
So, that may be why Sophos shies away from calling the system a SIEM. As a computer-focused defense system, you wouldn’t expect the software to be looking at the activities on the network. Traffic detection under normal circumstances would be the remit of a network-based intrusion detection system.

However, the package’s activities include traffic monitoring. Sophos describes this IDS element as a HIPS – a host-based intrusion prevention system. This is an approach that has been adopted by many of Sophos’s old rivals in the traditional AV market, such as McAfee and Symantec. In order to address all of those critics who point out what AV cannot do, Sophos added intrusion detection to its Endpoint Protection package. This is the traditional AV method and Sophos held onto it. The AV is still there and it centers on a threat database, which is regularly updated with new malware signatures from the central Sophos Labs. The Sophos Intercept X Endpoint Protection system takes the best of the past and adds on the best of the present cybersecurity strategies.

Sophos Endpoint Protection competitors & alternatives.Sophos Endpoint Protection system requirements.You still need an AV and that’s the premise of the Sophos Endpoint Protection strategy. When you read down to the end of the thrusting presentations of shiny new vulnerability scanners and threat hunters, you will notice that these industry disruptors can detect problems but they can’t actually do anything about them. However, antivirus systems are not completely useless and they still play a role today in protecting endpoints.

It doesn’t prevent log file tampering and it doesn’t pay attention to the malicious use of valid software. Everyone will tell you that nowadays, blocking malware is the wrong way to secure an endpoint, it is the monitoring of events that really counts.ĪV can’t protect a network from advanced persistent threats. AI has taken over as the next big thing in cybersecurity. ‘Intrusion detection’ became a bigger headline than ‘malware detection’. Younger concepts have risen to the forefront and grabbed media attention over the past decade – all ready to point out the shortcomings of the AV formula. As the world moved on, AVs stuck to their tried and trusted formula. Antivirus systems have progressively become the granddaddy of cybersecurity.
