Email to schedule an appointment:     contact@abatis.ch

STOP ATTACKS BEFORE THEY START.

Deterministic endpoint protection at the operating system level.

 

Abatis prevents unauthorised code from executing, blocking ransomware, malware, scripts and persistence before they run. No signatures. No behavioural analysis. No telemetry.

Zero Breaches

in 20+ Years

Ultra-Lightweight

Maximum Protection

Zero Updates Required—

Ever

The Problem

Detection is reactive. Patching is fragile.

Modern cybersecurity is reactive by design.

 

  Detection happens after execution

  AI is compressing exploit timelines

  EDR/XDR creates noise, not certainty

  Patching introduces instability and risk

  Telemetry creates sovereignty and data exposure issues

The result: increasing cost, complexity and exposure.

Our Solution

Execution control, not detection.

Abatis operates at ring zero (kernel level) and enforces deterministic rules:

 

  • Only authorised code is permitted to execute
  • Everything else fails before it can run
  • No reliance on signatures, heuristics or threat intelligence
  • No dependency on cloud connectivity or telemetry

This is not EDR. Not MDR. Not behavioural detection.

 

It is deterministic prevention at the point of execution.


The Process

Deploy across the estate

Lightweight (<100KB), deployable to endpoints, servers, OT and legacy systems.

Audit mode (1–2 weeks)

Full visibility of all software, binaries and activity across the estate.

Policy enforcement

 Authorised execution is defined and locked.

Real-time prevention

Unauthorised code is blocked at the kernel before execution (sub-millisecond).


Why it Matters

Prevents ransomware and zero-day attacks

Stops payload execution regardless of origin or sophistication.

Eliminates alert fatigue

Up to 99% reduction in log noise and unnecessary alerts.

Reduces security stack complexity

Removes dependency on layered detection tools.

Restores system performance

Eliminates overhead from EDR/XDR tooling.

Enables cyber sovereignty

No telemetry.

No data leaves the estate.


Where it is Used

Abatis is deployed in environments where compromise is not acceptable.

Port of Hamburg

17-year continuous renewal

Air Traffic Control Systems

Decade-long deployment

UK Government environments including nuclear infrastructure

Tested and validated

by leading global defence and financial organisations

Supports Legacy Systems 

From NT4 to modern OS, Abatis protects it all.

Cost-negative Impact 

Reduces OPEX, simplifies security stack.

Self-protecting Code

 Cannot be disabled, even by privileged users.

Need clarification?

Our FAQ page has you covered.

Explore Our Whitepapers!

Discover Proven Strategies for Cyber Protection

January 29, 2025

The rise of AI has not only revolutionized industries but also reshaped cybercrime. Phishing attacks, once riddled with spelling errors and obvious flaws, now mimic trusted contacts with frightening accuracy, leveraging AI tools like generative chatbots and deepfake technology. From hyper-personalized spear phishing emails to cloned voices in vishing scams, attackers are scaling their efforts like never before.

January 28, 2025

The European Commission has announced a comprehensive Action Plan to enhance the cybersecurity of hospitals and healthcare providers.

January 27, 2025

Recent attacks have targeted Microsoft 365 and Microsoft Teams, exploiting default configurations to impersonate tech support and compromise employees. Two new ransomware groups, STAC5143 and STAC5777, have been identified as key actors behind these campaigns, reports SC Media.