As a trusted provider of advanced compromise assessment tools, Nextron Systems will be present at it-sa 2025, Europe’s leading trade fair for IT security. Join us in Hall 7 at Stand 7-353 to learn more about our portfolio of forensic cybersecurity solutions developed and maintained entirely in Germany.
Our solutions support organizations in detecting what conventional antivirus and EDR solutions often miss, such as dual-use tools, web shells, renamed binaries, memory dumps, or anomalies in legitimate system files. Whether you’re preparing for incident response, planning retrospective analysis, or auditing critical infrastructure: Nextron products deliver targeted results even in the most constrained environments.
Live-Session: Learning from Intelligence Services and Military – Uncover APTs Like the Pros
Speaker: Marc Hirtz, CEO of Nextron Systems Date & Time: Thursday, October 9, 2025 | 10:30–10:45 Location: Hall 7, Forum D (Note: Presentation will be held in German)
In this 15-minute session, our CEO Marc Hirtz shares insights into strategic detection workflows derived from years of operational experience in intelligence-grade compromise assessments. You’ll learn how to uncover APT activity based on evidence that’s invisible to conventional telemetry.
Field-Tested Detection. Developed in Germany.
All Nextron products are engineered and maintained entirely in Germany. This allows us to offer transparent, auditable software without telemetry dependencies, cloud lock-in, or third-party analytics.
At it-sa 2025, we will present our entire forensic product family:
- THOR: Our flagship scanner, used worldwide for live triage and retrospective analysis.
- THOR Cloud: Remote compromise assessment via Microsoft Defender or live response, built for hybrid environments.
- ASGARD Management Center: Scalable orchestration, scan control, and result aggregation for enterprise environments.
- ASGARD Analysis Cockpit: Centralized triage, case management, and forensic baselining for THOR scan results at enterprise scale.
- THOR Thunderstorm: Analysis of air-gapped, embedded, and legacy systems using collector-based artifact submission.
All tools support custom YARA/Sigma integration, signature filtering, and multi-platform operation. Whether you need to scan endpoints in field offices, analyze memory dumps in isolated networks, or detect sophisticated attacker tradecraft: Nextron offers the tools to act decisively and precisely.
Let’s Talk
We invite you to visit us for a technical exchange at Hall 7, Booth 7-353. Our team will be available throughout the event to provide demonstrations, discuss specific use cases, and share insights from ongoing projects.
To help us prepare effectively for the conversation, please use the contact form to let us know which topics are most relevant to you or where you currently see specific needs.





Nextron Threat Research Team
Florian Roth
Marius Benthin