THOR Description

THOR is the most flexible and sophisticated compromise assessment tool available. Incident response engagements typically begin with a set of compromised systems and a larger group of systems that could be affected. Manual analysis of many forensic images can prove difficult. THOR accelerates your forensic analysis by providing more than 12,000 handcrafted YARA Signatures, 400 Sigma rules and many anomaly detection rules. There are also thousands of IOCs. THOR is the ideal tool to highlight suspicious elements and reduce the workload. It also speeds up forensic analysis in critical moments when quick results are crucial. THOR is a comprehensive tool that covers all the Antivirus's weaknesses. THOR has a huge signature set that includes thousands of YARA, Sigma rules, IOCs and rootkit and anomaly check. It covers all types of threats. THOR not only detects backdoors and tools used by attackers but also outputs, temporary file changes, and other traces that indicate malicious activity.

Integrations

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
Nextron Systems
Year Founded:
2017
Headquarters:
Germany
Website:
www.nextron-systems.com/thor/

Media

THOR Screenshot 1
Recommended Products
Deliver secure remote access with OpenVPN. Icon
Deliver secure remote access with OpenVPN.

Trusted by nearly 20,000 customers worldwide, and all major cloud providers.

OpenVPN's products provide scalable, secure remote access — giving complete freedom to your employees to work outside the office while securely accessing SaaS, the internet, and company resources.
Get started — no credit card required.

Product Details

Platforms
Windows
Mac
Linux
Type of Training
Documentation
Videos
Customer Support
Online

THOR Features and Options

Incident Response Software

Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Security Orchestration
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management

THOR Lists

THOR User Reviews

Write a Review
  • Previous
  • Next