Specifications include, but are not limited to: 1. Central Intercept X Advanced for endpoint and server a. Central Intercept X Advanced is the industry’s most comprehensive endpoint protection built to stop the widest range of threats. Includes multiple policies, control capabilities (Web, Peripheral, Application, DLP) and threat cases. b. Central Intercept X Advanced for Server is the industry’s most comprehensive server protection built to stop the widest range of threats. Includes multiple policies, control capabilities. 2. Central Intercept X Advanced with XDR for endpoint and server a. Central Intercept X Advanced with Extended Detection and Response (XDR) is built for both cybersecurity analysts and IT administrators. Includes all features in Central Intercept X Advanced, as well as additional, powerful features for detection and remediation. Ask and answer business critical IT operations and threat hunting questions with Live Discover and respond remotely with Live Response. Includes 30 days of storage in the Sophos Data Lake and enables queries across the data collected from any Sophos XDR-ready product. b. Central Intercept X Advanced for Server with Extended Detection and Response (XDR) is built for both cybersecurity analysts and IT administrators. Includes all features in Central Intercept X Advanced for Server, as well as additional, powerful features for detection and remediation. Ask and answer business critical IT operations and threat hunting questions with Live Discover and respond remotely with Live Response. Includes 30 days of storage in the Sophos Data Lake and enables queries across the data collected from any Sophos XDR-ready product. 3. Central Disk Encryption a. Includes: Management of Full Disk Encryption in Sophos Central. Supports BitLocker on Windows and FileVault on macOS. Self-help recovery with Sophos Central Self-Service portal 4. Central Email Advanced a. Includes: Email threat protection: Mailflow Rule integration and post-delivery protection for Microsoft 365, phishing impersonation protection, cloud sandboxing, state-of-the-art machine learning, URL protection, SPF, DKIM and DMARC sender authentication. Data loss prevention: Flexible DLP and Content Control Policies with integrated encryption (TLS, push-based, and S/MIME). 5. Phish Threat a. Includes: Managed from Sophos Central, Phish Threat includes the Campaign Builder, Attack Templates, Interactive Training Modules, and a reporting dashboard for all users registered with the organization’s email domain.