{"id":3005,"date":"2018-02-14T12:26:12","date_gmt":"2018-02-14T11:26:12","guid":{"rendered":"http:\/\/nextron.bsk-consulting.de\/?p=3005"},"modified":"2022-03-25T14:15:06","modified_gmt":"2022-03-25T13:15:06","slug":"new-thor-spark-license-packs","status":"publish","type":"post","link":"https:\/\/www.nextron-systems.com\/2018\/02\/14\/new-thor-spark-license-packs\/","title":{"rendered":"New THOR \/ SPARK License Packs"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;3.22&#8243;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.4.2&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; hover_enabled=&#8221;0&#8243;]We have just recently released new, flexible and practice-oriented <a href=\"\/license-packs\/\">license packs<\/a> for our scanners THOR and SPARK. These license packs will help you to get started as quickly as possible in case of an incident response, digital forensics engagement or compromise assessment.<\/p>\n<p>Most packs include a short-term but unrestricted enterprise license that allows you to run THOR or SPARK on any end system within an organisation. (the default licensing includes only host-based licenses; unrestricted enterprise licenses are more expensive)<\/p>\n<p>Each license pack is offered at an attractively low price.<\/p>\n<h3>The Right Package for Every Mission<\/h3>\n<p>We offer license packs for the following scenarios:<\/p>\n<ul>\n<li>Incident Response Cases<\/li>\n<li>Compromise Assessments (enterprise wide \/ single system)<\/li>\n<li>Digital Forensics Engagements<\/li>\n<\/ul>\n<p>The license packs are the perfect solution for:<\/p>\n<ul>\n<li>Incident Response Teams<\/li>\n<li>Security Service Providers<\/li>\n<li>CERTs \/ CSIRTs<\/li>\n<li>Digital Forensics Specialists<\/li>\n<li>SOC Teams<\/li>\n<\/ul>\n<h3>Customer Portal<\/h3>\n<p>After purchasing one or more license packs, we create an account in our customer portal in which you can issue a license right when you need it. It also has a &#8220;Downloads&#8221; section in which you find the scanner software, guides and signature information.<\/p>\n<div id=\"attachment_3006\" style=\"width: 1371px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-3006\" class=\"wp-image-3006 size-full\" src=\"\/wp-content\/uploads\/2018\/02\/Screen-Shot-2018-02-12-at-21.43.13.png\" alt=\"\" width=\"1361\" height=\"1032\" srcset=\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2018\/02\/Screen-Shot-2018-02-12-at-21.43.13.png 1361w, https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2018\/02\/Screen-Shot-2018-02-12-at-21.43.13-300x227.png 300w, https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2018\/02\/Screen-Shot-2018-02-12-at-21.43.13-768x582.png 768w, https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2018\/02\/Screen-Shot-2018-02-12-at-21.43.13-1024x776.png 1024w, https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2018\/02\/Screen-Shot-2018-02-12-at-21.43.13-1080x819.png 1080w\" sizes=\"(max-width: 1361px) 100vw, 1361px\" \/><p id=\"caption-attachment-3006\" class=\"wp-caption-text\">Customer Portal<\/p><\/div>\n<h3>Example<\/h3>\n<p>For example, when you purchase 3 &#8220;Incident Response&#8221; license packs, you&#8217;ll get 3 full and unrestricted enterprise licenses of THOR and SPARK, each of them with a validity of 30 days from the issue date.<\/p>\n<p>You also receive 15 host-based licenses with a validity of 5 days each which you can issue and use for all types of testing and lab scanning.<\/p>\n<p>You can use THOR for Windows and SPARK for Linux and OSX system scans. Both scanners contain our huge signature database and allow you to integrate your own IOCs and YARA signatures in an unencrypted or encrypted form.<\/p>\n<h3>Contact<\/h3>\n<p>If you can&#8217;t find your use case covered by one of our license packs, please don&#8217;t hesitate to contact us. Boost your detection capabilities and ask for a <a href=\"\/get-a-quote\/\">quote<\/a> or <a href=\"\/trial\/\">request a trial<\/a>\u00a0today.[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We have just recently released new, flexible and practice-oriented license packs for our scanners THOR and SPARK. These license packs will help you to get started as quickly as possible in case of an incident response, digital forensics engagement or compromise assessment. Most packs include a short-term but unrestricted enterprise license that allows you to run THOR or SPARK on any end system within an organisation. (the default licensing includes only host-based licenses; unrestricted enterprise licenses are more expensive) Each license pack is offered at an attractively low price. The Right Package for Every Mission We offer license packs for the following scenarios: Incident Response Cases Compromise Assessments (enterprise wide \/ single system) Digital Forensics Engagements The license packs are the perfect solution for: Incident Response Teams Security Service Providers CERTs \/ CSIRTs Digital Forensics Specialists SOC Teams Customer Portal After purchasing one or more license packs, we create an account in our customer portal in which you can issue a license right when you need it. It also has a &#8220;Downloads&#8221; section in which you find the scanner software, guides and signature information. Example For example, when you purchase 3 &#8220;Incident Response&#8221; license packs, you&#8217;ll get 3 full and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"We have just recently released new, flexible and practice-oriented <a href=\"http:\/\/nextron.bsk-consulting.de\/license-packs\/\">license packs<\/a> for our scanners THOR and SPARK. These license packs will help you to get started as quickly as possible in case of an incident response, digital forensics engagement or compromise assessment.