Sophos Intercept X Endpoint Review
November 05, 2021

Sophos Intercept X Endpoint Review

Ash Patel | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Overall Satisfaction with Sophos Intercept X

We are in the healthcare industry and need to provide security for our users from malicious cyber attacks. These attacks include malware, viruses and ransomware. We have deployed the agent for all our users to ensure they are protected from the bad guys. Sophos Intercept X also has a data loss prevention component that allows us to monitor and detect when users are sharing information insecurely.
  • virus scanning
  • malware detection
  • Data loss prevention
  • add phishing scanning
  • virus protection
  • ransomware protection
  • malware protection
  • Positive impact is reduced the number of virus on company computers
  • Intercept X actively scans for any DLP
  • Intercept X also ensures our systems are scanned and clean of any malware
I personally found Sophos Intercept X GUI to be easy to use. The agent is easy to deploy on client machines and runs in the background silently. It has a very good virus, malware scan engine that picks out a high percentage of malicious software. The price was also very competitive to what is out in industry.

Do you think Sophos Intercept X delivers good value for the price?

Yes

Are you happy with Sophos Intercept X's feature set?

Yes

Did Sophos Intercept X live up to sales and marketing promises?

Yes

Did implementation of Sophos Intercept X go as expected?

Yes

Would you buy Sophos Intercept X again?

Yes

Sophos Intercept X is well suited for ensuring endpoints are secure from viruses, ransomeware, exploites and data loss prevention. Our Post COVID world requires many of our users to still work remotely. Some work in public spaces and unsecure networks. Having Sophos Intercept X helps ensure our company resources are safe and our users are not exposed to malicious software.

Sophos Intercept X Feature Ratings

Anti-Exploit Technology
9
Endpoint Detection and Response (EDR)
9
Centralized Management
9
Infection Remediation
9
Malware Detection
9