| |
|
| Item number: CIEN7-114697981 Manufacturer no.: CIXE0U36AENCCU EAN/GTIN: n/a |
| |
|
| | |
| Intercept X Essentials and Intercept X Essentials for Server are new licenses that deliver the industry leading protection of Intercept X, with reduced control and management capabilities.
Intercept X Essentials and Intercept X Essentials for Server are ideal for small organizations that want the very best protection, from a single policy, but don’t require all of the control and management capabilities. If a customer requires multiple, configurable policies or capabilities such as peripheral control then Intercept X Advanced/ Intercept X Advanced for Server or higher should be positioned.
Multiple policies Customers must use the base policy.
Peripheral Control Customers cannot restrict what devices users plug in.
Controlled Updates Customers cannot delay updates and choose when to deploy them.
Web Control Customers cannot block users from accessing inappropriate websites.
Application Control Customers cannot control which types of applications can be installed and run.
Threat Cases Customers don’t have access to threat cases which show what happened during an incident.
File Integrity Monitoring (FIM) Customers cannot monitor critical files on their servers for attempts at tampering
Cloud Security Posture Management (CSPM) Customers cannot see their wider cloud environment such as serverless functions and databases.
Server Lockdown Customers cannot lock down their servers to a baseline setup. More information: Features | Distribution type | Download | License | Type | Antivirus security | | Software type | Competitive Upgrade | | License quantity | 1 license(s) | | License term in months | 36 month(s) | | License level purchase required | 100 - 199 license(s) |
|
| | |
| | | |
| Other search terms: Sophos licenses, Sophos license, virus scanner, virus, anti-virus, anti virus, security, antispam, anti-spam, Content Security, internet security, antivirus, security software, security management, access control, firewall, proxy |
| | |
| |