THOR is a fully modular technology with capabilities that fit your security needs and budget. It is configurable to analyze operating system behavior, intrinsic file behavior and the human-computer entanglement.
The technology that powers our digital hammer, THOR™, is a patented set of sophisticated algorithms and intricate mosaic code embedded in the satellite itself. Back at the ground station, you will have continuous and uninterrupted assurance that while the blackout period is active, the data on the system is accessible only to you and is guaranteed to be free from insider threats.
Unimaginably complex to build, remarkably simple for the assurance provided. Our technology is certified by Red Hat.
Defensive information security perfection crafted with precision.