Innovative Security Software for Business

We offer a unique set of security software for companies to provide full protection against any type of attack.

Abatis Host Integrity Technology

Abatis® enforces system integrity and proactively protects systems against malicious software. When deployed on supported Windows or Red Hat Linux platforms, Abatis® blocks malware infection in a simple but effective way.

  • Proven to protect web servers against hackers’ attacks
  • Non-signature based
  • Defeats zero day and targeted attacks
  • Enforces system and file integrity
  • Protects against known & unknown security threats
  • Denies any unauthorised modifications to the system
  • Prevents web defacement and malware insertion thus effectively neutralizing any hacking activity
  • Provides protection for Legacy equipment for which updates, and security patches and Anti-virus may no longer be available (from Windows NT4 to Windows 11, including all servers, inclusively)
  • A credible technical defence for real time, process control and safety-critical systems, Industrial Control Systems (ICS) and SCADA environments
  • Allows updates to Windows and other applications but blocks the portions of those updates that include unnecessary items, allowing a significant boost in Windows performance, leading to a massive reduction in network traffic
  • Backdoor or rootkit approach cannot be used and cannot bypass Abatis™ control even with the highest level of computer system privilege.


Central Management Console (CMC)

The CMC is the monitoring and management tool for the Abatis Shield Technology. It is a web-based application with a combination of functionality such as:

  • Log collection, log analysis, log query (report),
  • Real time monitoring and management.
  • With the CMC, authorised IT administrators can easily view real-time log information showing the status of Abatis Shield Technology clients, security trends, security alarms; and
  • Can interrogate the Abatis Shield Technology operating parameters as well as system and hardware information.


Benefits of Abatis®

  • Stops all attempts to write known and unknown malware to the permanent storage of the device
  • Protects real-time, safety-critical and SCADA devices
  • Low maintenance, virtually fit-and-forget solution
  • Near zero performance hit (imperceptible)
  • There is no additional demand on RAM and almost no CPU overhead because the software is less than 100 Kbytes in size and implemented at the file system level or zero ring (Kernel Level).
  • Shield Technology does not use signatures so there is no need for constant updates to add newly discovered attacks and no threat of being the Zero-Day victim.
  • No Block-listing or Allow-listing hash databases are maintained and Abatis Shield Technology is not reputation or heuristics based.
  • Does not use a “File Integrity Monitoring” model that simply notifies of a breach; and
  • Does not rely on Threat Intelligence feeds requiring additional subscription fees.