Proactive Cyber Defence

Malware Prevention and Protection





Abatis is a UK based company spun out of Royal Holloway University of London.


Abatis designs and develops security solutions to defend against the most sophisticated malware and advanced attacks by cyber criminals.


Abatis supplies governments, financial and major corporations around the world with security solutions that have withstood the test of time against all forms of attack.

Protect your systems and data from recently discovered bugs, not yet known to vendors or antivirus companies, that hackers can exploit. 

Protect your systems from malicious software - including viruses, trojans, worms and any dangerous code or content. 

Protect your critical assets from  ransomware that makes your data or systems unusable until you make that payment.

  • Abatis is designed to enforce system and file integrity

  • Protects against known & unknown security threats

  • Provides protection for Legacy equipment for which patches and AV may no longer be available (Win NT4, XP, etc.)

  • A credible technical defence for real time, process control and safety-critical systems and SCADA environments

  • Stops all attempts to write known and unknown malware to the permanent storage of the device

  • Protects real-time, safety-critical and SCADA devices

  • Low maintenance, virtually fit-and-forget solution

  • Near zero performance hit (imperceptible)

  • Independently proven by Lockheed Martin to save 7% energy equivalent to £35/$60 per server per annum)

  • Scored 100% in independent AV testing by ENEX Test Labs

  • Security effectiveness & energy saving capabilities confirmed by Lockheed Martin in extensive laboratory testing

  • Successful near Common Criteria evaluation by BAE Systems

  • Cited as technology & company to watch by Forrester Research

  • Finalist in the Global Security Challenge

  • Finalist in UK Cyber Innovation Awards

  • Winner of Innovative Security Product of the Year Cyber Security Awards

  • Patent Granted in USA and Patent Pending in Europe

What is Abatis Host Integrity Technology (HDF)?


Abatis Host Integrity Technology (HDF) is an advanced technology that enforces system integrity and proactively protects against infection of computer systems by viruses, worms, key-loggers, root-kits, Trojan-horses and all manner of other malware. 


This non signature-based technology defeats zero day and targeted attacks and uses a revolutionary new, patent protected method which does not use signature file updates, white-listing, heuristic analysis or sandboxing and therefore offers excellent zero day defence, very low maintenance overhead and no false positive or false negative results. 

When deployed on supported Windows or Red Hat Linux platforms, Abatis HDF blocks malware infection in a simple but effective way.

The same Abatis HDF technology has been proven to protect web servers against many hackers’ attacks.

Denying any unauthorised modifications to the system, hackers are prevented from achieving their goals, such as web defacement and malware insertion thus effectively neutralizing any hacking activity.

Ransomware is a growing global cyber security threat, and one which could affect any organisation that does not have appropriate defences. 


Abatis provides a Cyber Malware Protection System designed to meet the needs of the Maritime sector.

In particular we can protect vulnerable systems on board ship as well as shorebased systems.


Abatis provides a Cyber Malware Protection System designed to meet the needs of the Financial Services Sector and organisations using Point Of Sale (POS) Terminals.

We prevent logical attacks by stopping malware and hacking tools being deposited on the target device thereby stopping exploitation.


Abatis Host Integrity Technology (HDF) is an advanced technology that enforces system integrity and proactively protects against infection of computer systems by viruses, worms, key-loggers, root-kits, Trojan-horses and all manner of other malware. 

Abatis HDF Central Management Console (CMC) is specifically designed to monitor all HDF protected computers for real‐time HDF logging, status of HDF clients, security trends, security alarm, and to interrogate the HDF operating parameters as well as system and hardware information.

Protective Monitoring

Abatis Central Management Console (CMC)
Making Security Management Simple and Cost-Effective

What is the Central Management Console?

HDF Central Management Console (CMC) is a monitoring and management tool for HDF-protected computers within the
company or organisation.

It is a web-based application with a combination of functionality such as log collection, log analysis, log query (report), realtime monitoring
and management.

With the CMC, authorised IT administrators can easily view real-time HDF log information showing the status of HDF clients, security trends, security alarms, and can interrogate the HDF operating parameters as well as system and hardware information.

Central Management Console (CMC) provides facilities to: 
  • Retrieve and analyse HDF logs

  • Define policy updates for HDF protected devices according to architectural requirement

  • Web based application

  • SIEM-like dashboard

  • Simple, clean and easy to use

  • Database back-end allows sophisticated query, analysis and abstraction

  • CMC can be used to search for identified ‘rogue’ files such as blocked  APT updates

  • Experience shows ‘clean-up’ time for a typical malware infection can be improved by up to 90%

Source: National Cyber Security Centre www.ncsc.gov.uk

Malware Prevention and Protection

A Mandatory Requirement

NIS Directive

Objective B

Protecting Against Cyber Attack

The EU Directive on the security of Network and Information Systems (NIS) came into force on 10th May 2018. 

Preventing, detecting and removing malware is part of NIS Objective B: Protecting Against Cyber Attack (B4: System Security, Vulnerability Management)

10 Steps to Cyber Security

Step 7

Malware Prevention

The 10 Steps to Cyber Security was originally published in 2012 and is now used by a majority of the FTSE350. 

NCSC believes that understanding the cyber environment and implementing the 10 Steps helps protect organisations from cyber attacks

Malware Prevention is Step 7.

Cyber Essentials

Step 4

Malware Protection

The Cyber Essentials Scheme (CES) self-assessment option helps organisations protect themselves against a wide variety of the most common cyber attacks.

Malware Protection is Step 4 

GDPR Security Outcomes: Protect personal data against cyber attack (Outcome B)

DPA 2018, Article 5(1)(f)

GDPR requires you to process personal data securely. Article 5(1)(f) concerns ‘integrity and confidentiality’ of personal data – in short, it is the GDPR’s ‘security principle’. It states that personal data shall be:

‘processed in a manner that ensures appropriate security of the personal data, including protection against unauthorised or unlawful processing and against accidental loss, destruction or damage, using appropriate technical or organisational measures’