保护您的云本机载荷

保护 Amazon Web Services、Microsoft Azure 和 Google Cloud 载荷。

免费试用 获取价格

顶级防护

最佳端点安全
2018 / 2019 / 2020

领导者 2021

最佳托管安全 服务 2020

漏洞防护排名第 1

编者选择

高级技术合作伙伴

保护您的 AWS、Azure 和 GCP 云环境

图像
edr-icon-small.svg

Extended Detection and Response (XDR)

通过强大的查询和远程响应功能,将威胁追踪和 IT 安全操作提高到新的水平。

图像
deep-learning-icon

深度学习技术

人工智能保护云载荷不受已知和未知恶意软件影响,不依赖特征码。

图像
multi-cloud-visibilty-icon-orange.svg

云本机

跨云平台快速部署和直接管理,甚至在多云和混合服务器环境。

图像
ransomware-icon

反勒索软件

勒索软件文件保护,自动文件恢复,以及行为分析,阻止勒索软件和引导记录攻击。

图像
mtr-icon

云安全状态管理

侦测可疑访问事件、不安全主机、容器和免服务器部署,同时监测配置。

图像
Exploits

载荷锁定

阻止在云载荷上运行未经授权程序,如果尝试篡改关键文件,将收到通知。

阻止最新网络安全威胁

Intercept X Advanced for Server 结合传统和下一代功能,保护企业的 Amazon EC2 实例、Microsoft Azure 和 Google Cloud 虚拟机。

深度学习人工智能采用免特征码侦测,擅长识别威胁,即使从未见过。防恶意软件功能阻止恶意加密进程,将任何受影响的文件恢复到安全状态,减少对业务连续性的影响。防漏洞攻击技术阻止免文件隐秘攻击,如阻止混淆的 PowerShell 脚本执行。

 

图像
Azure logo
图像
AWS logo
图像
Google Cloud logo

试用 Sophos

亲自试用 Intercept X for Server,了解其强大的防护、可见性和管理功能。

免费试用

控制您的云载荷

从一个控制台部署、管理和维护整个资产,甚至是带有云载荷和本地服务器的混合场景中。精确控制可以和不可以运行的内容。

图像
Centralized Management

集中式管理

从 Sophos Central 的单个控制台管理所有云实例和载荷。

图像
Cloud-Security Posture Management

云安全状态管理

加固 AWS 配置,侦测安全和合规性漏洞。

图像
Server Lockdown

服务器锁定

只需点击一次,即可确保仅批准的应用程序可以运行,无停机时间。

图像
File Integrity Monitoring

文件完整性监测

如果尝试篡改关键文件和文件夹,将收到通知。

    自动侦测不安全部署

    查看并确保整个多云资产安全。利用 Intercept X Advanced for Server with XDR,您可以快速侦测云载荷以及关键云服务,包括 S3 bucket、数据库;免服务器功能;识别可疑活动或不安全部署;弥补安全不足。

    图像
    Unknown threats

    详细多云库存

    可视化整个云环境,即使是多云设置,细致了解配置问题、资源浪费和潜在安全问题。

    图像
    icon

    人工智能支持的异常侦测

    人工智能持续监测您的云环境,通知任何异常,阻止可能导致漏洞的配置更改。

    图像
    24/7 support

    自动评估

    通过自动最佳做法扫描建议修复问题的必要补救措施,保持云基础设施处于峰值性能。

    图像
    Shield Computers Graphic

    扩展式侦测与响应 (XDR)

    Sophos Intercept X Advanced for Server with XDR 为组织提供了快速响应关键威胁捕获和 IT 操作任务的工具。除了端点和服务器,还加入网络、电子邮件、云和移动*数据源,超越传统端点侦测与响应 (EDR)。提供 30 天云存储,90 天设备存储和实时数据,这样您可以:

    • 交叉引用多个数据源的威胁指标,快速识别、确定和消除威胁
    • 利用防火墙的 ATP 和 IPS 事件扩展式侦测与响应 (XDR),研究可疑主机,发现资产内不受保护的设备
    • 研究 AWS 云环境 API、CLI 和管理控制台活动,无缝集成 AWS CloudTrail
    • 检查 IT 资产中具有性能问题的设备,如高 CPU 使用率或低内存,或者是否不必要启用 RDP

