{"id":31,"date":"2022-05-10T10:51:07","date_gmt":"2022-05-10T13:51:07","guid":{"rendered":"https:\/\/fortesecurity.com.br\/?page_id=31"},"modified":"2022-11-01T14:17:52","modified_gmt":"2022-11-01T17:17:52","slug":"endpoint-protection-sophos-interceptx","status":"publish","type":"page","link":"https:\/\/fortesecurity.com.br\/en\/solucoes\/security\/endpoint-protection-sophos-interceptx\/","title":{"rendered":"Endpoint Protection Sophos InterceptX"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"31\" class=\"elementor elementor-31\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-25ddd32 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"25ddd32\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeInDown&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-42863ce\" data-id=\"42863ce\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c7a29b4 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"c7a29b4\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:500}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Endpoint Protection Sophos InterceptX<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-09fb271 elementor-icon-list--layout-inline elementor-align-center elementor-list-item-link-full_width elementor-invisible elementor-widget elementor-widget-icon-list\" data-id=\"09fb271\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:1000}\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/fortesecurity.com.br\/en\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Home<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"\/en\/solucoes\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-right\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Solutions<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-right\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Security<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-right\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Endpoint Protection Sophos InterceptX<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4c53f4e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4c53f4e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6df2f54\" data-id=\"6df2f54\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-5430b13 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5430b13\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-c64a26c\" data-id=\"c64a26c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3a37a35 elementor-view-stacked elementor-position-inline-start elementor-shape-circle elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"3a37a35\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"41.998\" height=\"51.333\" viewbox=\"0 0 41.998 51.333\"><path id=\"Icon_metro-security\" data-name=\"Icon metro-security\" d=\"M27.427,3.856l-21,9.333v14c0,12.962,8.948,25.048,21,28,12.052-2.952,21-15.038,21-28v-14Zm0,25.643H43.76c-1.237,9.613-7.642,18.177-16.333,20.848V29.523H11.093v-13.3L27.427,8.966V29.5Z\" transform=\"translate(-6.428 -3.856)\" fill=\"#fff\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h2 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tSecurity &gt; Endpoint Protection\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h2>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-5ba7d59\" data-id=\"5ba7d59\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f027213 elementor-widget elementor-widget-image\" data-id=\"f027213\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"362\" height=\"147\" src=\"https:\/\/fortesecurity.com.br\/wp-content\/uploads\/2022\/06\/logo__0015_sophos.png\" class=\"attachment-large size-large wp-image-1789\" alt=\"\" srcset=\"https:\/\/fortesecurity.com.br\/wp-content\/uploads\/2022\/06\/logo__0015_sophos.png 362w, https:\/\/fortesecurity.com.br\/wp-content\/uploads\/2022\/06\/logo__0015_sophos-300x122.png 300w, https:\/\/fortesecurity.com.br\/wp-content\/uploads\/2022\/06\/logo__0015_sophos-18x7.png 18w\" sizes=\"(max-width: 362px) 100vw, 362px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6daa796 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"6daa796\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5cfaed1\" data-id=\"5cfaed1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-45f15bb elementor-widget elementor-widget-heading\" data-id=\"45f15bb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Intercept X Advanced<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-172aa13 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"172aa13\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d7b7b88\" data-id=\"d7b7b88\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-76dadd6 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"76dadd6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-277d63e elementor-hidden-tablet elementor-hidden-mobile\" data-id=\"277d63e\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-00b6194 elementor-invisible\" data-id=\"00b6194\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeInRight&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-aadb6e9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"aadb6e9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-d446531\" data-id=\"d446531\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-079448f elementor-widget elementor-widget-text-editor\" data-id=\"079448f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Sophos Intercept X is the industry-leading endpoint security solution that reduces the attack surface and prevents attacks from occurring. Combining anti-exploit, anti-ransomware, deep learning AI, and control technology, it blocks attacks before they affect your systems. Intercept X uses a defense-in-depth approach to protect endpoints, rather than relying on a single security foundation.