Starting @199 /month /per userBuy Now Schedule Demo Take Tour Play Video
on sale - Save 15%order now
on sale - Save 15%order now
9 OUT OF 10 ATTACKS ON ORGANIZATIONAL SYSTEMS CAN BE STOPPED AT THE NETWORK LEVEL.
Firstly, unlike an AV solution, Darklayer GUARD™ doesn’t look at files, but at the infrastructure used by attackers.
The Heimdal™ CORP suite focuses on closing vulnerabilities and mitigating exploits, while constantly blocking incoming attacks, data leakage and Command & Control server communication.
Here is how Heimdal CORP's VectorN Detection fits into your security setup and boosts it with a much-need proactive layer.
Helping you make patching and vulnerability management cost-effective and time-efficient is our goal!
X-ploit Resilience enables you to cover the gaps in your security while demonstrating compliance for software and security audits.
Combining the most advanced endpoint DNS product in the world – the Darklayer GUARD™, with a highly complex threat detection package– VectorN Detection™, gives you HIPS & HIDS capabilities.
Rapid Detection service is an enterprise-grade managed service that detects, quantifies & gathers evidence regarding advanced attacks
Experienced threats hunters from XcedllHost watching over your environment 24/7
Max 30 minutes from breach detection to response, as agreed in a service level agreement
High quality detection’s, with actionable response guidance by XcellHostexperts
Advanced Threat Protection
Exploit prevention- Zero day Vulnerability
Data Center Security
Clean up-Automatic Remediation
Security For Hybrid Enviornment
Enables you to detect advanced malware, regardless of the attack vector (exploits, phishing, etc.).
Performs an in-depth analysis of all your incoming and outgoing HTTP, HTTPS and DNS traffic.
Works proactively during every stage of an attack to detect APTs, ransomware strains, botnets, Trojans and other known and unknown malware.
Provides alerts and detailed insights about your vulnerable endpoints, so you can mitigate risks and achieve legal compliance.
Using thorough traffic analysis, Thor Premium matches Machine Learning insights with Indicators of compromise/attack to uncover even hidden or dormant 2nd generation malware.
The VectorN Detection engine is a new feature and its purpose is to search for patterns within the blocks that Thor's Traffic Scanning records.
* It works across-the-board on any Windows™ device;
* It does not rely on scanning the code or auditing any system processes. Instead, the new technology uses Machine Learning Detection (MLD) to perform an in-depth analysis of all incoming and outgoing HTTP, HTTPS and DNS traffic.
* It matches Machine Learning (MLD) insights with Indicators of compromise/attack (IOC/IOA) and network forensics, turning Thor Foresight into a unique, proactive cybersecurity suite.
* It helps users discover even hidden, second-generation malware that tries to infect the endpoint or attempts to harvest data from the compromised system.
* By tracking device-to-infrastructure communication, this technology enables users to detect and block advanced malware, regardless of the attack vector.
If Thor Foresight's Traffic Scanning is blocking a specific domain or multiple domains at a specific time of the day, VectorN Detection will consider this a pattern and will inform the user that there might be a possible threat.
- A domain is blocked multiple times a day in a very short time period.
- A domain is blocked every day at a specific time
- Multiple domains are blocked in a very short time period.
Thor Premium product line-up includes 2 main product branches: Thor Foresight and Thor Vigilance. The products complement each other, and they should be combined in order to offer maximum system and network protection.
Thor Foresight has been specifically designed to protect you from financial and data-stealing malware while doing banking operations and keep you safe from Zero Hour malware and security exploits frequently employed by IT, criminals.
Thor RC is the release candidate (beta version) that is in pre-production.
We recommend you install this version only if someone from the Heimdal Security team recommends you do it. Otherwise, this version might cause issues because of its relative instability.
In case you suspect that your antivirus is interfering with Heimdal Security’s functionality, you’ll need to add some exceptions to allow Thor to work properly.
Here are some examples of potential interferences:
The Heimdal services do not start at Windows’s start-up or the network adapter’s DNS 127.0.0.1 is not set for some reason even if the Traffic Scanning is ON.
The files you need to add are located in this path: C:\Program Files (x86)\Heimdal (you need to add them one by one)
Restart the computer and check if everything is working as it should!
Simplify your cloud infrastructure with XcellHost robust set of tools to develop, deploy, and scale your applications faster and easier.
Accelerate your machine learning and deep learning workloads with Tesla V100 and Nvidia T4 based GPU instances.
Experience bare-metal performance on Cloud with zero noisy neighbor problem, and reliable performance.