• Experienced a Breach? Contact Us
  • Blog
  • Newsletter
  • Company
    • About Us
    • Jobs
Nextron Systems
  • Why Nextron
  • Products
    • L
      • Scanners
        • THORAPT Scanner
        • THOR ThunderstormTHOR as a Web Service
        • THOR LiteFree IOC and YARA Scanner
        • Compare our Scanners
      • Managed Services
        • THOR CloudOn-Demand Compromise Assessments
        • Nextron MDR ↗Managed Detection and Response Service
    • R
      • Platform
        • ASGARD Management CenterIncident Response Platform
        • ASGARD Analysis CockpitOptimized Analysis and Baselining
      • Endpoint Agents
        • AURORACustom Sigma-based Endpoint Agent
      • Feeds
        • VALHALLAYARA and Sigma Rule Feed
  • Solutions
    • L
      • Solutions
        • Security Validation
        • Accelerated Forensic Analysis
        • Supercharged Detection
        • Large Scale Incident Response
    • R
      • Overview
        • Solutions Matrix
        • THOR Use Cases
        • THOR Integrations
  • Partners
    • Become a Partner
    • Authorized Resellers
  • Resources
    • L
      • Explore
        • Fact Sheets
        • Slide Decks
        • Customer Stories
      • Guides & Learning Hub
        • Manuals
        • Trainings
        • YouTube Videos
        • Hosts & IP Addresses
        • Keys & Certificates
    • R
      • Customers
        • Customer Portal
        • Customer Support
      • Community
        • GitHub
        • Discord Server
      • News & Insights
        • Blog
        • Newsletter
        • LinkedIn
        • Twitter
  • Get Started
Select Page
Back to Resources

Fact Sheets

THOR

Download Fact Sheet

ASGARD Management Center

Download Fact Sheet

ASGARD Analysis Cockpit

Download Fact Sheet

VALHALLA

Download Fact Sheet

Nextron Systems GmbH © 2025
All Rights Reserved

Resources

  • Manuals
  • Fact Sheets
  • Customer Portal

Company

  • About Us / Contact
  • Jobs

Newsletter

Monthly news, tips and insights.

  • Imprint
  • Privacy Policy
  • Change privacy consent
  • Privacy consents history
  • Revoke privacy consents
Experienced a Breach? Contact Us