THOR

THOR

Nextron Systems
+
+

Related Products

  • Guardz
    106 Ratings
    Visit Website
  • SOCRadar Extended Threat Intelligence
    98 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website
  • Iru
    1,487 Ratings
    Visit Website
  • ManageEngine Log360
    141 Ratings
    Visit Website
  • ThreatLocker
    501 Ratings
    Visit Website
  • Blumira
    146 Ratings
    Visit Website
  • Safetica
    401 Ratings
    Visit Website
  • Predict360
    18 Ratings
    Visit Website
  • NINJIO
    415 Ratings
    Visit Website

About

CyFIR digital security and forensic analysis solutions provide unparalleled endpoint visibility, scalability, and speed to resolution. Cyber resilient organizations suffer little to no damage in the event of a breach. CyFIR cyber risk solutions identify, analyze, and resolve active or potential threats 31x faster than traditional EDR tools. We live in a post-breach world where data breaches are more frequent and more aggressive in their capacity to do harm. Attack surfaces are expanding beyond the walls of an organization to encompass thousands of connected devices and computer endpoints located throughout remote facilities, cloud and SaaS providers, controlled foreign assets, and other locations.

About

THOR is the most sophisticated and flexible compromise assessment tool on the market. Incident response engagements often begin with a group of compromised systems and an even bigger group of systems that are possibly affected. The manual analysis of many forensic images can be challenging. THOR speeds up your forensic analysis with more than 12,000 handcrafted YARA signatures, 400 Sigma rules, numerous anomaly detection rules and thousands of IOCs. THOR is the perfect tool to highlight suspicious elements, reduce the workload and speed up forensic analysis in moments in which getting quick results is crucial. THOR focuses on everything the Antivirus misses. With its huge signature set of thousands of YARA and Sigma rules, IOCs, rootkit and anomaly checks, THOR covers all kinds of threats. THOR does not only detect the backdoors and tools attackers use but also outputs, temporary files, system configuration changes and other traces of malicious activity.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Companies of all sizes searching for a Cyber Risk Management solution

Audience

IT teams searching for an APT Scanner solution

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

CyFIR
Founded: 2010
United States
www.cyfir.com

Company Information

Nextron Systems
Founded: 2017
Germany
www.nextron-systems.com/thor/

Alternatives

AD Enterprise

AD Enterprise

AccessData

Alternatives

ASGARD Management Center

ASGARD Management Center

Nextron Systems
Cyber Triage

Cyber Triage

Sleuth Kit Labs
ListSync

ListSync

ThorApps
Fidelis Elevate

Fidelis Elevate

Fidelis Security
Alisha AI SDR

Alisha AI SDR

floworks
ProjectSync

ProjectSync

ThorApps

Categories

Categories

Endpoint Detection and Response (EDR) Features

Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis

Integrations

Mesh

Integrations

Mesh
Claim CyFIR Investigator and update features and information
Claim CyFIR Investigator and update features and information
Claim THOR and update features and information
Claim THOR and update features and information