Problems that solves
Unauthorized access to corporate IT systems and data
Risk or Leaks of confidential information
Malware infection via Internet, email, storage devices
Risk of attacks by hackers
Values
Reduce Costs
Ensure Security and Business Continuity
Ensure Compliance
Abatis HDF
Abatis HDF is a host-based software-only solution that blocks unwanted executables. It is implemented as a kernel driver on Windows platforms.
About Product
Description
Abatis HDF is a host-based software-only solution that is implemented as a kernel driver on Windows platforms. It intercepts and mediates file write access to the computer’s permanent storage e.g. local hard disk, network shares and removable storage devices such as USB stick and external disk. It is designed to help enforce system and file integrity without complex management overheads. It achieves this security objective by exercising robust access control over the writing of executable files and user-defined files (protected files) to a computer. It protects against unauthorized modification and denies unauthorized write operations. While HDFblocks unwanted executables by default, the HDF system administration can define files for integrity protection according to the computer’s roles.
Ideally, Abatis HDF should be deployed on a newly installed ‘clean’ operating system. From this secure initial state (baseline), Abatis HDF will prevent malware infection than on. For most corporate environments, Abatis HDFis rolled out in stages and there may be extant undetected infections on systems –often referred to as Advanced Persistent Threats (APTs). Abatis HDF’s unique operation and extensive audit log allow the malware to be identified. Abatis HDF can also reveal rootkit infections and facilitates the subsequent removal of such programs.
Features:
- Defeats zero-day malware, rootkits, Trojans, APTs and viruses/worms
- Protects legacy and new operating systems from Windows NT4 to Windows 7
- Has a tiny software footprint(less than 100KB)that requires no ongoing updates
- Is extremely fast in operation
- Prevents exploitation of Alternate Data Streams (ADS)
- Protects all permanent storage on the device, thereby ensuring no threats can penetrate
- Is non-signature-based protection for Windows and Linux
- Provides anti-malware and anti-hacker protection
Competitive products
User features
Roles of Interested Employees
Chief Executive Officer
Chief Information Officer
Chief IT Security Officer
IT Security and Risk Management
Organizational Features
IT Security Department in company