Abatis HDF
0.00

Problems that solves

Unauthorized access to corporate IT systems and data

Risk or Leaks of confidential information

Malware infection via Internet, email, storage devices

Risk of attacks by hackers

Values

Reduce Costs

Ensure Security and Business Continuity

Ensure Compliance

Abatis HDF

Abatis HDF is a host-based software-only solution that blocks unwanted executables. It is implemented as a kernel driver on Windows platforms.

Description

Abatis HDF is a host-based software-only solution that is implemented as a kernel driver on Windows platforms. It intercepts and mediates file write access to the computer’s permanent storage e.g. local hard disk, network shares and removable storage devices such as USB stick and external disk. It is designed to help enforce system and file integrity without complex management overheads. It achieves this security objective by exercising robust access control over the writing of executable files and user-defined files (protected files) to a computer. It protects against unauthorized modification and denies unauthorized write operations. While HDFblocks unwanted executables by default, the HDF system administration can define files for integrity protection according to the computer’s roles. Ideally, Abatis HDF should be deployed on a newly installed ‘clean’ operating system. From this secure initial state (baseline), Abatis HDF will prevent malware infection than on. For most corporate environments, Abatis HDFis rolled out in stages and there may be extant undetected infections on systems –often referred to as Advanced Persistent Threats (APTs). Abatis HDF’s unique operation and extensive audit log allow the malware to be identified. Abatis HDF can also reveal rootkit infections and facilitates the subsequent removal of such programs. Features:
  • Defeats zero-day malware, rootkits, Trojans, APTs and viruses/worms
  • Protects legacy and new operating systems from Windows NT4 to Windows 7
  • Has a tiny software footprint(less than 100KB)that requires no ongoing updates
  • Is extremely fast in operation
  • Prevents exploitation of Alternate Data Streams (ADS)
  • Protects all permanent storage on the device, thereby ensuring no threats can penetrate
  • Is non-signature-based protection for Windows and Linux
  • Provides anti-malware and anti-hacker protection

User features

Roles of Interested Employees

Chief Executive Officer

Chief Information Officer

Chief IT Security Officer

IT Security and Risk Management

Organizational Features

IT Security Department in company