Marche
Categorie
Scegli solo i prodotti...
Tutti i Costi Finanziari sono esposti trasparentemente.
Tutti i prezzi NON sono comprensivi di IVA.
|
SCHEDA PRODOTTO
. |
Descrizione disponibile anche in:
Protect. Discover. Control.
Secure your cloud, on-premises, or hybrid server environments.
Stop Advanced Malware
Block the latest threats, including ransomware, exploit-based attacks, and server-specific malware with powerful deep learning technology.
Catch Evasive Threats
Proactively search for issues, understand how attacks took place, and automatically respond to incidents.
Lock Down Your Servers
Control exactly what can and cant run on your servers and get notifications for any unauthorized change attempts.
All-In-One Server Protection
Intercept X for Server delivers protection that is top-rated by industry experts, combining server-specific features to create a comprehensive, defense-in-depth solution.
Stop Unknown Threats
Deep-learning technology is an advanced form of machine learning that detects malware even when it has never been seen before.
Block Server Exploits
Exploit techniques are commonly used to break into organizations servers. Intercept X for Server uses exploit prevention to stop these dangerous attacks.
Dont Get Held to Ransom
Anti-ransomware protection stops ransomware from encrypting your server files and rolls them back to a safe state.
Deny Hackers
Stop real-world hacking techniques used for credential harvesting, lateral movement, and privilege escalation.
Automated Server Threat Detection and Response
Get unparalleled visibility of your servers whether they are in the cloud, on-premises, or virtual. Answer critical IT security-operations and threat-hunting questions, and automatically detect insecure cloud deployments.
Endpoint Detection and Response (EDR) for Servers
Ask and answer detailed IT operations and threat-hunting questions across your entire server estate. Quickly find vulnerabilities such as remote desktop protocol being unnecessarily enabled and hunt down suspicious activity such as processes attempting to connect on a non-standard port.
- Answer critical IT operations and threat-hunting questions
- Quickly scan your entire server estate
- Remediate issues fast
Automatically Detect Insecure Deployments
See and secure your entire multi-cloud inventory. With Intercept X Advanced for Server with EDR you can detect your cloud workloads as well as critical cloud services like S3 buckets, databases, and serverless functions; identify suspicious activity or insecure deployments; and expose any security gaps.
- Detailed multi-cloud inventory
- AI-powered anomaly detection
- Automated assessment of your environment
Take Control of Your Servers
Servers are your organizations most important assets. With Intercept X for Server, you can control exactly what can and cant run, so your server configurations stay safe and secure.
Dashboard Overview
- See your entire server estate, including hybrid and cloud deployments
- Dive into threat cases, reports, and your servers with a single click
- Access policies and settings from a single screen
- Quickly download deployment agents
Policy Management
- Create policies for threat protection, and for application, peripheral, and web control
- Apply them across your entire server estate in just a few clicks
- Policies can also be configured individually for servers if required
Server Lockdown
- Protect your server configuration in one click
- Only apps approved by you can run
- No downtime required
Simple Deployment
- Quickly access the deployment agent for physical, cloud, or virtual deployments
Straightforward Licensing and Deployment
Licensing and deployment of Intercept X Advanced for Server is designed from the ground up to be easy to understand and use. Whether your organization has physical, virtual, cloud, or mixed deployments, the license policy and agent deployed is the same.
Synchronized Security
An industry first, Synchronized Security shares data between your Sophos servers and firewalls, making your protection faster and smarter.
- Identify unclassified apps and processes that are using bandwidth
- Block worm-like lateral movement, isolating infected machines with one click
- Protect servers from other compromised machines on the network
|
|
|
Tutti i prezzi NON sono comprensivi di IVA.
Il Listino è in EURO, salvo se diversamente indicato. Marchi e i nomi di prodotti sono registrati dai rispettivi titolari. Dati a cura del Fornitore. Non possiamo essere ritenuti responsabili per eventuali errori o refusi presenti. Prodotti, versioni, prezzi, termini e garanzie sono soggetti a cambiamenti senza preavviso. In ogni rapporto di fornitura valgono le Condizioni Generali di Vendita. Prezzi aggiornati in tempo reale. |
|
|
Perchè Comprare qui? |
|
Prodotti di qualità dei maggiori Marchi |
|
Informazione sulla disponibilità dei prodotti |
|
Aiuto all'acquisto |
|
Sicurezza nell'acquisto |
|
Scelta della forma di pagamento |
|
Pagamenti sicuri con transazioni riservate |
|
Rispetto della Privacy |
|
Supporto nella soluzione di problemi |
|
Professionalità e competenza del nostro Staff |
|
Ricerca su richiesta di prodotti non a Listino |
|