Sophos' Endpoint Security Bolsters Cyber Threat Defenses While Simplifying Management

Sophos' Endpoint Security Bolsters Cyber Threat Defenses While Simplifying Management

By Stefania Viscusi

Sophos introduced new endpoint security innovations that aim to enhance protection, improve operational efficiency, and speed up detection and response. The new features include adaptive active adversary protection, Linux malware protection enhancements, account health check capabilities, and an integrated zero trust network access (ZTNA) agent for Windows and macOS devices. These upgrades help to bolster defenses against advanced cyber threats and streamline endpoint security management.

Right now, it is crucial for organizations to strengthen their defenses as attacks are becoming more sophisticated and challenging to detect, requiring advanced security measures that can sense and adapt quickly to better protect against these threats.

“Ransomware remains one of the most prevalent and damaging cyberthreats to organizations, with Sophos incident responders still consistently remediating ransomware activity worldwide,” said Raja Patel, senior vice president of products at Sophos.

With the new adaptive active adversary protection, defenders get more time to respond to targeted attacks that are underway. And with Sophos Intercept X heightened defenses are activated as soon as it detects a “hands-on-keyboard” endpoint intrusion.

Sophos also introduced a faster and lighter agent for Windows that improves the performance of devices and applications by reducing the memory footprint by 40% and the number of processes by more than 30%. The company has also launched a new XDR sensor deployment option, which is approximately 80% lighter than the previous full agent, making it more efficient.

As part of the Linux malware protection enhancements added to the Sophos Intercept X Advanced for Server offering, users get on-access malware scanning and quarantine capabilities. This includes new live runtime detections and response to container escapes, cryptominers, data destruction, and kernel exploits.

The new account health check feature offers real-time monitoring of security configurations and policy settings so organizations can quickly optimize their security posture and return to recommended settings with a single click.

“Now isn’t the time for organizations to let their guard down because of any perceived reduction in attacks; in fact, they should be strengthening defenses as attacks are now more intricate and difficult to detect, requiring advanced security techniques that can sense and then quickly adapt to better protect themselves,” said Patel.




Edited by Greg Tavarez
Get stories like this delivered straight to your inbox. [Free eNews Subscription]
SHARE THIS ARTICLE
Related Articles

Shining a Light on the Dark Web: Searchlight Cyber Debuts Comprehensive Hub

By: Greg Tavarez    3/28/2024

The Dark Web Hub is a one-stop shop for crucial context and continuously updated information on dark web marketplaces, ransomware actors, hacking foru…

Read More

Stellar Cyber and Trellix Bridge the Gap in Security Operations

By: Greg Tavarez    3/28/2024

Stellar Cyber announced the integration with Trellix Endpoint Security HX to allow customers to deploy more robust security solutions and improve thei…

Read More

CyberSaint Raises $21M in Series A Funding to Continue Securing its CyberStrong Customers

By: Alex Passett    3/27/2024

CyberSaint announced that it succeeded in a huge $21 million Series A funding round. This was led by Riverside Acceleration Capital (RAC) with other i…

Read More

US Education Receives Security Upgrade with Free Browser Protection Offered by Conceal, Carahsoft

By: Greg Tavarez    3/27/2024

Conceal and Carahsoft recently unveiled an initiative to fortify the cybersecurity infrastructure of U.S. educational institutions.

Read More

Cato's AI Takes Control of Security and Incident Response

By: Greg Tavarez    3/27/2024

With Cato's recently announced Network Stories for Cato XDR, advanced AI algorithms instantly identify outages in customer networks and conduct root c…

Read More