">
TechMoran
  • About Us
  • Deals
  • Jobs
  • Motoring
    • Money
  • Pitch Your Startup
  • Submit Your Post
  • Freelance Gigs
  • Travel
  • Men’s Corner
  • Dating
Sunday, January 24, 2021
  • Startups
  • Reviews
  • Insider
    • Obituaries
  • Business
  • Women
  • Blockchain
  • Columnists
  • Hacks & Facts
    • How To
  • Editions
    • US Edition
    • India Edition
    • MENA Edition
    • Asia Edition
    • Europe Edition
    • International Edition
No Result
View All Result
TechMoran
">
Home Columnists

Sophos Introduces Predictive Protection in Intercept X with Advanced Deep Learning

Milcah Lukhanyu by Milcah Lukhanyu
3 years ago
in Columnists
8 min read
0

 

Sophos today announced the availability of Intercept X with malware detection powered by advanced deep learning neural networks. Combined with new active-hacker mitigation, advanced application lockdown, and enhanced ransomware protection, this latest release of the next-generation endpoint protection delivers previously unseen levels of detection and prevention.

“Predictive protection is the future of IT security. Sophos has taken a huge step forward by bringing deep learning neural networks into the industry leading exploit and ransomware protection of Intercept X,” said Dan Schiappa, senior vice president and general manager of products at Sophos. “Being able to protect against the next unknown attack instead of waiting for it to arrive will change the way IT operations in every organization can protect their users and assets. Intercept X can bring the most advanced next-generation protection to any organization, regardless of their current strategy.”

New features in Intercept X include:

Deep Learning Malware Detection

  • Deep learning model detects known and unknown malware and potentially unwanted applications (PUAs) before they execute, without relying on signatures
  • The model is less than 20MB and requires infrequent updates.

Active Adversary Mitigations

  • Credential theft protection – Preventing theft of authentication passwords and hash information from memory, registry, and persistent storage, as leveraged by such attacks as Mimikatz
  • Code cave utilization – Detects the presence of code deployed into another application, often used for persistence and antivirus avoidance
  • APC protection – Detects abuse of Asynchronous Procedure Calls (APC) often used as part of the AtomBombing code injection technique and more recently used as the method of spreading the WannaCry worm and NotPetya wiper via EternalBlue and DoublePulsar (adversaries abuse these calls to get another process to execute malicious code)

New and Enhanced Exploit Prevention Techniques

Related posts

Which Tech Companies Are Employee Owned and Why?

January 22, 2021
0

Avoid Biggest Mistakes Often Made By New Poker Players

January 18, 2021
0

Growing Kenyan entrepreneurship – the digital programmes and projects that are shaping the future

January 13, 2021
0

5 Ways to Make Your Office Space Appear More Professional

December 21, 2020
0
  • Malicious process migration – Detects remote reflective DLL injection used by adversaries to move between processes running on the system
  • Process privilege escalation – Prevents a low-privilege process from being escalated to a higher privilege, a tactic used to gain elevated system access

Enhanced Application Lockdown

  • Browser behavior lockdown – Intercept X prevents the malicious use of PowerShell from browsers as a basic behavior lockdown
  • HTA application lockdown – HTML applications loaded by the browser will have the lockdown mitigations applied as if they were a browser

Deep learning is the latest evolution of machine learning. It delivers a massively scalable detection model that is able to learn the entire observable threat landscape. With the ability to process hundreds of millions of samples, deep learning can make more accurate predictions at a faster rate with far fewer false-positives when compared to traditional machine learning.

This new version of Sophos Intercept X also includes innovations in anti-ransomware and exploit prevention, and active-hacker mitigations such as credential theft protection. As anti-malware has improved, attacks have increasingly focused on stealing credentials in order to move around systems and networks as a legitimate user, and Intercept X detects and prevents this behavior. Deployed through the cloud-based management platform Sophos Central, Intercept X can be installed alongside existing endpoint security software from any vendor, immediately boosting endpoint protection. When used with the Sophos XG Firewall, Intercept X can introduce synchronized security capabilities to further enhance protection.

First launched in September 2016, Intercept X has been proven in tens of thousands of organizations worldwide. Pricing and licensing details are available from registered Sophos channel partners worldwide.

 

Readers 1,626

Share

  • Click to share on Telegram (Opens in new window)
  • More
  • Click to share on Tumblr (Opens in new window)
  • Click to print (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Pinterest (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Pocket (Opens in new window)

Like this:

Like Loading...

Related

Milcah Lukhanyu

Milcah Lukhanyu

Milcah Lukhanyu covers daily news briefs at TechMoran. She is the person who will probably read your press release and get the story out of it or totally trash it. Send tips to [email protected]

Related Posts

Columnists

Which Tech Companies Are Employee Owned and Why?

January 22, 2021
0
Columnists

Avoid Biggest Mistakes Often Made By New Poker Players

January 18, 2021
0
Columnists

Growing Kenyan entrepreneurship – the digital programmes and projects that are shaping the future

January 13, 2021
0
Columnists

5 Ways to Make Your Office Space Appear More Professional

December 21, 2020
0
Columnists

Common VPN myths debunked

December 18, 2020
0
Columnists

Best File Recovery Software for macOS Big Sur

December 14, 2020
0
Bitcoin

How Online Gaming Is Pushing a Wider Bitcoin and Crypto Adoption

December 14, 2020
0
Columnists

2021 Upcoming Mobile Games

December 14, 2020
0

https://bit.ly/2VOxuoBhttps://bit.ly/2VOxuoBhttps://bit.ly/2VOxuoB
ADVERTISEMENT

Join our Mailing List

Loading

Recent Posts

Finnfund & Norfund double Starsight’s funding to $20 million for Ghana expansion

January 23, 2021

African tech startup funding passes $700m in 2020 despite COVID-19

January 23, 2021
Toshiba

Chrome Now Helps You Change Weak Passwords

January 23, 2021
Toshiba

Shoppable Ad Formats Are Coming Soon To Youtube

January 23, 2021

Hero MotoCorp Surpasses the Monumental 100M Cumulative Production Milestone

January 23, 2021
">
">

Follow Us

">

There are many sites out there focused on blowing off some steam, from funny entertainment to thrilling experiences like playing online, in some cases online gaming could grant you the chance to win extra money. We came across rocketpot.io while browsing for a good btc casino online and it left us a very good impression with their wide variety of games and crypto offering.

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy

© 2019 Moran Media Group - All rights reserved TechMoran.

No Result
View All Result
  • Startups
  • Reviews
  • Insider
    • Obituaries
  • Business
  • Women
  • Blockchain
  • Columnists
  • Hacks & Facts
    • How To
  • Editions
    • US Edition
    • India Edition
    • MENA Edition
    • Asia Edition
    • Europe Edition
    • International Edition

© 2019 Moran Media Group - All rights reserved TechMoran.

Login to your account below

Forgotten Password? Sign Up

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.
%d bloggers like this: