Email to schedule an appointment: contact@abatis.ch
Welcome to the Abatis FAQ: your go-to resource for quick, straightforward answers about our products, services, and approach to cybersecurity. Whether you’re exploring Abatis for the first time or are a long-time customer looking for specific details, you’ll find helpful information right here. If you need more, our team is always just a message away.
Abatis operates at the kernel level (ring zero) of the operating system, enforcing strict write controls on executable files. Rather than detecting threats based on patterns or behaviours, it prevents them entirely by blocking unauthorised binaries from being written to disk or existing ones from being altered — regardless of whether the threat is known. Only approved changes, made through the Abatis Central Management Console (CMC) and validated via Multi-Factor Authentication, are allowed. Even advanced tactics like Living Off The Land Binaries (LotBins) are rendered ineffective without proper authorisation. This proactive approach remains effective even in compromised environments, including attacks from threat actors like Volt-Typhoon and Salt-Typhoon, giving full control back to your SOC/NOC teams.
Abatis enhances system performance by eliminating the overhead typically introduced by conventional security tools. Operating entirely in the kernel (ring 0) and with a footprint of under 100KB, Abatis makes deterministic, sub-microsecond decisions without relying on continuous scanning, behavioural analysis, or cloud lookups. This drastically reduces CPU cycles, memory consumption, and network usage — especially when compared to traditional EDR/XDR solutions, which often introduce significant system latency through real-time telemetry and analytics.
By preventing unauthorised code execution at the filesystem level, Abatis also suppresses redundant or noisy system behaviours (such as verbose OS communications and telemetry). These efficiencies lead to faster boot times, reduced I/O bottlenecks, and improved overall endpoint stability. Independent evaluations, including by Lockheed Martin in live datacentre environments, have confirmed measurable performance gains — making Abatis not only a security enhancement but also an operational and energy efficiency tool.
Abatis offers a unique approach that reduces both operational complexity and costs. Operating at the kernel level with an ultra-lightweight footprint (under 100KB), Abatis eliminates the need for traditional, resource-hungry security tools like EDR and XDR. By preventing threats before they execute, it reduces the ongoing CPU and network demands that typically come with constant threat scanning and analysis.
This proactive model not only minimises the need for frequent updates and vulnerability patching but also enables proper change control, mitigating the risks of arbitrarily updating security solutions across a large estate — a problem highlighted by the 2024 CrowdStrike update incident. By consolidating security layers and reducing the overhead of incident response and false positives, Abatis helps organisations achieve cost savings while improving endpoint performance and system stability. Additionally, Abatis supports legacy systems, extending the life of older hardware and ensuring that updates and upgrades don’t drive unnecessary costs, which can be especially critical in industries like OT or for devices like ATMs and PoS terminals.
Abatis differs from traditional antivirus or EDR (Endpoint Detection and Response) solutions in that it operates at the kernel level to prevent unauthorised code execution rather than detecting and responding to threats after they occur. Traditional antivirus solutions rely on continuous scanning, signature updates, and pattern recognition, while Abatis proactively blocks threats without needing constant updates or behavioural analysis. This results in significantly lower resource consumption and no performance degradation, unlike conventional EDR solutions that can slow down endpoints with constant background scanning.
Abatis provides unique protection against zero-day and fileless malware attacks because it doesn't rely on known signatures, heuristics, or AI to detect threats. Instead, Abatis enforces a strict control over what code can run on a system by preventing any unapproved code from being written to disk or executed. Fileless malware, which often operates entirely in memory and doesn’t leave a trace on disk, is blocked because Abatis prevents any new, unapproved binaries from executing, regardless of whether they are known or unknown.
Yes, Abatis integrates seamlessly with your existing security infrastructure. It doesn’t replace traditional security tools like firewalls, anti-DDOS solutions, or SIEMs, but rather complements them. Because Abatis operates at the kernel level and is lightweight, it doesn’t cause conflicts with other security measures or cause performance degradation. It can be integrated into your environment with minimal disruption and works alongside other monitoring tools by providing actionable logs and reports to enhance your security posture.
Abatis is designed to perform efficiently even in high-demand environments, such as data centres or large-scale enterprises. Its lightweight kernel-level agent (under 100KB) ensures minimal impact on system resources, even when deployed across hundreds or thousands of endpoints. Abatis requires no signature updates, telemetry processing, or continuous scanning, allowing it to conserve CPU cycles and network bandwidth, which is crucial in high-performance environments. Organisations benefit from improved stability, reduced operational costs, and more efficient endpoint management.
Yes, Abatis is highly versatile and can be deployed in both cloud and on-premises environments. Whether your infrastructure is fully cloud-based, on-premises, or a hybrid environment, Abatis provides comprehensive protection across all systems. The solution can protect servers, endpoints, and virtual machines, regardless of whether they are in your data centre or hosted in the cloud. Its lightweight and efficient design makes it scalable across different architectures without introducing performance overhead.
Abatis supports a wide range of operating systems, including all major versions of Windows, Linux distributions, and even legacy systems like NT4. The system requirements are minimal due to Abatis' lightweight footprint. For most modern operating systems, it requires only a few MB of disk space and less than 100KB of RAM for operation, making it highly efficient and suitable for even resource-constrained environments. Detailed system requirements can be provided based on your specific OS and architecture.
