Achieve proactive security with Thor Premium Enterprise

Are you as an IT administrator looking to simplify your day to day life by proactively stopping malware from reaching your systems, using IOA/IOC’s as an EDR add-on and Threat Hunting to find malware that Antivirus cannot see, whilst also continuing to have all the traditional detections mechanisms at your disposal?

With Thor Premium you will be getting a cost-effective, multi-layered, proactive and reactive security suite.

"We've been able to save huge amounts of time in deploying the latest software patches in our company and make sure that our endpoints are not only kept to date, but also safe from all these attacks." DPD SLOVAKIA

Thor Foresight is the first component of the Thor Premium Enterprise package. Thor Vigilance, our antivirus with 100% detection, completes it to offer multiple security layers.

This package includes next-gen threat prevention based on dual machine learning at both Traffic and File level + a powerful antivirus with 100% detection rate

  • Silent, automatic vulnerability and patch management system
  • Ability to stop and identify malware attacks before they reach your systems
  • Ability to hunt and identity threats or processes that antivirus cannot see
  • Unique IOAs/IOCs detection, working fluently as a EDR add-on, including HIPS/HIDS
  • Unique threat prevention layer to stop ransomware, data leakage, viruses, APTs, exploits & other threats
  • Next-gen and traditional Antivirus integrated with the EDR / HIPS / HIDS module
  • GDPR compliance in a streamlined, efficient package
 

Reactive

Proactive

Proactive
/Reactive

 

Antivirus

Firewall

Thor
Vigilance
Enterprise

Thor
Foresight
Enterprise

Thor
Premium
Enterprise

Traffic-based Malware Blocking
Exploit & Dropper Blocking
Attack Reversing & Source Identifier
Threat Hunting
Patch Management
Data Leakage Blocking
Traffic-based Malware Detection (IOC)
Browser-based Protection
Firewall
Antivirus
Local Signature / File-based Scanning
Real-Time Cloud Scanning
*
Sandbox and Backdoor Inspection
*
Heuristic / Behavior-based Scanning
*

* only some Antivirus

Traffic-based Malware Blocking

Exploit & Dropper Blocking

Attack Reversing & Source Identifier

Threat Hunting

Patch Management

Data Leakage Blocking

Traffic-based Malware Detection (IOC)

Browser-based Protection

Firewall

Antivirus

Local Signature / File-based Scanning

Real-Time Cloud Scanning

Sandbox and Backdoor Inspection

Heuristic / Behavior-based Scanning

Traffic-based Malware Blocking

Exploit & Dropper Blocking

Attack Reversing & Source Identifier

Threat Hunting

Patch Management

Data Leakage Blocking

Traffic-based Malware Detection (IOC)

Browser-based Protection

Firewall

Antivirus

Local Signature / File-based Scanning

Real-Time Cloud Scanning

Sandbox and Backdoor Inspection

Heuristic / Behavior-based Scanning

Traffic-based Malware Blocking

Exploit & Dropper Blocking

Attack Reversing & Source Identifier

Threat Hunting

Patch Management

Data Leakage Blocking

Traffic-based Malware Detection (IOC)

Browser-based Protection

Firewall

Antivirus

Local Signature / File-based Scanning

Real-Time Cloud Scanning

Sandbox and Backdoor Inspection

Heuristic / Behavior-based Scanning

Traffic-based Malware Blocking

Exploit & Dropper Blocking

Attack Reversing & Source Identifier

Threat Hunting

Patch Management

Data Leakage Blocking

Traffic-based Malware Detection (IOC)

Browser-based Protection

Firewall

Antivirus

Local Signature / File-based Scanning

Real-Time Cloud Scanning

Sandbox and Backdoor Inspection

Heuristic / Behavior-based Scanning

Traffic-based Malware Blocking

Exploit & Dropper Blocking

Attack Reversing & Source Identifier

Threat Hunting

Patch Management

Data Leakage Blocking

Traffic-based Malware Detection (IOC)

Browser-based Protection

Firewall

Antivirus

Local Signature / File-based Scanning

Real-Time Cloud Scanning

Sandbox and Backdoor Inspection

Heuristic / Behavior-based Scanning

Reach out to discuss how we can help you protect and grow your business