for immediate provisioning of images. Quick tasks can simplify complex processes into step-by-step flows that will make even the newest admin feel like a pro.
Job Creation Wizards
Job Creation Wizards provide step-by-step guides to create the most common jobs executed in the console. These wizards allow users to quickly learn how to create jobs and ensure consistency throughout the process. Jobs can be deployed using the web console and can also be edited further in the standard Symantec Ghost Solution Suite console.
Faster Imaging
A significant part of the time required for imaging machines is booting into automation. The longer a machine takes to get into automation, the longer the overall imaging process takes. Symantec Ghost Solution Suite 3.3 supports iPXE which delivers a dramatic speed improvement to the pre-boot automation process. iPXE shortens the overall downtime during deployment activities and gets the end user back to productivity quicker
Symantec Academic & Non-Profit licenses are for sale to K-12 Schools, Community Colleges, Universities, IRS 501c3 Non-Profit Organizations and Churches in the US only.
3-Year Subscription License
Symantec Ghost Solution Suite is an industry leading and award-winning solution for deploying and managing desktops, laptops, tablets, and servers. From a single management console, you can quickly and easily migrate to the latest operating systems, inventory machines, deploy software, and perform custom configurations across multiple hardware platforms and OS types including Windows, Mac, and Linux.
Easy to use Management Console
With Symantec Ghost Solution Suite 3.3 you can do everything you need to manage your systems to manage your systems from within a single console without leaving your desk. Use the intuitive and fast interface to build jobs to perform all of your computer management tasks. A single job can include every step needed to provision and manage a machine, including disk configuration, OS deployment, network configuration, and software deployment.
Simplified Inventory, Software, and Settings
OS deployment and configuration is only part of the battle. Once a computer is in day-to-day usage, ongoing tasks like inventory, software management, and basic asset management are also important areas that must be addressed.
Symantec Ghost Solution Suite 3.3 makes it fast and easy to deploy, configure, and upgrade software on managed devices including being able to group machines based on application versions for easy targeting.
Symantec Ghost Solution Suite also enables power users to perform advanced automation and customized scripting. Whether it is support for server-side scripting or conditional error handling, Ghost Solution Suite provides nparalleled job and task management.
Technician’s Web Console
Symantec Ghost Solution Suite 3.3 includes a web-based console designed specifically for technicians with minimal experience. It complements the full console and is simple to use with built-in wizards for common tasks such as Windows 10 migration and image deployment. The console also has a modern UI and works with any browser.
With the web console, frequently run jobs can be delegated to frontline technicians to optimize resources and reduce costs. The web console is also highly scalable, so a large number of technicians can use it simultaneously.
Quick Tasks
Quick tasks allow you to schedule existing jobs, move computers to groups or to add new computers for immediate provisioning of images. Quick tasks can simplify complex processes into step-by-step flows that will make even the newest admin feel like a pro.
Job Creation Wizards
Job Creation Wizards provide step-by-step guides to create the most common jobs executed in the console. These wizards allow users to quickly learn how to create jobs and ensure consistency throughout the process. Jobs can be deployed using the web console and can also be edited further in the standard Symantec Ghost Solution Suite console.
Faster Imaging
A significant part of the time required for imaging machines is booting into automation. The longer a machine takes to get into automation, the longer the overall imaging process takes. Symantec Ghost Solution Suite 3.3 supports iPXE which delivers a dramatic speed improvement to the pre-boot automation process. iPXE shortens the overall downtime during deployment activities and gets the end user back to productivity quicker
1-Year Subscription License.
Symantec Web Security Service - cloud-delivered network security service enforces comprehensive internet security and data compliance policies, regardless of location or device.
Increasing web use, rapid cloud adoption, and greater numbers of mobile and remote users are exposing your network to additional risk. Symantec Web Security Service (WSS) is an indispensable line of defense against modern day cyber threats. It provides secure web services, enables enterprises to control access, protects users from threats, and secures their sensitive data.
