Cyberarms IDDS (Intrusion Detection and Defense System) provides intelligent, automated protection for any business running Windows Server–based services.
It’s designed to defend your infrastructure from brute-force, dictionary, and password-guessing attacks — keeping your systems, data, and users safe.

Whether you host your own systems or operate in the cloud, Cyberarms IDDS continuously monitors, detects, and blocks suspicious access attempts in real time.

 

Out-of-the-Box Security for Your Business

Cyberarms IDDS protects a wide range of Windows services right after installation — no complex setup or external hardware required.

 

Systems that benefit from Cyberarms protection include:

  • Outlook Web Access (OWA)

  • Microsoft SharePoint

  • Microsoft Dynamics products (CRM, NAV, AX, GP)

  • Remote Desktop / Terminal Services (RDP)

  • Microsoft SQL Server

  • SMTP (Email Services)

  • FTP Servers

  • And virtually any system using Windows Authentication

Cyberarms runs as a Windows Service, accessing relevant security data directly on the server — unlike network-based firewalls that only see external traffic.
This architecture gives Cyberarms deeper insight into system events, access logs, and authentication failures, allowing it to react instantly and intelligently to potential intrusions.

 

Key Advantages

  • Native Windows integration — no third-party dependencies

  • Lightweight service — minimal CPU and memory footprint

  • Real-time defense against brute-force and dictionary attacks

  • Centralized logging for security visibility and audits

  • Automatic IP blocking and unblocking for safe, self-managing defense

  • Modular architecture — add or customize agents for specific applications

Cyberarms IDDS is built on Swiss engineering principles: precision, reliability, and trust.

 

Security Modules & Agents

Each module in Cyberarms IDDS targets a specific type of service or protocol.
Below are the core protection agents included with the system.

 

Get Started

Protect your systems within minutes.
Download the latest version of Cyberarms IDDS and activate your 14-day trial via the Cyberarms Portal.
Once registered, you can choose from various subscription models tailored to your organization’s size and security needs.

Download Cyberarms IDDS →
Register on the Cyberarms Portal →