{"id":13855,"date":"2018-12-17T16:30:06","date_gmt":"2018-12-17T21:30:06","guid":{"rendered":"https:\/\/www.firewalls.com\/blog\/?p=13855"},"modified":"2026-01-05T11:40:06","modified_gmt":"2026-01-05T16:40:06","slug":"sophos-intercept-x","status":"publish","type":"post","link":"https:\/\/www.firewalls.com\/blog\/sophos-intercept-x\/","title":{"rendered":"Intercept Threats with Sophos Intercept X"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"13855\" class=\"elementor elementor-13855\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1b94c086 e-flex e-con-boxed e-con e-parent\" data-id=\"1b94c086\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7a170316 elementor-widget elementor-widget-text-editor\" data-id=\"7a170316\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Network threats are always lurking out there, evolving. Admins need a whole team to pick attack vectors off one-by-one. Sophos has built an all-pro squad in\u00a0<strong><a href=\"https:\/\/www.firewalls.com\/brands\/sophos\/central\/intercept-x-advanced-with-xdr.html\" target=\"_blank\" rel=\"noopener noreferrer\">Intercept X<\/a><\/strong>, ensuring that even a Tom Brady-level hacker\u2019s attempts to pass malware and ransomware onto your network fall short.<\/p><p>What is Sophos Intercept X? In short, it\u2019s the 1970s Steel Curtain, the 1985 Chicago Bears, and the 2000 Baltimore Ravens defenses all rolled into one package that protects endpoints like those units protected the end zone. Each individual layer of Sophos protection is best in class, but it\u2019s the combination\u2013or team\u2013of features that put Intercept X at the top of the power rankings.<\/p><p>Sophos offers multiple versions of Intercept X with features that only get better as you level-up. Let\u2019s take a look at the different Intercept X plans that are available.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b6e2452 elementor-widget elementor-widget-image\" data-id=\"b6e2452\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" data-src=\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2018\/12\/stop-unknown-threats-with-intercept-x.png\" title=\"\" alt=\"\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" style=\"--smush-placeholder-width: 1280px; --smush-placeholder-aspect-ratio: 1280\/720;\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8a3115f elementor-widget elementor-widget-text-editor\" data-id=\"8a3115f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3 style=\"padding-left: 30px;\"><strong>Intercept X<\/strong><\/h3>\n<p style=\"padding-left: 30px;\">This standard level of endpoint security is the backbone of all Intercept X options\u2013the locker room leader if you will. It includes Deep Learning Malware Detection and Exploit Prevention that shuts down penetration before it impacts your device. CryptoGuard protects your files against ransomware, while WipeGuard stops boot-record attacks. You\u2019ll also get automated malware removal, Sophos Clean to do a secondary malware scan, and Sophos Security Heartbeat. All of this combines to allow all your Sophos products to communicate, diagnose, and respond to network incidents in seconds. Just like the headsets that keep coaches, coordinators, and captains on the same page during the game. You can try it completely free, no credit card required, for 30 days.<\/p>\n<p style=\"text-align: center;\"><strong><a class=\"wpex-theme-button red\" href=\"https:\/\/www.sophos.com\/en-us\/products\/endpoint-antivirus\/free-trial?id=00130000019KGZ4\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-size: 18px;\">Try INTERCEPT X Free for 30 Days<\/span><\/a><\/strong><\/p>\n<h3 style=\"padding-left: 30px;\"><strong>Intercept X Advanced<\/strong><\/h3>\n<p style=\"padding-left: 30px;\">Sophos Intercept X Advanced takes your skills to the next level. All the game-changing features are joined by the comprehensive features of <a href=\"https:\/\/secure2.sophos.com\/en-us\/products\/sophos-central\/free-trial.aspx?id=00130000019KGZ4\" target=\"_blank\" rel=\"noopener noreferrer\">Sophos Central Endpoint Protection<\/a>.&nbsp;These added solutions include Web Security and Application Control, anti-malware file scanning &amp; live protection, potentially unwanted application blocking, and more.<\/p>\n<h3 style=\"padding-left: 30px;\"><strong>Advanced with EDR &#8211; (<em>err XDR<\/em>)<\/strong><\/h3>\n<p style=\"padding-left: 30px;\">Taking Advanced a step further, Sophos\u2019 latest addition to Intercept X adds EDR, which stands for Endpoint Detection and Response. (<em><strong>Update 2021: Actually, now the latest is XDR &#8211; extended detection &amp; response<\/strong><\/em>).