Everyone — except hackers.

Cyberarms Intrusion Detection is built for professionals who value system security.
Whether you manage servers, develop software, or maintain IT infrastructure, our solution protects your systems from brute-force attacks and unauthorized access — automatically.

 

In-House System Administrators

Cyberarms Intrusion Detection is ideal for administrators managing systems such as Microsoft Exchange, SharePoint, or CRM servers.
It enables secure remote access from the internet while automatically blocking intrusion attempts based on attacker IP addresses — not user accounts.

 

Webmasters and Web Server Administrators

Outsourcing or cloud hosting offers convenience and scalability, but it also exposes systems to the public internet.
With administrative access (for example, Windows Remote Desktop) available online, brute-force password attacks are a constant threat.
Cyberarms Intrusion Detection automatically detects and blocks attackers, keeping your servers secure — even when exposed to the world.

 

Custom Software Developers

Integrating security into your own applications can be complex and time-consuming.
Cyberarms Intrusion Detection makes it simple: developers can secure their applications within minutes using our API, Developer’s Guide, and sample agents.
Create your own intrusion detection modules and let our engine handle the blocking logic for you.

 

Software Vendors

If your software provides network services such as SMTP, POP3, IMAP, or custom TCP/UDP endpoints, you can easily integrate Cyberarms Intrusion Detection for additional protection.
No need to build your own security UI or logic — our framework handles detection, logging, and defense out of the box.

Our mission is to secure systems against fraud, attacks, and abuse.
Cybersecurity is no longer optional — it’s one of the defining challenges of this decade.
With cybercrime rapidly increasing worldwide, proactive defense tools like Cyberarms Intrusion Detection are essential for individuals, businesses, and institutions alike.

Yes — and here’s why.

Using Windows’ built-in account lockout policy is risky because anyone can intentionally lock out legitimate users simply by guessing passwords.
This can easily turn into a denial-of-service situation.

Cyberarms Intrusion Detection works differently:

  • It blocks attackers by IP address, not by username.

  • Legitimate users remain unaffected.

  • You gain far greater protection without reducing system availability.

In short: it’s smarter, safer, and more reliable than account lockout policies.

Cyberarms Intrusion Detection and Defense System (IDDS) is modular, extensible, and developer-friendly.
You can easily integrate your own security logic by developing custom agents that communicate with the Cyberarms core engine through our public API.

Develop Your Own Agent

To build a custom agent, you need Microsoft Visual Studio 2010 or newer.
Create a .NET assembly (targeting .NET 4.0 or higher) using the Cyberarms Intrusion Detection API, which ships with the product.
Check our API documentation, code samples, and developer blog — you’ll master the API in minutes.

Need a tailor-made agent?
Contact us — we develop and certify custom agents for partners and enterprise clients.

No — direct redistribution is no longer permitted.

Since the introduction of our new subscription and registration model, Cyberarms Intrusion Detection may only be obtained through official Cyberarms AG channels.
Each installation requires user registration and activation via the Cyberarms Portal.

You may, however, link to our official download page so your customers can access the latest installer and register their trial or subscription directly.
This ensures they always receive up-to-date, licensed, and secure versions of the software.

Cyberarms Intrusion Detection is now offered exclusively as a subscription service.

Trial Version

  • A 14-day trial is available for evaluation.

  • Registration on the Cyberarms Portal is required for activation.

  • The trial includes all professional features with no functional limitations.

Subscription Models

We offer various subscription plans tailored to different usage levels — from single servers to enterprise networks.
Each active installation must be registered and activated online.
If hardware changes occur, reactivation is required, but no additional charges apply.

For current pricing, feature tiers, and activation details, please visit our
pricing page.