Heimdal Security load logo

Heimdal Security Products

Discover the award-winning security suite from Heimdal Security that offers threat prevention, antivirus with market leading detection rate and compliance.

Our next-gen, multi-layered security products are uniquely adapted to provide true cyber resilience against known and unknown threats.

Instead of relying strictly on signature-based code scanning, Heimdal takes protection one step further and ensures a unique type of proactive protection compared to other security products.

Truly next-gen protection with our new, rebranded Thor security suite

Our team has been working relentlessly to improve our security products and provide a seamless customer journey. The improved, flexible Thor product line-up packs the strength of our threat intelligence database and includes key, innovative features that will seamlessly integrate with your existing
enhance online protection.

FOR HOME

Home Image
Thor Foresight Image

THOR FORESIGHT HOME

30-Days Trial

Unique Threat Prevention of the Most Advanced Ransomware Viruses, Spyware and APTs

Traffic-based Malware Blocking
(HIPS)

Exploit & Dropper Blocking
(HIPS)

Attack Foresinc & Source Identifier
(IOAs, IOCs)

Threat Hunting
(EDR)

Multi-layered, AI Powered Protection

Patch Management

Data Leakage Blocking

Traffic-based Malware Detection
(HIDS, IOAs, IOCs)

Browser-based Protection

Phishing Protection

*Process / Behavior-based Scanning

Lightweight Installation and Smooth Performance

Very Easy to Use

Thor Vigilance Image

THOR VIGILANCE HOME

30-Days Trial

Firewall

Next-Gen Antivirus

*Local Signature / File-based Scanning

*Real-time Cloud Scanning

*Sandbox and Backdoor Inspection

*Process / Behavior-based Scanning

Lightweight Installation and Smooth Performance

Very Easy to Use

Thor Premium Image

THOR PREMIUM HOME

30-Days Trial

Unique Threat Prevention of the Most Advanced Ransomware Viruses, Spyware and APTs

Traffic-based Malware Blocking
(HIPS)

Exploit & Dropper Blocking
(HIPS)

Attack Foresinc & Source Identifier
(IOAs, IOCs)

Threat Hunting
(EDR));

Multi-layered, AI Powered Protection

Patch Management

Data Leakage Blocking

Traffic-based Malware Detection
(HIDS, IOAs, IOCs)

Browser-based Protection

Phishing Protection

Firewall

Next-Gen Antivirus

*Local Signature / File-based Scanning

*Real-time Cloud Scanning

*Process / Behavior-based Scanning

Lightweight Installation and Smooth Performance

Very Easy to Use

Unique Threat Prevention of the Most Advanced Ransomware Viruses, Spyware and APTs

Firewall

Unique Threat Prevention of the Most Advanced Ransomware Viruses, Spyware and APTs

Traffic-based Malware Blocking
(HIPS)

Next-Gen Antivirus

Traffic-based Malware Blocking
(HIPS)

Exploit & Dropper Blocking
(HIPS)

*Local Signature / File-based Scanning

Exploit & Dropper Blocking
(HIPS)

Attack Foresinc & Source Identifier
(IOAs, IOCs)

*Real-time Cloud Scanning

Attack Foresinc & Source Identifier
(IOAs, IOCs)

Threat Hunting
(EDR)

*Sandbox and Backdoor Inspection

Threat Hunting
(EDR)

Multi-layered, AI Powered Protection

*Process / Behavior-based Scanning

Multi-layered, AI Powered Protection

Patch Management

Lightweight Installation and Smooth Performance

Patch Management

Data Leakage Blocking

Very Easy to Use

Data Leakage Blocking

Traffic-based Malware Detection
(HIDS, IOAs, IOCs)

Traffic-based Malware Detection
(HIDS, IOAs, IOCs)

Browser-based Protection

Browser-based Protection

Phishing Protection

Phishing Protection

*Process / Behavior-based Scanning

Firewall

Lightweight Installation and Smooth Performance

Next-Gen Antivirus

Very Easy to Use

*Local Signature / File-based Scanning

*Real-time Cloud Scanning

*Sandbox and Backdoor Inspection

*Process / Behavior-based Scanning

Lightweight Installation and Smooth Performance

Very Easy to Use

FOR ENTERPRISE

Enterprise Image
Thor Foresight Image

THOR FORESIGHT ENTERPRISE

Unique Threat Prevention of the Most Advanced Ransomware Viruses, Spyware and APTs

Traffic-based Malware Blockings
(HIPS)

Exploit & Dropper Blocking
(HIPS)

Attack Foresinc & Source Identifier
(IOAs, IOCs)

Threat Hunting
(EDR)

Multi-layered, AI Powered Protection

Patch Management

Data Leakage Blocking

Traffic-based Malware Detection
(HIDS, IOAs, IOCs)

Browser-based Protection

Phishing Protection

*Process / Behavior-based Scanning

Lightweight Installation and Smooth Performance

Very Easy to Use

Thor Vigilance Image

THOR VIGILANCE ENTERPRISE

Firewall

*Local Signature / File-based Scanning

*Real-time Cloud Scanning

*Sandbox and Backdoor Inspection

*Process / Behavior-based Scanning

Lightweight Installation and Smooth Performance

Very Easy to Use

Thor Premium Image

THOR PREMIUM ENTERPRISE

Unique Threat Prevention of the Most Advanced Ransomware Viruses, Spyware and APTs

Traffic-based Malware Blocking
(HIPS)

Exploit & Dropper Blocking
(HIPS)

Attack Foresinc & Source Identifier
(IOAs, IOCs)

Threat Hunting
(EDR)

Multi-layered, AI Powered Protection

Patch Management

Data Leakage Blocking

Traffic-based Malware Detection
(HIDS, IOAs, IOCs)

Browser-based Protection

Phishing Protection

Firewall

Next-Gen Antivirus

*Local Signature / File-based Scanning

*Real-time Cloud Scanning

*Sandbox and Backdoor Inspection

*Process / Behavior-based Scanning

Lightweight Installation and Smooth Performance

Very Easy to Use

Unique Threat Prevention of the Most Advanced Ransomware Viruses, Spyware and APTs

Firewall

Unique Threat Prevention of the Most Advanced Ransomware Viruses, Spyware and APTs

Traffic-based Malware Blocking
(HIPS)

Next-Gen Antivirus

Traffic-based Malware Blocking
(HIPS)

Exploit & Dropper Blocking
(HIPS)

*Local Signature / File-based Scanning

Exploit & Dropper Blocking
(HIPS)

Attack Foresinc & Source Identifier
(IOAs, IOCs)

*Real-time Cloud Scanning

Attack Foresinc & Source Identifier
(IOAs, IOCs)

Threat Hunting
(EDR)

*Sandbox and Backdoor Inspection

Threat Hunting
(EDR)

Multi-layered, AI Powered Protection

*Process / Behavior-based Scanning

Multi-layered, AI Powered Protection

Patch Management

Lightweight Installation and Smooth Performance

Patch Management

Data Leakage Blocking

Very Easy to Use

Data Leakage Blocking

Traffic-based Malware Detection
(HIDS, IOAs, IOCs)

Traffic-based Malware Detection
(HIDS, IOAs, IOCs)

Browser-based Protection

Browser-based Protection

Phishing Protection

Phishing Protection

*Process / Behavior-based Scanning

Firewall

Lightweight Installation and Smooth Performance

Next-Gen Antivirus

Very Easy to Use

*Local Signature / File-based Scanning

*Real-time Cloud Scanning

*Sandbox and Backdoor Inspection

*Process / Behavior-based Scanning

Lightweight Installation and Smooth Performance

Very Easy to Use