{"id":4049,"date":"2022-01-10T17:20:05","date_gmt":"2022-01-11T00:20:05","guid":{"rendered":"https:\/\/www.ngx-mx.com\/?page_id=4049"},"modified":"2025-12-26T13:49:29","modified_gmt":"2025-12-26T20:49:29","slug":"endpoint-security","status":"publish","type":"page","link":"https:\/\/www.ngxnetworks.com\/en\/endpoint-security\/","title":{"rendered":"Endpoint Security"},"content":{"rendered":"<p style=\"\">\n<h1 style=\"text-align: center;\"><span style=\"color: var(--tcb-skin-color-22);\">NGX<\/span><span style=\"color: rgb(43, 113, 167) !important; --tcb-applied-color: rgb(43, 113, 167) !important;\">Endpoint Security<\/span><\/h1>\n<ul>\n<li style=\"\"><span style=\"\"><span data-contrast=\"auto\" lang=\"EN-US\">Cloud-based endpoint protection<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/span><\/li>\n<li style=\"\"><span style=\"\"><span data-contrast=\"auto\" lang=\"EN-US\">Intelligent detection and response for Endpoint<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/span><\/li>\n<\/ul>\n<p><span style=\"\"><img decoding=\"async\" alt=\"\" data-id=\"3811\" width=\"105\" data-init-width=\"2500\" height=\"105\" data-init-height=\"2500\" title=\"icon_laptop_protected\" src=\"https:\/\/www.ngxnetworks.com\/wp-content\/uploads\/2021\/11\/icon_laptop_protected.png\" data-width=\"105\" data-height=\"105\" ml-m=\"0\" mt-m=\"-1.0589999999999975\" style=\"aspect-ratio: auto 2500 \/ 2500;\" loading=\"lazy\"><\/span><\/p>\n<h2 style=\"text-align: left;\"><span data-contrast=\"auto\" lang=\"EN-US\">Security that gives you peace of mind, the world\u2019s best Endpoint protection.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/h2>\n<p style=\"text-align: left;\"><strong>SOPHOS INTERCEPT X<\/strong><\/p>\n<h2><span data-contrast=\"none\" lang=\"EN-US\"><span data-ccp-parastyle=\"heading 2\">Discover what a deep learning neural network can do for you<\/span><\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/h2>\n<p lang=\"EN-US\"><span data-contrast=\"none\" lang=\"EN-US\">Deep Learning, an advanced form of Machine Learning, enables unmatched endpoint threat prevention, detecting both known and unknown malware without relying on signatures.&nbsp;<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p lang=\"EN-US\"><span data-contrast=\"none\" lang=\"EN-US\">This makes it smarter, scalable, and effective against unknown threats,&nbsp;since&nbsp;it uses Deep Learning to overcome security solutions that&nbsp;only use&nbsp;traditional Machine Learning or rely on signature-based detection.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<h2 style=\"text-align: center;\"><strong><span data-contrast=\"none\" lang=\"EN-US\"><span data-ccp-parastyle=\"heading 2\">Worldwide recognition Endpoint security<\/span><\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/strong><\/h2>\n<h6 style=\"text-align: center;\"><span data-contrast=\"none\" lang=\"EN-US\">Best Endpoint Security 2018\/2019\/2020<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/h6>\n<h6 style=\"text-align: center;\"><span data-contrast=\"none\" lang=\"EN-US\">Leader 2021<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/h6>\n<h6 style=\"text-align: center;\"><span data-contrast=\"none\" lang=\"EN-US\">4.8\/5 #1 Customer Rating Endpoint Protection Platforms<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/h6>\n<h6 style=\"text-align: center;\"><span data-contrast=\"none\" lang=\"EN-US\">Best Managed Security<\/span>&nbsp;<span data-contrast=\"none\" lang=\"EN-US\">Service 2020<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/h6>\n<h6 style=\"text-align: center;\"><span data-contrast=\"none\" lang=\"EN-US\">Best Production for<\/span>&nbsp;<span data-contrast=\"none\" lang=\"EN-US\">Small Business Endpoint<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/h6>\n<h6 style=\"text-align: center;\"><span data-contrast=\"none\" lang=\"EN-US\">#1 Exploit Protection<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/h6>\n<h6 style=\"text-align: center;\"><span data-contrast=\"none\" lang=\"EN-US\">Editor&#8217;s Choice