A Complete Endpoint Security Solution.

Endpoint Prevention, Detection and Response.

Thor Premium Enterprise

Discover the unique, multi-layered security suite that brings together Threat Hunting, Prevention, and Mitigation.
All in one package, for the best endpoint protection.

90-day FREE TRIAL

Download Product Sheet EXPLORE
Dots Separator Image

The essential security layers

Everything you need rolled into a unified endpoint security solution

Thor Foresight Logo

Hunt, Prevent, Detect and Block Threats

DarkLayer Guard

Prevents threats such data leaks, ransomware and exploits at the DNS, HTTP/S level.

VectorN Detection

Spots hidden threats using advanced Machine Learning algorithms.

X-Ploit Resilience

Remotely deploys Microsoft and 3rd Party software and updates.

Infinity Management

Installs any custom, in-house software at any location, anytime.

Thor Vigilance Logo

X-Gen Antivirus with EDR and Firewall

Firewall

Prevents incoming attacks, brute force attacks, and lets you isolate devices.

Local & Real-time Cloud scanning

Detects all known malicious files locally and unknown files through cloud scanning.

Sandbox & Backdoor Inspection

Isolates files that still don’t show up as malware in our sandbox.

Process Behavior-based scanning

Continues to monitor processes and changes with heuristic, behavior engines.

Dots Image

See what our customers have to say about us

Dots Separator Image

Why Thor Premium Enterprise to protect your endpoints?

Endpoint Detection and Response and Vulnerability Management are often addressed by organizations through disparate solutions, but overseeing a myriad of different cybersecurity tools can be overwhelming.

However, when multiple advanced endpoint protection technologies are available as one, EDR and Vulnerability Management truly become easy.

With Thor Premium Enterprise, our endpoint security tool, now you can deploy HIPS/HIDS and obtain unparalleled IOCs and IOAs for threat-hunting.

Threat Hunting Image

DNS and DoH endpoint security with threat hunting, prevention, detection and blocking

In today's threat landscape, tracking device-to-infrastructure communication and unknown malware detection are essential steps towards securing your endpoints.

Thor Premium Enterprise is uniquely adapted to safeguard your environment and add valuable threat-hunting tools. Its modular nature allows you to build your cybersecurity in layers and prevent data breaches, obtain actionable insights, and ultimately become truly cyber resilient.

Embedded in Thor Premium Enterprise are Darklayer GUARD™, our DoH and DNS filtering technology, and VectorN Detection™, our key advancement powered by machine learning for adaptive protection against next-generation malware. Working in tandem, they offer protection against threats and detection along multiple attack vectors, helping you take a proactive approach to endpoint security that reactive, signature-based tools like traditional Antivirus simply can’t achieve.

Dots Separator Image

Endpoint protection software featuring a next-gen Antivirus

Reinforce your organization’s security foundation with Thor Vigilance Enterprise, our next-gen Antivirus with unique Firewall capabilities and a market-leading detection rate.

Prevent incoming attacks through connections and login activity monitoring and stop brute force attacks. Fully manage your Windows Firewall and isolate devices in case of major outbreaks, enabling your staff to lock down departments at risk in no time.

Reap the benefits of real-time, signature-based file scanning powered by machine learning, scheduled and on-demand scans, cloud-scanning and sandbox inspection that detects and blocks evolving threats, and heuristic and behavior-based scanning to detect code changes and trigger alerts for potentially malicious activity.

More than that, thanks to its EDR features, our next-gen Antivirus incorporates true detection and remediation capabilities. Thor Vigilance, when used alongside Thor Foresight, provides you with extra benefits such as identifying user compromise, process exploits and malware undetectable by Antivirus solutions.

With the Threat to Process Correlation (TTPC) feature, you also have the ability quarantine malicious processes.

Essentially, Thor Vigilance Enterprise is supplied by the proactive Darklayer GUARD™ and VectorN Detection™ modules, bringing an unparalleled level of intelligence used for threat assessment and IOAs that strengthen its local and cloud threat scanning.

