Email to schedule an appointment: contact@abatis.ch
Deterministic endpoint protection at the operating system level.
Abatis prevents unauthorised code from executing, blocking ransomware, malware, scripts and persistence before they run. No signatures. No behavioural analysis. No telemetry.
Zero Breaches
in 20+ Years
Ultra-Lightweight
Maximum Protection
Zero Updates Required—
Ever
Detection is reactive. Patching is fragile.
Modern cybersecurity is reactive by design.
Detection happens after execution
AI is compressing exploit timelines
EDR/XDR creates noise, not certainty
Patching introduces instability and risk
Telemetry creates sovereignty and data exposure issues
The result: increasing cost, complexity and exposure.
Execution control, not detection.
Abatis operates at ring zero (kernel level) and enforces deterministic rules:
This is not EDR. Not MDR. Not behavioural detection.
It is deterministic prevention at the point of execution.
Lightweight (<100KB), deployable to endpoints, servers, OT and legacy systems.
Audit mode (1–2 weeks)Full visibility of all software, binaries and activity across the estate.
Policy enforcementAuthorised execution is defined and locked.
Unauthorised code is blocked at the kernel before execution (sub-millisecond).
Stops payload execution regardless of origin or sophistication.
Up to 99% reduction in log noise and unnecessary alerts.
Removes dependency on layered detection tools.
Eliminates overhead from EDR/XDR tooling.
No telemetry.
No data leaves the estate.
Abatis is deployed in environments where compromise is not acceptable.
Port of Hamburg
17-year continuous renewal
Air Traffic Control Systems
Decade-long deployment
UK Government environments including nuclear infrastructure
Tested and validated
by leading global defence and financial organisations
Supports Legacy Systems
From NT4 to modern OS, Abatis protects it all.
Cost-negative Impact
Reduces OPEX, simplifies security stack.
Self-protecting Code
Cannot be disabled, even by privileged users.
Our FAQ page has you covered.
Discover Proven Strategies for Cyber Protection
January 29, 2025
The rise of AI has not only revolutionized industries but also reshaped cybercrime. Phishing attacks, once riddled with spelling errors and obvious flaws, now mimic trusted contacts with frightening accuracy, leveraging AI tools like generative chatbots and deepfake technology. From hyper-personalized spear phishing emails to cloned voices in vishing scams, attackers are scaling their efforts like never before.
January 28, 2025
The European Commission has announced a comprehensive Action Plan to enhance the cybersecurity of hospitals and healthcare providers.
January 27, 2025
Recent attacks have targeted Microsoft 365 and Microsoft Teams, exploiting default configurations to impersonate tech support and compromise employees. Two new ransomware groups, STAC5143 and STAC5777, have been identified as key actors behind these campaigns, reports SC Media.
This site uses cookies to provide you with the best experience on our website. Please, accept cookies for optimal performance. For full details, see our Privacy Policy