Award<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/h6>\n<h6 style=\"text-align: center;\"><span data-contrast=\"none\" lang=\"EN-US\">Endpoint Protection #1,<\/span>&nbsp;<span data-contrast=\"none\" lang=\"EN-US\">Perfect Score<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/h6>\n<h6 style=\"text-align: center; color: var(--tcb-skin-color-22)  !important; --tcb-applied-color:var$(--tcb-skin-color-22)  !important;\"><span data-contrast=\"auto\" lang=\"EN-US\">Smart detection and response<\/span>&nbsp;<span data-contrast=\"auto\" lang=\"EN-US\">for Endpoint (EDR)<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/h6>\n<p style=\"text-align: center;\"><span data-contrast=\"auto\" lang=\"EN-US\">Designed for security analysts and IT administrators looking for threats to provide accurate remote response to security problems<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<h6 style=\"text-align: center;\"><span data-contrast=\"auto\" lang=\"EN-US\">Extended detection<\/span>&nbsp;<span data-contrast=\"auto\" lang=\"EN-US\">and response (XDR)<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/h6>\n<p style=\"text-align: center;\"><span data-contrast=\"auto\" lang=\"EN-US\">Go beyond the endpoint, XDR uses data sources from the net, cloud, email and mobile devices to give you a broad view of your cybersecurity.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<h6 style=\"text-align: center;\"><span data-contrast=\"auto\" lang=\"EN-US\">Managed Threat Response<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/h6>\n<p style=\"text-align: center;\"><span data-contrast=\"auto\" lang=\"EN-US\">An elite team conducts a proactive threat search, initiating actions to remotely contain and neutralize cyberattacks, advising you to avoid recurring incidents.<\/span><\/p>\n<h3 style=\"text-align: center;\"><span data-contrast=\"none\" lang=\"EN-US\"><span data-ccp-parastyle=\"heading 2\">Learn more about the features that give you the most security<\/span><\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/h3>\n<p style=\"text-align: center;\"><span data-contrast=\"none\" lang=\"EN-US\">Endpoint protection meeting the highest standards<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span><img decoding=\"async\" alt=\"\" data-id=\"3871\" width=\"64\" data-init-width=\"363\" height=\"59\" data-init-height=\"333\" title=\"EDR\" src=\"https:\/\/www.ngxnetworks.com\/wp-content\/uploads\/2021\/11\/EDR.png\" data-width=\"64\" data-height=\"59\" style=\"aspect-ratio: auto 363 \/ 333;\" loading=\"lazy\"><\/span><\/p>\n<h4 style=\"\"><span data-contrast=\"none\" lang=\"EN-US\"><span data-ccp-parastyle=\"heading 3\">Endpoint Detection and Response (EDR)<\/span><\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/h4>\n<p style=\"\"><span data-contrast=\"none\" lang=\"EN-US\">Easily see which computers may have been affected, thanks to the automatic detection of potential threats, you can determine which&nbsp;to prioritize.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span><img decoding=\"async\" alt=\"Deteccion de respuesta ampliada\" data-id=\"3873\" width=\"64\" data-init-width=\"363\" height=\"59\" data-init-height=\"333\" title=\"XDR\" src=\"https:\/\/www.ngxnetworks.com\/wp-content\/uploads\/2021\/11\/XDR.png\" data-width=\"64\" data-height=\"59\" style=\"aspect-ratio: auto 363 \/ 333;\" loading=\"lazy\"><\/span><\/p>\n<h4 style=\"\"><span data-contrast=\"none\" lang=\"EN-US\"><span data-ccp-parastyle=\"heading 3\">Extended Detection and Response (XDR)<\/span><\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/h4>\n<p style=\"\"><span data-contrast=\"none\" lang=\"EN-US\">We incorporate data sources between products to gain even more visibility, going even beyond your endpoints allowing you an expanded response.