Yes, Abatis is particularly effective in preventing insider threats. Since Abatis operates at the kernel level, even trusted users or system administrators cannot bypass its protective measures. It prevents unauthorised code execution at the core of the operating system, meaning that even if a trusted insider attempts to run malicious code, Abatis will block it from executing. Additionally, Abatis’ comprehensive logging and reporting features provide visibility into actions that could indicate malicious activity from insiders, enabling quick response and investigation.
Abatis helps organisations meet compliance requirements by providing an additional layer of security that ensures data protection and system integrity. By preventing unauthorised code execution, Abatis ensures that sensitive data is not compromised by malicious software or accidental exposure. It also provides detailed logs that can be used to demonstrate compliance with regulations like GDPR, HIPAA, and NIST by ensuring that only authorised users can modify critical system files and that all security events are logged for audit purposes.
Abatis takes a fundamentally different approach from AI-based security solutions. While AI-based solutions attempt to learn and adapt to new threats by analysing patterns and behaviours, Abatis focuses on strict access control to prevent unauthorised actions from the start. Abatis doesn't need AI or machine learning to recognise new threats; instead, it prevents any unknown or unapproved binaries from being executed. This proactive approach ensures protection against both known and unknown threats, without the need for training models or ongoing updates.
If a breach attempt occurs while Abatis is running, the system will continue to function normally. Abatis blocks unauthorised code from executing immediately, preventing malicious code from gaining a foothold on the system. Since Abatis operates at the kernel level, it ensures that the operating system and legitimate processes continue to function without disruption. This proactive prevention eliminates the need for reactive measures, allowing the system to remain stable and operational even during an attack attempt.
Yes, Abatis is specifically designed to extend the life of legacy systems. It can protect older operating systems, including unsupported versions like NT4, as well as newer ones, without requiring an upgrade or a costly hardware refresh. By providing kernel-level security, Abatis allows organisations to continue using older systems while maintaining robust protection against modern threats, ensuring compliance and security even when upgrading infrastructure is not financially viable or feasible.
Abatis significantly reduces the risk of supply chain attacks by preventing unauthorised code execution, even if it comes from a trusted source. Because Abatis controls what code is allowed to execute on the system, it stops any malicious updates or modifications from being introduced into the environment. If a trusted third-party application or system update attempts to introduce malicious code, Abatis will block it before it can cause any harm. This makes it highly effective at mitigating risks posed by compromised software vendors or supply chain vulnerabilities.
Abatis provides comprehensive, real-time reporting through its proprietary Security Event Investigation Monitoring (SEIM) toolset. This allows security teams to track security events, analyse attempted breaches, and gather data for forensic investigation. The logs are detailed, transparent, and immutable, providing a clear chain of custody for any actions taken by both external attackers and internal users. This makes Abatis an effective tool for compliance auditing, incident response, and ongoing security monitoring.
Abatis is designed for ease of deployment and management. The lightweight agent can be quickly installed on endpoints with minimal disruption to existing systems. The solution is centrally managed through a web-based interface that allows security teams to monitor and control all endpoints from a single location. Because it doesn’t require constant updates or complex configurations, managing Abatis across a large organisation is straightforward and doesn’t require specialised security staff to maintain.
Abatis offers comprehensive support and training to ensure organisations get the most out of the solution. This includes 24/7 technical support, access to online resources, and personalised training sessions for security teams. Abatis also provides detailed documentation and best practices for deployment and ongoing management, ensuring that your team can operate the solution effectively with minimal effort.
Abatis focuses primarily on prevention by blocking unauthorised code before it can execute, rather than relying on active threat hunting or scanning. However, it integrates well with other security tools, such as SIEM and vulnerability management systems, to provide a comprehensive security posture. By preventing threats at the kernel level, Abatis reduces the need for constant threat hunting, allowing your security team to focus on actual incidents rather than false alarms.
Abatis is highly effective at preventing advanced threats like ransomware and targeted attacks. Since ransomware typically relies on executing malicious binaries, Abatis prevents these files from being written to disk or executed in the first place. The solution also mitigates attacks that attempt to modify existing applications or install malicious code by ensuring only authorised code can run, making it extremely difficult for attackers to gain a foothold in the system.
Yes, Abatis can be deployed to protect both IoT devices and OT systems. Many IoT devices and OT systems are vulnerable to attacks due to their limited security capabilities, but Abatis provides kernel-level protection that secures even these less-secure devices. By preventing unauthorised code execution, Abatis ensures that these devices remain secure, even if they are running legacy systems or are connected to a broader network.
For SMBs, Abatis provides a cost-effective security solution that requires minimal management and overhead. Its lightweight design means it doesn’t require large IT teams to maintain, and its preventative approach ensures that businesses don’t have to worry about constant updates or new threats. Additionally, Abatis offers robust protection against a wide range of threats, including ransomware, zero-day exploits, and insider attacks, providing peace of mind for businesses with limited security resources.
Abatis eliminates false positives by using a deterministic model for security. It doesn’t rely on behavioural analysis or pattern recognition, which can sometimes generate false alarms. Instead, Abatis enforces strict control over which binaries can execute, preventing any unapproved code from running. Since the system only blocks unauthorised actions, security teams receive clear, actionable alerts, without the noise created by false positives.
Abatis undergoes rigorous testing and validation to ensure its security and reliability. This includes regular penetration testing, code reviews, and compliance checks to ensure the solution meets industry standards. Additionally, the Abatis solution is continually tested in real-world environments to ensure it remains effective against emerging threats and performs consistently.
Request a demo today!
Check out our whitepapers!
This site uses cookies to provide you with the best experience on our website. Please, accept cookies for optimal performance. For full details, see our Privacy Policy