Next-gen Antivirus Image
Dots Separator Image
Cloud-delivered Image

Cloud-delivered Windows and 3rd party vulnerability management.

Eliminate risky gaps targeted by ransomware and other malware attacks and save valuable man-hours.

X-Ploit Resilience, our automatic patch management tool, closes commonly exploited vulnerabilities and ensures your organization is secured from multiple angles. Your organization will not only benefit from truly proactive and reactive security, but also from an agile 3rd party software and Windows OS deployment tool that brings down both costs and cyber risks associated with outdated systems.

X-Ploit Resilience simplifies your sysadmins’ life with 100% customizable, set-and-forget settings for software and updates automatic deployment, with a full compliance and CVE/CVSS audit trail.

We deliver updates fully repackaged and tested by our security specialists using encrypted packages inside encrypted HTTPS transfers to your endpoints locally. The distribution is also further optimized using local P2P transfers between your own machines.

What’s more, our built-in software center allows you to remove admin rights and let your users “click-and-install” only your pre-approved software.

Plus, the optional Infinity Management add-on offers administrators the ability to safely and seamlessly deploy any custom, in-house software and patches that are not available in the base X-Ploit Resilience module.

Dots Separator Image

Manage your environment in a powerful and simple way with the Unified Threat Dashboard (UTD)

Threat hunting, prevention, blocking, and mitigation have never felt so easy and straightforward. You can define policies for Thor Premium’s modules in great detail using the Heimdal™ UTD and save significant amounts of time.

Refine blacklisting of websites, files, processes and patches per active directory group and gain the powerful option to individually tailor your entire IT environment according to your exact needs.

The UTD helps you prevent next-gen malware and data leakages, quickly respond even to hidden threats, and efficiently and automatically manage vulnerabilities. Our user-friendly and intuitive platform lets you fine-tune your environment and deploy policies at the time intervals of your choosing.

You will also benefit from a lifetime history storage for auditing and compliance with data regulations and security standards. Additionally, you will notice a great ROI within the shortest timeframe.

Unified Threat Dashboard Image
Dots Separator Image

The Global Scalability Benefit

Thor Vigilance Enterprise logo

Enables you to:

  • Prevent incoming attacks by using Firewall features (such as port and application management).
  • Also gain access to an advanced technology that detects and blocks Brute Force attacks from affecting your servers and endpoints.
  • Fully manage your Windows firewall and isolate endpoints in the event of major outbreaks (NIST AC-7 compliance).
  • Use a next-gen Antivirus with a market-leading malware detection rate, based on four stages of scanning.
  • Mitigate otherwise hidden threats and gain a unique E-PDR ability with the IOA/IOC intelligence of Thor Foresight Enterprise.
Thor Foresight Enterprise logo Thor Foresight Enterprise Shield Image

Empowers you to:

  • Filter and block emerging threats and second-generation malware strains through DNS and DoH filtering, delivering a HIDS at the endpoint traffic layer.
  • Identify specific attack processes and provide HIPS capabilities for your endpoints.
  • Spot hidden threats by using advanced AI and Machine Learning algorithms.
  • Achieve compliance, mitigate exploits, close vulnerabilities, deploy updates, and install 3rd party (and in-house, custom*) software anytime and anywhere in the world.
  • Get access to a full category-based blocking system for administrators to choose from.
  • Easily manage your environment and deploy custom policies in the Unified Threat Dashboard.
Thor Premium Enterprise logo

Allows you to:

  • Experience the power of Thor Foresight and Thor Vigilance combined.
  • Thor Premium Enterprise gives you full access to the complete capabilities of Thor Foresight Enterprise and Thor Vigilance Enterprise, which can be easily accessed in the Unified Threat Dashboard.
  • Benefit from next-gen endpoint security and unique EDR.
  • Explore the multi-layered security that provides you with threat prevention, a next-gen Antivirus, and compliance, all in one package.
Dots Image

Exhaustive security features for excellent endpoint protection

PREVENTION DETECTION REMEDIATION

Thor Features

Thor Foresight Logo
Thor Vigilance Logo
Thor Premium Logo
Basic Antivirus Logo
REACTIVE
Basic Firewall Logo
REACTIVE
  Unique Threat Prevention

