Cyber Triage

Cyber Triage

Sleuth Kit Labs
THOR

THOR

Nextron Systems
+
+

Related Products

  • Guardz
    106 Ratings
    Visit Website
  • ManageEngine Log360
    141 Ratings
    Visit Website
  • Blumira
    146 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website
  • Bitdefender Ultimate Small Business Security
    3 Ratings
    Visit Website
  • SOCRadar Extended Threat Intelligence
    98 Ratings
    Visit Website
  • DoctorConnect
    83 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,231 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,506 Ratings
    Visit Website
  • Hotspot Shield
    121 Ratings
    Visit Website

About

Fast & Affordable Forensics for Incident Response. Automated incident response software for fast, comprehensive, and easy intrusion investigations. An alert is generated from IDS or SIEM. An endpoint investigation is started from SOAR manually. Cyber Triage is deployed to the endpoint to collect data. Analyst uses Cyber Triage data to find evidence and make decisions. Manual incident response is slow, leaving the entire organization at the intruder’s mercy. By automating every phase of the endpoint forensics process, Cyber Triage ensures state-of-the-art remediation speed. Cyber threats are constantly evolving, and manual incident response can be inconsistent and incomplete. Always operating on the latest threat intelligence, Cyber Triage scours every relevant corner of a compromised endpoint. Forensic tools are often confusing, with features not needed for intrusions. Cyber Triage’s intuitive interface allows even junior staff to analyze data and assemble reports.

About

THOR is the most sophisticated and flexible compromise assessment tool on the market. Incident response engagements often begin with a group of compromised systems and an even bigger group of systems that are possibly affected. The manual analysis of many forensic images can be challenging. THOR speeds up your forensic analysis with more than 12,000 handcrafted YARA signatures, 400 Sigma rules, numerous anomaly detection rules and thousands of IOCs. THOR is the perfect tool to highlight suspicious elements, reduce the workload and speed up forensic analysis in moments in which getting quick results is crucial. THOR focuses on everything the Antivirus misses. With its huge signature set of thousands of YARA and Sigma rules, IOCs, rootkit and anomaly checks, THOR covers all kinds of threats. THOR does not only detect the backdoors and tools attackers use but also outputs, temporary files, system configuration changes and other traces of malicious activity.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Security teams and investigators who want an automated forensics software for incident response in order to analyze data and assemble reports

Audience

IT teams searching for an APT Scanner solution

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

$2,500
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Sleuth Kit Labs
Founded: 2023
United States
www.cybertriage.com

Company Information

Nextron Systems
Founded: 2017
Germany
www.nextron-systems.com/thor/

Alternatives

Alternatives

ASGARD Management Center

ASGARD Management Center

Nextron Systems
Binalyze AIR

Binalyze AIR

Binalyze
ListSync

ListSync

ThorApps
Cado

Cado

Cado Security
Falcon Forensics

Falcon Forensics

CrowdStrike
Alisha AI SDR

Alisha AI SDR

floworks
ProjectSync

ProjectSync

ThorApps

Categories

Categories

Incident Response Features

Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
Security Orchestration
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management

Integrations

Elastic Security
IBM Cloud
IBM QRadar SIEM
Mesh
Microsoft Defender for Endpoint
SentinelOne Singularity
Splunk Cloud Platform
Splunk SOAR
Swimlane

Integrations

Elastic Security
IBM Cloud
IBM QRadar SIEM
Mesh
Microsoft Defender for Endpoint
SentinelOne Singularity
Splunk Cloud Platform
Splunk SOAR
Swimlane
Claim Cyber Triage and update features and information
Claim Cyber Triage and update features and information
Claim THOR and update features and information
Claim THOR and update features and information