SlideShare a Scribd company logo
Email info@zerodayplus.com
www.zerodayplus.com
Page 1 of 2
Zero Day Plus anti-malware Limited is a UK head quartered company committed
to helping organisations enhance their cyber security strategy.
With the current Cyber threat landscape looking increasingly bleak and the very
public failure of conventional security tools, policies and procedures to protect
organisations like Anthem, Ashley Madison, IRS, Office of Personal Management,
Primera and Sony etc. it is time to look beyond the tried, tested and failing old
technologies of signature-based anti-virus, white-listing and behavioural analysis
tools to Abatis Host Integrity Technology (HIT): a disruptive, new, evaluated,
proven, award-winning and patent protected solution to secure all of your
endpoints against unwanted or malicious code.
Highly respected third parties such as BAE Systems, Lockheed Martin, ENEX
TestLab and ATOS have thoroughly tested and measured a 100% success rate for
Abatis HIT against any attack writing to persistent storage regardless of system
privilege. The Abatis HIT software also secures valuable IP, client data, corporate
reputation and shareholder value.
Abatis HIT prevents both external and internal threat vectors/surfaces from
being the conduit to enabling malware to become persistent on your endpoints.
Known or unknown, zero day or APT, no matter, whether simple, sophisticated
or encrypted.
Abatis’ proven protection covers legacy estates of Windows Servers and
Workstations as old as NT4 right up to the most modern systems from the
present. Abatis HIT is also available for Redhat Linux (and can be adapted for
other Linux/UNIX systems on request).
Future versions of Abatis HIT will soon be able to protect Windows Mobile and
Android, and through the Google Brillo platform and Weave language, the
Internet of Things (IoT).
Abatis HIT’s modus operandi is to prevent malware becoming resident on the
device which means inherent weaknesses or vulnerabilities of the operating
system cannot be exploited. This approach allows system managers to patch
their devices after thoroughly testing the patch rather than as an emergency
move (which can sometimes have very undesirable side effects).
Email info@zerodayplus.com
www.zerodayplus.com
Page 2 of 2
The ability to protect legacy operating systems such as Windows XP and Windows
Server 2003 which are no longer even in extended support from Microsoft is
essential to allow the continued operation of vital legacy applications developed
specifically for those platforms – thus extending the life of the asset. Similarly,
SCADA and embedded operating systems can be protected way past normal end
of life.
There is no end user impact nor reduction in capability of approved systems and
applications. This is not a whitelisting solution that is reliant on MD5 or SHA1 or
any other hashing function.
The solution scales, integrates extremely well in complex security environments
with no performance impact. No updates, no signatures, no cloud liaison is
required! The software self protects, is hardened, and is tiny being simple to
administer in large scale environments (very low FTE requirement) with excellent
reporting qualities. No False Positives or Negatives are generated, essential in
providing SIEMs with actionable intelligence with no operational requirement to
share with Third Parties.
The Abatis solution can be installed initially in LEARN mode with no risk to the
organisation. This mode allows the organisation to gather intelligence about the
environment and what unacceptable pieces of code are getting through the
existing defences. This allows the organisation to craft a suitable security policy
and, at the flick of a switch, enforce the policy from the Centre – thus taking back
control of the environment. Over time, any extant malware on the system will
be discovered and eradicated, and no new malware will get onto the system –
therefore the system will get cleaner and cleaner and faster and faster.

More Related Content

What's hot

Should You Be Automating
Should You Be AutomatingShould You Be Automating
Should You Be Automating
Siemplify
 
information security technology
information security technologyinformation security technology
information security technology
garimasagar
 
LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)
 LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)
LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)
rver21
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
vasanthimuniasamy
 
INFOGRAPHIC▶ Protecting Corporate Information In the Cloud
INFOGRAPHIC▶  Protecting Corporate Information In the CloudINFOGRAPHIC▶  Protecting Corporate Information In the Cloud
INFOGRAPHIC▶ Protecting Corporate Information In the Cloud
Symantec
 
LTS Secure SIEM Features
LTS Secure SIEM Features LTS Secure SIEM Features
LTS Secure SIEM Features
rver21
 
Ciso Platform Webcast: Shadow Data Exposed
Ciso Platform Webcast: Shadow Data ExposedCiso Platform Webcast: Shadow Data Exposed
Ciso Platform Webcast: Shadow Data Exposed
Elastica Inc.
 
