Cyberarms Intrusion Detection icon

Cyberarms Intrusion Detection

2 big stars
Cyberarms Intrusion Detection screenshot
Name: Cyberarms Intrusion Detection
Works on: windowsWindows 2008 and above
Developer: Cyberarms
Version: 2.2
Last Updated: 25 Apr 2017
Release: 18 Apr 2017
Category: Security > Security Related
Rate this software:
1425 downloads
screenshotsView Screenshots(14)
commentsComments
downloadDownload
Liked it? Tell others:
details

Cyberarms Intrusion Detection Details

Works on: Windows 10 | Windows 8.1 | Windows 8 | Windows 7 | Windows 2008 | Windows 2012
SHA1 Hash:
Size: 0 bytes
File Format:
Rating: 2.478260869 out of 5 based on 23 user ratings
Publisher Website: External Link
Downloads: 1425
License: Free
Cyberarms Intrusion Detection is a free software by Cyberarms and works on Windows 10, Windows 8.1, Windows 8, Windows 7, Windows 2008, Windows 2012.
You can download Cyberarms Intrusion Detection which is 0 bytes in size and belongs to the software category Security Related.
Cyberarms Intrusion Detection was released on 2017-04-18 and last updated on our database on 2017-04-25 and is currently at version 2.2.
We also have Cyberarms Intrusion Detection 64bit version which is in size and will work on x64 computers.
download button
Thank you for downloading from SoftPaz! Your download should start any moment now. It would be great if you could rate and share:
Rate this software:
Share in your network:
features

Cyberarms Intrusion Detection Description

  • Cyberarms IDDS enhances Security by denying access to intruders on the network level:
  • Cyberarms provides a pro-active Intrusion Detection and Defense System (IDDS). It's pro-active, because it not only logs, but also reacts to intrusion attempts.
  • High performance, extremely small footprint and ultra low system overhead:
  • Additional software almost always implies additional risk. But not with Cyberarms Security Systems, as the existing system functionality of Windows is re-used.
  • Configure and adapt your Security System to meet 100 % your needs:
  • Cyberarms IDDS covers the most common use-cases out of the box. In addition you can protect your own applications and cover almost any use-case with the powerful configuration-tool or the extendible API.
  • Full control - whitelist trusted networks and determine how and in which case your IDDS shall react:
  • Adapt the default settings in order to determine which kind of intrusion attempts you want to focus on and what consequences shall be taken when suspicious behavior occurs.
  • Extend Cyberarms IDDS to secure your own applications or order a custom agent:
  • We are developing new agents for a broad variety of standard software in order to extend Cyberarms IDDS functionality.
screenshots

Cyberarms Intrusion Detection Screenshots

Cyberarms Intrusion Detection screenshot 1 Cyberarms Intrusion Detection screenshot 2 Cyberarms Intrusion Detection screenshot 3 Cyberarms Intrusion Detection screenshot 4 Cyberarms Intrusion Detection screenshot 5 Cyberarms Intrusion Detection screenshot 6 Cyberarms Intrusion Detection screenshot 7 Cyberarms Intrusion Detection screenshot 8 Cyberarms Intrusion Detection screenshot 9 Cyberarms Intrusion Detection screenshot 10 Cyberarms Intrusion Detection screenshot 11 Cyberarms Intrusion Detection screenshot 12 Cyberarms Intrusion Detection screenshot 13 Cyberarms Intrusion Detection screenshot 14
similarSimilar Software