Armstrong logo

Thor Vigilance Enterprise

Thor Vigilance Enterprise combines the techniques known by both traditional and Next-gen Antivirus engines to offer market leading mitigation.

Thor Vigilance Enterprise menu

Move beyond signature-based detection into true prevention

Local Signature-based File Scanning

Thor Vigilance Enterprise uses signature-based code scanning to monitor the activity of your organisation’s files in order to protect your endpoints against malware, ransomware, APTs and other types of threats.

You can perform files scan in real time, as a permanently active process, or you can run scheduled or on-demand scans for your endpoints to detect any suspicious activity.

Real-time Cloud Scanning

The cloud-based technology is integrated into our Next-Gen Antivirus to enhance endpoint threat remediation and to deliver an impeccable, market leading detection rate.

All unknown files are sent to our cloud for scanning.  With 1000 CPU cores running advanced detection algorithms powered by machine learning, Thor Vigilance Enterprise adds another dimension to detection and mitigation.

Sandbox and Backdoor Analysis (or Inspection)

Every file in your organisation should be impeccable, just like Thor Vigilance Enterprise’s detection rate.

If scanned files do not appear as malware, they will be isolated in our sandboxing system and examined for malicious behavior.

The inspection also includes checking the file communication to see if it tries to establish contact with Command and Control servers.  Malicious activity will be stopped at its roots to provide unparalleled endpoind threat remediation.

Process and Behavior-Based Scanning

Thor Vigilance Enterprise, the next-gen Antivirus, has the ability to detect code changes at all levels.  Once files start to execute, Thor Vigilance Enterprise will monitor processes and process chances with Heuristic, behavior-based engines powered by AI.

In an ever-changing threat landscape, impeccable detection and powerful mitigation is the fundamental security layer.

Product Comparison

Thor Foresight

Thor Vigilance

Thor Premium

Regular Antivirus

Regular Firewall

Advanced Ransomware Viruses, Spyware and APTs    
Traffic-based Malware Blocking (HIPS)    
Exploit & Dropper Blocking (HIPS)    
Attack Forensics & Source Identifier (IOAs, IOCs)    
Threat Hunting (EDR)    
Multi-layered, AI Powered Protection    
Patch Management    
Blocks Data Leakage    
Traffic-based Malware Detection (HIDS, IOAs, IOCs)      
Browser-based Protection      
Phishing Protection      
Firewall integration        
Next-gen Antivirus        
* Local Signature / File-based Scanning        
* Real-time Cloud Scanning      
* Sandbox and Backdoor Inspection      
* Process / Behavior-based Scanning        
Lightweight Installation and Smooth Performance      
Very Easy to Use      
Go Go
Small Person


Small Person

Interested in Thor Vigilance Enterprise?

Let us Call you

If you'd like to have a chat with us about Thor Vigilance Enterprise, please select this option.   If you'd prefer to email or phone us, our details are also here.

Request it!