Information security policy
Information security policyInformation security policy
Information security policy
BalachanderThilakar1
 
Five cloud security tips
Five cloud security tipsFive cloud security tips
Five cloud security tips
ServiceMesh
 
Ethical Hacking - Ferramentas Open Source para Pentest - Mateus Buogo - Tchel...
Ethical Hacking - Ferramentas Open Source para Pentest - Mateus Buogo - Tchel...Ethical Hacking - Ferramentas Open Source para Pentest - Mateus Buogo - Tchel...
Ethical Hacking - Ferramentas Open Source para Pentest - Mateus Buogo - Tchel...
Tchelinux
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
Codero
 
Vaultize corp three-pager v14
Vaultize corp three-pager v14Vaultize corp three-pager v14
Vaultize corp three-pager v14
Sameer (Sam) Vitkar
 
P3
P3P3
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
KATHEESKUMAR S
 
System Security Threats and Risks)
System Security Threats and Risks)System Security Threats and Risks)
System Security Threats and Risks)
BPalmer13
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
Kumawat Dharmpal
 
Usability vs. Security: How USP Secure Entry Server® (SES) Gives You Both – b...
Usability vs. Security: How USP Secure Entry Server® (SES) Gives You Both – b...Usability vs. Security: How USP Secure Entry Server® (SES) Gives You Both – b...
Usability vs. Security: How USP Secure Entry Server® (SES) Gives You Both – b...
United Security Providers AG
 
Think Your Network Is Safe? Check Your Printers
Think Your Network Is Safe? Check Your PrintersThink Your Network Is Safe? Check Your Printers
Think Your Network Is Safe? Check Your Printers
scoopnewsgroup
 

What's hot (18)

Should You Be Automating
Should You Be AutomatingShould You Be Automating
Should You Be Automating
 
information security technology
information security technologyinformation security technology
information security technology
 
LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)
 LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)
LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
 
INFOGRAPHIC▶ Protecting Corporate Information In the Cloud
INFOGRAPHIC▶  Protecting Corporate Information In the CloudINFOGRAPHIC▶  Protecting Corporate Information In the Cloud
INFOGRAPHIC▶ Protecting Corporate Information In the Cloud
 
LTS Secure SIEM Features
LTS Secure SIEM Features LTS Secure SIEM Features
LTS Secure SIEM Features
 
Ciso Platform Webcast: Shadow Data Exposed
Ciso Platform Webcast: Shadow Data ExposedCiso Platform Webcast: Shadow Data Exposed
Ciso Platform Webcast: Shadow Data Exposed
 
Information security policy
Information security policyInformation security policy
Information security policy
 
Five cloud security tips
Five cloud security tipsFive cloud security tips
Five cloud security tips
 
Ethical Hacking - Ferramentas Open Source para Pentest - Mateus Buogo - Tchel...
Ethical Hacking - Ferramentas Open Source para Pentest - Mateus Buogo - Tchel...Ethical Hacking - Ferramentas Open Source para Pentest - Mateus Buogo - Tchel...
Ethical Hacking - Ferramentas Open Source para Pentest - Mateus Buogo - Tchel...
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
 
Vaultize corp three-pager v14
Vaultize corp three-pager v14Vaultize corp three-pager v14
Vaultize corp three-pager v14
 
P3
P3P3
P3
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
System Security Threats and Risks)
System Security Threats and Risks)System Security Threats and Risks)
System Security Threats and Risks)
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Usability vs. Security: How USP Secure Entry Server® (SES) Gives You Both – b...
Usability vs. Security: How USP Secure Entry Server® (SES) Gives You Both – b...Usability vs. Security: How USP Secure Entry Server® (SES) Gives You Both – b...
Usability vs. Security: How USP Secure Entry Server® (SES) Gives You Both – b...
 
