Skip to Content

Strongest protection. Simple licensing.

Sophos Endpoint Detection and Response (EDR) elevates your endpoint defenses by enabling you to identify, investigate, and neutralize evasive threats.

 

Sophos Extended Detection and Response (XDR) extends EDR to provide visibility across your entire attack surface.

 

Organizations with limited in-house resources can engage Sophos’ Managed Detection and Response (MDR) services, delivered by a team of global cybersecurity experts that monitor your environment for threats 24/7.

Sophos Endpoint System Requirements:

Windows
logo 3
logo4
Linux

Protect your iOS and Android devices with Sophos Mobile

Windows Server and Linux devices require a subscription to Sophos Workload Protection.



Sophos Endpoint for Legacy Platforms add-on available for critical systems running older operating systems.

Endpoint protection and control

Sophos Endpoint

 

Endpoint protection and control  

 

Sophos EDR

 

Complete endpoint protection, detection and response  

 

Learn more

 

Sophos XDR

 

Comprehensive detection and response across the environment  

 

Learn more

 

 

Sophos MDR

 

24/7 expert-led threat monitoring and response service  

 

Learn more

 

 

Available on

Threat surface reduction

Web Protectioncircle-check.svgcircle-check.svgcircle-check.svgcircle-check.svgwindows
apple
Web Control

 

circle-check.svg

 

circle-check.svg

 

circle-check.svg

 

circle-check.svg
windows
apple
Download Reputation

 

circle-check.svg

 

circle-check.svg

 

circle-check.svg

 

circle-check.svg
windows
Application Controlcircle-check.svgcircle-check.svgcircle-check.svgcircle-check.svgwindows
apple
Peripheral Controlcircle-check.svgcircle-check.svgcircle-check.svgcircle-check.svgwindows
apple
Data Loss Preventioncircle-check.svgcircle-check.svgcircle-check.svgcircle-check.svgwindows
Server Lockdown (application whitelisting)circle-check.svgcircle-check.svgcircle-check.svgcircle-check.svgwindows
Full Disk EncryptionAdd-onAdd-onAdd-onAdd-onwindows
apple

Threat prevention

Ransomware file protection (CryptoGuard)circle-check.svgcircle-check.svgcircle-check.svgcircle-check.svgwindows
apple
Remote ransomware protection (CryptoGuard)
Watch video
circle-check.svgcircle-check.svgcircle-check.svgcircle-check.svgwindows
Ransomware Master Boot Record (MBR) protectioncircle-check.svgcircle-check.svgcircle-check.svgcircle-check.svgwindows
Context-sensitive Defense:
Adaptive Attack Protection
Watch video
circle-check.svgcircle-check.svgcircle-check.svgcircle-check.svgwindows
Context-sensitive Defense:
Estate-wide Critical Attack Warnings
circle-check.svgcircle-check.svgcircle-check.svgcircle-check.svgwindows
Deep Learning AI-powered malware preventioncircle-check.svgcircle-check.svgcircle-check.svgcircle-check.svgwindows
linux
Anti-malware file scanningcircle-check.svgcircle-check.svgcircle-check.svgcircle-check.svgwindows
apple
linux
Potentially Unwanted App (PUA) blockingcircle-check.svgcircle-check.svgcircle-check.svgcircle-check.svgwindows
apple
linux
Live Protection cloud-lookupscircle-check.svgcircle-check.svgcircle-check.svgcircle-check.svgwindows
apple
linux
Behavioral Analysiscircle-check.svgcircle-check.svgcircle-check.svgcircle-check.svgwindows
linux
Anti-Exploitation (60+ mitigations)circle-check.svgcircle-check.svgcircle-check.svgcircle-check.svgwindows
Application Lockdowncircle-check.svgcircle-check.svgcircle-check.svgcircle-check.svgwindows
Anti-malware Scan Interface (AMSI)circle-check.svgcircle-check.svgcircle-check.svgcircle-check.svgwindows
Malicious Traffic Detectioncircle-check.svgcircle-check.svgcircle-check.svgcircle-check.svgwindows
apple
Intrusion Prevention System (IPS)circle-check.svgcircle-check.svgcircle-check.svgcircle-check.svgwindows
File Integrity Monitoring (Servers)circle-check.svgcircle-check.svgcircle-check.svgcircle-check.svgwindows
Integrated ZTNA agentcircle-check.svgcircle-check.svgcircle-check.svgcircle-check.svgwindows
apple

