SlideShare a Scribd company logo
1 of 1
Download to read offline
GBMS Tech Ltd HDF Advanced Malware Protection
GBMS Tech Ltd Preferred Distributor For Abatis HDF
Registered in England and Wales. Company No 09607559
1 Berkeley Street Mayfair London W1J 8DJ
enquiries@gbmstech.com www.gbmstech.com
Why HDF is needed ?
Any business with a computer is under constant threat from cybercriminals using ever changing and more sophisticated malware to steal intellectual property,
extort money, steal customer’s personal information or deface websites.
Major downtime involving corporate internet services will cripple businesses and today's headlines report a steady stream of data breaches resulting in
damaged reputations along with multi-millions in lost revenue, legal fees, fines and cost of recovery. If viruses and malware introduced inadvertently or
otherwise are not rigorously prevented from executing their malicious code, they can easily spread to infect the entire IT infrastructure. The era of Antivirus has
long been gone and is only able to defend against 5% of new malware .Complex anti-malware tools now promising protection requires an ever increasing
amount of bandwidth and CPU power therefore degrading overall network performance.
Unlike HDF the systems described above will continue to be vulnerable to Zero-Day attacks.
What is HDF ?
HDF is an innovative patent-protected advanced anti-malware software solution
using Host Integrity Technology integrating fully into operating systems to prevent
executable files from writing to computer hard drives and serves to enforce
corporate security policy and provides detailed analysis and audit information.
HDF is a proactive security software that is 99.999 % effective against Zero-Day
Malware, virus, worms, spyware, trojans, botnet and rootkit attacks / infection. This
includes evolving Ransom Ware attacks and Advanced Persistent Threats (APT’s) ,
exploitation of Alternate Data Streams (ADS).
HDF prevents notebook and mobile users inadvertently introducing viruses into
company networks. HDF stops other unauthorized software downloads that effect
computer stability.
How does it work ?
Deployed as software on servers and end user workstations and laptops , HDF is
implemented as a kernel driver into Microsoft (or Linux) 32bit or 64bit operating
systems and takes 1 minute to install.
HDF intercepts and mediates file write access to computer hard drives, network
shared storage, or removable storage devices such as USB sticks and other external
drives.
Host Integrity Technology is used by HDF to secure the operating system kernel by
understanding what source code is required by legitimate applications (logging all
executable attempts) and flags, without executing, any and all irrelevant,
unnecessary, unwanted and illegal binary code. HDF continues to monitor operating
process binaries, detecting additional modifications and stopping malicious code that
enters applications at later dates even if dormant malware is already on the system
before the HDF is installed, malicious code (a Trojan for example) will still be blocked
once it attempts to execute.
HDF allows updates to Windows and other applications , but blocks the portions of
those updates that include unnecessary items. A significant boost in Windows
performance can be achieved.
An attacker cannot use a backdoor or rootkit approach and cannot bypass HDF
control even with the highest level of computer system privilege.
There are three modes of operation:
Protect mode blocks all unwanted executables from being written to the hard drive
and is the operational mode
Learn mode records all unwanted executables that would have been blocked if HDF
had been in normal protect mode and allowing the user to authorised desired
applications
Audit mode records all write I/O activity and can be used to monitor all internal use
of the system
There is no additional demand on RAM and almost no CPU overhead because the
HDF software is less than 100 Kbytes in size and implemented at the file system level
or zero ring (Kernel Level )
HDF enforces system and file integrity without complex
management overheads and is transparent to applications and
users without user interaction.
HDF does not use signatures so there is no need for constant
updates to add newly discovered attacks and no threat of being
the Zero-Day victim. No Blacklisting or Whitelisting hash
databases are maintained and HDF is not reputation or
heuristics-based. HDF is not using a “File Integrity Monitoring”
model that simply notifies of a breach and it does not rely on
Threat Intelligence feeds requiring additional subscription fees.
All of these traditional methods will be defeated by Zero-Day
attacks. HDF will not.
HDF using Host Integrity Technology exercises robust control
over the writing of files to a computer, providing true Zero-Day
Attack protection.
HDF provides additional protection against vulnerabilities
caused by delayed operating system patching.
HDF provides protection to unsupported legacy Windows
operating systems such as NT4 , XP and Server 2003
As a Defence-in-Depth layer of security, HDF serves to prevent
the effects of malware missed by anti-virus solutions.
HDF has a tiny footprint of less than 100k and once installed
provides significant system speed and performance
improvement Furthermore HDF is proven in independent tests
by Lockheed Martin to reduce electrical energy consumption by
7% while providing effective security
With such a small footprint HDF is also ideal for SCADA, Process
control and CCTV environments
HDF Central Management Console (CMC) is required by most
corporate deployments.
While HDF blocks unwanted executable files by default,
information gathered from HDF in learn-mode is used by the
CMC to create templates of all acceptable binaries and pushed
globally to Windows servers and PC workstations, to one user, a
group of users or all users.
Any end point that is un protected by HDF can be blocked by the
CMC using API’s as part of a Firewall or Access Control rule set.
Detailed log reporting structured for easy filtering will clearly
identify what HDF has allowed and what has been blocked.
Admin permissions can be defined to individuals or groups.
When HDF is used with the CMC it provides a “Hunter Killer”
capacity against APTs and identify areas that require clean up
HDF demands little operational or back office management.

