Sophos Server Protection Windows Competitive Overview
Sophos Server Protection Windows Competitive Overview
The information in this document is based on Sophos’s interpretation of data publicly available as of the date it was prepared. Other companies named in the presentation had no part in its preparation. The information contained in this comparison may be incomplete JULY 2024
or inaccurate and is subject to change. The information is intended for informational purposes only and is not intended to be relied upon in making any purchase decision. The information is provided "as is" without warranties of any kind either expressed or implied.
This document is Sophos confidential information. Page 1 of 7
Copyright 2024 Sophos Group. All Rights Reserved.
CONFIDENTIAL - SOPHOS INTERNAL AND CHANNEL PARTNERS ONLY - DO NOT REDISTRIBUTE
Prevention Limited control features Prevent threats reaching machines in the first place
Deep Security can block malicious websites, but it has no category-based web control (e.g., block access to Social Media Category-based web control, application control and device control provide extensive (and simple) control over the
sites), application control, device control, or data loss prevention (DLP). attack surface. Server Lockdown delivers application whitelisting, and by automatically allowing updates from trusted
sources it minimizes the administrative workload.
Lockdown
Deep Security’s Application Control is a white/blacklisting tool to block or allow any new software installed on Windows Ask: What tools do you have in place to prevent exposure to threats?
and Linux servers. It is necessary to manually approve any exemptions or updated versions of existing applications.
Best of breed exploit prevention
Virtual patching We focus on protecting against the exploit techniques that are at the heart of threats, rather than individual
Deep Security’s ‘virtual patching’ feature is a set of IPS rules that protect against specific vulnerabilities. New rules are vulnerabilities. This means it is not necessary to deploy and maintain IPS rules to machines.
made available in response to the latest threats, but customers need to balance applying sufficient rules to receive the Point out: Sophos provides out of the box protection from 20+ exploit techniques
optimum protection without impacting performance.
Deep learning
Machine learning and anti-exploit Deep learning is based on neural networks, an advanced form of machine learning, and detects both known and
Both features are available, although there is little information about the depth of protection or the range of anti-exploit unknown malware as well as unwanted applications.
techniques, and third party testing by MRG Effitas has indicated limitations in the actual protection strength.
Detection Anti-ransomware Ransomware protection against both local and remote threats
Ransomware protection is available, but it does not detect the encryption of local files by a remote computer (e.g., CryptoGuard prevents inbound attacks from unprotected machines (e.g., a file server with CryptoGuard will be
ransomware on a client machine that encrypts shared files residing on a server). protected from an un-protected client attempting to encrypt files).
Show: Sophos Central’s Threat Analysis Center provides visibility across an organization’s estate (servers and
clients). Better understand the scope of security incidents and hunt for misuse of admin tools such as
PowerShell.
The information in this document is based on Sophos’s interpretation of data publicly available as of the date it was prepared. Other companies named in the presentation had no part in its preparation. The information contained in this comparison may be incomplete JULY 2024
or inaccurate and is subject to change. The information is intended for informational purposes only and is not intended to be relied upon in making any purchase decision. The information is provided "as is" without warranties of any kind either expressed or implied.
This document is Sophos confidential information. Page 2 of 7
Copyright 2024 Sophos Group. All Rights Reserved.
CONFIDENTIAL - SOPHOS INTERNAL AND CHANNEL PARTNERS ONLY - DO NOT REDISTRIBUTE
Threat Correlation – Missing patches are linked to known vulnerabilities and exploits Integration – Managed through a separate console from other Symantec products
Standalone Integrated
Cloud Workload Protection is managed through its own cloud portal, which is separate from other Symantec products such Server protection is managed alongside endpoint protection, firewall, encryption, mobile, email security, Wi-Fi. It
as endpoint protection. also integrates with Sophos Firewall via the Security Heartbeat.
Detection No behavior-based ransomware or post-compromise protection Detect and block malicious encryption
Symantec’s exploit prevention does not extend to post-compromise attack techniques, and it does not include a specific CryptoGuard utilizes behavioral analysis to stop never-before-seen ransomware and boot-record attacks, making it
ransomware protection feature. the most advanced anti-ransomware technology available.
File Integrity Monitoring (FIM) Show: CryptoGuard is enabled through a simple checkbox, and no further configuration is required
One of the product’s strengths is the ability to specify files and settings that should not be modified.
Protection that continues after a successful compromise
Even if a server is compromised, Sophos continues to monitor behavior for signs of an attack. This includes, for
example, credential theft, code cave attacks, and privilege escalation.
The information in this document is based on Sophos’s interpretation of data publicly available as of the date it was prepared. Other companies named in the presentation had no part in its preparation. The information contained in this comparison may be incomplete JULY 2024
or inaccurate and is subject to change. The information is intended for informational purposes only and is not intended to be relied upon in making any purchase decision. The information is provided "as is" without warranties of any kind either expressed or implied.
This document is Sophos confidential information. Page 3 of 7
Copyright 2024 Sophos Group. All Rights Reserved.
CONFIDENTIAL - SOPHOS INTERNAL AND CHANNEL PARTNERS ONLY - DO NOT REDISTRIBUTE
The information in this document is based on Sophos’s interpretation of data publicly available as of the date it was prepared. Other companies named in the presentation had no part in its preparation. The information contained in this comparison may be incomplete JULY 2024
or inaccurate and is subject to change. The information is intended for informational purposes only and is not intended to be relied upon in making any purchase decision. The information is provided "as is" without warranties of any kind either expressed or implied.