Your Data and Apps are moving to the cloud – So can your security
Advanced cloud and web security services to protect applications like Office 365
Moving to the cloud introduces new security and compliance risks, but it also enables tremendous new defensive strategies. Cloud-delivered network security adds flexibility and boosts performance, while protecting users with consistent threat prevention and data compliance policies—wherever they go.
Symantec Web Security Service delivers a broad set of advanced capabilities—including a secure web gateway (SWG), software defined perimeter, anti-virus scanning, sandboxing, web isolation, data loss prevention (DLP), and email security. As your users directly access the web, you can extend consistent policies that follow your sensitive data wherever it goes.
Consolidate your security stack
Simplify with our cloud-delivered network security service
Don't waste time and effort stitching together point products. Instead, select a complete web and cloud security service that gives you the protection, threat prevention and compliance capabilities your business needs to stay secure. Our full arsenal of WSS technologies offers broad and deep protection.
Strong, central Web and cloud access governance.
Consistently apply network security policies across web and cloud applications
Protect users with web and cloud security services that connect all devices to distributed, global data centers for reliable, high-performance, local service. Configure and enforce powerful web and cloud application access-control policies.
Protect users from threats hiding in encrypted Web and cloud traffic.
Advanced proxy architecture delivers SWG and Advanced Threat Protection capabilities
Symantec Web Security Service protects your organization from cyber attacks using an advanced proxy architecture that terminates, inspects, and controls high volumes of web and cloud traffic, even when it's SSL/TLS encrypted. Our proxy architecture combats advanced threats, secures your information, and protects your users wherever they go. It's built to meet the challenges of the Cloud Generation.
Industry leading NGFW security controls for all internet traffic.
Cloud Firewall Service extends protection to all internet traffic, covering all ports and protocols
A simple add-on for Web Security Service enables customers to manage non-web internet traffic in the cloud for all users, regardless of where they are located. This ensures consistent policies are applied and provides easy-to-access, centralized visibility and reporting on internet use.
Symantec Cloud Firewall Service allows you to:
1-Year Subscription License.
Symantec Web Protection Suite gives organizations an advanced cloud-delivered Secure Web Gateway and leading on-premises Secure Web Gateway (SWG) deployment – both of which can operate seamlessly together with a unified management, reporting and policy control interface. It also includes Threat Intelligence, SSL Inspection, Content Analysis, Isolation, Sandboxing, WAF and more.
The Symantec Web Protection Suite is suitable for customers who are considering cloud SWG adoption, yet would like flexibility to begin this journey now, or any time in the future. The Suite also serves as an entry level SASE foundation enabling secure and fast access for any user, from any device, located anywhere protecting users, devices and data from known and unknown threats across all locations (Remote, branch, and HQ).
The cloud-native SWG facet of this solution differs from others in the market that are run from single purpose Data Centers and fail to protect against advanced threats.
The cloud SWG is deployed across a cloud-native, hyper-scaling and high performant infrastructure built on top of a leading CSP (Google). It is directly on the same backbone delivering YouTube, Google’s Ad Network and other world class services.
Symantec Web Protection Suite – What’s Included:
Intercept X Essentials is the new entry-level endpoint protection for small businesses at an affordable price. It offers the same protections as Intercept X Advanced with deep-learning AI, anti-ransomware, and anti-exploit capabilities, but without all the control and management features, which you probably won't miss if your organization is small or perceives low risk.
If you need multiple configurable policies or a higher level of manageability with Peripheral Control, Web Control, Application Control, etc., consider purchasing Intercept X Advanced instead.
Compare the feature set of Sophos’s various endpoint products to protect your clients. Not sure which protection best suits your business? We advise you free of charge and completely without obligation.
Intercept X Essentials is the new entry-level endpoint protection for small businesses at an affordable price. It offers the same protections as Intercept X Advanced with deep-learning AI, anti-ransomware, and anti-exploit capabilities, but without all the control and management features, which you probably won't miss if your organization is small or perceives low risk.
