Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • ManageEngine Log360 Reviews & Ratings
    112 Ratings
    Company Website
  • Guardz Reviews & Ratings
    95 Ratings
    Company Website
  • Blumira Reviews & Ratings
    144 Ratings
    Company Website
  • Cynet All-in-One Cybersecurity Platform Reviews & Ratings
    386 Ratings
    Company Website
  • Resolver Reviews & Ratings
    262 Ratings
    Company Website
  • Kubit Reviews & Ratings
    33 Ratings
    Company Website
  • Plaid Reviews & Ratings
    115 Ratings
    Company Website
  • ManageEngine ADAudit Plus Reviews & Ratings
    455 Ratings
    Company Website
  • NMIS Reviews & Ratings
    14 Ratings
    Company Website
  • Huntress Reviews & Ratings
    819 Ratings
    Company Website

What is THOR?

THOR distinguishes itself as the premier and most versatile instrument for conducting compromise assessments. In the wake of cyber incidents, teams often find themselves sifting through a multitude of compromised devices alongside a wider spectrum of potentially affected systems, which renders the manual analysis of countless forensic images an overwhelming endeavor. By utilizing THOR, the forensic analysis process is significantly enhanced due to its formidable collection of over 12,000 expertly designed YARA signatures, 400 Sigma rules, various anomaly detection methods, and a myriad of indicators of compromise (IOCs). This powerful tool is specifically engineered to highlight suspicious activities, alleviate the workload on analysts, and speed up the forensic examination process during critical instances when swift results are essential. Additionally, by focusing on aspects frequently neglected by conventional antivirus solutions, THOR boasts an expansive signature library that includes a diverse array of YARA and Sigma rules, IOCs, as well as checks for rootkits and anomalies, effectively tackling a broad spectrum of threats. Beyond merely detecting backdoors and tools utilized by attackers, THOR also captures outputs, temporary files, system configuration changes, and other remnants of malicious activities, thereby providing a comprehensive view of the incident landscape. The all-encompassing nature of THOR not only enhances detection but also fosters a deeper understanding of threats, establishing it as an indispensable tool in the cybersecurity field. Ultimately, its ability to adapt and evolve with emerging threats ensures that security teams are better equipped to respond effectively.

What is Cofense Triage?

Cofense Triageâ„¢ accelerates the identification and management of phishing emails, ensuring a quick and effective response. By utilizing integration and automation, response times can be drastically minimized. With the application of Cofense Intelligenceâ„¢ rules and a leading spam engine, threats are detected and evaluated with remarkable accuracy. Our robust read/write API allows for a smooth integration of intelligent phishing defenses into your current workflow, enabling your team to focus on protecting your organization. Understanding the complexities of phishing prevention, Cofense Triageâ„¢ offers instant access to expert help with a mere click, available at any time of day. Our dedicated Threat Intelligence and Research Teams are committed to continually broadening our array of YARA rules, which aids in discovering new phishing campaigns and improving your response capabilities. Additionally, the Cofense Triage Community Exchange lets users collaboratively dissect phishing emails and compile threat intelligence, providing invaluable support in your fight against these dangers. This cooperative strategy not only fortifies your defenses but also cultivates a rich community of shared insights and experiences, enhancing collective knowledge in the ongoing battle against phishing threats. By working together, organizations can create a more resilient front against cyber threats.

Media

Media

Integrations Supported

Anomali
Chronicle SOAR
Cisco Umbrella
Libraesva Email Security
LogRhythm SIEM
Mesh
OpenText Content Management (Extended ECM)
Palo Alto Networks AutoFocus
SentinelOne Singularity
Splunk Enterprise
Trellix Endpoint Security (HX)
Trend Micro Web Security
Vizit

Integrations Supported

Anomali
Chronicle SOAR
Cisco Umbrella
Libraesva Email Security
LogRhythm SIEM
Mesh
OpenText Content Management (Extended ECM)
Palo Alto Networks AutoFocus
SentinelOne Singularity
Splunk Enterprise
Trellix Endpoint Security (HX)
Trend Micro Web Security
Vizit

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Nextron Systems

Date Founded

2017

Company Location

Germany

Company Website

www.nextron-systems.com/thor/

Company Facts

Organization Name

Cofense

Date Founded

2011

Company Location

United States

Company Website

cofense.com/product-services/cofense-triage/

Categories and Features

Incident Response

Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Security Orchestration
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management

Categories and Features

Incident Response

Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Security Orchestration
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management

Popular Alternatives

ASGARD Management Center Reviews & Ratings

ASGARD Management Center

Nextron Systems

Popular Alternatives

Cyber Triage Reviews & Ratings

Cyber Triage

Sleuth Kit Labs