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ee66d3a elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"ee66d3a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Stops never-before-seen threats using Deep Learning AI<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Blocks ransomware and reverts affected files to their safe state<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Blocks vulnerability exploitation techniques used throughout the attack chain<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Reduces attack surface with application, device, and web control<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Perform threat hunting and security hygiene of IT operations with XDR<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Provides 24\/7 year-round security as a fully managed service<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Easy to deploy, configure, and maintain, even in remote work environments<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1b22384 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1b22384\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-820273e\" data-id=\"820273e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-31a3d08 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"31a3d08\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-fde6127 elementor-invisible\" data-id=\"fde6127\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeInRight&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-eb00264 elementor-widget elementor-widget-heading\" data-id=\"eb00264\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Intercept X Advanced<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-18776c1 elementor-widget elementor-widget-heading\" data-id=\"18776c1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Other benefits:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bbdf8dc elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bbdf8dc\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-129ba82\" data-id=\"129ba82\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-0a6b254 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"0a6b254\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-76c9945\" data-id=\"76c9945\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-63a55d7 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"63a55d7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" width=\"96\" height=\"121\" src=\"https:\/\/fortesecurity.com.br\/wp-content\/uploads\/2022\/05\/ixa-ob-ico01.png\" class=\"attachment-full size-full wp-image-600\" alt=\"\" srcset=\"https:\/\/fortesecurity.com.br\/wp-content\/uploads\/2022\/05\/ixa-ob-ico01.png 96w, https:\/\/fortesecurity.com.br\/wp-content\/uploads\/2022\/05\/ixa-ob-ico01-10x12.png 10w\" sizes=\"(max-width: 96px) 100vw, 96px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Blocks unknown threats<\/h3><p class=\"elementor-image-box-description\">Intercept X\u2019s deep learning AI technology excels at detecting and blocking malware, even never-before-seen malware, by analyzing file attributes extracted from millions of samples to identify threats, without the need for signatures.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-03de6ed\" data-id=\"03de6ed\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-869ca23 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"869ca23\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" width=\"96\" height=\"121\" src=\"https:\/\/fortesecurity.com.br\/wp-content\/uploads\/2022\/05\/ixa-ob-ico02.png\" class=\"attachment-full size-full wp-image-601\" alt=\"\" srcset=\"https:\/\/fortesecurity.com.br\/wp-content\/uploads\/2022\/05\/ixa-ob-ico02.png 96w, https:\/\/fortesecurity.com.br\/wp-content\/uploads\/2022\/05\/ixa-ob-ico02-10x12.png 10w\" sizes=\"(max-width: 96px) 100vw, 96px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Reduces the attack surface<\/h3><p class=\"elementor-image-box-description\">Control which applications and devices can operate in your environment, and block malicious websites and potentially unwanted applications (PUAs) before they reach users or devices.\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-c5ae1c0\" data-id=\"c5ae1c0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-21fbdf0 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"21fbdf0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"95\" height=\"121\" src=\"https:\/\/fortesecurity.com.br\/wp-content\/uploads\/2022\/05\/ixa-ob-ico03.png\" class=\"attachment-full size-full wp-image-592\" alt=\"\" srcset=\"https:\/\/fortesecurity.com.br\/wp-content\/uploads\/2022\/05\/ixa-ob-ico03.png 95w, https:\/\/fortesecurity.com.br\/wp-content\/uploads\/2022\/05\/ixa-ob-ico03-9x12.png 9w\" sizes=\"(max-width: 95px) 100vw, 95px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Direct management<\/h3><p class=\"elementor-image-box-description\">Intercept X is managed by Sophos Central, the cloud-based management platform for all Sophos solutions. A single pane of glass for all your products