Unique Threat Prevention

Windows Logo Apple Logo Android Logo
Windows Logo Apple Logo Android Logo
DNS filtering to block Ransomware, Spyware and APTs
DNS filtering to block Ransomware, Spyware and APTs
  Traffic-based Malware Blocking (HIPS)
Traffic-based Malware Blocking (HIPS)
  Exploit & Dropper Blocking (HIPS)
Exploit & Dropper Blocking (HIPS)
  Attack Forensics & Source Identifier (IOAs, IOCs)
Attack Forensics & Source Identifier (IOAs, IOCs)
  Threat Hunting (EDR)
Threat Hunting (EDR)
  Multi-layered, AI Powered Protection
Multi-layered, AI Powered Protection
  Blocks Data Leakage
Blocks Data Leakage
  Traffic-based Malware Detection (HIDS, IOAs, IOCs)
Traffic-based Malware Detection (HIDS, IOAs, IOCs)
  Protection against DNS hijacking
Protection against DNS hijacking
  Browser-based Protection
Browser-based Protection
  Phishing Protection
Phishing Protection
  PATCH MANAGEMENT

PATCH MANAGEMENT

Windows Logo Apple Logo Android Logo
Windows Logo Apple Logo Android Logo
Zero user interruption
Zero user interruption
  Microsoft Windows updates
Microsoft Windows updates
  Software updates
Software updates
  Secure packages anytime and anywhere in the world with low bandwidth
Secure packages anytime and anywhere in the world with low bandwidth
  Automatic deployment/re-deployment of 3rd party patches
Automatic deployment/re-deployment of 3rd party patches
  Ability to delay, version manage and rollback any update
Ability to delay, version manage and rollback any update
  Patches release-to-install time < 4 hours, on average
Patches release-to-install time < 4 hours, on average
  Covers both feature and security patches
Covers both feature and security patches
  Ability to deploy updates to remote endpoints
Ability to deploy updates to remote endpoints
  Updates always fit to employees and in their time zone
Updates always fit to employees and in their time zone
  SOFTWARE ASSET MANAGEMENT

SOFTWARE ASSET MANAGEMENT

Windows Logo Apple Logo Android Logo
Windows Logo Apple Logo Android Logo
See any software assets in your inventory, their version and number of installs
See any software assets in your inventory, their version and number of installs
  Create inventory reports
Create inventory reports
  Install & uninstall software
Install & uninstall software
  Deploy custom software to your endpoints, anywhere in the world**
Deploy custom software to your endpoints, anywhere in the world**
  UNIQUE REACTIVE SECURITY

UNIQUE REACTIVE SECURITY

Windows Logo Apple Logo Android Logo
Windows Logo Apple Logo Android Logo
Firewall
Firewall
  Next-Gen Antivirus
Next-Gen Antivirus
  *Local Signature / File-based Scanning
*Local Signature / File-based Scanning
  *Real-time Cloud Scanning
*Real-time Cloud Scanning
  *Sandbox and Backdoor Inspection
*Sandbox and Backdoor Inspection
  *Process / Behavior-based Scanning
*Process / Behavior-based Scanning
  EXTRA BENEFITS

EXTRA BENEFITS

Windows Logo Apple Logo Android Logo
Windows Logo Apple Logo Android Logo
Lightweight Installation and Smooth Performance
Lightweight Installation and Smooth Performance
  Very Easy to Use
Very Easy to Use
Dots Separator Image

Customer Support Excellence

VIP Support Image

Free VIP support

for both Home and Enterprise
customers

Dedicated Support Image

24/7 dedicated support

from our expert-skilled Europe-based
support team

Cybersecurity Consultancy Image

Free cybersecurity

consultancy in order to choose the
best solutions for your business

Configure Serfices Image

Support and configure

services available remotely
anywhere in the world

Excellent

Rating Stars Based on 650 reviews on Truspilot Image

Explore our true proactive endpoint security suite designed to protect your organization's most valuable data.