Need More Details ?
- Our ABATIS Shield Technology is currently successfully protecting critical national infrastructure (including but not limited to, military and civilian nuclear, air traffic control systems) and high integrity corporations. Protecting against malware, ransomware, corruption and theft of data, files or media.
- It is a proactive security software, with no reported breaches or Common Vulnerabilities and Exposures.
- It is effective against Zero Day Malware, viruses, worms, spyware, trojans, botnet, and rootkit attacks/infection, including evolving Ransomware attacks, Advanced Persistent Threats (and exploitation of Alternate Data Streams). We stopfile less (in RAM) attacks.
- Military & Civilian air traffic control systems Military and Civilian nuclear
- Critical National Infrastructure Industrial Control Systems (ICS) & SCADA
- Mass Transit Systems
- Logistics hubs – major European port infrastructure Casinos
- High integrity Enterprise & SME’s
- Innovative, disruptive & patented
- Stops known unknown malware inc. file less
- Stops zero days and targeted phishing attacks
- Legacy Preservation NT4 to present day
- ICS/SCADA systems protection proven, credible technical defense
- More efficient ZERO performance degradation
- Tiny footprint
- Can uncover existing infections
- Works with all other security tools
- Works in Linux
- Android, IOS & IoT on roadmap
- ABATIS Shield is Ring 0 self hardened code. Creates an unchangeable OS
- Prevents all unauthorised programs from being written to end points
- Prevents ZERO DAY attacks
- No false positives, no false negatives
- Zero latency
- Log files stored locally
- Deterministic and proven safe in Safety Critical, SCADA, etc.
- No signature file/white list updates
- Works with all known existing security products.
- Locates pre existing malware infection(s)
- No Personal Identifiable Information (PII) leaves your estate
- Traditional AV is slow bloatware and can’t stop zero-days even with heuristic analysis – the problem is huge
- Whitelisting – Cumbersome, can’t stop DLL injection,
- ADS attacks or rootkits (must whitelist WinLogon & svchost – favourite hacker targets)
- Reputation based – like an MOT. No standard. False +/-
- Behavioural analysis and sandboxing – it knows!.
- Probabilistic analysis in general – will flag but false +/- and requires infections
- Firewalls – must have open ports which can be abused (encrypted channels etc.)
- IDS/IPS – again probabilistic so false +/- and malware is ‘aware’
- Central Management Console (CMC) provides facilities for SMEs and Cos. without SIEMs to:
- Monitor ABATIS Shield on an estate.
- Retrieve and analyse logs.
- Craft policy updates for ABATIS Shield individually, in groups or globally as required.
- CMC and/or Your Enterprise SIEM can:
- •Identify existing infections such as blocked APT updates.
- •‘Clean up’ existing infection proven reduction from 3 days to 2 hours (90% improvement).
- Road map for enterprise APIs for logs and policy management.
- Established 2005 at Royal Holloway University of London
- Award winning innovative, proven and patented software technology for Windows and Linux
- Continual development; third party testing by Lockheed Martin, BAE Systems, ATOS, and others to establish TRUST (claims made are validated and verified by organisation’s who have conducted evals)
- US and International Patent Granted in May 2015, European Patent Pending, new patents pending
- Low profile until patent grant restricted sales to Critical National Infrastructure, High Integrity Nuclear and Transport
- Royal Holloway Security Team Completed a Blackbox Penetration Test Which Our Technology Passed 22nd November 2022
- Successfully tested by a western Government’s Military against their entire back catalogue of malware, dating back 10 years, including Nation State attacks.
- Passed ITSEC evaluation testing with European ‘alphabet agency’.
- Evaluated with one of the world’s largest aircraft manufacturers specifically for SCADA/ICS use case with successful results
Windows Version
Windows NT4
Windows 2000
Windows XP
Windows XP Embeded
Windows Vista
Windows 7
Windows 2003 Server
Windows 2008 Web Server
Windows 2008 Server
Windows 8/8.1
Windows 10
Windows 2012
Windows 10 to Enterprise 2015
Windows 11
Mainstream Support Ends
Ended 2001
Ended 2005
Ended 2009
Ended 2011
Ended 2012
Ended January 2015
Ended 2010
Ended July 2013
Ended January 2015
Ended 9 January 2018
Ended 13 October 2020
Ended 9 January 2018
Ended October 2021
Current
Extended Support Ends
Ended 2004
Ended 2010
Ended April 2014
Ended January 2016
Ended April 2017
Ended January 2020
Ended July 2015
Ended January 2020
Ended January 2020
Ended January 2023
Ended January 2020
Ended 10 January 2023
Ended October 2023
Ends October 2025