Cyberarms IDDS enhances Security by denying access to intruders
on the network level
Cyberarms provides a pro-active Intrusion Detection and Defense
System (IDDS). It's pro-active, because it not only logs, but also
reacts to intrusion attempts.
Once a "bad guy" is recognized, he won't have access to any of
your systems protected by Cyberarms IDDS. Don't give a second
chance to hackers!
High performance, extremely small footprint and ultra low
Additional software almost always implies additional risk. But
not with Cyberarms Security Systems, as the existing system
functionality of Windows is re-used.
Our software uses the Windows event log for security analysis
and intrusion detection (among other sources), and it configures
the Windows firewall to dynamically deny access to hackers on a
very low system level.
Configure and adapt your Security System to meet 100 % your
Cyberarms IDDS covers the most common use-cases out of the box.
In addition you can protect your own applications and cover almost
any use-case with the powerful configuration-tool or the extendible
Full control - whitelist trusted networks and determine how and
in which case your IDDS shall react
Adapt the default settings in order to determine which kind of
intrusion attempts you want to focus on and what consequences shall
be taken when suspicious behavior occurs. Whitelist trusted
networks to never deny access to clients from these networks. Get
notified about every recognized attempt to attack your systems and
the action taken.
Trusted and tested - our certifications
Companies all over the world use Cyberarms IDDS to secure their
systems. You can find us on a variety of Security Trade fairs for
public and private sectors and visit us in person.
Cyberarms IDDS is tested for Windows Server 2008
and Windows Server 2012,
as certified by Microsoft Corporation.
Extend Cyberarms IDDS to secure your own applications or order
a custom agent
We are developing new agents for a broad variety of standard
software in order to extend Cyberarms IDDS functionality, which you
will get for free.
Using Cyberarms Intrusion Detection, developers can easily write
Security Agents for individual needs and custom software.