    更多了解 XDR

    *Sophos Mobile XDR 集成即将推出

    Managed Threat Response 托管式威胁响应

    • 威胁捕猎:  由我们的威胁分析师精英团队 24/7 全天候主动捕猎。确定对您业务的潜在影响和威胁环境。
    • 响应:  代表您开始远程中断、隔离和消除威胁的操作,阻止最复杂的威胁。
    • 持续改进:  获取可行建议,解决反复发生事件的根本原因以阻止其再次发生。

    更多了解 MTR

     

    图像
    Secure
    图像
    Secure-remote-workers

    保护远程员工的安全

    保护您的虚拟服务器和通过远程桌面服务 (RDS) 访问的员工,不受最新恶意软件、勒索软件和免文件威胁。

    多云支持

    Intercept X for Server 提供针对最新威胁的先进防护,云载荷的详细信息,以及更广泛的云基础设施。保护您的 Amazon EC2 实例、S3 bucket、Microsoft Azure 和 GCP 载荷。

      Intercept X Advanced for Server Intercept X Advanced for Server with XDR
    基础技术
    (包括应用程序控制、行为侦测等)

    已移除图像。

    已移除图像。

    下一代技术
    (包括深度学习、防勒索软件、无文件攻击防护等)

    已移除图像。

    已移除图像。

    载荷特定功能
    (包括白名单、文件完整性监测等)

    已移除图像。

    已移除图像。

    云安全姿态管理
    (查看和确保整个云资产安全)

    已移除图像。

    已移除图像。

    XDR
    (扩展式侦测与响应)
     

    已移除图像。

     

    免费试用 获取价格

    Sophos Cloud Workload Protection

    High impact host and container security. Low impact on performance.

    Free TrialQuote Request

    Optimize Workload Protection

    图像
    Cloud Ecosystem

    Secure Cloud Growth

    Cloud or datacenter, host and container. Protect your infrastructure now and as you evolve it with runtime threat detection and prioritized investigations.

    图像
    Client isolation

    Reduce Your Attack Surface

    Design cloud environments to meet security best-practice standards, detect workload configuration risk and anomalous activity, and achieve visibility across your whole cloud environment.

    图像
    icon-upgrade

    Get Performance and Uptime

    Flexible, lightweight host and container protection is optimized for performance. Available as an agent or via API to integrate with your security operations, IT, and DevOps processes.

    Minimize Time to Detect and Respond

    Sophos Cloud Workload Protection provides complete visibility into your host and container workloads, identifying malware, exploits, and anomalous behavior before they get a foothold.

    • Extended detection and response (XDR) provides complete visibility of hosts, containers, endpoints, the network and even cloud provider native services
    • Cloud-native behavioral and exploit runtime detections identify threats, including container escapes, kernel exploits, and privilege escalation attempts
    • Streamlined threat investigation workflows prioritize high-risk incident detections and consolidate connected events to increase efficiency
    • Integrated Live Response establishes a secure command line terminal to hosts for remediation

    Watch XDR Detections Video

    图像
    detection-screenshot

    Integrate with Security, IT, and DevOps 

    Combat threats with actionable host and container runtime visibility and threat detections delivered through the deployment model which best fits your environment. 

    图像
    compliance-illustration

    Single Host Agent

    Secure the host and container with a single agent managed from the Sophos Central management console. Easily investigate and respond to behavioral, exploit, and malware threats in one place while increasing IT hygiene with automated detections, intuitive querying, and remote response capabilities.

     

    Integrated Threat Intelligence

    Fine-tuned for maximum performance, seamlessly enrich your security operations workflows with an ultra-lightweight Linux sensor providing API integration of host and container behavioral and exploit runtime detections into your existing automation, orchestration, log management, and incident response tooling – available soon.

    Get Performance Without Friction

    When uptime is your number one requirement, security tools must be lightweight and integrate into your DevSecOps workflows to prevent risk and optimize application performance.

    Optimized for Linux

    Identify sophisticated Linux security incidents as they happen without deploying a kernel module, which can introduce security risk through third-party code and require you to recompile the kernel when each new update is pushed.

     

    Designed to Avoid disruption

    Avoid costly downtime, overloaded hosts, or stability snafus caused by traditional security tools with a single agent with optimized resource limits (including CPU, memory, and data collection limits).

