Prevention

Abatis® is an innovative endpoint cybersecurity software solution that protects nearly all operating systems. Developed as a military cybersecurity solution, Abatis was first deployed in 2005 to safeguard critical national infrastructure, government entities, and various high-integrity organisations. In 2022, the founder sold Abatis to a new organisation, which dedicated the following 18 months to enhancing the technology for a broader market. In January 2024, Abatis passed its final penetration tests and became available worldwide.

Abatis can stop malware and cyber-attacks in less than a millionth of a second on a standard PC, demonstrating that prevention is more effective than reaction. This proactive approach empowers users, which means they can trust that Abatis is constantly working to keep their systems safe. Unlike traditional ‘detect and respond’ models that react to threats after infiltrating a system, Abatis utilises advanced cyber engineering principles to prevent attacks proactively, giving users a sense of control over their system’s security.

As a kernel-level (ring zero) filter technology, Abatis seamlessly integrates into the operating system’s kernel, providing a robust defence against cyber threats. This robustness instils confidence, ensuring that Abatis can handle even the most sophisticated attacks. It operates independently of threat intelligence sharing, behavioural analysis, or heuristics, ensuring cyber sovereignty by keeping all data within the protected estate or operating system. This robustness gives users a sense of reassurance about their system’s security.

Abatis effectively addresses the challenge of cadence patching, mitigating the risks associated with bad actors weaponising published CVE proofs of concept in under 10 hours. With a tiny footprint of less than 100 KB—comparable to a single sheet of A4 paper—Abatis presents a minimal attack surface compared to traditional solutions. Additionally, it has been shown to reduce energy consumption, decrease CPU cycles, and enhance network speed by over 50% compared to traditional Endpoint Detection and Response (EDR) solutions.

Abatis protects against file-less attacks and blocks unauthorised software deployments that could compromise computer stability or drain valuable resources by preventing unauthorised code from entering an organisation’s network. With Abatis, organisations gain a reliable, proactive cybersecurity solution that safeguards their critical systems against the evolving landscape of cyber threats.

BENEFITS OF ABATIS® SECURITY TECHNOLOGY

Abatis® is a proactive security software with no reported breaches or Common Vulnerabilities and Exposures (CVEs).

Abatis® offers comprehensive protection against all types of malware, from Advanced Persistent Threats (APTs) to zero-day malware, viruses, worms, spyware, adware, trojans, rootkits, and the exploitation of Alternate Data Streams (ADS).

Abatis® is designed to stop file-less attacks that occur in RAM.

Abatis® is your network’s vigilant guardian, preventing users and System Administrators from inadvertently or maliciously introducing unauthorised code. This strict control ensures the integrity and security of your network.

Moreover, Abatis® plays a crucial role in maintaining system stability by preventing the deployment of unauthorised software. This includes potential threats such as cryptocurrency mining, potential copyright breaches in film libraries, and illegal website hosting.

Protection Against Cyber Attack

Malware Protection

The Abatis® solution delivers comprehensive protection against a wide array of malware, including Trojans, worms, and diverse forms of malicious code. By implementing effective malware protection through Abatis, organisations can thwart potential intrusions and identify malware prior to its entry and propagation within the network.

Ransomware Protection

Abatis® effectively detects and prevents ransomware attacks, ensuring that malicious software cannot infiltrate the network or spread across systems. Functioning as a robust protective barrier, it safeguards sensitive data and preserves the integrity of the network environment.

Zero Day Protection

Abatis® offers protection against both known and unknown vulnerabilities, commonly referred to as zero-day threats. This approach ensures that your systems remain secure and robust, safeguarding your organisation’s digital infrastructure.

Free Trial

Start your Free Proof of Concept Now

Product Deployment

Deploy, optimize, and manage your Shield product

Verticals

 Manufacturing

  •   De-risks whole IT estate via single console (or hierarchy)
  •   Protects older operating Systems back to NT4, particularly useful in air-gapped environments eg., SCADA
  •   Fast accreditation due to tiny software footprint (under 100kbs)
  •   Strong protection as self-hardening
  •   No updates required
  •   Protects against remote engineers USB infection or any other threat surface
  •   Satisfies General Data Protection Regulation controls
  •   Allows for fixed annual endpoint security budget
  •   Deployment is achieved using standard Microsoft toolset or can be deployed manually in situ
  •   In non-dynamic environment is fit & forget – no updates
  •   Works across Virtual & Physical endpoints including Servers
  •   Scalable to 10,000’s of endpoints


Verticals

Local Government

  •   De-risks whole IT estate via single console (or hierarchy of consoles)
  •   Puts C-Suite back in control
  •   Enables duty of care to citizens and employees
  •   Satisfies General Data Protection Regulation controls
  •   Allows for fixed annual security budget
  •   Works across Virtual & Physical endpoints including servers Strong protection as self-hardening
  •   No updates required
  •   Protects against USB or any other threat surface
  •   Deployment is achieved using standard Microsoft toolset(s)
  •   In non-dynamic environment is fit & forget – no updates
  •   Allows approved software supplier updates and patches
  •   Scalable to 10,000’s of endpoints
  •   Minimal administration with full logging
  •   Full change control with proper governance – eg., Patching cycle is now brought under control at zero risk


Verticals

Finance

  •   De-risks whole IT estate via single console (or hierarchy)
  •   Protects older operating Systems back to NT4, 
  •   Zero Latency-no measurable “bump in the wire”.
  •   Fast accreditation due to tiny software footprint (under 100kbs)
  •   Strong protection as self-hardening
  •   No updates required
  •   Protects against remote engineers USB infection or any other threat surface
  •   Satisfies General Data Protection Regulation controls
  •   Allows for fixed annual Endpoint security budget
  •   Seamlessly integrates with other security toolsets
  •   Can deploy with pre-existing monitoring and governance solutions 
  •   Deployment is achieved using standard Microsoft toolsets
  •   In non-dynamic environment is fit & forget – no updates
  •   Works across Virtual & Physical endpoints including Servers
  •   Scalable to 10,000’s of endpoints
  •   Measurable contribution to Carbon Footprint reduction – especially across Data Centre


Verticals

Energy 

  •   De-risks whole IT estate via single console (or hierarchy)
  •   Protects older operating Systems back to NT4
  •   Also Proven in Civil Nuclear environments
  •   Works in Air-gapped environments with “NO” degradation of effectiveness
  •   Powerful tool in providing assurance of Governance Risk & Compliance (GRC)
  •   Fast accreditation due to tiny software footprint (under 100kbs)
  •   Strong protection as self-hardening
  •   Protects against remote engineers USB infection or any other threat surface
  •   Works in SCADA and other minimal footprint environments
  •   Satisfies General Data Protection Regulation controls
  •   Allows for fixed annual Endpoint security budget
  •   Seamlessly integrates with other security toolsets
  •   Can deploy with pre-existing monitoring and governance solutions 
  •   Deployment is achieved using standard Microsoft toolsets (and others) or can be deployed manually in situ
  •   In non-dynamic environment is fit & forget – no updates
  •   Works across Virtual & Physical endpoints including Servers