Introducing adaptive active adversary

Issue 1 2023 Cyber Security, Products

Sophos has introduced advances to its portfolio of endpoint security offerings. New adaptive active adversary protection; Linux malware protection enhancements; account health check capabilities; an integrated zero trust network access (ZTNA) agent for Windows and macOS devices; and improved frontline defences against advanced cyberthreats and streamline endpoint security management.

“Ransomware remains one of the most prevalent and damaging cyberthreats to organisations, with Sophos incident responders still consistently remediating ransomware activity worldwide. Now isn’t the time for organisations to let their guard down because of any perceived reduction in attacks; in fact, they should be strengthening defences as attacks are now more intricate and difficult to detect, requiring advanced security techniques that can sense and then quickly adapt to better protect themselves,” said Raja Patel, Senior Vice President of Products at Sophos.

Designed to improve protection and operational efficiency, as well as speed up detection and response, the new Sophos endpoint innovations include:

• Adaptive active adversary protection: A core part of Sophos’ ‘shields up’ design methodology that provides defenders with additional time needed to respond to targeted attacks underway. Sophos Intercept X immediately enables heightened defences as soon as it detects a ‘hands-on-keyboard’ endpoint intrusion. This wide-reaching step up in defensive measures removes an attacker’s ability to take further actions by minimising the attack surface, disrupting and containing the attack prior to response team engagement, and providing insights needed for complete remediation.

• Linux malware protection enhancements: On-access malware scanning and quarantine capabilities improve real-time prevention of security incidents within Linux operating environments. Added to the Sophos Intercept X Advanced for Server offering, these new features complement existing functionality, including live runtime detections and response to container escapes, cryptominers, data destruction, and kernel exploits.

• Account health check: Intuitive, real-time health check monitoring of security configurations and policy settings with the ability to automatically return to recommended settings in a single click, optimising security posture and enabling organisations to promptly re-establish security best practices. Assessments ensure devices are running the necessary security components, policies are following recommended settings, tamper protection is active, exclusions are not creating attack surface exposure, and more.

• Integrated ZTNA agent for Windows and macOS devices: Sophos Intercept X is one of the only endpoint protection solutions with a modular ZTNA agent, and organisations can now extend defences to include Sophos ZTNA across entire estates without deploying an additional agent.

• Faster, lightweight agent: Reduces the Windows agent’s memory footprint by 40% and the number of processes by more than 30%, accelerating the performance of applications, workloads and devices. Sophos has also introduced a new extended detection and response (XDR) sensor deployment option that is approximately 80% lighter than the previous full agent.

Sophos XDR gives security analysts the ability to proactively hunt threats, providing faster detection, investigation and response to drive better security outcomes. Sophos endpoint offerings also include server workload protection for server and container security and integrated web and application controls; Sophos Mobile for secure unified endpoint management; and Sophos Encryption for full disk encryption.

Sophos’ complete and integrated portfolio of endpoint, network and cloud solutions and managed security services are part of the Sophos Adaptive Cybersecurity Ecosystem; powered by threat intelligence from Sophos X-Ops for faster, contextual and synchronised protection, detection and response.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Prevention-first approach to cybersecurity
News Cyber Security
Check Point CEO, Gil Shwed, highlights the increasing importance of artificial intelligence in defending evolving networks and protecting against cyber threats at annual CPX 360 customer and partner event.

Read more...
Three new portable power stations to ease load shedding
News Security Services & Risk Management Products
EcoFlow has launched three portable power stations that provide sufficient power for consumers wherever they are; the DELTA 2 and RIVER 2 Series are feature-filled power solutions to the volatile electricity supply.

Read more...
Recharge and top up for pre-paid SIM cards
Asset Management, EAS, RFID Products
Businesses of all sizes are challenged by the administrative nightmare of reporting on the costs associated with airtime recharges on pre-paid and top-up SIM cards, which are often procured from multiple sources, including carriers and retail outlets.

Read more...
How much protection does cyber insurance really give businesses?
Cyber Security Security Services & Risk Management
If organisations don’t meet even the minimum requirements of security and data protection, insurance will do them little good. Instead, it needs to be just one part of the digital resiliency toolbox.

Read more...
Qognify VMS adds support for Pelco IP camera series
CCTV, Surveillance & Remote Monitoring Products
The latest IP camera series from Pelco can now be used with Qognify’s advanced video solution for corporate and enterprise projects, increasing the overall number of camera models and third-party devices supported in Qognify VMS to more than 6 500.

Read more...
Off-grid power solution for residential estate
Editor's Choice Security Services & Risk Management Residential Estate (Industry) Products
Coral Beach Estate, an upmarket residential estate based in East London, has been struggling with load shedding and power outages due to South Africa's energy crisis, as well as the vandalism of its power infrastructure.

Read more...
Choosing an inferior lithium battery can be detrimental and unsafe
Uniross Batteries Security Services & Risk Management Products
South Africans looking to mitigate the impact of load shedding by installing a solar system for their home must do so through an accredited installer or electrician to avoid insurance claims being rejected.

Read more...
Eleven steps to an effective ransomware response checklist
Editor's Choice Cyber Security
Anyone is a viable target for ransomware attacks and should have a plan in place to deal with a worst-case scenario. Fortinet offers this ransomware attack response checklist to effectively deal with an active ransomware attack.

Read more...
VIVOTEK launches VAST Security Station
CCTV, Surveillance & Remote Monitoring Products
VIVOTEK officially launched its AI security system, VAST Security Station (VSS), in March, available to users in three flexible tiers: VSS Lite, VSS Standard, and VSS Professional.

Read more...
Converged infrastructure: Beyond the hype
IT infrastructure Products
Technical teams no longer have to sit and try to work through a magnum opus of manuals for every layer of computing, networking, and storage, largely thanks to the growing popularity and increasing success of converged infrastructure.

Read more...