We Detect Hackers
Flexible and Continuous Compromise Assessments
Have I been compromised?
With security breaches arising on multiple fronts, companies, healthcare systems, governmental and educational entities alike are starting to realize how real the threat of cyber security attacks are. In today’s world, firewalls, antivirus and network based intrusion prevention are not enough.
Compromise assessments are the most effective defense in depth measure an organization can use to ensure no threats have made it past their defenses.
Nextron System provides the best compromise assessment scanner and management platforms to facilitate a continuous assessment.
We don’t believe in using cloud services. All our solutions are on your premises. Your data will never leave your network.
We Detect Hacker Activity
Our signature database with more than 9000 hand crafted and high quality rules is focused on APTs (advanced persistent threats), their tool sets, scripts and malware.
We curate rules for hack tools, their output, config backdoors, RATs, web shells, suspicious system file replacements and traces of other malicious activity.
THOR is the perfect complement to your Antivirus solution.
Our Product LineScanners, Management and Analysis
Management and Analysis
Why Do Customers Choose Nextron?
THOR’s impressive detection rate is well-known in the industry and fits the needs of threat hunters around the globe.
Thousands of generic signatures detect anomalies, obfuscation techniques and suspicious properties to rapidly accelerate compromise assessments.
Use our scanners fully managed with the ASGARD platform or stand-alone as portable scanners for live forensics, image scans or to monitor a certain folder.
You can easily add your own indicators and signatures from threat feeds that you’ve subscribed to.
We are a German-based company and all of our solutions are on-premise. Our scanners work completely offline.
We enjoy great confidence from our customers in the form of government agencies, NGOs and private corporations.
What our customers say
In our environment, we use ASGARD for a multitude of use-cases. In addition to other security components, we use ASGARD to regularly selected systems for sign of compromise. Furthermore, we use ASGARD during incident response for both initial triage and comprehensive scanning of a system.
I have been given the opportunity to evaluate Nextron’s VALHALLA feed. The handcrafted high quality detections with literally zero false-positive rate are an unmatched capability that does not only enable your detection technologies to stay ahead of the latest advanced threats but also is an extension of your own security team. Given the high quality and value the feed provides I can highly recommend VALHALLA.
NewsBlog Posts and Tweets
Recent Blog Posts
We've made a short video demo to showcase the new THOR 10 feature called "THOR Remote", which allows you to perform compromise assessment scans on multiple remote systems - no...
We are working on a THOR scanner version that brings our well-known compromise assessments and thousands of YARA rules to IBM's AIX®. Subscribe here to get noticed once beta...
New Module "Events" This module checks registered Events in the system environment as they are used by advanced malware and rootkits. We have checked for malicious Events...
We've just released an updated version of our Antivirus Event Analysis cheat sheet. You can download version 1.7.2 here. The major changes are: Updated AV signature lists...