
Kernel-level application whitelisting to block unauthorized code execution.
Kernel-level application whitelisting to block unauthorized code execution.
Abatis System is a kernel-level application whitelisting and execution control solution developed by Abatis (Platinum High Integrity Technologies). It operates by enforcing a strict allowlist of pre-approved files at the operating system kernel level, preventing any unauthorized or unknown code from executing on protected endpoints. How it works: - The system intercepts execution requests at the kernel level before any code can run - Only files that have been pre-approved and whitelisted are permitted to execute - Any file not on the approved list is blocked outright, regardless of whether it is known malware or a novel zero-day threat Key operational characteristics: - Does not rely on signature databases, cloud lookups, or heuristic/behavioral analysis - Requires no ongoing signature updates or patch management - Operates with a reported footprint of less than 100KB - Functions in both network-connected and air-gapped environments - Compatible with legacy and modern Windows systems, including those running as far back as NT4 - Claims over 20 years of operational history without a recorded breach Use cases and compliance: - Designed for critical infrastructure, high-security industries, and environments where legacy systems must be protected - Supports GDPR compliance requirements - Produces consistent penetration testing results due to its deterministic nature - Eliminates false positives and false negatives associated with detection-based approaches The solution is positioned as an alternative to traditional antivirus and EDR products, focusing on prevention rather than detection or response. It does not require continuous monitoring, behavioral analysis, or significant system resources to operate.
Common questions about Abatis System including features, pricing, alternatives, and user reviews.
Abatis System is Kernel-level application whitelisting to block unauthorized code execution, developed by Abatis. It is a Endpoint Security solution designed to help security teams with Whitelist, Ransomware Prevention, Zero Day.
Abatis System offers the following core capabilities:
Abatis System is deployed as a on-premises solution, suited to startup, smb, mid-market, enterprise organizations looking to operationalize endpoint security. The commercial offering is positioned for production security operations with vendor support and SLAs.
Abatis System is built for security teams handling Whitelist, Ransomware Prevention, Zero Day, Critical Infrastructure. It supports workflows including kernel-level execution control and application whitelisting, prevention of unauthorized code execution without signature updates, support for air-gapped and network-connected environments. Teams typically adopt Abatis System when they need to endpoint security capabilities integrated into their existing stack. Explore similar tools at https://cybersectools.com/alternatives/abatis-system
Abatis System is a commercial Endpoint Security solution. For detailed pricing information, visit https://www.abatis.ch/the-abatis-system/ or contact Abatis directly.
Popular alternatives to Abatis System include:
Compare all Abatis System alternatives at https://cybersectools.com/alternatives/abatis-system
Abatis System is for security teams and organizations that need Whitelist, Ransomware Prevention, Zero Day, Critical Infrastructure, Windows Security. It's particularly suitable for enterprises requiring robust, commercial-grade security capabilities. Other Endpoint Security tools can be found at https://cybersectools.com/categories/endpoint-security
Head-to-head feature, pricing, and rating breakdowns.
Deception-based endpoint agent preventing ransomware & malware pre-execution.
Antivirus software for Windows PCs providing malware protection and web security
A repository containing scripts and configuration files to help administrators implement Microsoft AppLocker for application whitelisting based on NSA security guidelines.