Preventing the unknown and catching the known
Achieve proactive security with Thor Premium Enterprise
Are you as an IT administrator looking to simplify your day to day life by proactively stopping malware from reaching your systems, using IOA/IOC’s as an EDR add-on and Threat Hunting to find malware that Antivirus cannot see, whilst also continuing to have all the traditional detections mechanisms at your disposal?
With Thor Premium you will be getting a cost-effective, multi-layered, proactive and reactive security suite.
"We've been able to save huge amounts of time in deploying the latest software patches in our company and make sure that our endpoints are not only kept to date, but also safe from all these attacks." DPD SLOVAKIA
Thor Foresight is the first component of the Thor Premium Enterprise package. Thor Vigilance, our antivirus with 100% detection, completes it to offer multiple security layers.
This package includes next-gen threat prevention based on dual machine learning at both Traffic and File level + a powerful antivirus with 100% detection rate
Reactive |
Proactive |
Proactive
|
|||
---|---|---|---|---|---|
Antivirus |
Firewall |
Thor
|
Thor
|
Thor
|
|
Traffic-based Malware Blocking
|
|
|
|||
Exploit & Dropper Blocking
|
|
|
|||
Attack Reversing & Source Identifier
|
|
|
|||
Threat Hunting
|
|
|
|||
Patch Management
|
|
|
|||
Data Leakage Blocking
|
|
|
|
||
Traffic-based Malware Detection (IOC)
|
|
|
|
||
Browser-based Protection
|
|
|
|
|
|
Firewall
|
|
|
|
|
|
Antivirus
|
|
|
|
||
Local Signature / File-based Scanning
|
|
|
|
|
|
Real-Time Cloud Scanning
|
*
|
|
|
||
Sandbox and Backdoor Inspection
|
*
|
|
|
||
Heuristic / Behavior-based Scanning
|
*
|
|
|
||
* only some Antivirus
Traffic-based Malware Blocking
Exploit & Dropper Blocking
Attack Reversing & Source Identifier
Threat Hunting
Patch Management
Data Leakage Blocking
Traffic-based Malware Detection (IOC)
Browser-based Protection
Firewall
Antivirus
Local Signature / File-based Scanning
Real-Time Cloud Scanning
Sandbox and Backdoor Inspection
Heuristic / Behavior-based Scanning
Traffic-based Malware Blocking
Exploit & Dropper Blocking
Attack Reversing & Source Identifier
Threat Hunting
Patch Management
Data Leakage Blocking
Traffic-based Malware Detection (IOC)
Browser-based Protection
Firewall
Antivirus
Local Signature / File-based Scanning
Real-Time Cloud Scanning
Sandbox and Backdoor Inspection
Heuristic / Behavior-based Scanning
Traffic-based Malware Blocking
Exploit & Dropper Blocking
Attack Reversing & Source Identifier
Threat Hunting
Patch Management
Data Leakage Blocking
Traffic-based Malware Detection (IOC)
Browser-based Protection
Firewall
Antivirus
Local Signature / File-based Scanning
Real-Time Cloud Scanning
Sandbox and Backdoor Inspection
Heuristic / Behavior-based Scanning
Traffic-based Malware Blocking
Exploit & Dropper Blocking
Attack Reversing & Source Identifier
Threat Hunting
Patch Management
Data Leakage Blocking
Traffic-based Malware Detection (IOC)
Browser-based Protection
Firewall
Antivirus
Local Signature / File-based Scanning
Real-Time Cloud Scanning
Sandbox and Backdoor Inspection
Heuristic / Behavior-based Scanning
Traffic-based Malware Blocking
Exploit & Dropper Blocking
Attack Reversing & Source Identifier
Threat Hunting
Patch Management
Data Leakage Blocking
Traffic-based Malware Detection (IOC)
Browser-based Protection
Firewall
Antivirus
Local Signature / File-based Scanning
Real-Time Cloud Scanning
Sandbox and Backdoor Inspection
Heuristic / Behavior-based Scanning