Sophos Endpoint Security, Intercept X, XDR & MTR
Sophos Intercept X is the world’s best endpoint protection, combining ransomware protection, deep learning malware detection, exploit prevention, EDR, and more in a single solution. Get complete protection for all your endpoints. Works across all your desktops, laptops, servers, tablets, and mobile devices. Works across all major operating systems.
Features
- Endpoint Detection & Response
- Anti Ransomware
- Exploit Prevention
- Encryption
- Mobile Security & Management
- Managed Threat Response
- Synchronize Your Firewall and Endpoint Security
- Anti Virus & Anti Malware
- Centralised Management
- Web & Email Security
Benefits
- Easy to Manage
- Prevent Ransonware Attacks
- Deep Learning Neural Network
- Protect endpoints, servers and virtual environments
- Train Users on phishing
- Protect against Viruses, Trojans and Exploits
Pricing
£19.64 a user
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
5 8 3 2 1 5 5 5 9 5 8 0 0 1 1
Contact
Southern Communications Corporate Solutions T/A SCG Corporate
Rebecca Rowarth
Telephone: 01372 385715
Email: rebecca.rowarth@southern-comms.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- None
- System requirements
-
- Windows 7, 8 , 8.1, 10
- Server 2008 or above
- Disk space: 2 GB free RAM: 2 GB Cores: 2
- MacOS 10.13, 10.14 and 10.15 Intel-based Macs (64-bit)
- Amazon Linux, Amazon Linux 2 CentOS 6/7/8 Debian 9, 1
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
4 hours response - Monday to Friday 9 X 5
2 hour response 24X7X365 at an additional cost - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AAA
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
9 X 5 Monday to Friday 4 hour respone
24X7X365 4 hour response at additional cost - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Onsite training, installation and configuration available upon request at an additional cost.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Users to export data to various sources
- End-of-contract process
- The service and software are subscription based at the end os the contract the technology stops working and users can request data to be deleted.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Windows Phone
- Other
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- No difference
- Service interface
- No
- User support accessibility
- WCAG 2.1 AAA
- API
- No
- Customisation available
- No
Scaling
- Independence of resources
- The technology is designed with loadbalancing and can allocate resources accordingly, in addition uptimes are 99.99%
Analytics
- Service usage metrics
- Yes
- Metrics types
- Various report and metrics can be accessed via the dashboard as per the users requirements.
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- Sophos
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- They have functionality on the console to export data
- Data export formats
-
- CSV
- ODF
- Data import formats
-
- CSV
- ODF
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Bonded fibre optic connections
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- Uptime is garaunteed st 99.99% - SLA's are negotiated on a case by case basis based on the clients requirements. Every piece of data is stored in database clusters that is, at a minimum, triplicated. Event-driven clustered replication, with a replication factor of at least three, ensures two database instances in our cluster can fail and data will still remain available. Being event-driven, any database change is immediately pushed to all instances in the cluster, rather than changes being replicated on a schedule, making sure that even when an instance fails, the full dataset is available on failover instances.
- Approach to resilience
-
As the physical infrastructure for Sophos Central is maintained by Amazon, there is a separation of responsibilities. In brief, Amazon take responsibility for security of the cloud itself, and Sophos take responsibility for security in the cloud. The AWS Shared Responsibility Model details these responsibilities: https://aws.amazon.com/compliance/shared-responsibility-model/
For details on what steps Amazon takes to secure the infrastructure and services they offer, see their security whitepaper: https://d1.awsstatic.com/whitepapers/Security/AWS_Security_Whitepaper.pdf - Outage reporting
- Email alerts as well as public dashbaord , Sophos’ global security team monitor all logging data from Sophos Central and its related services 24/7/365. Central has forensic capabilities in the event of a data breach for rapid incident response.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- A number of pre-defined administrative roles can be assigned to admins that can restrict access to sensitive log data as well as restrict them from making changes to settings and configurations. MFA can be enabled for all administrators of a Sophos Central account, a subset of administrators, or disabled completely. We strongly recommend the use of MFA to ensure that, in the event of credentials becoming compromised, Sophos Central account access is not possible.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI
- ISO/IEC 27001 accreditation date
- 03/07/2022
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- ISO2700, GDPR & Various industry standards
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- A change management policy exist that is based on industry standards such as ISO27001, in addition a data protection impact assessment is carried out to ensure that security impacts are mitigated.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
Every 3 weeks, the gold images for virtual machines are upgraded with the latest software libraries and applications. No virtual machine instance exists for longer than 3 weeks, with old instances being destroyed and new instances deployed based on the new gold images.
Should a vulnerability be found via the vulnerability dependency framework, internal or external testing, bug bounty program, or other means, patching and redeployment take place as part of the vulnerability response program. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
Sophos Central is architected so that all machines are user-less, requiring no interaction, allowing machines to be locked down and hardened.
