• Experienced a Breach? Contact Us
  • Blog
  • Newsletter
  • Company
    • About Us
    • Jobs
Nextron Systems
  • Why Nextron
  • Products
    • L
      • Scanners
        • THORAPT Scanner
        • THOR ThunderstormTHOR as a Web Service
        • THOR LiteFree IOC and YARA Scanner
      • Managed Services
        • THOR CloudOn-Demand Compromise Assessments
        • Nextron MDR ↗Managed Detection and Response Service
    • R
      • Platform
        • ASGARD Management CenterIncident Response Platform
        • ASGARD Analysis CockpitOptimized Analysis and Baselining
      • Endpoint Agents
        • AURORACustom Sigma-based Endpoint Agent
      • Feeds
        • VALHALLAYARA and Sigma Rule Feed
  • Solutions
    • L
      • Solutions
        • Security Validation
        • Accelerated Forensic Analysis
        • Supercharged Detection
        • Large Scale Incident Response
    • R
      • Overview
        • Solutions Matrix
        • Scanner Comparison
        • Use Cases
        • Integrations
  • Partners
    • Become a Partner
    • Authorized Resellers
  • Resources
    • L
      • Explore
        • Fact Sheets
        • Slide Decks
        • Customers
      • Customers
        • Customer Portal
        • Customer Support
        • Product Surveys
      • Community
        • GitHub
        • Discord Server
    • R
      • Guides & Learning Hub
        • Manuals
        • Trainings
        • Hosts & IP Addresses
        • Keys & Certificates
      • News & Insights
        • Blog
        • Newsletter
        • LinkedIn
        • Twitter
        • YouTube
  • Get Started
Select Page
Back to Resources

Fact Sheets

THOR

Download Fact Sheet

ASGARD Management Center

Download Fact Sheet

ASGARD Analysis Cockpit

Download Fact Sheet

VALHALLA

Download Fact Sheet

Nextron Systems GmbH © 2025
All Rights Reserved

Resources

  • Manuals
  • Fact Sheets
  • Customer Portal

Company

  • About Us / Contact
  • Jobs

Newsletter

Monthly news, tips and insights.

  • Imprint
  • Privacy Policy
  • Change privacy consent
  • Privacy consents history
  • Revoke privacy consents
Experienced a Breach? Contact Us