    图像
    Managed Threat Response

    Automate Your Cloud Security Checklist

    Design your cloud environments to meet security best-practice standards with the visibility and tools to maintain them using integrated Sophos Cloud Optix Standard capabilities.

    图像
    inventory-screen-loop-graphic
    • Proactively identify unsanctioned activity and misconfigurations across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP)
    • Continuously discover cloud resources with detailed inventory and visibility of Sophos host protection and Sophos Firewall deployments
    • Automatically overlay security best practice standards to detect gaps in posture as well as identify quick wins and critical issues
    • Detect high-risk anomalies in user IAM role behavior, pinpointing unusual access patterns, locations, and malicious behaviors quickly to prevent a breach

    Learn More About Cloud Optix Standard

    Get Flexible Host and Container Protection

    As your organization expands from on-premises or data center to hybrid and multi-cloud environments, Sophos protects your infrastructure and data across deployment and computing models.

    图像
    linux-black

    Linux Security

    Detection and resilience for Linux systems in any environment, including container runtimes such as Docker, containerd, and CRI-O. Our detection is crafted with the threat models of cloud-native systems in mind.

    图像
    windows-wordmark

    Windows Security

    Secure your Windows hosts and remote workers against ransomware, exploits and never-before-seen threats, control applications, lockdown good configurations, and monitor changes to critical system files.

    图像
    aws-cloud

    Hybrid and Multi-Cloud

    Secure applications and data across your hybrid cloud footprint from a single console. The flexible agent runs on-premises, in data centers, hybrid and multi-cloud environments including AWS, Azure, GCP and Oracle Cloud.

    Resolve Security Incidents Faster

    The intuitive detection dashboard makes it easy to increase incident response efficiency. Host and container threat detection automatically converted into an investigation, with an AI-prioritized risk score for each detection. Scores are then color-coded and mapped against the MITRE ATT@CK framework, enabling an analyst to quickly identify where they should focus, or not.

    Detections include: malware targeting Linux, memory corruption, new file behavior, unusual application behavior, suspicious interactive shell, container escapes, kernel and userland backdoors, privileged file operations, network discovery, lateral movement, process injection, system discovery, scheduled task changes, complier usage, privileged command usage, and risky developer activity. 

    Watch XDR Investigations Video

    图像
    Linux-detection-screenshot
    图像
    Intelligent endpoint detection

     

     

    Hunt Threats and Harden IT Ops

    Get information that matters to you – fast.  Choose from a library of pre-written templates for threat hunting and IT operations scenarios, customize them, or write your own. You have access to live data, up-to 90 days on-disk and 30 days of data stored in the Sophos Data Lake so you’re covered for every scenario.

    Learn More About XDR

    Take the Weight of Cloud Security off Your Shoulders

    Our flexible approach to cybersecurity deployment and management means optimizing security, keeping data secure and private while blocking active threats are goals you can easily achieve.

    • Your organization’s team can deploy and manage Sophos protection from a single unified console
    • Sophos can connect you with an experienced Sophos Managed Security Partner
    • Sophos own Professional Services Team can help with initial deployment
       
    图像
    take-weight-of-cloud-security-off-your-shoulders-graphic
    图像
    stopwatch

    Respond to Security Incidents at 3 a.m.

    Sophos Managed Threat Response, the Sophos MDR service, can work in partnership with your team and Sophos MSP, monitoring your environment 24/7/365, and proactively hunting for and remediating threats on your behalf.

    • Threat Hunting: Proactive threat hunting by our elite team of threat analysts. Determining the potential impact and context of threats to your business
    • Response: Initiates actions to remotely disrupt, contain and neutralize threats on your behalf to stop even the most sophisticated threats
    • Continuous Improvement: Get actionable advice for addressing the root cause of recurring incidents to stop them from occurring again
       

    Sophos MTR Sophos MTR for AWS

    图像
    azure-white
    图像
    AWS logo
    图像
    Google Cloud logo
    图像
    oracle-logo-white

    Hybrid Cloud Security Trusted by Millions

    Sophos is trusted by millions to provide intuitive and incredibly broad visibility and protection. Available in a single unified management console, Sophos Central. Sophos combines Cloud Workload and server protection with endpoint and mobile device security, firewall, zero trust network access, secure email and more. Now available in AWS Marketplace to help streamline cloud security procurement, while counting towards any cloud provider consumption commitments your organization already has in place.

    Free TrialQuote request