Welcome Xcellator

XcellSecure SM | Cloud Endpoint Security

Managed Endpoint detection & response service against targeted cyber attacks.

Stop Advanced Threats,Stay ahead of attackers with Adaptive,Layered Endpoint Security & Unique EDR

Starting @199 /month /per user

Buy Now Schedule Demo Take Tour Play Video
header-image

unmanaged

₹ 199 per user

on sale - Save 15%

order now
  • Automated Threat Detection
  • Assest & Application Discovery
  • AI Analysis
  • Vulnerabilities & Reports
  • Enhanced Assest Reporting
  • API Access & Integration

managed

₹ 289 per user

on sale - Save 15%

order now
  • Automated Threat Detection
  • Assest & Application Discovery
  • AI Analysis
  • Vulnerabilities & Reports
  • Enhanced Assest Reporting
  • API Access & Integration
  • 24x7 Manged Security Services
  • On-Demand Incident Response
  • Expert Threat & Malware Analysis

9 OUT OF 10 ATTACKS ON ORGANIZATIONAL SYSTEMS CAN BE STOPPED AT THE NETWORK LEVEL.

Firstly, unlike an AV solution, Darklayer GUARD™ doesn’t look at files, but at the infrastructure used by attackers.

The Heimdal™ CORP suite focuses on closing vulnerabilities and mitigating exploits, while constantly blocking incoming attacks, data leakage and Command & Control server communication.

Here is how Heimdal CORP's VectorN Detection fits into your security setup and boosts it with a much-need proactive layer.

Helping you make patching and vulnerability management cost-effective and time-efficient is our goal!

X-ploit Resilience enables you to cover the gaps in your security while demonstrating compliance for software and security audits.

Combining the most advanced endpoint DNS product in the world – the Darklayer GUARD™, with a highly complex threat detection package– VectorN Detection™, gives you HIPS & HIDS capabilities.

OUR SERVICES

Rapid Detection service is an enterprise-grade managed service that detects, quantifies & gathers evidence regarding advanced attacks

support-icon

24x7 Support

Experienced threats hunters from XcedllHost watching over your environment 24/7

Fast_Response-512

Quick Response

Max 30 minutes from breach detection to response, as agreed in a service level agreement

1429535

Guidance

High quality detection’s, with actionable response guidance by XcellHostexperts

WHY MOVE TO EDR

move-to-edr

USE CASES

shield

Block Ransomeware

misconfiguration

Advanced Threat Protection

Cross Site Script

Exploit prevention- Zero day Vulnerability

insecure

Data Center Security

data example

Clean up-Automatic Remediation

auth

Security For Hybrid Enviornment

Enables you to detect advanced malware, regardless of the attack vector (exploits, phishing, etc.).

Performs an in-depth analysis of all your incoming and outgoing HTTP, HTTPS and DNS traffic.

Works proactively during every stage of an attack to detect APTs, ransomware strains, botnets, Trojans and other known and unknown malware.

Provides alerts and detailed insights about your vulnerable endpoints, so you can mitigate risks and achieve legal compliance.

Using thorough traffic analysis, Thor Premium matches Machine Learning insights with Indicators of compromise/attack to uncover even hidden or dormant 2nd generation malware.

FACTS & FIGURES

keyfacts

talk to our cloud ex

Cloud Endpoint Security - WHAT OUR CUSTOMERS HAVE TO SAY?

The amount of security you get from this software definitely outweighs the cost. It is reliable and has worked very well for me to date.

-kamlesh khanna

It works quietly in the background, scanning for any potential threats while not disturbing me with what I am doing, and if any threats are found, it shuts it down immediately.

-kashap chidori

It is a very useful antivirus and during the time I used it, it perfectly protected my computers and its cost was always within what I was willing to pay.

-manan jhat

FREQUENTLY ASKED QUESTIONS

The VectorN Detection engine is a new feature and its purpose is to search for patterns within the blocks that Thor's Traffic Scanning records. 

          * It works across-the-board on any Windows™ device;

          * It does not rely on scanning the code or auditing any system processes. Instead, the new technology uses Machine Learning Detection (MLD) to perform an in-depth analysis of all incoming and outgoing HTTP, HTTPS and DNS traffic.

          * It matches Machine Learning (MLD) insights with Indicators of compromise/attack (IOC/IOA) and network forensics, turning Thor Foresight into a unique, proactive cybersecurity suite.

          * It helps users discover even hidden, second-generation malware that tries to infect the endpoint or attempts to harvest data from the compromised system.

          * By tracking device-to-infrastructure communication, this technology enables users to detect and block advanced malware, regardless of the attack vector.

Example: 

If Thor Foresight's Traffic Scanning is blocking a specific domain or multiple domains at a specific time of the day, VectorN Detection will consider this a pattern and will inform the user that there might be a possible threat. 

Patterns:

- A domain is blocked multiple times a day in a very short time period.

- A domain is blocked every day at a specific time 

- Multiple domains are blocked in a very short time period. 

Thor Premium product line-up includes 2 main product branches: Thor Foresight and Thor Vigilance. The products complement each other, and they should be combined in order to offer maximum system and network protection. 

Thor Foresight has been specifically designed to protect you from financial and data-stealing malware while doing banking operations and keep you safe from Zero Hour malware and security exploits frequently employed by IT, criminals.

Thor RC is the release candidate (beta version) that is in pre-production.

We recommend you install this version only if someone from the Heimdal Security team recommends you do it. Otherwise, this version might cause issues because of its relative instability.

  1. When Thor is installed your local DNS is changed to 127.7.7.x and your DNS server is saved by Thor in the registries.
  2. Four new services will be activated: Heimdal Antivirus, Heimdal Client Host, Heimdal DarkLayer Guard and Heimdal Uptime Checker, all of them set to Automatic
  3. Two new folders will be created, one in Program Files or Program File (x86), depending on the OS architecture and one in ProgramData.
  4. One icon in the Taskbar
  5. One certificate in the Trusted People folder.
  1. When Thor is installed your local DNS is changed to 127.7.7.x and your DNS server is saved by Thor in the registries.
  2. Four new services will be activated: Heimdal Antivirus, Heimdal Client Host, Heimdal DarkLayer Guard and Heimdal Uptime Checker, all of them set to Automatic
  3. Two new folders will be created, one in Program Files or Program File (x86), depending on the OS architecture and one in ProgramData.
  4. One icon in the Taskbar
  5. One certificate in the Trusted People folder.

In case you suspect that your antivirus is interfering with Heimdal Security’s functionality, you’ll need to add some exceptions to allow Thor to work properly.

Here are some examples of potential interferences:

The Heimdal services do not start at Windows’s start-up or the network adapter’s DNS 127.0.0.1 is not set for some reason even if the Traffic Scanning is ON.

The files you need to add are located in this path: C:\Program Files (x86)\Heimdal (you need to add them one by one) 

- Heimdal.Agent​​
- Heimdal.AgentLoader​​
- Heimdal.ClientHost​​
- Heimdal.SecureDNS​
- Heimdal.UptimeChecker.exe
- Heimdal.AgentError.exe

Restart the computer and check if everything is working as it should!

RELATED TO ITEM YOU HAVE VIEWED...

Performance Cloud-1

Performance Cloud

Simplify your cloud infrastructure with XcellHost robust set of tools to develop, deploy, and scale your applications faster and easier.

Dedicated GPU Cloud

GPU Cloud

Accelerate your machine learning and deep learning workloads with Tesla V100 and Nvidia T4 based GPU instances.

Bare metal Cloud

Bare Metal Cloud

Experience bare-metal performance on Cloud with zero noisy neighbor problem, and reliable performance.