More Related Content

What's hot

Denial of Service Attack Defense Techniques
Denial of Service Attack Defense TechniquesDenial of Service Attack Defense Techniques
Denial of Service Attack Defense TechniquesIRJET Journal
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber lawDivyank Jindal
 
Ch08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System VulnerabilitiesCh08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System Vulnerabilitiesphanleson
 
Network security 22.1.18
Network security 22.1.18Network security 22.1.18
Network security 22.1.18Philip_
 
Ceh v5 module 01 introduction to ethical hacking
Ceh v5 module 01 introduction to ethical hackingCeh v5 module 01 introduction to ethical hacking
Ceh v5 module 01 introduction to ethical hackingVi Tính Hoàng Nam
 
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...IJCNCJournal
 
Technical track kevin cardwell-10-00 am-solid-defense
Technical track   kevin cardwell-10-00 am-solid-defenseTechnical track   kevin cardwell-10-00 am-solid-defense
Technical track kevin cardwell-10-00 am-solid-defenseISSA LA
 
Microset Security Presentation
Microset Security PresentationMicroset Security Presentation
Microset Security Presentationalpereira
 
Industry Best Practice against DDoS Attacks
Industry Best Practice against DDoS AttacksIndustry Best Practice against DDoS Attacks
Industry Best Practice against DDoS AttacksMarcelo Silva
 
PCI DSS Basics - The Twelve Steps
PCI DSS Basics - The Twelve StepsPCI DSS Basics - The Twelve Steps
PCI DSS Basics - The Twelve StepsTerra Verde
 
Safend General Presentation 2010
Safend General Presentation 2010Safend General Presentation 2010
Safend General Presentation 2010Joseph Mark Heinzen
 
PCI DSS Implementation: A Five Step Guide
PCI DSS Implementation: A Five Step GuidePCI DSS Implementation: A Five Step Guide
PCI DSS Implementation: A Five Step GuideAlienVault
 
unified threat management by Nisha Menon K
 unified threat management by Nisha Menon K unified threat management by Nisha Menon K
unified threat management by Nisha Menon KNisha Menon K
 
INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL PANKAJKUMAR2519
 
IRJET- A Review on Intrusion Detection System
IRJET-  	  A Review on Intrusion Detection SystemIRJET-  	  A Review on Intrusion Detection System
IRJET- A Review on Intrusion Detection SystemIRJET Journal
 
Operating system vulnerability and control
Operating system vulnerability and control Operating system vulnerability and control
Operating system vulnerability and control أحلام انصارى
 

What's hot (20)

Denial of Service Attack Defense Techniques
Denial of Service Attack Defense TechniquesDenial of Service Attack Defense Techniques
Denial of Service Attack Defense Techniques
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber law
 
Ch08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System VulnerabilitiesCh08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System Vulnerabilities
 