and devices makes it easy to deploy, configure, and manage your environment, even from remote work locations. <\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-33dfc61 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"33dfc61\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-b62c039\" data-id=\"b62c039\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3881877 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"3881877\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"96\" height=\"121\" src=\"https:\/\/fortesecurity.com.br\/wp-content\/uploads\/2022\/05\/ixa-ob-ico04.png\" class=\"attachment-full size-full wp-image-597\" alt=\"\" srcset=\"https:\/\/fortesecurity.com.br\/wp-content\/uploads\/2022\/05\/ixa-ob-ico04.png 96w, https:\/\/fortesecurity.com.br\/wp-content\/uploads\/2022\/05\/ixa-ob-ico04-10x12.png 10w\" sizes=\"(max-width: 96px) 100vw, 96px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Blocks ransomware<\/h3><p class=\"elementor-image-box-description\">Detects malicious encryption processes and blocks them before they can spread across the network, including those that act at system startup. All encrypted files are reverted to a safe state, allowing your company to continue operating without interruption and with minimal impact to your business. You get detailed information about the threat, including the root cause.\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-7b83b7e\" data-id=\"7b83b7e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6a2f905 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"6a2f905\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"96\" height=\"121\" src=\"https:\/\/fortesecurity.com.br\/wp-content\/uploads\/2022\/05\/ixa-ob-ico05.png\" class=\"attachment-full size-full wp-image-598\" alt=\"\" srcset=\"https:\/\/fortesecurity.com.br\/wp-content\/uploads\/2022\/05\/ixa-ob-ico05.png 96w, https:\/\/fortesecurity.com.br\/wp-content\/uploads\/2022\/05\/ixa-ob-ico05-10x12.png 10w\" sizes=\"(max-width: 96px) 100vw, 96px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Prevents vulnerability exploits<\/h3><p class=\"elementor-image-box-description\">Anti-exploit technology blocks exploitation techniques used by attackers to compromise devices, steal credentials, and distribute malware. By stopping techniques used throughout the attack chain, Intercept X keeps your organization safe from attacks.\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-ba4ff55\" data-id=\"ba4ff55\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d68bae0 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"d68bae0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"95\" height=\"121\" src=\"https:\/\/fortesecurity.com.br\/wp-content\/uploads\/2022\/05\/ixa-ob-ico06.png\" class=\"attachment-full size-full wp-image-599\" alt=\"\" srcset=\"https:\/\/fortesecurity.com.br\/wp-content\/uploads\/2022\/05\/ixa-ob-ico06.png 95w, https:\/\/fortesecurity.com.br\/wp-content\/uploads\/2022\/05\/ixa-ob-ico06-9x12.png 9w\" sizes=\"(max-width: 95px) 100vw, 95px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Synchronized security<\/h3><p class=\"elementor-image-box-description\">Sophos solutions work best together. For example, Intercept X and Sophos Firewall share data to automatically isolate compromised devices while cleaning, then allow network access once the threat is neutralized. All without requiring administrator intervention.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8fa796e elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"8fa796e\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-575f968\" data-id=\"575f968\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-97a37c9 elementor-widget elementor-widget-heading\" data-id=\"97a37c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Expert, AI-powered data<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d146725 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d146725\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-028213f\" data-id=\"028213f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-ee8c827 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"ee8c827\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-f333d41 elementor-invisible\" data-id=\"f333d41\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeInRight&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-ed2c981 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ed2c981\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-30a2485\" data-id=\"30a2485\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c17e583 elementor-widget elementor-widget-text-editor\" data-id=\"c17e583\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>By combining deep learning AI with the cybersecurity expertise of Forte experts, Intercept X offers organizations the best of both worlds, reflected in industry-leading threat intelligence.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9ca7a0d elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"9ca7a0d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>More intelligence: <\/b><br>Deep learning solutions process data through multiple layers of analysis, detecting malware that would go unnoticed by other traditional learning machines.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Scalability:<\/b><br> Deep learning technology can scale the analysis to hundreds of millions of additional samples. This is significant considering that 2.8 million new malware samples are analyzed every week.