Thor Foresight offers real-time threat and status reporting, delivered in intervals of your choosing. Data is graphed and scaled daily, weekly or monthly for an easy overview and can be integrated into SIEM via API.
Thor Foresight helps you perform:
Allows you to define policies for Traffic scanning, malware detection, patching and installation for different segments of your Thor Foresight environment.
This gives you the option to segment your entire IT environment and create policies which apply to your exact needs across the Active Directory groups of your organisations. Heimdal policies can be made both one to one and one too many.
The Security Suite consists of 3 key layers:
DarkLayer GUARD™ detects and blocks network communication to mitigate Zero Hour exploits, Ransomware C&C’s, next-gen attacks and data leakages on DNS, HTTPS and HTTP layers. The scanning engine supports fully customizable white/black listing.
The Heimdal filter receives more than 800,000 new weekly updates to keep up with cyber criminals’ threats. A filter update is provided every 2 hours.
The VectorN Detection engine detects and mitigates 2nd generation malware strains, regardless of the attack vector.
Using Machine Learning Detection, Indicators of compromise/attack and Network forensics to analyse all HTTP, HTTPS and DNS traffic.
The X-Ploit Resilience module stops vulnerabilities in software which aren’t up to date and haven’t had the latest patches installed – these vulnerabilities are exploited in 65% of attacks. X-Ploit Resilience automatically installs and patches critical applications silently, with zero setup and without user interruption.
Uncover hidden, next generation malware that tries to infect the endpoint or attempts to harvest data from the compromised system.
By tracking device-to-infrastructure communication, this technology enables users to detect and block advanced malware, regardless of the attack vector.
Proactively blocks ransomware before it has a chance to encrypt data.
Heimdal uses 5 layers to stop Ransomware attacks: Attack blocking, Patching, Exploit blocking, Dropper protection and key delivery filtering.
Software exploits, especially in Adobe Flash and Oracle Java, are a common path of attack. Overall, software exploits account for 85% of attack angles.
endpoint protection products and firewalls cannot shield users from these attacks, as no file is executed on the PC – but Heimdal Corp can.