Network security 22.1.18
Network security 22.1.18Network security 22.1.18
Network security 22.1.18
 
TSS_Overview
TSS_OverviewTSS_Overview
TSS_Overview
 
Ceh v5 module 01 introduction to ethical hacking
Ceh v5 module 01 introduction to ethical hackingCeh v5 module 01 introduction to ethical hacking
Ceh v5 module 01 introduction to ethical hacking
 
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
 
Technical track kevin cardwell-10-00 am-solid-defense
Technical track   kevin cardwell-10-00 am-solid-defenseTechnical track   kevin cardwell-10-00 am-solid-defense
Technical track kevin cardwell-10-00 am-solid-defense
 
Microset Security Presentation
Microset Security PresentationMicroset Security Presentation
Microset Security Presentation
 
06686259 20140405 205404
06686259 20140405 20540406686259 20140405 205404
06686259 20140405 205404
 
Firewalls
FirewallsFirewalls
Firewalls
 
Industry Best Practice against DDoS Attacks
Industry Best Practice against DDoS AttacksIndustry Best Practice against DDoS Attacks
Industry Best Practice against DDoS Attacks
 
152 ready eng
152 ready eng152 ready eng
152 ready eng
 
PCI DSS Basics - The Twelve Steps
PCI DSS Basics - The Twelve StepsPCI DSS Basics - The Twelve Steps
PCI DSS Basics - The Twelve Steps
 
Safend General Presentation 2010
Safend General Presentation 2010Safend General Presentation 2010
Safend General Presentation 2010
 
PCI DSS Implementation: A Five Step Guide
PCI DSS Implementation: A Five Step GuidePCI DSS Implementation: A Five Step Guide
PCI DSS Implementation: A Five Step Guide
 
unified threat management by Nisha Menon K
 unified threat management by Nisha Menon K unified threat management by Nisha Menon K
unified threat management by Nisha Menon K
 
INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL
 
IRJET- A Review on Intrusion Detection System
IRJET-  	  A Review on Intrusion Detection SystemIRJET-  	  A Review on Intrusion Detection System
IRJET- A Review on Intrusion Detection System
 
Operating system vulnerability and control
Operating system vulnerability and control Operating system vulnerability and control
Operating system vulnerability and control
 

Viewers also liked

Vizocom_Satellite-Services-global
Vizocom_Satellite-Services-globalVizocom_Satellite-Services-global
Vizocom_Satellite-Services-globalJoseph Deepak
 
Compartir Archivos e Impresora
Compartir Archivos e ImpresoraCompartir Archivos e Impresora
Compartir Archivos e ImpresoraUriel Barrios
 
обличчя біляївщини. проект умш
обличчя біляївщини. проект умшобличчя біляївщини. проект умш
обличчя біляївщини. проект умшLiudmyla Iamshchykova
 
Prayaag International Schools in Panipat, Haryana
Prayaag International Schools in Panipat, HaryanaPrayaag International Schools in Panipat, Haryana
Prayaag International Schools in Panipat, HaryanaPradeep Kumar
 
Orden carnívora por Carla Escobar
Orden carnívora por Carla EscobarOrden carnívora por Carla Escobar
Orden carnívora por Carla Escobarcarlavaleriaescobar
 
SPA-программы с Lemongrass house или Organic Tai
SPA-программы с Lemongrass house или Organic TaiSPA-программы с Lemongrass house или Organic Tai
SPA-программы с Lemongrass house или Organic TaiElena Baranbaeva
 
Gomez Marvin_8_10_2016
Gomez Marvin_8_10_2016Gomez Marvin_8_10_2016
Gomez Marvin_8_10_2016Marvin Gomez
 
CV- Ayanda Nxumalo 2016
CV- Ayanda Nxumalo 2016CV- Ayanda Nxumalo 2016
CV- Ayanda Nxumalo 2016Ayanda Nxumalo
 
Distributional implications of carbon and environmental taxation a case study...
Distributional implications of carbon and environmental taxation a case study...Distributional implications of carbon and environmental taxation a case study...
Distributional implications of carbon and environmental taxation a case study...BC3 - Basque Center for Climate Change
 