Detection, investigation and response

Sophos Endpoint

Endpoint protection and control  

Sophos EDR

 

Complete endpoint protection, detection and response  

 

Learn more

Sophos XDR

 

Comprehensive detection and response across the environment  

 

Learn more

Sophos MDR

 

24/7 expert-led threat monitoring and response service  

 

Learn more

Available on

Detection

Rich on-device data for real-time insightscircle-check.svgcircle-check.svgcircle-check.svgwindows
Suspicious event detectionscircle-check.svgcircle-check.svgcircle-check.svg 
AI-powered prioritization of detectionscircle-check.svgcircle-check.svgcircle-check.svgwindows
linux
Automatic MITRE Framework mappingcircle-check.svgcircle-check.svgcircle-check.svgwindows
linux
Linux container behavioral and exploit detectionscircle-check.svgcircle-check.svgcircle-check.svglinux
Device Exposurecircle-check.svgcircle-check.svgcircle-check.svgwindows
Generate detections on integrated third-party datacircle-check.svgcircle-check.svg 
Cross-product event correlation and analysiscircle-check.svgcircle-check.svg 

INVESTIGATION

RCA threat graphscircle-check.svgcircle-check.svgcircle-check.svgcircle-check.svgwindows apple 
Automatic and manual case creationcircle-check.svgcircle-check.svgcircle-check.svgwindowslinux
On-demand Sophos X-Ops threat intelligencecircle-check.svgcircle-check.svgcircle-check.svgwindows

 

AI Case Summarycircle-check.svgcircle-check.svgcircle-check.svg 
AI Command Analysiscircle-check.svgcircle-check.svgcircle-check.svg 
AI Searchcircle-check.svgcircle-check.svgcircle-check.svg 
AI Assistantcircle-check.svgcircle-check.svg 
Forensic data exportcircle-check.svgcircle-check.svgwindows 

RESPONSE

Automatic malware cleanup
Automatic ransomware file encryption roll-back
Automatic process termination
Synchronized Security: Automatic device isolation via Sophos Firewall
On-demand Adaptive Attack Protection
On-demand device isolation
Live Response remote terminal access
Microsoft 365 response actions

DATA INGESTION

Extensive data on-device and in the cloud (Sophos Products) 
Cloud data retention30 days90 days90 dayswindowsapplelinux
Additional cloud storage retention1 Year (Add-on)1 Year (Add-on)1 Year (Add-on)windowsapplelinux
Ingest and correlate data from your existing (non-Sophos) technology investments 

Sophos Endpoint

 

Endpoint protection and control  

 

Sophos EDR

 

Complete endpoint protection, detection and response  

 

Learn more

Sophos XDR

 

Comprehensive detection and response across the environment  

 

Learn more

 

Sophos MDR

 

24/7 expert-led threat monitoring and response service  

 

Learn more

24/7 managed detection and response service

24/7 threat monitoring and responsecircle-check.svg 
Weekly and monthly reportingcircle-check.svg 
Health Checkcircle-check.svg 
Expert-led threat huntingcircle-check.svg 
Threat containmentcircle-check.svg 
Direct call-in support during active incidentscircle-check.svg 
Full-scale incident response: threats are fully eliminatedcircle-check.svg 
Root cause analysiscircle-check.svg 
Dedicated Incident Response Leadcircle-check.svg 
$1M Breach Protection Warrantycircle-check.svg 
Guided threat insights from Sophos X-Opscircle-check.svg 

Sophos Endpoint

 

Endpoint protection and control  

 

 

Sophos EDR

 

Complete endpoint protection, detection and response  

 

Learn more

 

Sophos XDR

 

Comprehensive detection and response across the environment  

 

Learn more

 

 

Sophos MDR

 

24/7 expert-led threat monitoring and response service

 

Learn more

Optional add-ons

Sophos Endpoint for Legacy PlatformsOptionalOptionalOptionalOptional
Sophos Device EncryptionOptionalOptionalOptionalOptional
Sophos Advisory ServicesOptionalOptionalOptionalOptional
Sophos Incident Response (IR) Services RetainerOptionalOptionalOptionalOptional
Additional cloud storage retentionOptionalOptionalOptional
Sophos Identity Threat Detection and Response (ITDR)OptionalOptional
Sophos Network Detection and Response (NDR)OptionalOptional
Sophos Managed Risk powered by TenableOptional
Full Width CTA - BG

Try Sophos Endpoint for free

Sign up for a free no-obligation 30-day trial.