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>More technology:<\/b><br> Cybersecurity machine learning experts at the National Advanced Research Projects Agency (DARPA) created their Cyber \u200b\u200bGenome Program to uncover the \u201cDNA\u201d of malware and other cyber threats. This was the origin of what is now the algorithm built into Intercept X.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>More performance:<\/b><br> Incredibly fast, in less than 20 milliseconds, the technology is able to extract millions of features, conduct in-depth analysis and determine whether a file is benign or malicious. It all happens before the file is executed.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-131ebbf elementor-hidden-tablet elementor-hidden-mobile\" data-id=\"131ebbf\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5ed642a elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"5ed642a\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-66f5ded\" data-id=\"66f5ded\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4272caf elementor-widget elementor-widget-heading\" data-id=\"4272caf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Intercept X Advanced with XDR<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-dd07d3d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"dd07d3d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-d3e13bd\" data-id=\"d3e13bd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-4102fa9 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"4102fa9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-c1f00aa elementor-hidden-tablet elementor-hidden-mobile\" data-id=\"c1f00aa\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-38f22b7 elementor-widget elementor-widget-image\" data-id=\"38f22b7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"534\" src=\"https:\/\/fortesecurity.com.br\/wp-content\/uploads\/2022\/05\/programmer-hands-on-keyboard-network-security-1024x684.jpg\" class=\"attachment-large size-large wp-image-610\" alt=\"Programmer hands on keyboard, network security\" srcset=\"https:\/\/fortesecurity.com.br\/wp-content\/uploads\/2022\/05\/programmer-hands-on-keyboard-network-security-1024x684.jpg 1024w, https:\/\/fortesecurity.com.br\/wp-content\/uploads\/2022\/05\/programmer-hands-on-keyboard-network-security-300x200.jpg 300w, https:\/\/fortesecurity.com.br\/wp-content\/uploads\/2022\/05\/programmer-hands-on-keyboard-network-security-768x513.jpg 768w, https:\/\/fortesecurity.com.br\/wp-content\/uploads\/2022\/05\/programmer-hands-on-keyboard-network-security-1536x1025.jpg 1536w, https:\/\/fortesecurity.com.br\/wp-content\/uploads\/2022\/05\/programmer-hands-on-keyboard-network-security-18x12.jpg 18w, https:\/\/fortesecurity.com.br\/wp-content\/uploads\/2022\/05\/programmer-hands-on-keyboard-network-security.jpg 2000w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-e83b775\" data-id=\"e83b775\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-853fc96 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"853fc96\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-df3a6b6 elementor-invisible\" data-id=\"df3a6b6\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeInRight&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a0e67f6 elementor-widget elementor-widget-heading\" data-id=\"a0e67f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Extended detection and response<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b1705ba elementor-widget elementor-widget-text-editor\" data-id=\"b1705ba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Intercept X Advanced with XDR is a next-level endpoint protection solution that delivers greater accuracy and agility in finding threats to IT operations. It is an integrated security solution that detects potentially malicious activity through real-time device monitoring and endpoint data collection.<\/p><p>Additionally, it is a feature that uses this collected data to respond to these malicious actors, stopping breaches before they start.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d0005b4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d0005b4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-032de1b\" data-id=\"032de1b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-c7a20e2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c7a20e2\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-a9af36d\" data-id=\"a9af36d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8bc18c8 elementor-widget elementor-widget-heading\" data-id=\"8bc18c8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Does this solution solve your problem?