With isolated security solutions, you are only using a fraction of the global protection possibilities against the dangers of the cyberworld. You should therefore count on agile threat detection, to be able to benefit from the entire range of security technologies at the same time. Combine the various protection potentials with each other, adjust your selection flexibly to your needs and thus achieve the maximum protection for your IT.



720 Mio. Malware Examples

No security technology can detect all worldwide threats and has gaps (false-negatives) in the identification and removal of malware.
False alarms (false-positives) by security technologies, in which files are wrongly classified as threats, can create considerable damage.

The reaction times of the security vendors to new threats can amount to hours or even weeks. Thus, the protection often becomes available too late.

Most security systems are designed for isolated operation. Malfunctions in a system cannot thus be intercepted or compensated.

In order to comply with the legally required IT compliance, multi-vendor strategies must be implemented with high effort and cost levels.

Changing a security system, for strategic reasons or due to lack of satisfaction, requires much work, time and expense, and barely brings added value.

Guaranteeing the security of your data and IT infrastructure has become a difficult challenge nowadays. Despite the implementation of renowned protection solutions, things can always slip through the cracks: open the wrong e-mail attachment, visit a supposedly serious website, connect a colleague’s USB stick, and the damage is already done.

Malware on a computer system is not an exceptional situation any more, due to the rapidly growing mass of threats that start circulating year by year. One occurrence is enough to crash your IT, to cause the loss and theft of your data, as well as damage your reputation with customers and partners. Followed by possible economic damage that can amount to millions and legal consequences, which may reach all the way to your personal liability.

As protection against this type of incident, you can choose from a wide range of security solutions. Each of them has its own philosophy and technology for malware fighting. However, they are often incompatible with each other and very operationally intensive, which means that you usually have to decide for a single solution.

The increasing number and complexity of threats is making it ever more difficult for individual vendors to protect you against all the threats across the world on time. Despite greatest efforts and the most innovative of approaches, this task is practically impossible to fulfil. You can feel the effects yourself in your everyday life: malware attacks despite installed security system!



Diverse redundancy is a well-known strategy for fulfilling the highest security needs: different components, from independent manufacturers, are implemented in parallel to prevent incidents of any type. Which has been the norm for many years now in critical systems, such as aviation and aerospace, Tabidus Technology now also allows you to protect against malware!

Each security vendor has its own information sources to analyse parts of the global data flow. For this, it uses its patented technologies and its own know-how to identify malware and determine the measures to fight it. The vendor conducts an independent quality control to prevent false alarms and is often specialised in certain types of threats. For this, it uses technical and staff resources of varied sizes, and is subject to the political and legal influences of its country of origin. Its technology has specific characteristics in the fields of data throughput, CPU-usage, memory usage and reaction times, and offers different functionalities and various technical approaches. The protection potentials and technologies of the security vendors in the fight against malware are thus correspondingly diverse and unique.

With diverse redundancy, you can benefit from the full range of security technologies at the same time, exploit the strengths and balance out the weaknesses. From traditional virus signatures to various heuristic algorithms, sandboxing, behaviour analyses, up to real-time information from different clouds. Tabidus Technology bundles all the protection potentials into one unified security system, so that they are available to you with a simple keystroke.

To achieve the closest correspondence to your wishes and needs, Tabidus Technology puts a strong focus on flexibility. You decide yourself which technologies from which vendors should be used, where and in which combinations. You can activate other technologies at any time, or turn off or change existing ones. This opens a new dimension for you in the design of your security concept and the protection of your IT can be redundant for the first time.



Achieve a significantly higher detection accuracy for malware, through the combined variety of the protection potentials of different vendors and technologies.


Avoid the negative effects of false alarms through configurable minimum-matching between vendors before automatic cleaning is performed.


Receive the protection measures against new threats faster than before, as soon as any one of your choosen vendors makes them available.


Choose the vendors freely according to your needs, adapted to each of your application areas and make flexible changes at any time.


Activate and deactivate technologies with a single keystroke, during running operations, without software roll-out, network wide, even in an emergency.


Manage all vendors and technologies through a common user interface, with minimum maintenance work and know-how.


Correspond with diverse redundancy to the legal requirements for IT compliance, with true multi-vendor strategies.


Simplified evaluation of technologies, minimisation of external consulting, elimination of software roll-outs and extensive training sessions.