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span><img decoding=\"async\" alt=\"antiransomware\" data-id=\"3875\" width=\"64\" data-init-width=\"363\" height=\"59\" data-init-height=\"333\" title=\"antiransomware\" src=\"https:\/\/www.ngxnetworks.com\/wp-content\/uploads\/2021\/11\/antiransomware.png\" data-width=\"64\" data-height=\"59\" style=\"aspect-ratio: auto 363 \/ 333;\" loading=\"lazy\"><\/span><\/p>\n<h4 style=\"\"><span data-contrast=\"none\" lang=\"EN-US\"><span data-ccp-parastyle=\"heading 3\">Protection against ransomware attacks<\/span><\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/h4>\n<p style=\"\"><span data-contrast=\"none\" lang=\"EN-US\">Advanced file protection against ransomware, through automatic file recovery and behavior analysis to stop ransomware and master boot attacks.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span><img decoding=\"async\" alt=\"deep_learning\" data-id=\"3877\" width=\"64\" data-init-width=\"363\" height=\"59\" data-init-height=\"333\" title=\"deep_learning\" src=\"https:\/\/www.ngxnetworks.com\/wp-content\/uploads\/2021\/11\/deep_learning.png\" data-width=\"64\" data-height=\"59\" style=\"aspect-ratio: auto 363 \/ 333;\" loading=\"lazy\"><\/span><\/p>\n<h4 style=\"\"><span data-contrast=\"none\" lang=\"EN-US\"><span data-ccp-parastyle=\"heading 3\">Deep Learning Technology<\/span><\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/h4>\n<p style=\"\"><span data-contrast=\"none\" lang=\"EN-US\">Detect known and unknown malware without the need for signatures. Acting in a predictive rather than reactive way.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span><img decoding=\"async\" alt=\"prevencion de exploits\" data-id=\"3879\" width=\"64\" data-init-width=\"363\" height=\"59\" data-init-height=\"333\" title=\"exploits\" src=\"https:\/\/www.ngxnetworks.com\/wp-content\/uploads\/2021\/11\/exploits.png\" data-width=\"64\" data-height=\"59\" style=\"aspect-ratio: auto 363 \/ 333;\" loading=\"lazy\"><\/span><\/p>\n<h4 style=\"\"><span data-contrast=\"none\" lang=\"EN-US\"><span data-ccp-parastyle=\"heading 3\">Exploit prevention<\/span><\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/h4>\n<p style=\"\"><span style=\"font-size: 16px;\"><span data-contrast=\"none\" lang=\"EN-US\">Repel attackers by blocking exploits and the techniques they use to distribute malware, steal credentials, and exclude arrest.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/span><\/p>\n<p><span><img decoding=\"async\" alt=\"Managed Threat Response\" data-id=\"3881\" width=\"64\" data-init-width=\"363\" height=\"59\" data-init-height=\"333\" title=\"MTR\" src=\"https:\/\/www.ngxnetworks.com\/wp-content\/uploads\/2021\/11\/MTR.png\" data-width=\"64\" data-height=\"59\" style=\"aspect-ratio: auto 363 \/ 333;\" loading=\"lazy\"><\/span><\/p>\n<h4 style=\"\"><span data-contrast=\"none\" lang=\"EN-US\"><span data-ccp-parastyle=\"heading 3\">Managed Threat Response<\/span><\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/h4>\n<p style=\"\"><span data-contrast=\"none\" lang=\"EN-US\">A team of top-level threat hunters and response experts who take specific measures on your behalf to neutralize even the most sophisticated threats.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span><img decoding=\"async\" alt=\"\" data-id=\"3883\" width=\"64\" data-init-width=\"363\" height=\"59\" data-init-height=\"333\" title=\"adversarios\" src=\"https:\/\/www.ngxnetworks.com\/wp-content\/uploads\/2021\/11\/adversarios.png\" data-width=\"64\" data-height=\"59\" style=\"aspect-ratio: auto 363 \/ 333;\" loading=\"lazy\"><\/span><\/p>\n<h4 style=\"\"><span data-contrast=\"none\" lang=\"EN-US\"><span data-ccp-parastyle=\"heading 3\">Active adversary mitigations<\/span><\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/h4>\n<p style=\"\"><span data-contrast=\"none\" lang=\"EN-US\">Prevention of credential theft as well as the detection of malicious traffic and the mitigation of active adversaries, which prevents persistence on the computers.