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-230f389 elementor-widget__width-auto elementor-widget-mobile__width-inherit elementor-align-justify elementor-invisible elementor-widget elementor-widget-button\" data-id=\"230f389\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:2000}\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-float\" href=\"\/en\/contato\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Talk to a consultant<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-a400665 elementor-hidden-tablet elementor-hidden-mobile\" data-id=\"a400665\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Home Solu\u00e7\u00f5es Security Security > Endpoint Protection Intercept X Advanced O Sophos Intercept X \u00e9 a solu\u00e7\u00e3o de seguran\u00e7a de endpoint l\u00edder no setor que reduz a superf\u00edcie de ataque e previne a incid\u00eancia de ataques. Combinando anti-exploit, anti-ransomware, IA com Deep Learning e tecnologia de controle, ele bloqueia os ataques antes que afetem os [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":342,"parent":902,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-31","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Endpoint Protection Sophos InterceptX - Forte Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fortesecurity.com.br\/en\/solucoes\/security\/endpoint-protection-sophos-interceptx\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Endpoint Protection Sophos InterceptX - Forte Security\" \/>\n<meta property=\"og:description\" content=\"Home Solu\u00e7\u00f5es Security Security &gt; Endpoint Protection Intercept X Advanced O Sophos Intercept X \u00e9 a solu\u00e7\u00e3o de seguran\u00e7a de endpoint l\u00edder no setor que reduz a superf\u00edcie de ataque e previne a incid\u00eancia de ataques. Combinando anti-exploit, anti-ransomware, IA com Deep Learning e tecnologia de controle, ele bloqueia os ataques antes que afetem os [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fortesecurity.com.br\/en\/solucoes\/security\/endpoint-protection-sophos-interceptx\/\" \/>\n<meta property=\"og:site_name\" content=\"Forte Security\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForteSegurancadaInformacao\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-01T17:17:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/fortesecurity.com.br\/wp-content\/uploads\/2022\/05\/data-security-system-shield-protection-verification.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1427\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fortesecurity.com.br\\\/en\\\/solucoes\\\/security\\\/endpoint-protection-sophos-interceptx\\\/\",\"url\":\"https:\\\/\\\/fortesecurity.com.br\\\/en\\\/solucoes\\\/security\\\/endpoint-protection-sophos-interceptx\\\/\",\"name\":\"Endpoint Protection Sophos InterceptX - Forte Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fortesecurity.com.br\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/fortesecurity.com.br\\\/en\\\/solucoes\\\/security\\\/endpoint-protection-sophos-interceptx\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/fortesecurity.com.br\\\/en\\\/solucoes\\\/security\\\/endpoint-protection-sophos-interceptx\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/fortesecurity.com.br\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/data-security-system-shield-protection-verification.jpg\",\"datePublished\":\"2022-05-10T13:51:07+00:00\",\"dateModified\":\"2022-11-01T17:17:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fortesecurity.com.br\\\/en\\\/solucoes\\\/security\\\/endpoint-protection-sophos-interceptx\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fortesecurity.com.br\\\/en\\\/solucoes\\\/security\\\/endpoint-protection-sophos-interceptx\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/fortesecurity.com.br\\\/en\\\/solucoes\\\/security\\\/endpoint-protection-sophos-interceptx\\\/#primaryimage\",\"url\":\"https:\\\/\\\/fortesecurity.com.br\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/data-security-system-shield-protection-verification.jpg\",\"contentUrl\":\"https:\\\/\\\/fortesecurity.com.br\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/data-security-system-shield-protection-verification.jpg\",\"width\":2000,\"height\":1427,\"caption\":\"Data Security system Shield Protection Verification\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fortesecurity.com.br\\\/en\\\/solucoes\\\/security\\\/endpoint-protection-sophos-interceptx\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/fortesecurity.com.br\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Solu\u00e7\u00f5es\",\"item\":\"https:\\\/\\\/fortesecurity.com.br\\\/en\\\/solucoes\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Security\",\"item\":\"https:\\\/\\\/fortesecurity.com.br\\\/en\\\/solucoes\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Endpoint Protection Sophos InterceptX\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fortesecurity.com.br\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/fortesecurity.com.br\\\/en\\\/\",\"name\":\"Forte Security\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/fortesecurity.com.br\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fortesecurity.com.br\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/fortesecurity.com.br\\\/en\\\/#organization\",\"name\":\"Forte Security\",\"url\":\"https:\\\/\\\/fortesecurity.com.br\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/fortesecurity.com.br\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/fortesecurity.com.br\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/logo-azul.svg\",\"contentUrl\":\"https:\\\/\\\/fortesecurity.com.br\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/logo-azul.svg\",\"width\":234,\"height\":66,\"caption\":\"Forte Security\"},\"image\":{\"@id\":\"https:\\\/\\\/fortesecurity.com.br\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ForteSegurancadaInformacao\",\"https:\\\/\\\/www.instagram.com\\\/fortesecuritybr\\\/\",\"https:\\\/\\\/br.linkedin.com\\\/company\\\/forte-security\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Endpoint