&nbsp; EDR means you\u2019ll get everything it has to offer, plus cross estate threat searching, guided investigations, and more from the experts at Sophos Labs. This is definitely the Rookie of the Year of endpoint protection.<\/p>\n<p style=\"text-align: center;\"><strong><a class=\"wpex-theme-button red\" href=\"https:\/\/www.firewalls.com\/brands\/sophos\/central\/intercept-x-advanced-with-xdr.html\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-size: 18px;\">GET INTERCEPT X WITH XDR<\/span><\/a><\/strong><\/p>\n<h3 style=\"padding-left: 30px;\"><strong>Advanced for Server<\/strong><\/h3>\n<p style=\"padding-left: 30px;\">You\u2019re thinking bigger and Sophos has too. <strong><a href=\"https:\/\/www.firewalls.com\/brands\/sophos\/central\/intercept-x-advanced-for-server-with-xdr.html\" target=\"_blank\" rel=\"noopener noreferrer\">Intercept X Advanced for Server<\/a><\/strong>&nbsp;prevents attacks from reaching the server, detects attacks before they run, and cleans up damage in case of a breach. This is a broader scale: not just the team, but the whole league. It includes the features outlines above, plus other server-based add-ons like application whitelisting, which locks down your server with one click, allowing only authorized applications to run and securing your server in safe state.<\/p>\n<p style=\"text-align: center;\"><a class=\"wpex-theme-button red\" href=\"https:\/\/www.firewalls.com\/brands\/sophos\/central\/intercept-x-advanced-for-server-with-xdr.html\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-size: 18px;\"><strong>GET INTERCEPT X ADVANCED FOR SERVER<\/strong><\/span><\/a><\/p>\n<p>All of these options are managed through <strong>Sophos Central<\/strong>, a cloud-based console hosted by Sophos that allows you to configure all your products in one place. This ensures you don&#8217;t need a separate management server. You can access Sophos Central anywhere, anytime.<\/p>\n<p style=\"text-align: center;\"><strong><a class=\"wpex-theme-button red\" href=\"https:\/\/www.firewalls.com\/sophos-firewall-buyers-guide\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-size: 18px;\">LEARN MORE WITH OUR SOPHOS BUYERS GUIDE<\/span><\/a><\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Sophos has built an all-pro squad in\u00a0Intercept X that scans for threats in real time &#038; shuts them down before they reach the red zone.<\/p>\n","protected":false},"author":5,"featured_media":25498,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[610,594],"tags":[],"class_list":["post-13855","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-end-user-protection","category-sophos"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Intercept Advanced Threats with Sophos Intercept X Advanced<\/title>\n<meta name=\"description\" content=\"Sophos has built an all-pro squad in\u00a0Intercept X that scans for threats in real time &amp; shuts them down before they reach the red zone.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.firewalls.com\/blog\/sophos-intercept-x\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Intercept Advanced Threats with Sophos Intercept X Advanced\" \/>\n<meta property=\"og:description\" content=\"Sophos has built an all-pro squad in\u00a0Intercept X that scans for threats in real time &amp; shuts them down before they reach the red zone.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.firewalls.com\/blog\/sophos-intercept-x\/\" \/>\n<meta property=\"og:site_name\" content=\"Firewalls.com\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/firewallscom\" \/>\n<meta property=\"article:published_time\" content=\"2018-12-17T21:30:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-05T16:40:06+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2018\/12\/Intercept-Threats-with-Sophos-Intercept-X.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2240\" \/>\n\t<meta property=\"og:image:height\" content=\"1260\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Andrew Harmon\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@firewallscom\" \/>\n<meta name=\"twitter:site\" content=\"@firewallscom\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Andrew Harmon\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/sophos-intercept-x\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/sophos-intercept-x\/\"},\"author\":{\"name\":\"Andrew Harmon\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962\"},\"headline\":\"Intercept Threats with Sophos Intercept X\",\"datePublished\":\"2018-12-17T21:30:06+00:00\",\"dateModified\":\"2026-01-05T16:40:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/sophos-intercept-x\/\"},\"wordCount\":546,\"publisher\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/sophos-intercept-x\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2018\/12\/Intercept-Threats-with-Sophos-Intercept-X.png\",\"articleSection\":[\"End User Protection\",\"Sophos\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/sophos-intercept-x\/\",\"url\":\"https:\/\/www.firewalls.com\/blog\/sophos-intercept-x\/\",\"name\":\"Intercept Advanced Threats with Sophos Intercept X Advanced\",\"isPartOf\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/sophos-intercept-x\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/sophos-intercept-x\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2018\/12\/Intercept-Threats-with-Sophos-Intercept-X.png\",\"datePublished\":\"2018-12-17T21:30:06+00:00\",\"dateModified\":\"2026-01-05T16:40:06+00:00\",\"description\":\"Sophos has built an all-pro squad in\u00a0Intercept X that scans for threats in real time & shuts them down before they reach the red zone.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/sophos-intercept-x\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.firewalls.com\/blog\/sophos-intercept-x\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/sophos-intercept-x\/#primaryimage\",\"url\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2018\/12\/Intercept-Threats-with-Sophos-Intercept-X.png\",\"contentUrl\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2018\/12\/Intercept-Threats-with-Sophos-Intercept-X.png\",\"width\":2240,\"height\":1260,\"caption\":\"Intercept X\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/sophos-intercept-x\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.firewalls.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Intercept Threats with Sophos Intercept X\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#website\",\"url\":\"https:\/\/www.firewalls.com\/blog\/\",\"name\":\"Firewalls.com\",\"description\":\"Your Home For Cyber Security News, Stories, &amp; Tutorials\",\"publisher\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.firewalls.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#organization\",\"name\":\"Firewalls.com\",\"url\":\"https:\/\/www.firewalls.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png\",\"contentUrl\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png\",\"width\":365,\"height\":85,\"caption\":\"Firewalls.com\"},\"image\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/firewallscom\",\"https:\/\/x.com\/firewallscom\",\"https:\/\/www.linkedin.com\/company-beta\/1439857\/\",\"https:\/\/www.youtube.com\/user\/firewallsDotCom\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962\",\"name\":\"Andrew Harmon\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g\",\"caption\":\"Andrew Harmon\"},\"description\":\"Andrew Harmon was the Director of Marketing for Firewalls.com, co-host of the Ping podcast, and engineer-to-English translator of the network security lexicon. Andrew focused on creating content for small business owners and cybersecurity novices to make this crucial facet of modern business more approachable for non-experts everywhere.\",\"sameAs\":[\"https:\/\/www.Firewalls.com\",\"aharmon@firewalls.com\"],\"url\":\"https:\/\/www.firewalls.com\/blog\/author\/aharmon\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Intercept Advanced Threats with Sophos Intercept X Advanced","description":"Sophos has built an all-pro squad in\u00a0Intercept X that scans for threats in real time & shuts them down before they reach the red zone.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.firewalls.com\/blog\/sophos-intercept-x\/","og_locale":"en_US","og_type":"article","og_title":"Intercept Advanced Threats with Sophos Intercept X Advanced","og_description":"Sophos has built an all-pro squad in\u00a0Intercept X that scans for threats in real time & shuts them down before they reach the red zone.","og_url":"https:\/\/www.firewalls.com\/blog\/sophos-intercept-x\/","og_site_name":"Firewalls.com","article_publisher":"http:\/\/www.facebook.com\/firewallscom","article_published_time":"2018-12-17T21:30:06+00:00","article_modified_time":"2026-01-05T16:40:06+00:00","og_image":[{"width":2240,"height":1260,"url":"http:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2018\/12\/Intercept-Threats-with-Sophos-Intercept-X.png","type":"image\/png"}],"author":"Andrew Harmon","twitter_card":"summary_large_image","twitter_creator":"@firewallscom","twitter_site":"@firewallscom","twitter_misc":{"Written by":"Andrew Harmon","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.firewalls.com\/blog\/sophos-intercept-x\/#article","isPartOf":{"@id":"https:\/\/www.firewalls.com\/blog\/sophos-intercept-x\/"},"author":{"name":"Andrew Harmon","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962"},"headline":"Intercept Threats with Sophos Intercept X","datePublished":"2018-12-17T21:30:06+00:00","dateModified":"2026-01-05T16:40:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.firewalls.com\/blog\/sophos-intercept-x\/"},"wordCount":546,"publisher":{"@id":"https:\/\/www.firewalls.