\r\n\r\nMost packs include a short-term but unrestricted enterprise license that allows you to run THOR or SPARK on any end system within an organisation. (the default licensing includes only host-based licenses; unrestricted enterprise licenses are more expensive)\r\n\r\nEach license pack is offered at an attractively low price.\r\n\r\n<!--more-->\r\n<h3>The Right Package for Every Mission<\/h3>\r\nWe offer license packs for the following scenarios:\r\n<ul>\r\n \t<li>Incident Response Cases<\/li>\r\n \t<li>Compromise Assessments (enterprise wide \/ single system)<\/li>\r\n \t<li>Digital Forensics Engagements<\/li>\r\n<\/ul>\r\nThe license packs are the perfect solution for:\r\n<ul>\r\n \t<li>Incident Response Teams<\/li>\r\n \t<li>Security Service Providers<\/li>\r\n \t<li>CERTs \/ CSIRTs<\/li>\r\n \t<li>Digital Forensics Specialists<\/li>\r\n \t<li>SOC Teams<\/li>\r\n<\/ul>\r\n<h3>Customer Portal<\/h3>\r\nAfter purchasing one or more license packs, we create an account in our customer portal in which you can issue a license right when you need it. It also has a \"Downloads\" section in which you find the scanner software, guides and signature information.\r\n\r\n[caption id=\"attachment_3006\" align=\"alignnone\" width=\"1361\"]<img class=\"wp-image-3006 size-full\" src=\"http:\/\/nextron.bsk-consulting.de\/wp-content\/uploads\/2018\/02\/Screen-Shot-2018-02-12-at-21.43.13.png\" alt=\"\" width=\"1361\" height=\"1032\" \/> Customer Portal[\/caption]\r\n<h3>Example<\/h3>\r\nFor example, when you purchase 3 \"Incident Response\" license packs, you'll get 3 full and unrestricted enterprise licenses of THOR and SPARK, each of them with a validity of 30 days from the issue date.\r\n\r\nYou also receive 15 host-based licenses with a validity of 5 days each which you can issue and use for all types of testing and lab scanning.\r\n\r\nYou can use THOR for Windows and SPARK for Linux and OSX system scans. Both scanners contain our huge signature database and allow you to integrate your own IOCs and YARA signatures in an unencrypted or encrypted form.\r\n<h3>Contact<\/h3>\r\nIf you can't find your use case covered by one of our license packs, please don't hesitate to contact us. Boost your detection capabilities and ask for a <a href=\"http:\/\/nextron.bsk-consulting.de\/get-a-quote\/\">quote<\/a> or <a href=\"http:\/\/nextron.bsk-consulting.de\/trial\/\">request a trial<\/a>\u00a0today.","_et_gb_content_width":"","footnotes":""},"categories":[46,33,32],"tags":[69,67,68,66,65,64,5],"class_list":["post-3005","post","type-post","status-publish","format-standard","hentry","category-newsletter","category-spark","category-thor","tag-compromise-assessment","tag-dfir","tag-digital-forensics","tag-incident-response","tag-license-packs","tag-spark","tag-thor"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>New THOR \/ SPARK License Packs - Nextron Systems<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.nextron-systems.com\/2018\/02\/14\/new-thor-spark-license-packs\/\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.nextron-systems.com\/2018\/02\/14\/new-thor-spark-license-packs\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2018\/02\/14\/new-thor-spark-license-packs\/\"},\"author\":{\"name\":\"Florian Roth\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919\"},\"headline\":\"New THOR \/ SPARK License Packs\",\"datePublished\":\"2018-02-14T11:26:12+00:00\",\"dateModified\":\"2022-03-25T13:15:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2018\/02\/14\/new-thor-spark-license-packs\/\"},\"wordCount\":401,\"publisher\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\"},\"keywords\":[\"compromise assessment\",\"dfir\",\"digital forensics\",\"incident response\",\"license packs\",\"spark\",\"thor\"],\"articleSection\":[\"Newsletter\",\"SPARK\",\"THOR\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.nextron-systems.com\/2018\/02\/14\/new-thor-spark-license-packs\/\",\"url\":\"https:\/\/www.nextron-systems.com\/2018\/02\/14\/new-thor-spark-license-packs\/\",\"name\":\"New THOR \/ SPARK License Packs - Nextron Systems\",\"isPartOf\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#website\"},\"datePublished\":\"2018-02-14T11:26:12+00:00\",\"dateModified\":\"2022-03-25T13:15:06+00:00\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.nextron-systems.com\/2018\/02\/14\/new-thor-spark-license-packs\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.nextron-systems.com\/#website\",\"url\":\"https:\/\/www.nextron-systems.com\/\",\"name\":\"Nextron Systems\",\"description\":\"We Detect Hackers\",\"publisher\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.nextron-systems.