Average Ratings 1 Rating
Average Ratings 0 Ratings
Description
Security organizations utilizing the SureViews Operations SaaS suite manage events with speed, consistency, and security, resulting in enhanced security results. The platform offers a consolidated interface to manage all alarms and events entering the Security Operations Center (SOC) from various systems, devices, and sources. All essential tools for effective response—including geospatial maps, action plans, nearby camera feeds, and contact lists—are conveniently available on one screen. Alarms are intelligently grouped and prioritized, ensuring that operators address the most critical incidents first. This eliminates the need to switch between systems, as every event is processed in a uniform manner, which boosts productivity and elevates security performance. Additionally, SureView’s Field Operations tool fosters seamless communication between SOC teams and field personnel, delivering real-time updates on the location and status of both staff and vital assets, thereby enhancing overall operational efficiency. With such capabilities, organizations can respond to incidents more effectively and maintain a higher level of situational awareness.
Description
THOR stands out as the most advanced and adaptable tool available for compromise assessments. When responding to incidents, teams frequently encounter a collection of compromised devices along with a larger array of potentially affected systems, making the manual examination of numerous forensic images a daunting task. With THOR, the process of forensic analysis is accelerated thanks to its impressive arsenal of over 12,000 meticulously crafted YARA signatures, 400 Sigma rules, a variety of anomaly detection protocols, and countless indicators of compromise (IOCs). This tool is designed to emphasize suspicious activities, alleviate the burden on analysts, and expedite the forensic examination process during critical moments when timely results are vital. By concentrating on areas often overlooked by traditional antivirus solutions, THOR employs an extensive signature library that encompasses a multitude of YARA and Sigma rules, IOCs, and checks for rootkits and anomalies, effectively addressing a wide range of threats. Furthermore, THOR not only identifies backdoors and tools leveraged by attackers but also captures outputs, temporary files, modifications to system configurations, and other remnants of nefarious actions, ensuring a thorough understanding of the incident landscape. The comprehensive nature of THOR makes it an invaluable asset in the realm of cybersecurity.
API Access
Has API
API Access
Has API
Integrations
Amazon Web Services (AWS)
Arcules
Bosch Essential Video Analytics
Calipsa
Dahua
Genetec Security Center
Hikvision
Honeywell Active Alert
Irisity IRIS+
Mesh
Integrations
Amazon Web Services (AWS)
Arcules
Bosch Essential Video Analytics
Calipsa
Dahua
Genetec Security Center
Hikvision
Honeywell Active Alert
Irisity IRIS+
Mesh
Pricing Details
$150 per user per month
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
SureView Systems
Founded
2001
Country
United States
Website
sureviewsystems.com
Vendor Details
Company Name
Nextron Systems
Founded
2017
Country
Germany
Website
www.nextron-systems.com/thor/
Product Features
Incident Response
Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Security Orchestration
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management
Product Features
Incident Response
Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Security Orchestration
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management