Transversales encuesta insp 2000
Transversales encuesta insp 2000Transversales encuesta insp 2000
Transversales encuesta insp 2000Eduardo Sandoval
 
Campus Ambassador Program Final
Campus Ambassador Program FinalCampus Ambassador Program Final
Campus Ambassador Program FinalKhanya Keswa
 
Categorias del e comerce-vinicio suarez
Categorias del e comerce-vinicio suarezCategorias del e comerce-vinicio suarez
Categorias del e comerce-vinicio suarezviniciosuarez7
 

Viewers also liked (14)

3. guía entrevistas y observación
3. guía entrevistas y observación3. guía entrevistas y observación
3. guía entrevistas y observación
 
Vizocom_Satellite-Services-global
Vizocom_Satellite-Services-globalVizocom_Satellite-Services-global
Vizocom_Satellite-Services-global
 
Compartir Archivos e Impresora
Compartir Archivos e ImpresoraCompartir Archivos e Impresora
Compartir Archivos e Impresora
 
обличчя біляївщини. проект умш
обличчя біляївщини. проект умшобличчя біляївщини. проект умш
обличчя біляївщини. проект умш
 
Prayaag International Schools in Panipat, Haryana
Prayaag International Schools in Panipat, HaryanaPrayaag International Schools in Panipat, Haryana
Prayaag International Schools in Panipat, Haryana
 
Orden carnívora por Carla Escobar
Orden carnívora por Carla EscobarOrden carnívora por Carla Escobar
Orden carnívora por Carla Escobar
 
SPA-программы с Lemongrass house или Organic Tai
SPA-программы с Lemongrass house или Organic TaiSPA-программы с Lemongrass house или Organic Tai
SPA-программы с Lemongrass house или Organic Tai
 
Gomez Marvin_8_10_2016
Gomez Marvin_8_10_2016Gomez Marvin_8_10_2016
Gomez Marvin_8_10_2016
 
CV- Ayanda Nxumalo 2016
CV- Ayanda Nxumalo 2016CV- Ayanda Nxumalo 2016
CV- Ayanda Nxumalo 2016
 
Distributional implications of carbon and environmental taxation a case study...
Distributional implications of carbon and environmental taxation a case study...Distributional implications of carbon and environmental taxation a case study...
Distributional implications of carbon and environmental taxation a case study...
 
Transversales encuesta insp 2000
Transversales encuesta insp 2000Transversales encuesta insp 2000
Transversales encuesta insp 2000
 
Campus Ambassador Program Final
Campus Ambassador Program FinalCampus Ambassador Program Final
Campus Ambassador Program Final
 
Carbohidratos en alimentos
Carbohidratos en alimentosCarbohidratos en alimentos
Carbohidratos en alimentos
 
Categorias del e comerce-vinicio suarez
Categorias del e comerce-vinicio suarezCategorias del e comerce-vinicio suarez
Categorias del e comerce-vinicio suarez
 

Similar to What is HDF

ZERO DAY PLUS presentation
ZERO DAY PLUS presentationZERO DAY PLUS presentation
ZERO DAY PLUS presentationAlexander Rogan
 
DDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-HaltdosDDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-HaltdosHaltdos
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?William hendric
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)Amare Kassa
 
Heimdal Product Presentation - FULL
Heimdal Product Presentation - FULLHeimdal Product Presentation - FULL
Heimdal Product Presentation - FULLRami Mardini
 
Phantosys overview - Intelligent Desktop Virtualization
Phantosys overview - Intelligent Desktop VirtualizationPhantosys overview - Intelligent Desktop Virtualization
Phantosys overview - Intelligent Desktop VirtualizationJose Bittencourt
 
FlexNet Publisher Licensing Security
FlexNet Publisher Licensing SecurityFlexNet Publisher Licensing Security
FlexNet Publisher Licensing SecurityFlexera
 
Comodo advanced endpoint protection
Comodo advanced endpoint protectionComodo advanced endpoint protection
Comodo advanced endpoint protectionDavid Waugh
 
