Savant Protection Negates Malware Threat with New Software

Savant Technology Neutralizes Viral Spread while Containing Both Known and Unknown Forms of Malicious Code

Nashua, NH-September 18, 2006-Savant Protection, leading a new approach in preemptive malware spread mitigation and containment technology, today announces the launch of its enterprise security product Savant. Breaking with traditional approaches, Savant eliminates the spread of known and unknown computer malware without the overhead of inoculation downloads, time-consuming scanning, or exhaustive whitelist development. This second-generation product introduces enhanced features and functions derived from over 18 months of successful industry deployment.

"Savant is designed to dramatically lessen the occurrence of production-impacting events in a business environment where CSOs have to deal with internal and external intrusion, release, and zero-day vulnerabilities, as well as the chaos of human error that can bring business operations to a complete halt," said Ken Steinberg, CEO of Savant Protection. "Based upon new cryptographic algorithms and malware mitigation techniques, our software solves the larger information assurance issue of business continuity while factoring in unknown attack methods and human error. The best defense is a preemptive defense, an advantage Savant inherently provides."

Malware spreads because hackers know that systems running the same OS or third-party application will share the same vulnerabilities. When software is released, any flaw in the product code will be consistent in each and every copy of that product. Exploitation of these common weaknesses makes systems susceptible to global attack. Savant eliminates these widespread flaws by making access to each computer and its application set unique and virtually underivable. This ability to automatically block all unapproved applications makes Savant the premier systemic solution providing true "release day" protection.

Regardless of how malware arrives on a system, CPU access is imperative to affect infection. Based on its cryptographic technology, Savant assigns unique keys to each system's OS as well as the associated applications, interpreters, and scripts. These keys are validated with each invocation of an application, guaranteeing that only approved software can gain access to computing cycles. Any program attempting access without this key or one presenting a changed key is denied the right to execute on that system. This removes the requirement of maintaining a "whitelist" and creates an environment that is inherently resistant to viral spread and intrusion. Savant-enhanced systems, whether in managed or unmanaged configurations, obviate the fear of transient systems (laptops or PDAs) or user-injected errors incapacitating a company network.

Savant returns control of enterprise security to the corporation, removing dependence on a third party's ability to identify, report, and defend against new attacks in a timely manner. Advanced technologies designed with a realistic view of computing environments, further set Savant apart. Accepting the reality that mistakes will be made, intrusions will occur and that inoculation and list updates will lag behind any new attack, Savant allows corporations to survive systemic attacks by minimizing the ability of malicious code to propagate. By containing viral intrusion to single occurrences and mitigating its spread, the risk of corporate-wide compromise is averted. Savant ensures an environment supportive of any corporate mission by returning direct control of computing assets to the company.

Savant is available in multiple Linux versions as well as stand alone and Enterprise solutions for Microsoft Windows 2000 through XP. Savant is designed to have absolutely no impact on the operation of third-party applications and is compatible with all leading anti-virus solutions in an effort to protect the existing enterprise investment and environment.

About Savant Protection

Savant technology is the industry pioneer in preemptive spread mitigation and malware containment technology. For more information, visit our Web site:

Must Read Articles