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\",\"name\":\"Nextron Systems GmbH\",\"url\":\"https:\/\/www.nextron-systems.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png\",\"contentUrl\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png\",\"width\":260,\"height\":260,\"caption\":\"Nextron Systems GmbH\"},\"image\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919\",\"name\":\"Florian Roth\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g\",\"caption\":\"Florian Roth\"},\"description\":\"Florian Roth serves as the Head of Research and Development at Nextron Systems. With a background in IT security since 2000, he has delved deep into nation-state cyber attacks since 2012. Florian has developed the THOR Scanner and actively engages with the community via his Twitter handle @cyb3rops. He has contributed to open-source projects, including 'Sigma', a generic SIEM rule format, and 'LOKI', an open-source scanner. Additionally, he has shared valuable resources like a mapping of APT groups and operations and an Antivirus Event Analysis Cheat Sheet.\",\"url\":\"https:\/\/www.nextron-systems.com\/author\/florian\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"New THOR \/ SPARK License Packs - Nextron Systems","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.nextron-systems.com\/2018\/02\/14\/new-thor-spark-license-packs\/","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.nextron-systems.com\/2018\/02\/14\/new-thor-spark-license-packs\/#article","isPartOf":{"@id":"https:\/\/www.nextron-systems.com\/2018\/02\/14\/new-thor-spark-license-packs\/"},"author":{"name":"Florian Roth","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919"},"headline":"New THOR \/ SPARK License Packs","datePublished":"2018-02-14T11:26:12+00:00","dateModified":"2022-03-25T13:15:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.nextron-systems.com\/2018\/02\/14\/new-thor-spark-license-packs\/"},"wordCount":401,"publisher":{"@id":"https:\/\/www.nextron-systems.com\/#organization"},"keywords":["compromise assessment","dfir","digital forensics","incident response","license packs","spark","thor"],"articleSection":["Newsletter","SPARK","THOR"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.nextron-systems.com\/2018\/02\/14\/new-thor-spark-license-packs\/","url":"https:\/\/www.nextron-systems.com\/2018\/02\/14\/new-thor-spark-license-packs\/","name":"New THOR \/ SPARK License Packs - Nextron Systems","isPartOf":{"@id":"https:\/\/www.nextron-systems.com\/#website"},"datePublished":"2018-02-14T11:26:12+00:00","dateModified":"2022-03-25T13:15:06+00:00","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nextron-systems.com\/2018\/02\/14\/new-thor-spark-license-packs\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.nextron-systems.com\/#website","url":"https:\/\/www.nextron-systems.com\/","name":"Nextron Systems","description":"We Detect Hackers","publisher":{"@id":"https:\/\/www.nextron-systems.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nextron-systems.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.nextron-systems.com\/#organization","name":"Nextron Systems GmbH","url":"https:\/\/www.nextron-systems.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png","contentUrl":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png","width":260,"height":260,"caption":"Nextron Systems GmbH"},"image":{"@id":"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919","name":"Florian Roth","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g","caption":"Florian Roth"},"description":"Florian Roth serves as the Head of Research and Development at Nextron Systems. With a background in IT security since 2000, he has delved deep into nation-state cyber attacks since 2012. Florian has developed the THOR Scanner and actively engages with the community via his Twitter handle @cyb3rops. He has contributed to open-source projects, including 'Sigma', a generic SIEM rule format, and 'LOKI', an open-source scanner. Additionally, he has shared valuable resources like a mapping of APT groups and operations and an Antivirus Event Analysis Cheat Sheet.","url":"https:\/\/www.nextron-systems.com\/author\/florian\/"}]}},"_links":{"self":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/3005","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/comments?post=3005"}],"version-history":[{"count":8,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/3005\/revisions"}],"predecessor-version":[{"id":7312,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/3005\/revisions\/7312"}],"wp:attachment":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/media?parent=3005"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/categories?post=3005"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/tags?post=3005"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}