Infragard HiKit FLASH Alert.
Infragard HiKit FLASH Alert.Infragard HiKit FLASH Alert.
Infragard HiKit FLASH Alert.Travis
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소GE코리아
 
V1_I2_2012_Paper4.doc
V1_I2_2012_Paper4.docV1_I2_2012_Paper4.doc
V1_I2_2012_Paper4.docpraveena06
 
Detection of Distributed Denial of Service Attacks
Detection of Distributed Denial of Service AttacksDetection of Distributed Denial of Service Attacks
Detection of Distributed Denial of Service Attacksijdmtaiir
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...GARL
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and youArt Ocain
 
Hotpin datasheet
Hotpin datasheetHotpin datasheet
Hotpin datasheetHai Nguyen
 
CryptionPro Hdd Flyer English
CryptionPro Hdd Flyer EnglishCryptionPro Hdd Flyer English
CryptionPro Hdd Flyer Englishcynapspro GmbH
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!Dell EMC World
 

Similar to What is HDF (20)

ZERO DAY PLUS presentation
ZERO DAY PLUS presentationZERO DAY PLUS presentation
ZERO DAY PLUS presentation
 
DDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-HaltdosDDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-Haltdos
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)
 
Heimdal Product Presentation - FULL
Heimdal Product Presentation - FULLHeimdal Product Presentation - FULL
Heimdal Product Presentation - FULL
 
Phantosys overview - Intelligent Desktop Virtualization
Phantosys overview - Intelligent Desktop VirtualizationPhantosys overview - Intelligent Desktop Virtualization
Phantosys overview - Intelligent Desktop Virtualization
 
hotel management
hotel managementhotel management
hotel management
 
FlexNet Publisher Licensing Security
FlexNet Publisher Licensing SecurityFlexNet Publisher Licensing Security
FlexNet Publisher Licensing Security
 
Comodo advanced endpoint protection
Comodo advanced endpoint protectionComodo advanced endpoint protection
Comodo advanced endpoint protection
 
Infragard HiKit FLASH Alert.
Infragard HiKit FLASH Alert.Infragard HiKit FLASH Alert.
Infragard HiKit FLASH Alert.
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
V1_I2_2012_Paper4.doc
V1_I2_2012_Paper4.docV1_I2_2012_Paper4.doc
V1_I2_2012_Paper4.doc
 
Detection of Distributed Denial of Service Attacks
Detection of Distributed Denial of Service AttacksDetection of Distributed Denial of Service Attacks
Detection of Distributed Denial of Service Attacks
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
 
SecurePass at OpenBrighton
SecurePass at OpenBrightonSecurePass at OpenBrighton
SecurePass at OpenBrighton
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
 
Hotpin datasheet
Hotpin datasheetHotpin datasheet
Hotpin datasheet
 
Network security
Network security Network security
Network security
 
CryptionPro Hdd Flyer English
CryptionPro Hdd Flyer EnglishCryptionPro Hdd Flyer English
CryptionPro Hdd Flyer English
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!
 

