Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

During this period, threats can freely propagate through the network, leading to escalating damage and higher expenses. It is essential to react to attacks swiftly, aiming to mitigate harm within minutes through robust email search capabilities and quick removal from all inboxes. By recognizing anomalies that could signify threats, based on insights derived from past email analyses, organizations can enhance their security posture. Utilizing intelligence from earlier threat responses can help in blocking future emails from malicious entities and in pinpointing the most vulnerable users within the network. When email-based attacks successfully bypass security measures and infiltrate users’ inboxes, a prompt and precise response is crucial to avert further damage and curb the attack’s spread. Manual responses to these attacks are not only time-consuming but also ineffective, allowing threats to proliferate and amplifying the overall damage incurred. Therefore, implementing automated solutions can significantly enhance response times and improve overall security efficiency.

Description

THOR stands out as the most advanced and adaptable tool available for compromise assessments. When responding to incidents, teams frequently encounter a collection of compromised devices along with a larger array of potentially affected systems, making the manual examination of numerous forensic images a daunting task. With THOR, the process of forensic analysis is accelerated thanks to its impressive arsenal of over 12,000 meticulously crafted YARA signatures, 400 Sigma rules, a variety of anomaly detection protocols, and countless indicators of compromise (IOCs). This tool is designed to emphasize suspicious activities, alleviate the burden on analysts, and expedite the forensic examination process during critical moments when timely results are vital. By concentrating on areas often overlooked by traditional antivirus solutions, THOR employs an extensive signature library that encompasses a multitude of YARA and Sigma rules, IOCs, and checks for rootkits and anomalies, effectively addressing a wide range of threats. Furthermore, THOR not only identifies backdoors and tools leveraged by attackers but also captures outputs, temporary files, modifications to system configurations, and other remnants of nefarious actions, ensuring a thorough understanding of the incident landscape. The comprehensive nature of THOR makes it an invaluable asset in the realm of cybersecurity.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Mesh

Integrations

Mesh

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Barracuda

Founded

2003

Country

United States

Website

www.barracuda.com/products/forensics

Vendor Details

Company Name

Nextron Systems

Founded

2017

Country

Germany

Website

www.nextron-systems.com/thor/

Product Features

Incident Response

Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Security Orchestration
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management

Product Features

Incident Response

Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Security Orchestration
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management

Alternatives

Agari Reviews

Agari

Fortra

Alternatives

ASGARD Management Center Reviews

ASGARD Management Center

Nextron Systems
Cyber Triage Reviews

Cyber Triage

Sleuth Kit Labs
SmartEvent Reviews

SmartEvent

Check Point Software Technologies