Xthor monitors your OT network at the protocol level. Passively, without agents, without touching the control plane. It detects attacks your SOC has never seen, and explains them to the engineers who can actually stop them.
Industrial control networks run on decades of proprietary protocols that generic security tools cannot read. Attackers know this. The most destructive ICS attacks in history (Industroyer, TRITON, PIPEDREAM) all exploited this detection gap. Xthor closes it.
Firewalls and generic IDS see network flows. Xthor reads the protocol: command type, target device, process parameter, value. The difference between "normal traffic" and an attack is in those details.
PIPEDREAM, Industroyer2, TRITON - every major ICS attack was designed to stay invisible in standard OT networks. Eight adversary groups are active today. Xthor tracks each one.
Xthor doesn't generate tickets for your security team. It tells your process engineers exactly what happened, what it means for the physical process, and what to do next - in their language.
Xthor connects to a SPAN port or TAP on your OT switch. It never injects packets, never participates in protocol handshakes, and is invisible to every device on your network (including attackers).
Reads the semantic content of industrial communications, not just the header. What is being commanded, on which device, and what it means for the process.
Automatic device discovery with vendor fingerprinting and firmware identification. Every asset correlated with active vulnerability advisories - no manual input required.
Network baselines learned from your environment. Deviations detected at the command level, not just traffic volume. Catch slow attacks that look normal from the outside.
Every alert auto-mapped to the ICS technique matrix. Kill chain visualization shows which attack phase is active. Full coverage from Initial Access to Impact.
Eight active ICS adversary groups tracked in real time. IOC matching against live feeds. Every new advisory automatically correlated against your existing asset inventory.
Every alert explained in the language of the process: what happened, which device, what it means physically, what the risk is, and what to do. For engineers, not analysts.
Automated gap analysis for IEC 62443, NERC CIP, and NIS2. Zone models, security level assessments, and audit-ready reports — generated continuously from live network data.
Multi-tenant, MSSP-ready deployment. On-premise, air-gap, or hybrid cloud. SAML 2.0 / OIDC SSO, MFA, RBAC. Scales from a single site to a global industrial estate.
Xthor covers 180+ industrial protocols across every major sector, from IEC 61850 substation protection and PLC control networks to safety instrumented systems and smart metering infrastructure. Coverage is updated continuously as new protocols emerge.
Plus 25+ proprietary protocols across major DCS vendors including Honeywell, Emerson, Yokogawa, and GE.
Xthor doesn't rely on a single detection approach. Behavioral baselines, machine learning, protocol-specific signatures, and live threat intelligence run simultaneously — each catching what the others miss.
Every Xthor alert includes a physical consequence analysis — what device, what command, what it means for the process, whether the safety limits are at risk, and the exact recommended action. No SOC intermediary required.
Alerts reference the engineering tag, process variable, unit of measure, and safety limit - not the protocol address. Your operators understand it immediately.
Query your entire event history in plain English. No SIEM query language, no log parsing. Ask the question, get the answer.
ML models detect gradual setpoint manipulation weeks before it reaches process impact — a class of attack that conventional signature detection cannot catch.
AI runs locally on your hardware. No data leaves the plant. Air-gapped environments fully supported with on-premise fine-tuned models.
Xthor ThreatDB tracks the TTPs of every major ICS threat actor — updated continuously from ICS-CERT, CISA, and open threat intelligence communities. Every detection is enriched with adversary context the moment a match occurs.
Xthor sends enriched OT security events to every major SIEM, SOAR, and ticketing platform. No custom connectors, no professional services engagement.
Live deployment on your network or replay from your own packet capture. Working detections in under an hour - no commitment, no professional services fee, no extended onboarding.