
THOR
THOR is an advanced incident response software designed to enhance forensic analysis during cyber investigations. With over 30,000 handcrafted YARA signatures and 3,000 Sigma rules, it swiftly identifies compromised systems and potential threats. THOR excels in detecting overlooked malicious activities, system changes, and suspicious outputs, streamlining the investigation process for rapid results.
Top THOR Alternatives
ASGARD Management Center
The ASGARD Management Center empowers organizations to manage up to 25,000 endpoints per instance, offering robust scanning, IOC management, and real-time response capabilities.
Thinkst Canary
Companies often realize they've been breached too late, but with Thinkst Canary, they can detect threats early.
Jeli
Jeli empowers organizations to enhance their incident response through seamless integration with existing tech stacks.
Mitiga
Mitiga's Incident Response Software revolutionizes cloud security by integrating AI-driven threat detection across SaaS, Cloud, and Identity platforms.
Orna
Orna's incident response software revolutionizes cyber crisis management with AI-driven simulations, unifying threat detection and response across business units.
Everbridge Risk Intelligence
Everbridge Risk Intelligence enhances incident response capabilities by integrating advanced risk monitoring technology with real-time data analysis.
WireX Systems
With robust integration for SIEM vendors, it facilitates ticket management, playbook modeling, and threat enrichment...
Antigena Network
It actively monitors network traffic, swiftly identifying anomalies and responding to emerging threats in real...
BreachRx
By integrating operations across security, legal, and privacy functions, it enhances organizational resilience, streamlines collaboration...
CA Compliance Event Manager
By providing real-time alerts on changes and suspicious activity, it helps businesses maintain compliance, manage...
eRiskHub
By providing access to expertise in legal compliance, IT security, and crisis communication, it empowers...
SureView
It enhances situational awareness by connecting SOC teams with field staff, while offering incident tracking...
Blackpanda
With features like continuous vulnerability scanning, Dark Web monitoring, and integrated access to cyber insurance...
Cado
It automates data capture across multi-cloud environments, including containers and serverless systems, ensuring critical insights...
Top THOR Features
- Proactive hacker activity detection
- Extensive YARA signatures library
- Handcrafted Sigma rules integration
- Advanced anomaly detection rules
- Versatile deployment options
- Remote scanning capability
- Comprehensive event log analysis
- Customizable signature database
- Detection of renamed tools
- Temporary file detection
- Automated resource monitoring
- Support for multiple operating systems
- Flexible integration into workflows
- Real-time forensic analysis
- Detailed HTML reporting
- Enhanced detection of web shells
- Detection of malicious system files
- Comprehensive attack method coverage
- Easy addition of custom IOCs
- Unique detection of threat actor implants
Top THOR Alternatives
- ASGARD Management Center
- Thinkst Canary
- Jeli
- Mitiga
- Orna
- Everbridge Risk Intelligence
- WireX Systems
- Antigena Network
- BreachRx
- CA Compliance Event Manager
- eRiskHub
- SureView
- Blackpanda
- Cado