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/sophos-intercept-x\/#primaryimage"},"thumbnailUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2018\/12\/Intercept-Threats-with-Sophos-Intercept-X.png","articleSection":["End User Protection","Sophos"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.firewalls.com\/blog\/sophos-intercept-x\/","url":"https:\/\/www.firewalls.com\/blog\/sophos-intercept-x\/","name":"Intercept Advanced Threats with Sophos Intercept X Advanced","isPartOf":{"@id":"https:\/\/www.firewalls.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.firewalls.com\/blog\/sophos-intercept-x\/#primaryimage"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/sophos-intercept-x\/#primaryimage"},"thumbnailUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2018\/12\/Intercept-Threats-with-Sophos-Intercept-X.png","datePublished":"2018-12-17T21:30:06+00:00","dateModified":"2026-01-05T16:40:06+00:00","description":"Sophos has built an all-pro squad in\u00a0Intercept X that scans for threats in real time & shuts them down before they reach the red zone.","breadcrumb":{"@id":"https:\/\/www.firewalls.com\/blog\/sophos-intercept-x\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.firewalls.com\/blog\/sophos-intercept-x\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/sophos-intercept-x\/#primaryimage","url":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2018\/12\/Intercept-Threats-with-Sophos-Intercept-X.png","contentUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2018\/12\/Intercept-Threats-with-Sophos-Intercept-X.png","width":2240,"height":1260,"caption":"Intercept X"},{"@type":"BreadcrumbList","@id":"https:\/\/www.firewalls.com\/blog\/sophos-intercept-x\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.firewalls.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Intercept Threats with Sophos Intercept X"}]},{"@type":"WebSite","@id":"https:\/\/www.firewalls.com\/blog\/#website","url":"https:\/\/www.firewalls.com\/blog\/","name":"Firewalls.com","description":"Your Home For Cyber Security News, Stories, &amp; Tutorials","publisher":{"@id":"https:\/\/www.firewalls.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.firewalls.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.firewalls.com\/blog\/#organization","name":"Firewalls.com","url":"https:\/\/www.firewalls.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png","contentUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png","width":365,"height":85,"caption":"Firewalls.com"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/firewallscom","https:\/\/x.com\/firewallscom","https:\/\/www.linkedin.com\/company-beta\/1439857\/","https:\/\/www.youtube.com\/user\/firewallsDotCom"]},{"@type":"Person","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962","name":"Andrew Harmon","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g","caption":"Andrew Harmon"},"description":"Andrew Harmon was the Director of Marketing for Firewalls.com, co-host of the Ping podcast, and engineer-to-English translator of the network security lexicon. Andrew focused on creating content for small business owners and cybersecurity novices to make this crucial facet of modern business more approachable for non-experts everywhere.","sameAs":["https:\/\/www.Firewalls.com","aharmon@firewalls.com"],"url":"https:\/\/www.firewalls.com\/blog\/author\/aharmon\/"}]}},"_links":{"self":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/13855","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/comments?post=13855"}],"version-history":[{"count":38,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/13855\/revisions"}],"predecessor-version":[{"id":27642,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/13855\/revisions\/27642"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/media\/25498"}],"wp:attachment":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/media?parent=13855"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/categories?post=13855"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/tags?post=13855"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}