Think Your Network Is Safe? Check Your Printers
Think Your Network Is Safe? Check Your PrintersThink Your Network Is Safe? Check Your Printers
Think Your Network Is Safe? Check Your Printers
 

Similar to ZERO DAY PLUS presentation

Project
ProjectProject
Trusteer Apex Provides Automatic and Accurate Malware Protection
Trusteer Apex Provides Automatic and Accurate Malware ProtectionTrusteer Apex Provides Automatic and Accurate Malware Protection
Trusteer Apex Provides Automatic and Accurate Malware Protection
IBM Security
 
Hqs abatis hdf general overview
Hqs abatis hdf general overviewHqs abatis hdf general overview
Hqs abatis hdf general overview
Nine23Ltd
 
Comodo advanced endpoint protection
Comodo advanced endpoint protectionComodo advanced endpoint protection
Comodo advanced endpoint protection
David Waugh
 
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New VulnerabilitiesProtect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Symantec
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
GARL
 
Advanced Endpoint Protection
Advanced Endpoint ProtectionAdvanced Endpoint Protection
Advanced Endpoint Protection
Mustafa YÜKSEL
 
SecurePass at OpenBrighton
SecurePass at OpenBrightonSecurePass at OpenBrighton
SecurePass at OpenBrighton
Giuseppe Paterno'
 
The uncool-security-hygiene
The uncool-security-hygieneThe uncool-security-hygiene
The uncool-security-hygiene
Thiagu Haldurai
 
Advanced Threats in the Enterprise: Finding an Evil in the Haystack
Advanced Threats in the Enterprise: Finding an Evil in the HaystackAdvanced Threats in the Enterprise: Finding an Evil in the Haystack
Advanced Threats in the Enterprise: Finding an Evil in the Haystack
EMC
 
Reveelium Smart Predictive Analytics - Datasheet EN
Reveelium Smart Predictive Analytics - Datasheet ENReveelium Smart Predictive Analytics - Datasheet EN
Reveelium Smart Predictive Analytics - Datasheet EN
ITrust - Cybersecurity as a Service
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
William hendric
 
Accelerite Sentient Executive Briefing
Accelerite Sentient Executive BriefingAccelerite Sentient Executive Briefing
Accelerite Sentient Executive Briefing
Accelerite
 
OS-Anatomy-Article
OS-Anatomy-ArticleOS-Anatomy-Article
OS-Anatomy-Article
Condition Zebra (CONZebra)
 
CoreTrace Whitepaper: Whitelisting And Control Systems
CoreTrace Whitepaper: Whitelisting And Control SystemsCoreTrace Whitepaper: Whitelisting And Control Systems
CoreTrace Whitepaper: Whitelisting And Control Systems
CoreTrace Corporation
 
Proatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security TeamsProatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security Teams
FireEye, Inc.
 
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
MohamedOmerMusa
 
IDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleIDS+Honeypots Making Security Simple
IDS+Honeypots Making Security Simple
Gregory Hanis
 
seqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdf
seqriteseo
 
185
185185

Similar to ZERO DAY PLUS presentation (20)

Project
ProjectProject
Project
 
Trusteer Apex Provides Automatic and Accurate Malware Protection
Trusteer Apex Provides Automatic and Accurate Malware ProtectionTrusteer Apex Provides Automatic and Accurate Malware Protection
Trusteer Apex Provides Automatic and Accurate Malware Protection
 
Hqs abatis hdf general overview
Hqs abatis hdf general overviewHqs abatis hdf general overview
Hqs abatis hdf general overview
 
Comodo advanced endpoint protection
Comodo advanced endpoint protectionComodo advanced endpoint protection
Comodo advanced endpoint protection
 
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New VulnerabilitiesProtect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
 
Advanced Endpoint Protection
Advanced Endpoint ProtectionAdvanced Endpoint Protection
Advanced Endpoint Protection
 
SecurePass at OpenBrighton
SecurePass at OpenBrightonSecurePass at OpenBrighton
SecurePass at OpenBrighton
 
The uncool-security-hygiene
The uncool-security-hygieneThe uncool-security-hygiene
The uncool-security-hygiene
 
Advanced Threats in the Enterprise: Finding an Evil in the Haystack
Advanced Threats in the Enterprise: Finding an Evil in the HaystackAdvanced Threats in the Enterprise: Finding an Evil in the Haystack
Advanced Threats in the Enterprise: Finding an Evil in the Haystack
 
