
CIS Critical Security Controls are essential for your security
Sophos can help.
Boundary defense
Get advanced protection from hacks and attacks with next-gen IPS in Sophos Firewall. Prevent threats or hackers from spreading to other systems, stealing data, or communicating back to the host with the Lateral Movement Protection feature. Monitor and detect drift in configuration standards, and prevent accidental or malicious changes in resource configuration with Sophos Cloud Optix.
Malware defense
Prevent, detect, and remediate threats across all devices and platforms with Sophos Intercept X and Intercept X for Server. Identify and automatically stop the latest known and unknown threats from getting on your network with Sophos Firewall. Sophos Sandboxing inspects and blocks executables and documents with executable content before the file reaches your user. Get threat hunting and remediation as a fully-managed 24/7 service delivered by experts with Sophos Managed Threat Response.

Data protection
Protect your data on lost or stolen devices with full disk encryption for Windows and macOS from Sophos Encryption. Validate user identity and device health before granting access to applications and data with Sophos ZTNA. Proactively identify shared storage services and databases without encryption enabled or exposed ports, and remediate to protect these services and data at rest with Sophos Cloud Optix. Automatically deny access to sensitive data in case of a compromised device with Sophos Mobile.
Incident response and management
Get 24/7 threat hunting, detection and response delivered by an expert team as a fully-managed service with Sophos Managed Threat Response. Get assistance quickly to identify and neutralize active threats against your organization delivered by an expert team of incident responders – whether you are a Sophos customer or not – with Sophos Emergency Incident Response.


Read the Compliance Card for more details on how Sophos solutions help your efforts to stay compliant.
CIS Critical Security Controls: A Refresher
The CIS Critical Security Controls (previously known as the SANS Top 20 security controls), developed by the Center for Internet Security, provide a catalog of prioritized guidelines and steps for resilient cyber defense and information security mitigation approaches. This gives organizations an organized security action plan to stay compliant with major industry regulations and standards like HIPAA, PCI DSS, and more. Any episode of regulatory non-compliance can result in heavy fines, loss of business and reputation, litigation, and more.
This is not an exhaustive review of all elements of the Regulation, nor is it legal advice. Please consult your own legal experts if required.