If you need multiple configurable policies or a higher level of manageability with Peripheral Control, Web Control, Application Control, etc., consider purchasing Intercept X Advanced instead.
Compare the feature set of Sophos’s various endpoint products to protect your clients. Not sure which protection best suits your business? We advise you free of charge and completely without obligation.
Sophos Central Intercept X Advanced is a combination of Sophos Central Endpoint Protection and Intercept X products.
With Sophos Central Intercept X Advanced, you get all the features of Sophos Central Endpoint Protection and Intercept X in one product.
On the one hand, you benefit from great functions such as "Peripheral Control" or "Malicious Traffic Detection", and at the same time you get a specialist on your computer with Intercept X, which uses a technology called "CryptoGuard" to detect as soon as malware tries to encrypt files on your computer and stops this process immediately. Files that have already been encrypted are then automatically restored, so there is no data loss.
Would you like to see the Sophos Central user interface live? Just go to central.sophos.com and use the demo account. Username: demo@sophos.com / Password: Demo@sophos.com
Preventing the exploitation of security vulnerabilities.
Sophos Exploit Protection is a unique technology in Intercept X that prevents previously unknown or unpatched vulnerabilities in applications or operating system components from being exploited. With Intercept X, every application is monitored in the background and every action is checked to see if an exploit technique is being attempted.
If such a technique is detected, Exploit Prevention prevents a vulnerability from being exploited and restores the system to a secure state.
Find out the cause of the attack.
Imagine that, despite all the protective measures, malware has made it into your network. How could this happen? Thanks to the root cause analysis in Intercept X, this mystery can be uncovered with an impressive 360-degree analysis. The Root Cause Analysis Tool can tell you in great detail how the malware got into your network, which devices were infected and what steps you should take now.
With root cause analysis, you'll never be in the dark again if your network has been infected by an unknown malware.
Restores the system to its original state after an attack.
With Intercept X, thanks to technologies like CryptoGuard, you are protected against signatureless malware, such as ransomware, but after an attempted attack, your system still needs to be cleaned of all remnants. Since there is no cleaning routine for unknown malware, the entire processes of the executed malware must be forensically examined. This task is performed by Sophos Clean.
Sophos Clean performs a complete cleaning of the system after an attack has been stopped. It not only removes the malware itself, but replaces infected Windows resources with more secure original versions and ultimately restores the system to its original state, as it was before the infection.
Compare the feature set of Sophos’s various endpoint products to protect your clients. Not sure which protection best suits your business? We advise you free of charge and completely without obligation.
Sophos Central Intercept X Advanced is a combination of Sophos Central Endpoint Protection and Intercept X products.
With Sophos Central Intercept X Advanced, you get all the features of Sophos Central Endpoint Protection and Intercept X in one product.
On the one hand, you benefit from great functions such as "Peripheral Control" or "Malicious Traffic Detection", and at the same time you get a specialist on your computer with Intercept X, which uses a technology called "CryptoGuard" to detect as soon as malware tries to encrypt files on your computer and stops this process immediately. Files that have already been encrypted are then automatically restored, so there is no data loss.
Would you like to see the Sophos Central user interface live? Just go to central.sophos.com and use the demo account. Username: demo@sophos.com / Password: Demo@sophos.com
Preventing the exploitation of security vulnerabilities.
Sophos Exploit Protection is a unique technology in Intercept X that prevents previously unknown or unpatched vulnerabilities in applications or operating system components from being exploited. With Intercept X, every application is monitored in the background and every action is checked to see if an exploit technique is being attempted.
If such a technique is detected, Exploit Prevention prevents a vulnerability from being exploited and restores the system to a secure state.
Find out the cause of the attack.
Imagine that, despite all the protective measures, malware has made it into your network. How could this happen? Thanks to the root cause analysis in Intercept X, this mystery can be uncovered with an impressive 360-degree analysis. The Root Cause Analysis Tool can tell you in great detail how the malware got into your network, which devices were infected and what steps you should take now.