Reveelium Smart Predictive Analytics - Datasheet EN
Reveelium Smart Predictive Analytics - Datasheet ENReveelium Smart Predictive Analytics - Datasheet EN
Reveelium Smart Predictive Analytics - Datasheet EN
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
 
Accelerite Sentient Executive Briefing
Accelerite Sentient Executive BriefingAccelerite Sentient Executive Briefing
Accelerite Sentient Executive Briefing
 
OS-Anatomy-Article
OS-Anatomy-ArticleOS-Anatomy-Article
OS-Anatomy-Article
 
CoreTrace Whitepaper: Whitelisting And Control Systems
CoreTrace Whitepaper: Whitelisting And Control SystemsCoreTrace Whitepaper: Whitelisting And Control Systems
CoreTrace Whitepaper: Whitelisting And Control Systems
 
Proatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security TeamsProatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security Teams
 
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
 
IDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleIDS+Honeypots Making Security Simple
IDS+Honeypots Making Security Simple
 
seqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdf
 
185
185185
185
 

ZERO DAY PLUS presentation

  • 1. Email info@zerodayplus.com www.zerodayplus.com Page 1 of 2 Zero Day Plus anti-malware Limited is a UK head quartered company committed to helping organisations enhance their cyber security strategy. With the current Cyber threat landscape looking increasingly bleak and the very public failure of conventional security tools, policies and procedures to protect organisations like Anthem, Ashley Madison, IRS, Office of Personal Management, Primera and Sony etc. it is time to look beyond the tried, tested and failing old technologies of signature-based anti-virus, white-listing and behavioural analysis tools to Abatis Host Integrity Technology (HIT): a disruptive, new, evaluated, proven, award-winning and patent protected solution to secure all of your endpoints against unwanted or malicious code. Highly respected third parties such as BAE Systems, Lockheed Martin, ENEX TestLab and ATOS have thoroughly tested and measured a 100% success rate for Abatis HIT against any attack writing to persistent storage regardless of system privilege. The Abatis HIT software also secures valuable IP, client data, corporate reputation and shareholder value. Abatis HIT prevents both external and internal threat vectors/surfaces from being the conduit to enabling malware to become persistent on your endpoints. Known or unknown, zero day or APT, no matter, whether simple, sophisticated or encrypted. Abatis’ proven protection covers legacy estates of Windows Servers and Workstations as old as NT4 right up to the most modern systems from the present. Abatis HIT is also available for Redhat Linux (and can be adapted for other Linux/UNIX systems on request). Future versions of Abatis HIT will soon be able to protect Windows Mobile and Android, and through the Google Brillo platform and Weave language, the Internet of Things (IoT). Abatis HIT’s modus operandi is to prevent malware becoming resident on the device which means inherent weaknesses or vulnerabilities of the operating system cannot be exploited. This approach allows system managers to patch their devices after thoroughly testing the patch rather than as an emergency move (which can sometimes have very undesirable side effects).
  • 2. Email info@zerodayplus.com www.zerodayplus.com Page 2 of 2 The ability to protect legacy operating systems such as Windows XP and Windows Server 2003 which are no longer even in extended support from Microsoft is essential to allow the continued operation of vital legacy applications developed specifically for those platforms – thus extending the life of the asset. Similarly, SCADA and embedded operating systems can be protected way past normal end of life. There is no end user impact nor reduction in capability of approved systems and applications. This is not a whitelisting solution that is reliant on MD5 or SHA1 or any other hashing function. The solution scales, integrates extremely well in complex security environments with no performance impact. No updates, no signatures, no cloud liaison is required! The software self protects, is hardened, and is tiny being simple to administer in large scale environments (very low FTE requirement) with excellent reporting qualities. No False Positives or Negatives are generated, essential in providing SIEMs with actionable intelligence with no operational requirement to share with Third Parties. The Abatis solution can be installed initially in LEARN mode with no risk to the organisation. This mode allows the organisation to gather intelligence about the environment and what unacceptable pieces of code are getting through the existing defences. This allows the organisation to craft a suitable security policy and, at the flick of a switch, enforce the policy from the Centre – thus taking back control of the environment. Over time, any extant malware on the system will be discovered and eradicated, and no new malware will get onto the system – therefore the system will get cleaner and cleaner and faster and faster.