Cyberarms Home

Security -software -events

 

Cyberarms IDDS enhances Security by denying access to intruders on the network level

Cyberarms provides a pro-active Intrusion Detection and Defense System (IDDS). It's pro-active, because it not only logs, but also reacts to intrusion attempts.

Once a "bad guy" is recognized, he won't have access to any of your systems protected by Cyberarms IDDS. Don't give a second chance to hackers!

 

 

 Security -software -cyberarms

High performance, extremely small footprint and ultra low system overhead

Additional software almost always implies additional risk. But not with Cyberarms Security Systems, as the existing system functionality of Windows is re-used.

Our software uses the Windows event log for security analysis and intrusion detection (among other sources), and it configures the Windows firewall to dynamically deny access to hackers on a very low system level.

 

 

Security -software -plugins

 

Configure and adapt your Security System to meet 100 % your needs

Cyberarms IDDS covers the most common use-cases out of the box. In addition you can protect your own applications and cover almost any use-case with the powerful configuration-tool or the extendible API.

 

 

 

 

Cyberarms -Intrusion -Detection -save -networks 

Full control - whitelist trusted networks and determine how and in which case your IDDS shall react

Adapt the default settings in order to determine which kind of intrusion attempts you want to focus on and what consequences shall be taken when suspicious behavior occurs. Whitelist trusted networks to never deny access to clients from these networks. Get notified about every recognized attempt to attack your systems and the action taken.

 

 

 

Cyberarms -Intrusion -Detection -tested -certified

 

Trusted and tested - our certifications

Companies all over the world use Cyberarms IDDS to secure their systems. You can find us on a variety of Security Trade fairs for public and private sectors and visit us in person.

Cyberarms IDDS is tested for Windows Server 2008 and Windows Server 2012, as certified by Microsoft Corporation.

 

 

Security -software -plugins

 

 

 

Extend Cyberarms IDDS to secure your own applications or order a custom agent

We are developing new agents for a broad variety of standard software in order to extend Cyberarms IDDS functionality, which you will get for free.

Using Cyberarms Intrusion Detection, developers can easily write Security Agents for individual needs and custom software.

 

Secured Systems