What is HDF

  • 1. GBMS Tech Ltd HDF Advanced Malware Protection GBMS Tech Ltd Preferred Distributor For Abatis HDF Registered in England and Wales. Company No 09607559 1 Berkeley Street Mayfair London W1J 8DJ enquiries@gbmstech.com www.gbmstech.com Why HDF is needed ? Any business with a computer is under constant threat from cybercriminals using ever changing and more sophisticated malware to steal intellectual property, extort money, steal customer’s personal information or deface websites. Major downtime involving corporate internet services will cripple businesses and today's headlines report a steady stream of data breaches resulting in damaged reputations along with multi-millions in lost revenue, legal fees, fines and cost of recovery. If viruses and malware introduced inadvertently or otherwise are not rigorously prevented from executing their malicious code, they can easily spread to infect the entire IT infrastructure. The era of Antivirus has long been gone and is only able to defend against 5% of new malware .Complex anti-malware tools now promising protection requires an ever increasing amount of bandwidth and CPU power therefore degrading overall network performance. Unlike HDF the systems described above will continue to be vulnerable to Zero-Day attacks. What is HDF ? HDF is an innovative patent-protected advanced anti-malware software solution using Host Integrity Technology integrating fully into operating systems to prevent executable files from writing to computer hard drives and serves to enforce corporate security policy and provides detailed analysis and audit information. HDF is a proactive security software that is 99.999 % effective against Zero-Day Malware, virus, worms, spyware, trojans, botnet and rootkit attacks / infection. This includes evolving Ransom Ware attacks and Advanced Persistent Threats (APT’s) , exploitation of Alternate Data Streams (ADS). HDF prevents notebook and mobile users inadvertently introducing viruses into company networks. HDF stops other unauthorized software downloads that effect computer stability. How does it work ? Deployed as software on servers and end user workstations and laptops , HDF is implemented as a kernel driver into Microsoft (or Linux) 32bit or 64bit operating systems and takes 1 minute to install. HDF intercepts and mediates file write access to computer hard drives, network shared storage, or removable storage devices such as USB sticks and other external drives. Host Integrity Technology is used by HDF to secure the operating system kernel by understanding what source code is required by legitimate applications (logging all executable attempts) and flags, without executing, any and all irrelevant, unnecessary, unwanted and illegal binary code. HDF continues to monitor operating process binaries, detecting additional modifications and stopping malicious code that enters applications at later dates even if dormant malware is already on the system before the HDF is installed, malicious code (a Trojan for example) will still be blocked once it attempts to execute. HDF allows updates to Windows and other applications , but blocks the portions of those updates that include unnecessary items. A significant boost in Windows performance can be achieved. An attacker cannot use a backdoor or rootkit approach and cannot bypass HDF control even with the highest level of computer system privilege. There are three modes of operation: Protect mode blocks all unwanted executables from being written to the hard drive and is the operational mode Learn mode records all unwanted executables that would have been blocked if HDF had been in normal protect mode and allowing the user to authorised desired applications Audit mode records all write I/O activity and can be used to monitor all internal use of the system There is no additional demand on RAM and almost no CPU overhead because the HDF software is less than 100 Kbytes in size and implemented at the file system level or zero ring (Kernel Level ) HDF enforces system and file integrity without complex management overheads and is transparent to applications and users without user interaction. HDF does not use signatures so there is no need for constant updates to add newly discovered attacks and no threat of being the Zero-Day victim. No Blacklisting or Whitelisting hash databases are maintained and HDF is not reputation or heuristics-based. HDF is not using a “File Integrity Monitoring” model that simply notifies of a breach and it does not rely on Threat Intelligence feeds requiring additional subscription fees. All of these traditional methods will be defeated by Zero-Day attacks. HDF will not. HDF using Host Integrity Technology exercises robust control over the writing of files to a computer, providing true Zero-Day Attack protection. HDF provides additional protection against vulnerabilities caused by delayed operating system patching. HDF provides protection to unsupported legacy Windows operating systems such as NT4 , XP and Server 2003 As a Defence-in-Depth layer of security, HDF serves to prevent the effects of malware missed by anti-virus solutions. HDF has a tiny footprint of less than 100k and once installed provides significant system speed and performance improvement Furthermore HDF is proven in independent tests by Lockheed Martin to reduce electrical energy consumption by 7% while providing effective security With such a small footprint HDF is also ideal for SCADA, Process control and CCTV environments HDF Central Management Console (CMC) is required by most corporate deployments. While HDF blocks unwanted executable files by default, information gathered from HDF in learn-mode is used by the CMC to create templates of all acceptable binaries and pushed globally to Windows servers and PC workstations, to one user, a group of users or all users. Any end point that is un protected by HDF can be blocked by the CMC using API’s as part of a Firewall or Access Control rule set. Detailed log reporting structured for easy filtering will clearly identify what HDF has allowed and what has been blocked. Admin permissions can be defined to individuals or groups. When HDF is used with the CMC it provides a “Hunter Killer” capacity against APTs and identify areas that require clean up HDF demands little operational or back office management.