With root cause analysis, you'll never be in the dark again if your network has been infected by an unknown malware.
Restores the system to its original state after an attack.
With Intercept X, thanks to technologies like CryptoGuard, you are protected against signatureless malware, such as ransomware, but after an attempted attack, your system still needs to be cleaned of all remnants. Since there is no cleaning routine for unknown malware, the entire processes of the executed malware must be forensically examined. This task is performed by Sophos Clean.
Sophos Clean performs a complete cleaning of the system after an attack has been stopped. It not only removes the malware itself, but replaces infected Windows resources with more secure original versions and ultimately restores the system to its original state, as it was before the infection.
Compare the feature set of Sophos’s various endpoint products to protect your clients. Not sure which protection best suits your business? We advise you free of charge and completely without obligation.
Sophos Intercept X is the industry leading Endpoint Security solution that reduces the attack surface and prevents attacks from running. Combining anti-exploit, anti-ransomware, deep learning AI and control technology it stops attacks before they impact your systems. Intercept X uses a comprehensive, defense in depth approach to endpoint protection, rather than relying on one primary security technique.
Achieve unmatched endpoint threat prevention. Intercept X uses deep learning, an advanced form of machine learning to detect both known and unknown malware without relying on signatures.
Deep learning makes Intercept X smarter, more scalable, and more effective against never-seen-before threats. Intercept X leverages deep learning to outperform endpoint security solutions that use traditional machine learning or signature-based detection alone.
Block ransomware attacks before they wreak havoc on your organization. Intercept X with XDR includes anti-ransomware technology that detects malicious encryption processes and shuts them down before they can spread across your network. It prevents both file-based and master boot record ransomware.
Any files that were encrypted are rolled back to a safe state, meaning your employees can continue working uninterrupted, with minimal impact to business continuity. You get detailed post-cleanup information, so you can see where the threat got in, what it touched, and when it was blocked.
The first EDR designed for security analysts and IT administrators
Intercept X Advanced with EDR allows you to ask any question about what has happened in the past, and what is happening now on your endpoints. Hunt threats to detect active adversaries, or leverage for IT operations to maintain IT security hygiene. When an issue is found remotely respond with precision. By starting with the strongest protection, Intercept X stops breaches before they start. It cuts down the number of items to investigate and saves you time.
Intercept X Advanced with XDR is the industry’s only XDR solution that synchronizes native endpoint, server, firewall, email, cloud and O365 security. Get a holistic view of your organization’s environment with the richest data set and deep analysis for threat detection, investigation and response for both dedicated SOC teams and IT admins.
Sophos Intercept X is the industry leading Endpoint Security solution that reduces the attack surface and prevents attacks from running. Combining anti-exploit, anti-ransomware, deep learning AI and control technology it stops attacks before they impact your systems. Intercept X uses a comprehensive, defense in depth approach to endpoint protection, rather than relying on one primary security technique.
Achieve unmatched endpoint threat prevention. Intercept X uses deep learning, an advanced form of machine learning to detect both known and unknown malware without relying on signatures.
Deep learning makes Intercept X smarter, more scalable, and more effective against never-seen-before threats. Intercept X leverages deep learning to outperform endpoint security solutions that use traditional machine learning or signature-based detection alone.
Block ransomware attacks before they wreak havoc on your organization. Intercept X with XDR includes anti-ransomware technology that detects malicious encryption processes and shuts them down before they can spread across your network. It prevents both file-based and master boot record ransomware.
Any files that were encrypted are rolled back to a safe state, meaning your employees can continue working uninterrupted, with minimal impact to business continuity. You get detailed post-cleanup information, so you can see where the threat got in, what it touched, and when it was blocked.
The first EDR designed for security analysts and IT administrators
Intercept X Advanced with EDR allows you to ask any question about what has happened in the past, and what is happening now on your endpoints. Hunt threats to detect active adversaries, or leverage for IT operations to maintain IT security hygiene. When an issue is found remotely respond with precision. By starting with the strongest protection, Intercept X stops breaches before they start. It cuts down the number of items to investigate and saves you time.
