THOR

THOR

THOR is an advanced incident response software designed to enhance forensic analysis during cyber investigations. With over 30,000 handcrafted YARA signatures and 3,000 Sigma rules, it swiftly identifies compromised systems and potential threats. THOR excels in detecting overlooked malicious activities, system changes, and suspicious outputs, streamlining the investigation process for rapid results.

Top THOR Alternatives

1

ASGARD Management Center

The ASGARD Management Center empowers organizations to manage up to 25,000 endpoints per instance, offering robust scanning, IOC management, and real-time response capabilities.

2

Thinkst Canary

Companies often realize they've been breached too late, but with Thinkst Canary, they can detect threats early.

3

Jeli

Jeli empowers organizations to enhance their incident response through seamless integration with existing tech stacks.

4

Mitiga

Mitiga's Incident Response Software revolutionizes cloud security by integrating AI-driven threat detection across SaaS, Cloud, and Identity platforms.

5

Orna

Orna's incident response software revolutionizes cyber crisis management with AI-driven simulations, unifying threat detection and response across business units.

6

Everbridge Risk Intelligence

Everbridge Risk Intelligence enhances incident response capabilities by integrating advanced risk monitoring technology with real-time data analysis.

7

WireX Systems

With robust integration for SIEM vendors, it facilitates ticket management, playbook modeling, and threat enrichment...

8

Antigena Network

It actively monitors network traffic, swiftly identifying anomalies and responding to emerging threats in real...

9

BreachRx

By integrating operations across security, legal, and privacy functions, it enhances organizational resilience, streamlines collaboration...

10

CA Compliance Event Manager

By providing real-time alerts on changes and suspicious activity, it helps businesses maintain compliance, manage...

11

eRiskHub

By providing access to expertise in legal compliance, IT security, and crisis communication, it empowers...

12

SureView

It enhances situational awareness by connecting SOC teams with field staff, while offering incident tracking...

13

Blackpanda

With features like continuous vulnerability scanning, Dark Web monitoring, and integrated access to cyber insurance...

14

Cado

It automates data capture across multi-cloud environments, including containers and serverless systems, ensuring critical insights...

Top THOR Features

  • Proactive hacker activity detection
  • Extensive YARA signatures library
  • Handcrafted Sigma rules integration
  • Advanced anomaly detection rules
  • Versatile deployment options
  • Remote scanning capability
  • Comprehensive event log analysis
  • Customizable signature database
  • Detection of renamed tools
  • Temporary file detection
  • Automated resource monitoring
  • Support for multiple operating systems
  • Flexible integration into workflows
  • Real-time forensic analysis
  • Detailed HTML reporting
  • Enhanced detection of web shells
  • Detection of malicious system files
  • Comprehensive attack method coverage
  • Easy addition of custom IOCs
  • Unique detection of threat actor implants
Top THOR Alternatives
  • ASGARD Management Center
  • Thinkst Canary
  • Jeli
  • Mitiga
  • Orna
  • Everbridge Risk Intelligence
  • WireX Systems
  • Antigena Network
  • BreachRx
  • CA Compliance Event Manager
  • eRiskHub
  • SureView
  • Blackpanda
  • Cado
Show More Show Less