We Detect HackersFlexible and Continuous Compromise Assessments
Have I been compromised?
With security breaches arising on multiple fronts, companies, healthcare systems, governmental and educational entities alike are starting to realize how real the threat of cyber security attacks are. In today’s world, firewalls, antivirus and network based intrusion prevention are not enough.
Compromise assessments are the most effective defense in depth measure an organization can use to ensure no threats have made it past their defenses.
Nextron System provides the best compromise assessment scanner and management platforms to facilitate a continuous assessment.
We don’t believe in using cloud services. All our solutions are on your premises. Your data will never leave your network.
We Detect Hacker Activity
Our signature database with more than 10,000 hand crafted and high quality rules is focused on APTs (advanced persistent threats), their tool sets, scripts and malware.
We curate rules for hack tools, their output, config backdoors, RATs, web shells, suspicious system file replacements and traces of other malicious activity.
THOR is the perfect complement to your Antivirus solution.
Our Product LineScanners, Management and Analysis
THOR is our full-featured, portable and flexible compromise assessment scanner for Windows, macOS and Linux systems.
LOKI is a Python based open source IOC and YARA scanner bundled with our free and limited signature set.
Management and Analysis
ASGARD Management Center allows you to configure, schedule and control scans on up to 25,000 end points per instance; It also features an IOC management as well as many response functions like file or memory collection and custom playbooks to run any tool or command on your endpoints.
NewsBlog Posts and Tweets
Recent Blog Posts
We are proud to announce the release of THOR Lite. It is a trimmed-down version of THOR v10 with a reduced feature set and the open source signature base used in LOKI and the now...
The last five months we've been working on a shiny new version of our ASGARD platform that overcomes previous limitations and includes exciting new features. ASGARD 2 is a...
In this blog post I'd like to outline an idea on how to perform an automated compromise assessment on Citrix Netscaler / Citrix ADC appliances. I you haven't heard about...