Sophos Intercept X Features
Encryption (6)
Email Encryption
Encrypts the content of emails and their attachments.
Messaging Encryption
Encrypts messages being sent via text or within an application.
File Transfer Encryption
Protects data with within or as it leaves your secure or local network.
Data Encryption
Provide a level of encryption of data in transit, protecting sensitive data while it lives in the backup application.
Document Encryption
Provides a level of encryption for text documents.
Full-Disk Encryption
Encrypts entire device to secure data in case it is lost or stolen.
Compliance (5)
Authentication
Allows administrators to set multi-factor authentication requirements including tokens, keys, or sms messaging
Policy Enforcement
Abilities to set standards for database security and risk management.
Access Management
Allows administrators to set user access privileges to permit approved parties to access sensitive data.
At-Risk Analysis
Uses machine learning to identify at-risk data.
DLP Configuration
Offers data loss prevention tools to protect data from leaving the environments it is allowed to.
Management (4)
Backup
Stores data remotely, on-premise, or in cloud databases in case of recovery during disaster.
Recovery
Decrypts datasets or files or allows users access to a backup database for reintegration.
File Management
Allows administrators to set levels of encryption for file types. Allows administrators to decide which files to encrypt.
Anomaly Detection
Monitors activity within networks and alerts administrators when unusual activity occurs.
Data Protection (7)
Sensitive Data Discovery
Includes funcationality to automatically discover and classify sensitive and other defined data.
Structured and Unstructured Data
Can protect both structured and unstructured data using automated discovery tools.
Encryption
Includes encryption methods to protect data.
Persistent Protection
Protects data at rest, in transit, and in use.
Data Masking
Provides data masking functionality that hides specific data within a dataset based on the data's specific use policies.
Data Governance and Access Management
Provides policies and access controls to ensure the data is only handled by permisssioned users and processes.
Audit and Reporting
Includes audit and reporting functions to know exactly what actions have been taken on data, such as who has accessed it and when.
Usability (3)
Visualization
Offers tools to help administrators visualize the flow of data, whether that be processes or data flows.
AI Algorithyms
Offers machine learning to locate data security risks and make recommendations on how to mitigate those risks.
Cross-Platforms
Allows data to move across multiple platform types and remain protected.





