Tech Talk The latest news, reviews, and discussions for the IT professional.

Build Your Next-Gen Endpoint Security

Build Your Next-Gen Endpoint Security

The days of straightforward file scanning are long gone. Your goal is now to prevent threats from reaching your devices, stop them before they run, detect them if they have bypassed preventative methods, and not just clean up malware, but analyze and undo everything it does.

Sophos Intercept X uses multiple layers of technology that co-exist with your antivirus to provide full stack next-generation protection.

Deep Learning Malware Detection
Trained in SophosLabs using deep learning neural networks, Intercept X will detect new and unseen malware files with high accuracy, without signatures. Alternate methods of machine learning often demand data scientists identify attributes to look for. The resulting model is then limited by the effectiveness of the attribute selection and training data. Deep learning used in Intercept X identifies the important attributes to distinguish between malware and benign files for itself. This, coupled with an extensive training data set provided by SophosLabs, ensures an accurate and effective decision boundary is created between benign and malicious files. This trained model is smaller than 20mb in size and needs infrequent updates. Back in the cloud, SophosLabs is continuously training the model and monitoring the effectiveness of the decision boundary using new and previously unseen malware samples.

Protect Vulnerable Software
Vulnerabilities show up at an alarming rate. they represent flaws in software and need to be patched by vendors. new exploit techniques on the other hand show up on average only twice a year and are used over and over again by attackers with each vulnerability discovered. Exploit Prevention stops the techniques, stopping the attacker exploit the vulnerability before it can be patched.

Effective Ransomware Detection
CryptoGuard technology detects spontaneous malicious data encryption to stop ransomware in its tracks. Even if trusted files or processes are abused or hijacked, CryptoGuard will stop and revert them without any interaction from users or IT support personnel. CryptoGuard works silently at the file system level, keeping track of remote computers and local processes that attempt to modify your documents and other files.



Share your thoughts and questions in the comment section below. To get the latest news from PCM, follow @PCM on Twitter, join us on Facebook, or connect with us on LinkedIn. To get the latest news sent straight to your inbox, join our newsletter.