This document is Sophos confidential information. Page 4 of 7
Copyright 2024 Sophos Group. All Rights Reserved.
CONFIDENTIAL - SOPHOS INTERNAL AND CHANNEL PARTNERS ONLY - DO NOT REDISTRIBUTE
Share: Consistent top ratings (AAA)in SE Labs tests, 1st place in NSS Labs 2019 Advanced Endpoint
Protection (AEP) report, MRG Effitas malware and exploit prevention tests
Ask: What would it mean to you if you could run one of the industry’s most comprehensive anti-
exploit tools?
The information in this document is based on Sophos’s interpretation of data publicly available as of the date it was prepared. Other companies named in the presentation had no part in its preparation. The information contained in this comparison may be incomplete JULY 2024
or inaccurate and is subject to change. The information is intended for informational purposes only and is not intended to be relied upon in making any purchase decision. The information is provided "as is" without warranties of any kind either expressed or implied.
This document is Sophos confidential information. Page 5 of 7
Copyright 2024 Sophos Group. All Rights Reserved.
CONFIDENTIAL - SOPHOS INTERNAL AND CHANNEL PARTNERS ONLY - DO NOT REDISTRIBUTE
Deployment – McAfee’s server protection suite is not available through its cloud hosted management console (MVISION ePO),
Single Management Console – ePO (ePolicy Orchestrator) can manage most McAfee products
meaning the customer is required to set up and maintain an on-premise admin console
Prevention Application control Prevent threats reaching machines in the first place
McAfee Application Control is a single product within the broader server license suite. While offering Category-based web control, application control and device control provide extensive (and simple)
granular controls to lock down a system, it involves significant administration, such as specifying whether control over the attack surface. Server Lockdown delivers application whitelisting, and by automatically
files and folders are write-protected or read-protected. allowing updates from trusted sources it minimizes the administrative workload.
Exploit prevention Ask: What tools do you have in place to prevent exposure to threats?
McAfee Endpoint Security includes some generic anti-exploit techniques (e.g., defense against DEP and
Stack Pivot attacks), along with more specific protections to defend against recently disclosed Prevent threats with machine learning and exploit prevention
vulnerabilities. Intercept X delivers a far wider range of exploit prevention features and is not reliant on Deep learning detects both known and unknown malware without relying on signatures. Sophos also
responding to the latest known vulnerabilities. delivers best-of-breed exploit protection that leverages 20+ mitigation techniques.
Show: Point to the Exploits Explained whitepaper for confirmation of the depth of our exploit
protection
Change control
McAfee offers file integrity monitoring and protection for critical files, through its Change Control
product.
The information in this document is based on Sophos’s interpretation of data publicly available as of the date it was prepared. Other companies named in the presentation had no part in its preparation. The information contained in this comparison may be incomplete JULY 2024
or inaccurate and is subject to change. The information is intended for informational purposes only and is not intended to be relied upon in making any purchase decision. The information is provided "as is" without warranties of any kind either expressed or implied.
This document is Sophos confidential information. Page 6 of 7
Copyright 2024 Sophos Group. All Rights Reserved.
CONFIDENTIAL - SOPHOS INTERNAL AND CHANNEL PARTNERS ONLY - DO NOT REDISTRIBUTE
Other competitors
Intercept X for Carbon Black Palo Alto Kaspersky BlackBerry
Feature Comparison Server Endpoint Cortex XDR Hybrid Cloud
Security (Cylance) Protect
Single Console to protect Server, Endpoint, Mobile, Firewall, Email and Wi-Fi × × × ×
AWS/Azure Workload Discovery × × ×
MANAGE
Automatic Scanning Exclusions (e.g., Exchange, SQL Server) N/A × × ×
Virtualization: Thin Agent with Centralized Scanner × × ×
Web Filtering (Block malicious websites) × × ×
REDUCE
Web Control (Control access to potentially inappropriate sites) × × ×
ATTACK
SURFACE
Application Whitelisting (Server Lockdown) ×
Category Based Application Control × × ×
PREVENT Patch Assessment × × × ×
Machine Learning Malware Protection ×
BEFORE Exploit Prevention
IT RUNS
AMSI Support ×
Data Loss Prevention × × × ×
Anti-Hacker (e.g., Credential Theft and Code Cave protection) × × ×
Detection but Detection but
Ransomware protection (Behavior detection and rollback) × no rollback no rollback
DETECT
Disk and Boot Record Protection × × × ×
File Integrity Monitoring (FIM) / Change Monitoring × ×
Synchronized Security (Out of the box integration with firewall) × Partial × ×
Threat Chain Visualization × × × ×
RESPOND
Threat Hunting × × × ×
Managed Detection and Response (MDR) service $ $ $ $ $
Asset Inventory across multi-cloud providers × $ (Prisma Cloud) ×
Cloud Security Configuration Assessment – Daily/On-demand scans × $ -“- × ×
Posture Management
(CSPM) Anomaly Detection – Outbound network traffic and user login behavior × $ -“- × ×
Compliance Policies – CIS × $ -“- × ×
The information in this document is based on Sophos’s interpretation of data publicly available as of the date it was prepared. Other companies named in the presentation had no part in its preparation. The information contained in this comparison may be incomplete JULY 2024
or inaccurate and is subject to change. The information is intended for informational purposes only and is not intended to be relied upon in making any purchase decision. The information is provided "as is" without warranties of any kind either expressed or implied.
This document is Sophos confidential information. Page 7 of 7
Copyright 2024 Sophos Group. All Rights Reserved.