Cyberarms Home

Security -software -events


Cyberarms IDDS enhances Security by denying access to intruders on the network level

Cyberarms provides a pro-active Intrusion Detection and Defense System (IDDS). It's pro-active, because it not only logs, but also reacts to intrusion attempts.

Once a "bad guy" is recognized, he won't have access to any of your systems protected by Cyberarms IDDS. Don't give a second chance to hackers!



 Security -software -cyberarms

High performance, extremely small footprint and ultra low system overhead

Additional software almost always implies additional risk. But not with Cyberarms Security Systems, as the existing system functionality of Windows is re-used.

Our software uses the Windows event log for security analysis and intrusion detection (among other sources), and it configures the Windows firewall to dynamically deny access to hackers on a very low system level.



Security -software -plugins


Configure and adapt your Security System to meet 100 % your needs

Cyberarms IDDS covers the most common use-cases out of the box. In addition you can protect your own applications and cover almost any use-case with the powerful configuration-tool or the extendible API.





Cyberarms -Intrusion -Detection -save -networks 

Full control - whitelist trusted networks and determine how and in which case your IDDS shall react

Adapt the default settings in order to determine which kind of intrusion attempts you want to focus on and what consequences shall be taken when suspicious behavior occurs. Whitelist trusted networks to never deny access to clients from these networks. Get notified about every recognized attempt to attack your systems and the action taken.





Security -software -plugins




Extend Cyberarms IDDS to secure your own applications or order a custom agent

We are developing new agents for a broad variety of standard software in order to extend Cyberarms IDDS functionality, which you will get for free.

Using Cyberarms Intrusion Detection, developers can easily write Security Agents for individual needs and custom software.


Secured Systems