Protection Sophos InterceptX - Forte Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fortesecurity.com.br\/en\/solucoes\/security\/endpoint-protection-sophos-interceptx\/","og_locale":"en_US","og_type":"article","og_title":"Endpoint Protection Sophos InterceptX - Forte Security","og_description":"Home Solu\u00e7\u00f5es Security Security > Endpoint Protection Intercept X Advanced O Sophos Intercept X \u00e9 a solu\u00e7\u00e3o de seguran\u00e7a de endpoint l\u00edder no setor que reduz a superf\u00edcie de ataque e previne a incid\u00eancia de ataques. Combinando anti-exploit, anti-ransomware, IA com Deep Learning e tecnologia de controle, ele bloqueia os ataques antes que afetem os [&hellip;]","og_url":"https:\/\/fortesecurity.com.br\/en\/solucoes\/security\/endpoint-protection-sophos-interceptx\/","og_site_name":"Forte Security","article_publisher":"https:\/\/www.facebook.com\/ForteSegurancadaInformacao","article_modified_time":"2022-11-01T17:17:52+00:00","og_image":[{"width":2000,"height":1427,"url":"https:\/\/fortesecurity.com.br\/wp-content\/uploads\/2022\/05\/data-security-system-shield-protection-verification.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/fortesecurity.com.br\/en\/solucoes\/security\/endpoint-protection-sophos-interceptx\/","url":"https:\/\/fortesecurity.com.br\/en\/solucoes\/security\/endpoint-protection-sophos-interceptx\/","name":"Endpoint Protection Sophos InterceptX - Forte Security","isPartOf":{"@id":"https:\/\/fortesecurity.com.br\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fortesecurity.com.br\/en\/solucoes\/security\/endpoint-protection-sophos-interceptx\/#primaryimage"},"image":{"@id":"https:\/\/fortesecurity.com.br\/en\/solucoes\/security\/endpoint-protection-sophos-interceptx\/#primaryimage"},"thumbnailUrl":"https:\/\/fortesecurity.com.br\/wp-content\/uploads\/2022\/05\/data-security-system-shield-protection-verification.jpg","datePublished":"2022-05-10T13:51:07+00:00","dateModified":"2022-11-01T17:17:52+00:00","breadcrumb":{"@id":"https:\/\/fortesecurity.com.br\/en\/solucoes\/security\/endpoint-protection-sophos-interceptx\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fortesecurity.com.br\/en\/solucoes\/security\/endpoint-protection-sophos-interceptx\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/fortesecurity.com.br\/en\/solucoes\/security\/endpoint-protection-sophos-interceptx\/#primaryimage","url":"https:\/\/fortesecurity.com.br\/wp-content\/uploads\/2022\/05\/data-security-system-shield-protection-verification.jpg","contentUrl":"https:\/\/fortesecurity.com.br\/wp-content\/uploads\/2022\/05\/data-security-system-shield-protection-verification.jpg","width":2000,"height":1427,"caption":"Data Security system Shield Protection Verification"},{"@type":"BreadcrumbList","@id":"https:\/\/fortesecurity.com.br\/en\/solucoes\/security\/endpoint-protection-sophos-interceptx\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/fortesecurity.com.br\/en\/"},{"@type":"ListItem","position":2,"name":"Solu\u00e7\u00f5es","item":"https:\/\/fortesecurity.com.br\/en\/solucoes\/"},{"@type":"ListItem","position":3,"name":"Security","item":"https:\/\/fortesecurity.com.br\/en\/solucoes\/security\/"},{"@type":"ListItem","position":4,"name":"Endpoint Protection Sophos InterceptX"}]},{"@type":"WebSite","@id":"https:\/\/fortesecurity.com.br\/en\/#website","url":"https:\/\/fortesecurity.com.br\/en\/","name":"Strong Security","description":"","publisher":{"@id":"https:\/\/fortesecurity.com.br\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fortesecurity.com.br\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/fortesecurity.com.br\/en\/#organization","name":"Strong Security","url":"https:\/\/fortesecurity.com.br\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/fortesecurity.com.br\/en\/#\/schema\/logo\/image\/","url":"https:\/\/fortesecurity.com.br\/wp-content\/uploads\/2022\/05\/logo-azul.svg","contentUrl":"https:\/\/fortesecurity.com.br\/wp-content\/uploads\/2022\/05\/logo-azul.svg","width":234,"height":66,"caption":"Forte Security"},"image":{"@id":"https:\/\/fortesecurity.com.br\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForteSegurancadaInformacao","https:\/\/www.instagram.com\/fortesecuritybr\/","https:\/\/br.linkedin.com\/company\/forte-security"]}]}},"_links":{"self":[{"href":"https:\/\/fortesecurity.com.br\/en\/wp-json\/wp\/v2\/pages\/31","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fortesecurity.com.br\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/fortesecurity.com.br\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/fortesecurity.com.br\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/fortesecurity.com.br\/en\/wp-json\/wp\/v2\/comments?post=31"}],"version-history":[{"count":5,"href":"https:\/\/fortesecurity.com.br\/en\/wp-json\/wp\/v2\/pages\/31\/revisions"}],"predecessor-version":[{"id":2811,"href":"https:\/\/fortesecurity.com.br\/en\/wp-json\/wp\/v2\/pages\/31\/revisions\/2811"}],"up":[{"embeddable":true,"href":"https:\/\/fortesecurity.com.br\/en\/wp-json\/wp\/v2\/pages\/902"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fortesecurity.com.br\/en\/wp-json\/wp\/v2\/media\/342"}],"wp:attachment":[{"href":"https:\/\/fortesecurity.com.br\/en\/wp-json\/wp\/v2\/media?parent=31"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}