Valkyrie logo

What others miss,
we expose.

Valkyrie is a tactical OT threat hunting and forensic platform for disconnected, constrained, and hard-to-monitor environments.

Valkyrie extends OT threat hunting and forensic visibility into disconnected and constrained environments where traditional OT security tools can’t deploy. It complements your existing OT monitoring platforms by giving your team deploy-anywhere coverage, flexible detection, and investigative depth in the places you struggle to see today.

Benefits

Save Time

Detect and respond to threats in near real-time by automating data collection and correlation.

More Data Sources

Stay ahead of threats by expanding visibility with host and network data analysis.

  • Host data, like Windows event logs, registry hives, and device data 
  • Network data
  • Batch data review – PCAPs
  • Streaming data

Flexible Deployment Options

With virtual and physical deployment options, you can choose what fits your environment best without complexity.

Tailored Detection

Customize detection logic to track specific threats based on the most relevant risks to your environment.

Built for the mission.

Full packet capture with real-time answers

Don’t choose between PCAP and analysis. Get both at once.

Valkyrie captures packets while simultaneously extracting the metadata, protocol insights, and detections your team needs to respond quickly. When something looks wrong, you can jump straight from an alert to the underlying packets — with the evidence preserved.

Dashboards that turn telemetry into certainty

See what’s happening across your environment — IT, OT, and everything in between. Our dashboards bring together network traffic, industrial protocol activity, endpoint signals, and threat detections so you can identify assets, validate suspicious behavior, and respond faster with confidence.

What you can monitor at a glance:

  • Network traffic visibility — baseline normal behavior, spot anomalies, and investigate suspicious communications.

  • Industrial protocol insight — understand OT communications (not just IPs and ports), including protocol activity and device behavior.

  • Threat detections — prioritize alerts with context, evidence, and severity.

  • Asset identification — map devices to roles, locations, and behaviors to reduce unknowns.

  • Windows Event Logs — correlate endpoint events with network activity for complete incident timelines.

  • High-interest Windows events — focus on the events that matter most, without drowning in noise.

  • Removable storage scanning — detect and investigate USB usage and removable media risk.

  • Suricata integration — bring IDS detections into the same investigation workflow.

Packet-layer depth, host-level context

Most tools rely on summaries — netflow, basic packet metadata, or isolated logs. That leaves blind spots during investigations.

Our analytics inspect network traffic at every layer of the packet to extract high-fidelity signals, then correlate them with host activity (including Windows Event Logs and high-interest events). The result is deeper detection, faster validation, and clearer root-cause analysis.

Built for investigations

  • From packet → protocol → behavior

  • From host event → network evidence

  • From alert → proof

Built for real-world operations

Threat hunting, monitoring, and assessments don’t always happen where your infrastructure lives. Fleet visibility makes it possible to:

  • Extend coverage to remote and temporary environments

  • Maintain consistent tooling across deployments

  • Standardize monitoring and reporting across regions

  • Move quickly with portable flyaway kits and virtual deployments

Pairs well with:

Cygnet
Flyaway Kit

Valkyrie software in a flyaway kit that you don’t have
to build and manage.​

Corvus
Managed Services

We work together using Valkyrie and Cygnet in your
environment​.

Aesir
Professional Services

OT Cybersecurity help,
when and how you need it.

See how Insane Cyber transforms security

Our products are designed to work with
you and keep your network protected.