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span><img decoding=\"async\" alt=\"Administracion central\" data-id=\"3885\" width=\"64\" data-init-width=\"363\" height=\"59\" data-init-height=\"333\" title=\"administracion_centralizada\" src=\"https:\/\/www.ngxnetworks.com\/wp-content\/uploads\/2021\/11\/administracion_centralizada.png\" data-width=\"64\" data-height=\"59\" style=\"aspect-ratio: auto 363 \/ 333;\" loading=\"lazy\"><\/span><\/p>\n<h4 style=\"\"><span data-contrast=\"none\" lang=\"EN-US\"><span data-ccp-parastyle=\"heading 3\">Centralized administration<\/span><\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/h4>\n<p style=\"\"><span style=\"font-size: 16px;\"><span data-contrast=\"none\" lang=\"EN-US\">Through a central management platform, you can manage your protection for Endpoint, EDR, XDR, investigating, creating and deploying policies.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/span><\/p>\n<p><span><img decoding=\"async\" alt=\"seguridad sincronizada\" data-id=\"3887\" width=\"64\" data-init-width=\"363\" height=\"59\" data-init-height=\"333\" title=\"seguridad_sincronizada\" src=\"https:\/\/www.ngxnetworks.com\/wp-content\/uploads\/2021\/11\/seguridad_sincronizada.png\" data-width=\"64\" data-height=\"59\" style=\"aspect-ratio: auto 363 \/ 333;\" loading=\"lazy\"><\/span><\/p>\n<h4 style=\"\"><span data-contrast=\"none\" lang=\"EN-US\"><span data-ccp-parastyle=\"heading 3\">Synchronized Security<\/span><\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/h4>\n<p style=\"\"><span data-contrast=\"none\" lang=\"EN-US\">Our solutions work together, share data and initiate response actions automatically.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<h1 style=\"text-align: left;\"><span data-contrast=\"none\" lang=\"EN-US\"><span data-ccp-parastyle=\"heading 1\">Strengthen your defenses with <\/span><\/span><span data-contrast=\"none\" lang=\"EN-US\"><span data-ccp-parastyle=\"heading 1\">Endpoint &amp; Firewall synchronized<\/span><\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/h1>\n<ul>\n<li style=\"\"><span style=\"\"><span data-contrast=\"none\" lang=\"EN-US\">Better protection against advanced threats<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/span><\/li>\n<li style=\"\"><span style=\"\"><span data-contrast=\"none\" lang=\"EN-US\">Automatically isolate infected computers<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/span><\/li>\n<li style=\"\"><span style=\"\"><span data-contrast=\"none\" lang=\"EN-US\">Clean malware instantly<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/span><\/li>\n<li style=\"\"><span style=\"\"><span data-contrast=\"none\" lang=\"EN-US\">Get 100% visibility into all the applications on your network<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559731&quot;:0,&quot;335559737&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/span><\/li>\n<\/ul>\n<h2 style=\"\">Do you want to speak to an advisor?<\/h2>\n","protected":false},"excerpt":{"rendered":"<p>NGXEndpoint Security Cloud-based endpoint protection&nbsp; Intelligent detection and response for Endpoint&nbsp; Security that gives you peace of mind, the world\u2019s best Endpoint protection.&nbsp; SOPHOS INTERCEPT X Discover what a deep learning neural network can do for you&nbsp; Deep Learning, an advanced form of Machine Learning, enables unmatched endpoint threat prevention, detecting both known and unknown [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-4049","page","type-page","status-publish","hentry","post-wrapper","thrv_wrapper"],"_links":{"self":[{"href":"https:\/\/www.ngxnetworks.com\/en\/wp-json\/wp\/v2\/pages\/4049","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ngxnetworks.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ngxnetworks.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ngxnetworks.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ngxnetworks.com\/en\/wp-json\/wp\/v2\/comments?post=4049"}],"version-history":[{"count":6,"href":"https:\/\/www.ngxnetworks.com\/en\/wp-json\/wp\/v2\/pages\/4049\/revisions"}],"predecessor-version":[{"id":6160,"href":"https:\/\/www.ngxnetworks.com\/en\/wp-json\/wp\/v2\/pages\/4049\/revisions\/6160"}],"wp:attachment":[{"href":"https:\/\/www.ngxnetworks.com\/en\/wp-json\/wp\/v2\/media?parent=4049"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}