The flexible use of simultaneous anti-malware technologies will open new possibilities for you in the strategic usage of security vendors. All technologies can be combined with each other at will, in every feature. The fast activation and hot-swap change thereby also allow you to limit vendors to a certain period or application area. You also don’t have to make these decisions homogenously for your entire environment any longer. You can make individual decisions for each endpoint, in each application area. According to the relevant performance and security requirements of your users, you can thus always achieve an optimum technology usage. In the following part, we would like to introduce some of the fundamental strategies you can use to implement diverse redundancy to protect your IT infrastructure.


The best possible protection is achieved through the ongoing use of two or more technologies per security feature. This maximise the detection rate and protects you against false alarms. An even wider protection range is achieved with different vendor combinations between the security features. Possible selection criteria for this could be the performance characteristics: technologies with a high data throughput are the best for on-access-scan methods, whereas more time-intensive investigation techniques are perfectly suited for on-demand functions. You will thus achieve the highest level of security with optimum performance compatibility on your computer systems.


You can use redundant security not only in permanent operations, but also in the form of monitoring instances. While one or more vendors take care of the real-time protection, you can use additional technologies on-demand. With these, you check your systems in a timed manner and actively hunt for undiscovered threats and attackers. You can schedule these controls or have them run spontaneously. With this strategy, you will achieve an extended protection for your environment, without changing the usual scanning behaviour of your endpoints.


Another strategy is the use of different technology and vendor combinations, in different areas of your IT infrastructure. This type of separation makes it harder for a potential attacker to spread unnoticed through the network, due to constantly changing framework conditions. In addition, this can account for the protection requirements of individual system groups. Mobile devices, for example, face a higher risk than the server landscape and thus require more or different technology combinations.


Even if you want to continue placing your trust in a single vendor, redundant protection is the better choice. In the case of a virus outbreak that the technology on its own cannot eradicate, you can use other vendors to help you. They can be activated for protection across the entire company, in just a few short minutes. This can eliminate an outbreak much faster than the usual emergency measures.



Aside from the mass spread of malware, targeted attacks such as Advanced Persistent Threats are making the headlines more and more often. These long attacks are intended to discreetly steal the company’s confidential data. To protect against this, various security measures are necessary at different levels. In this threat scenario, diverse redundancy on your endpoints can also make an important contribution to the protection, in every stage of the attack.

In the first stage of the attack, important data about the company is obtained, through social engineering for example. Which security system is used is a coveted piece of information in this stage, to be able to develop targeted malware for its environment.
Through a flexible use of technologies, the information gained only has a limited shelf-life. You can quickly rotate or change security vendors, which constantly changes the initial situation for the attacker and makes the information useless.
The targeted malware is used in the second stage of the attack. Via prepared e-mails or manipulated USB sticks, the chosen employees are used for the execution, to obtain access to the first computer system.
The developed malware is confronted to a wide variety of vendors, methods and philosophies for zero-day threat detection. The attacker is thus faced with the difficult challenge of having to circumvent multiple technologies simultaneously to be able to execute an infection.
Starting with the first infected computer system, in the third stage the malware spreads slowly and discreetly to other systems in the network, until the desired target systems are reached.
During the spread, you can always surprise the attacker with different technology combinations. This significantly hinders their progress and the risk of being discovered grows simultaneously, as soon as one of your technologies receives newer information.
As soon as the target system has been reached, the coveted data is uploaded to the external server of the attacker, which usually only exists for a short amount of time on the internet and is difficultly traceable.
If the attacker tries the upload with special software, this may be recognised and deleted by the local technologies (PUP, for example). As general protection against data loss, you can also use various encryption, DataLoss or network security solutions.


Tabidus Technology is realising the diverse redundant security approach for the first time in the field of endpoint protection. Not in the form of a cloud service, but as a full-value security system on the local computer. The United Endpoint Protector was thereby equipped with multiple technology cores, by various security vendors. These are available to you through a single keystroke and can be combined fully flexibly, according to your wishes and needs.


To allow the operation of multiple security vendors and technologies in large environments too, Tabidus Technology developed the United Control Center. This control system for the United Endpoint Protector unifies the central management of all providers. Regardless of who you choose, you receive all the security information at a glance, control the technology usage in your environment and react immediately to any occurring situation.


Take part in the PreRelease program and join the exclusive group, which discover the redundant protection first.