Intercept X Advanced with XDR is the industry’s only XDR solution that synchronizes native endpoint, server, firewall, email, cloud and O365 security. Get a holistic view of your organization’s environment with the richest data set and deep analysis for threat detection, investigation and response for both dedicated SOC teams and IT admins.
With “Sophos Central MDR” you can achieve the highest level of security Sophos can currently offer for the protection of your endpoints (macOS 10.15+, Windows 8.1+). In this bundle, you get all the features of Intercept X Advanced with XDR and the new, enhanced MDR service.
With the MDR service, Sophos provides a highly available “Service Operation Center” (SOC). It is the perfect complement for all IT administrators where there are no free resources to go threat hunting themselves with XDR's tools. It takes highly skilled and specialized personnel to use XDR to proactively scan the network for potential threats and take the correct steps when an attack occurs.
With Sophos Central MDR for Server, you no longer need to look for trained personnel yourself. Sophos provides a team of experts who work 24/7 to combat threats.
If something has been detected on your system that could not be fixed automatically and requires human expertise, the MDR team is there for you on a 24/7 basis. An expert then takes a close look at the critical note and uses his experience to decide what needs to be done.
The MDR team pays special attention to attacks executed through legitimate processes, such as PowerShell. Such attacks are often successful because they are difficult for monitoring tools to detect. The MDR team uses proprietary analytics to monitor these processes to ensure they are not being misused for malicious purposes.
The Security Health Check ensures that your Sophos Central products can always operate at maximum performance. To do this, the MDR team looks at your network requirements and makes recommendations for configuration changes.
You will learn the current state of your systems, what intelligence was gathered during the reporting period, and what threats were averted. A histogram of these reports is then created over the period where you use the MDR service. With the help of this data, Sophos creates so-called "scorecards", with which one can compare oneself to previous periods.
Regardless of whether you choose the normal MDR or MDR Complete variant, you retain control over how autonomously the MDR team should operate. This is regulated right at the beginning in the so-called onboarding process. When you purchase the Sophos MDR service, you can choose from three options that determine what response you expect from the MDR team:
With “Sophos Central MDR” you can achieve the highest level of security Sophos can currently offer for the protection of your endpoints (macOS 10.15+, Windows 8.1+). In this bundle, you get all the features of Intercept X Advanced with XDR and the new, enhanced MDR service.
With the MDR service, Sophos provides a highly available “Service Operation Center” (SOC). It is the perfect complement for all IT administrators where there are no free resources to go threat hunting themselves with XDR's tools. It takes highly skilled and specialized personnel to use XDR to proactively scan the network for potential threats and take the correct steps when an attack occurs.
With Sophos Central MDR for Server, you no longer need to look for trained personnel yourself. Sophos provides a team of experts who work 24/7 to combat threats.
If something has been detected on your system that could not be fixed automatically and requires human expertise, the MDR team is there for you on a 24/7 basis. An expert then takes a close look at the critical note and uses his experience to decide what needs to be done.
The MDR team pays special attention to attacks executed through legitimate processes, such as PowerShell. Such attacks are often successful because they are difficult for monitoring tools to detect. The MDR team uses proprietary analytics to monitor these processes to ensure they are not being misused for malicious purposes.
The Security Health Check ensures that your Sophos Central products can always operate at maximum performance. To do this, the MDR team looks at your network requirements and makes recommendations for configuration changes.
You will learn the current state of your systems, what intelligence was gathered during the reporting period, and what threats were averted. A histogram of these reports is then created over the period where you use the MDR service. With the help of this data, Sophos creates so-called "scorecards", with which one can compare oneself to previous periods.
Regardless of whether you choose the normal MDR or MDR Complete variant, you retain control over how autonomously the MDR team should operate. This is regulated right at the beginning in the so-called onboarding process. When you purchase the Sophos MDR service, you can choose from three options that determine what response you expect from the MDR team: