Endpoint & ransomware protection (EDR)

Wat is Endpoint security?

Het beschermen van je laptop of desktop is de start van elke beveiligingsaanpak. Alles begint met het installeren van een degelijke antivirusoplossing.

Wat is Ransomware protection?

Ransomware of gijzelsoftware heeft als doel een computersysteem te blokkeren en de data ervan te versleutelen om vervolgens losgeld te vragen. Het betalen hiervan is geen goed idee omdat er geen enkele garantie is tot vrijgave. Je handelt inmiddels met criminelen.

De kracht van Endpoint security en Ransomware protection

Waarom Endpoint security?

Virussen en malware of kwaadaardige software zijn sinds eind jaren ’80 aanwezig om je laptop of desktop te belagen. Het hoeft dan ook geen betoog dat die sindsdien een steile opmars hebben gekend en ook een heel stuk geavanceerder zijn geworden. Een degelijke bescherming is dan ook cruciaal.

Waarom Ransomware protection?

Omdat Ransomware momenteel op de eerste plaats staat van malwarebedreigingen voor bedrijven (denken we maar aan het beruchte WannaCry), is het een absolute must om je bedrijf hiertegen te beschermen.

CLIENT Security & Ransomware Protection
MANAGEMENT
Multiple Policies
Controlled Updates
ATTACK SURFACE REDUCTION
Application Control
Peripheral Control
Web Control / Category-based URL Blocking
Download Reputation
Web Security
BEFORE IT RUNS ON DEVICE
Deep Learning Malware Detection
Anti-Malware File Scanning
Live Protection
Pre-execution Behavior Analysis (HIPS)
Potentially Unwanted Application (PUA) Blocking
Intrusion Prevention System (IPS)
STOP RUNNING THREAT
Data Loss Prevention
Runtime Behavior Analysis (HIPS)
Antimalware Scan Interface (AMSI)
Malicious Traffic Detection (MTD)
Exploit Prevention
Active Adversary Mitigations
Ransomware File Protection (CryptoGuard)
Disk and Boot Record Protection (WipeGuard)
Man-in-the-Browser Protection (Safe Browsing)
Enhanced Application Lockdown
DETECT
Live Discover (Cross Estate SQL Querying for Threat Hunting & IT Security Operations Hygiene)
SQL Query Library (pre-written, fully customizable queries)
Fast Access, On-disk Data Storage (up to 90 days)
Cross-product Data Sources e.g. Firewall, Email
Cross-product Querying
Sophos Data Lake (Cloud data storage)
Scheduled Queries
INVESTIGATE
Threat Cases (Root Cause Analysis)
Deep Learning Malware Analysis
Advanced On-demand SophosLabs Threat Intelligence
Forensic Data Export
REMEDIATE
Automated Malware Removal
Synchronized Security Heartbeat
Sophos Clean
Live Response (Remote Terminal Access for further investigation and response)
On-demand Endpoint Isolation
Single-click “Clean and Block”
HUMAN-LED THREAT HUNTING AND RESPONSE
24/7 Lead-driven Threat Hunting
Security Health Checks
Data Retention
Activity Reporting
Adversarial Detections
Threat Neutralization & Remediation
24/7 Lead-less Threat Hunting
Threat Response Team Lead
Direct Call-in Support
Proactive Security Posture Management
CLIENT Security & Ransomware Protection with MDR
MANAGEMENT
Multiple Policies
Controlled Updates
ATTACK SURFACE REDUCTION
Application Control
Peripheral Control
Web Control / Category-based URL Blocking
Download Reputation
Web Security
BEFORE IT RUNS ON DEVICE
Deep Learning Malware Detection
Anti-Malware File Scanning
Live Protection
Pre-execution Behavior Analysis (HIPS)
Potentially Unwanted Application (PUA) Blocking
Intrusion Prevention System (IPS)
STOP RUNNING THREAT
Data Loss Prevention
Runtime Behavior Analysis (HIPS)
Antimalware Scan Interface (AMSI)
Malicious Traffic Detection (MTD)
Exploit Prevention
Active Adversary Mitigations
Ransomware File Protection (CryptoGuard)
Disk and Boot Record Protection (WipeGuard)
Man-in-the-Browser Protection (Safe Browsing)
Enhanced Application Lockdown
DETECT
Live Discover (Cross Estate SQL Querying for Threat Hunting & IT Security Operations Hygiene)
SQL Query Library (pre-written, fully customizable queries)
Fast Access, On-disk Data Storage (up to 90 days)
Cross-product Data Sources e.g. Firewall, Email
Cross-product Querying
Sophos Data Lake (Cloud data storage)
30 dagen
Scheduled Queries
INVESTIGATE
Threat Cases (Root Cause Analysis)
Deep Learning Malware Analysis
Advanced On-demand SophosLabs Threat Intelligence
Forensic Data Export
REMEDIATE
Automated Malware Removal
Synchronized Security Heartbeat
Sophos Clean
Live Response (Remote Terminal Access for further investigation and response)
On-demand Endpoint Isolation
Single-click “Clean and Block”
HUMAN-LED THREAT HUNTING AND RESPONSE
24/7 Lead-driven Threat Hunting
Security Health Checks
Data Retention
Activity Reporting
Adversarial Detections
Threat Neutralization & Remediation
24/7 Lead-less Threat Hunting
Threat Response Team Lead
Direct Call-in Support
Proactive Security Posture Management
CLIENT Security & Ransomware Protection with MDR Advanced
MANAGEMENT
Multiple Policies
Controlled Updates
ATTACK SURFACE REDUCTION
Application Control
Peripheral Control
Web Control / Category-based URL Blocking
Download Reputation
Web Security
BEFORE IT RUNS ON DEVICE
Deep Learning Malware Detection
Anti-Malware File Scanning
Live Protection
Pre-execution Behavior Analysis (HIPS)
Potentially Unwanted Application (PUA) Blocking
Intrusion Prevention System (IPS)
STOP RUNNING THREAT
Data Loss Prevention
Runtime Behavior Analysis (HIPS)
Antimalware Scan Interface (AMSI)
Malicious Traffic Detection (MTD)
Exploit Prevention
Active Adversary Mitigations
Ransomware File Protection (CryptoGuard)
Disk and Boot Record Protection (WipeGuard)
Man-in-the-Browser Protection (Safe Browsing)
Enhanced Application Lockdown
DETECT
Live Discover (Cross Estate SQL Querying for Threat Hunting & IT Security Operations Hygiene)
SQL Query Library (pre-written, fully customizable queries)
Fast Access, On-disk Data Storage (up to 90 days)
Cross-product Data Sources e.g. Firewall, Email
Cross-product Querying
Sophos Data Lake (Cloud data storage)
30 dagen
Scheduled Queries
INVESTIGATE
Threat Cases (Root Cause Analysis)
Deep Learning Malware Analysis
Advanced On-demand SophosLabs Threat Intelligence
Forensic Data Export
REMEDIATE
Automated Malware Removal
Synchronized Security Heartbeat
Sophos Clean
Live Response (Remote Terminal Access for further investigation and response)
On-demand Endpoint Isolation
Single-click “Clean and Block”
HUMAN-LED THREAT HUNTING AND RESPONSE
24/7 Lead-driven Threat Hunting
Security Health Checks
Data Retention
Activity Reporting
Adversarial Detections
Threat Neutralization & Remediation
24/7 Lead-less Threat Hunting
Threat Response Team Lead
Direct Call-in Support
Proactive Security Posture Management
SERVER Security & Ransomware Protection
MANAGEMENT
Multiple Policies
Controlled Updates
ATTACK SURFACE REDUCTION
Application Control
Peripheral Control
Web Control / Category-based URL Blocking
Download Reputation
Web Security
BEFORE IT RUNS ON DEVICE
Deep Learning Malware Detection
Anti-Malware File Scanning
Live Protection
Pre-execution Behavior Analysis (HIPS)
Potentially Unwanted Application (PUA) Blocking
Intrusion Prevention System (IPS)
STOP RUNNING THREAT
Data Loss Prevention
Runtime Behavior Analysis (HIPS)
Antimalware Scan Interface (AMSI)
Malicious Traffic Detection (MTD)
Exploit Prevention
Active Adversary Mitigations
Ransomware File Protection (CryptoGuard)
Disk and Boot Record Protection (WipeGuard)
Man-in-the-Browser Protection (Safe Browsing)
Enhanced Application Lockdown
DETECT
Live Discover (Cross Estate SQL Querying for Threat Hunting & IT Security Operations Hygiene)
SQL Query Library (pre-written, fully customizable queries)
Fast Access, On-disk Data Storage (up to 90 days)
Cross-product Data Sources e.g. Firewall, Email
Cross-product Querying
Sophos Data Lake (Cloud data storage)
Scheduled Queries
INVESTIGATE
Threat Cases (Root Cause Analysis)
Deep Learning Malware Analysis
Advanced On-demand SophosLabs Threat Intelligence
Forensic Data Export
REMEDIATE
Automated Malware Removal
Synchronized Security Heartbeat
Sophos Clean
Live Response (Remote Terminal Access for further investigation and response)
On-demand Endpoint Isolation
Single-click “Clean and Block”
HUMAN-LED THREAT HUNTING AND RESPONSE
24/7 Lead-driven Threat Hunting
Security Health Checks
Data Retention
Activity Reporting
Adversarial Detections
Threat Neutralization & Remediation
24/7 Lead-less Threat Hunting
Threat Response Team Lead
Direct Call-in Support
Proactive Security Posture Management
SERVER Security & Ransomware Protection with MDR
MANAGEMENT
Multiple Policies
Controlled Updates
ATTACK SURFACE REDUCTION
Application Control
Peripheral Control
Web Control / Category-based URL Blocking
Download Reputation
Web Security
BEFORE IT RUNS ON DEVICE
Deep Learning Malware Detection
Anti-Malware File Scanning
Live Protection
Pre-execution Behavior Analysis (HIPS)
Potentially Unwanted Application (PUA) Blocking
Intrusion Prevention System (IPS)
STOP RUNNING THREAT
Data Loss Prevention
Runtime Behavior Analysis (HIPS)
Antimalware Scan Interface (AMSI)
Malicious Traffic Detection (MTD)
Exploit Prevention
Active Adversary Mitigations
Ransomware File Protection (CryptoGuard)
Disk and Boot Record Protection (WipeGuard)
Man-in-the-Browser Protection (Safe Browsing)
Enhanced Application Lockdown
DETECT
Live Discover (Cross Estate SQL Querying for Threat Hunting & IT Security Operations Hygiene)
SQL Query Library (pre-written, fully customizable queries)
Fast Access, On-disk Data Storage (up to 90 days)
Cross-product Data Sources e.g. Firewall, Email
Cross-product Querying
Sophos Data Lake (Cloud data storage)
30 dagen
Scheduled Queries
INVESTIGATE
Threat Cases (Root Cause Analysis)
Deep Learning Malware Analysis
Advanced On-demand SophosLabs Threat Intelligence
Forensic Data Export
REMEDIATE
Automated Malware Removal
Synchronized Security Heartbeat
Sophos Clean
Live Response (Remote Terminal Access for further investigation and response)
On-demand Endpoint Isolation
Single-click “Clean and Block”
HUMAN-LED THREAT HUNTING AND RESPONSE
24/7 Lead-driven Threat Hunting
Security Health Checks
Data Retention
Activity Reporting
Adversarial Detections
Threat Neutralization & Remediation
24/7 Lead-less Threat Hunting
Threat Response Team Lead
Direct Call-in Support
Proactive Security Posture Management
SERVER Security & Ransomware Protection with MDR Advanced
MANAGEMENT
Multiple Policies
Controlled Updates
ATTACK SURFACE REDUCTION
Application Control
Peripheral Control
Web Control / Category-based URL Blocking
Download Reputation
Web Security
BEFORE IT RUNS ON DEVICE
Deep Learning Malware Detection
Anti-Malware File Scanning
Live Protection
Pre-execution Behavior Analysis (HIPS)
Potentially Unwanted Application (PUA) Blocking
Intrusion Prevention System (IPS)
STOP RUNNING THREAT
Data Loss Prevention
Runtime Behavior Analysis (HIPS)
Antimalware Scan Interface (AMSI)
Malicious Traffic Detection (MTD)
Exploit Prevention
Active Adversary Mitigations
Ransomware File Protection (CryptoGuard)
Disk and Boot Record Protection (WipeGuard)
Man-in-the-Browser Protection (Safe Browsing)
Enhanced Application Lockdown
DETECT
Live Discover (Cross Estate SQL Querying for Threat Hunting & IT Security Operations Hygiene)
SQL Query Library (pre-written, fully customizable queries)
Fast Access, On-disk Data Storage (up to 90 days)
Cross-product Data Sources e.g. Firewall, Email
Cross-product Querying
Sophos Data Lake (Cloud data storage)
30 dagen
Scheduled Queries
INVESTIGATE
Threat Cases (Root Cause Analysis)
Deep Learning Malware Analysis
Advanced On-demand SophosLabs Threat Intelligence
Forensic Data Export
REMEDIATE
Automated Malware Removal
Synchronized Security Heartbeat
Sophos Clean
Live Response (Remote Terminal Access for further investigation and response)
On-demand Endpoint Isolation
Single-click “Clean and Block”
HUMAN-LED THREAT HUNTING AND RESPONSE
24/7 Lead-driven Threat Hunting
Security Health Checks
Data Retention
Activity Reporting
Adversarial Detections
Threat Neutralization & Remediation
24/7 Lead-less Threat Hunting
Threat Response Team Lead
Direct Call-in Support
Proactive Security Posture Management

* Alle prijzen zijn maandelijks, exclusief 21% BTW en worden gefactureerd voor de periode van 1 jaar, tenzij anders vermeld.

Meer info nodig? Plan je ZEN moment

Winkelmandje

Het product is toegevoegd aan je winkelmandje