ABTDS

Manifesto

Show the math.
That's the whole product.

Every endpoint detection vendor on Earth runs the same kind of model under the hood — Isolation Forest, gradient-boosted trees, an autoencoder for the boutique vendors. They all read Windows event logs. They all score behaviour against a baseline. They all flag deviations.

What they don't all do — what almost none of them do — is show you the math. When CrowdStrike fires a risk of 87, the dashboard does not tell you which features mattered, what their thresholds were, or what the user's baseline looked like. The explanation is an enterprise upsell. It's gated behind a CSM call.

For an SMB IT manager — the person reading this right now — the gated explanation is the problem. You bought the EDR to answer one question: is this a real attack, and what do I do about it? The score by itself can't answer either half.

ABTDS treats explainability as a load-bearing feature, not a marketing checkbox. Every alert is decomposed into 9 weighted factors. Each factor shows its inputs, its threshold, and the user's per-feature baseline. Each factor sums to a cap. The caps sum to exactly 100. No mystery numbers. No hidden weights.

Then, on top of the math, we run a Gemini analysis that translates the breakdown into plain English — attack type, likely actor, summary, three things to do, three things the user should do. The math proves the model. The summary lets you act in 30 seconds.

We're not better at detection than CrowdStrike. We're not faster than SentinelOne. We're honest about how the detection happened. That turns out to be enough — because for an IT manager without a SOC, honesty is the feature.

Read the difference

Same threat.
Three very different answers.

A brute-force attempt against a real Windows endpoint. Here's what each tool says when it fires.

D
Says
Microsoft Defender

"Medium risk."

That's it. That's the whole alert.

C
Says
CrowdStrike

"Score: 87."

From what? Threshold for what? On a curve calibrated when?

A
Says
ABTDS
9 factors

"Failed login from Bulgaria, off-hours, new ASN. 4 of 9 factors above baseline. Likely brute force."

Block the IP. Force MFA reset on j.morton. Review the next 4 Sysmon 4624s.

We're not better at detecting brute force. We're better at explaining the one you're already detecting.

The right decision

If you're tired of alerts you can't explain, starting an ABTDS pilot is the right decision.

30 days. Up to 50 endpoints. No card. No call required to start. Real data, your VPS, your decision at the end.

Or email founders@abtds.io — we read every one