Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

The entire system can be configured to operate within a secure closed network, ensuring that all data and files are kept in a specified location. There are no scans, reports, or backdoors involved, alongside no restrictions on the number of accounts or simultaneous users, and it does not have an expiry date. This setup can function entirely offline, requiring no Internet connectivity, utilizes a private protocol for communication, and guarantees encrypted interactions, again with no scans or backdoors present. Additionally, this arrangement offers a high level of privacy and security for all users involved.

Description

THOR stands out as the most advanced and adaptable tool available for compromise assessments. When responding to incidents, teams frequently encounter a collection of compromised devices along with a larger array of potentially affected systems, making the manual examination of numerous forensic images a daunting task. With THOR, the process of forensic analysis is accelerated thanks to its impressive arsenal of over 12,000 meticulously crafted YARA signatures, 400 Sigma rules, a variety of anomaly detection protocols, and countless indicators of compromise (IOCs). This tool is designed to emphasize suspicious activities, alleviate the burden on analysts, and expedite the forensic examination process during critical moments when timely results are vital. By concentrating on areas often overlooked by traditional antivirus solutions, THOR employs an extensive signature library that encompasses a multitude of YARA and Sigma rules, IOCs, and checks for rootkits and anomalies, effectively addressing a wide range of threats. Furthermore, THOR not only identifies backdoors and tools leveraged by attackers but also captures outputs, temporary files, modifications to system configurations, and other remnants of nefarious actions, ensuring a thorough understanding of the incident landscape. The comprehensive nature of THOR makes it an invaluable asset in the realm of cybersecurity.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Mesh

Integrations

Mesh

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

InsMsg

Country

China

Website

www.insmsg.com

Vendor Details

Company Name

Nextron Systems

Founded

2017

Country

Germany

Website

www.nextron-systems.com/thor/

Product Features

Collaboration

Brainstorming
Calendar Management
Chat / Messaging
Contact Management
Content Management
Document Management
Project Management
Real Time Editing
Task Management
Version Control
Video Conferencing

Product Features

Incident Response

Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Security Orchestration
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management

Alternatives

Alternatives

ListSync Reviews

ListSync

ThorApps
NymVPN Reviews

NymVPN

Nym Technologies
ASGARD Management Center Reviews

ASGARD Management Center

Nextron Systems
Alisha AI SDR Reviews

Alisha AI SDR

floworks
Z1 SecureHub Reviews

Z1 SecureHub

Zertificon
yEdit2 Reviews

yEdit2

Spacejock Software