Similarly, to database server instances, machines that comprise Sophos Central can be destroyed and rebuilt at any time without data loss. Detect network traffic to command and control servers
Sophos’ global security team monitor all logging data from Sophos Central and its related services 24/7/365. Central has forensic capabilities in the event of a data breach for rapid incident response. - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Sophos’ global security team monitor all logging data from Sophos Central and its related services 24/7/365. Central has forensic capabilities in the event of a data breach for rapid incident response. Sophos regularly undergoes SOC Type 1 auditing and can provide access to the report under NDA. SOC Type 2 auditing is currently in progress. We regularly conduct both internal and external penetration testing with reputable third-parties and can provide attestation under NDA.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
-
- Public Services Network (PSN)
- Police National Network (PNN)
- NHS Network (N3)
- Joint Academic Network (JANET)
- Scottish Wide Area Network (SWAN)
- Health and Social Care Network (HSCN)
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Equal opportunity
- Wellbeing
Fighting climate change
SCCS has undertaken an action plan (published carbon reduction plan) on how we can reduce our environmental impact. Whilst we don’t produce any products directly, we do undertake several recycling initiatives to ensure waste products are recycled where possible: • Paper – aim to work as a paperless company, meaning any hard paper documents are scanned and then placed into the shredding bin’s located on site, shredded and disposed of securely via a third party company. • Plastic– This is collected from site and recycled. • Print Cartridges – This is collected from site and recycled. • Staff commuting – SCCS adopts a 'green travel plan' for staff commuting to work. This means that we encourage staff to use public transport, car share and walk/cycle to work schemes. SCCS do not manufacture products directly as we are a reseller, thus reducing the number of raw materials needed to produce devices. As part of environmental promise, we offer all our customers the option to recycle devices, which can be done through a selected third party. SCCS also aims towards ensuring we are always working in accordance with the procedures of ISO 14001 - Environmental Management System. SCCS operates an Environmental Management System within our office and as part of that process, SCCS is rolling out improved energy efficiency measures to reduce impact on the environment and our carbon footprint: • Lighting – moving all lighting towards LED, which if more efficient for the environment, as well as cost saving. • Implementing Smart metering into our office facility. • Air Conditioning – Units are being changed to newer, more energy efficient models. • Additional Heaters – Heaters within the office are only used in extremes of temperature to prevent large fluctuations in temperature. We also use carbon neutral couriers for all deliveries.Covid-19 recovery
Covid-19 had a big impact on the world and many businesses and as such, SCCS, much like everyone else, had to adapt on how we worked throughout this period. As an information technology business, we were already equipped with things such as Teams, work mobiles, work laptops etc so the transition from office to home working didn’t have a large impact on our business like it might have on other businesses. Our recovery to Covid-19 has been very smooth in the sense that we are now working as a hybrid business, meaning that staff have the flexibility to work 2 days in the office and 3 days from home. By reducing the number of staff within the office, we are able to spread desks out further and provide less contact with large numbers of people which we believe helps prevent the spread of Covid and other illnesses. We continue to provide hand sanitising stations throughout the office, and have cleaners come in on a regular basis. By implementing hybrid working as a permanent process, this also helps with the environmental aspect of the business as staff are not having to come into the office every day, meaning less travel is required, thus reducing our carbon footprint as a business. SCCS have supported hundreds of charities and voluntary organisations in recovering from the impacts of Covid but also managing and leading that response. This includes explaining and supporting the implementation of solutions in the short, medium and long term. The deployment of Microsoft Teams Voice, Cloud Telephony solutions and mobiles on a short term contract have all helped customers support the recovery from Covid and are set to support any ongoing requirements.Equal opportunity
SCCS provides a safe environment for all staff and we ensure that equal opportunities exist throughout the company, regardless of race, religion, age, sex or physical ability. When recruiting employee’s, SCCS will first post vacancies on local job boards and with local recruitment agencies to ensure that the pool of candidates we receive are from the local community, however, we would not discriminate if a candidate came from further afield if suitable for the role. The reason for recruiting local is that 1, it contributes towards the local community, both helping towards less unemployment, and also spend in the community, and 2, we believe that by recruiting local helps with our carbon footprint as employees have the option to walk to work, and also car share where possible. SCCS contributes towards the work experience scheme. Over the past several years we have given placement to students who are looking to gain experience within the telecommunication’s sector. When employing staff at SCCS, we ensure that both men and woman feel equally empowered and as such, we have both non-discrimination and equal opportunity policies in place throughout the business. We also believe in equal pay and hold annual pay reviews to ensure that our staff fell they are being paid the correct salary based on their role and skills. SCCS have provided several local projects to support the local community to include but not limited to staff volunteering days, hardware recycling schemes to support local businesses, and consultancy time for local projects. The availability of services is based on the requirements of the customer and how best SCCS can support the request.Wellbeing
SCCS can confirm that in 2021, amidst the presence of COVID-19, we rolled out an opportunity to our employees to become a Mental Health First Aider’s. We are pleased to say that several staff wanted to be involved with this and as such, we teamed up with St. John’s Ambulance and put selected staff members on a week’s course to become qualified FAQ Level 3 Mental Health Workplace First Aiders. Both the physical and mental health of all our employees is at the forefront of our business as we understand how important it is for our employees to be well, and to feel happy and comfortable in the workplace. Since implementing mental health workplace first aiders, we have also made several changes internally to assess and improve the mental health and well being of all staff. These changes include but not limited to: • Fresh Fruit available every morning in the office • Dedicated zone’s and times that a mental health first aider is available should anyone wish to speak with one of them. • Well-being weeks which include various activities for the staff members to enjoy. • Posters added to all the communal area’s with support numbers should someone feel the need they need to speak with someone. In addition to the above, the mental health first aiders have been trained to look out for the common signs and symptoms of someone who may be struggling with their mental health and how to deal with this situation.
Pricing
- Price
- £19.64 a user
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Full working version for up to 30 days