Cyberarms provides a pro-active Intrusion Detection and Defense System (IDDS). It's pro-active, because it not only logs, but also reacts to intrusion attempts.
Once a "bad guy" is recognized, he won't have access to any of your systems protected by Cyberarms IDDS. Don't give a second chance to hackers!
Additional software almost always implies additional risk. But not with Cyberarms Security Systems, as the existing system functionality of Windows is re-used.
Our software uses the Windows event log for security analysis and intrusion detection (among other sources), and it configures the Windows firewall to dynamically deny access to hackers on a very low system level.
Cyberarms IDDS covers the most common use-cases out of the box. In addition you can protect your own applications and cover almost any use-case with the powerful configuration-tool or the extendible API.
Adapt the default settings in order to determine which kind of intrusion attempts you want to focus on and what consequences shall be taken when suspicious behavior occurs. Whitelist trusted networks to never deny access to clients from these networks. Get notified about every recognized attempt to attack your systems and the action taken.
We are developing new agents for a broad variety of standard software in order to extend Cyberarms IDDS functionality, which you will get for free.
Using Cyberarms Intrusion Detection, developers can easily write Security Agents for individual needs and custom software.
Get notified and stay informed. IDDS sends emails about security issues and actions taken.