Used Cyberarms Intrusion Detection (32-bit) for Windows?


Editors’ Review

Download.com staff
Cyberarms delivers a proactive host-based intrusion detection and prevention system. It analyzes Windows event logs to dynamically configure firewalls, blocking network-level threats while maintaining an extremely small system footprint and ultra-low overhead.
Enlarged image for Cyberarms Intrusion Detec…
Cyberarms Intrusion Detection (32-bit) 0/1
  • Pros

    • Proactive network level intrusion detection and automated defense response
    • Deep integration with Windows event logs for security analysis
    • Full API access allows developers to secure custom applications
    • Minimal system footprint ensures ultra low resource overhead
    • Extensible plug-in system supports custom agents and specific settings
  • Cons

    • Functional compatibility is restricted to Windows based environments
    • Requires manual input for agent specific security threshold values
    • Security analysis relies primarily on Windows event log sources
    • Host based architecture limits scope to individual PC protection

Used Cyberarms Intrusion Detection (32-bit) for Windows?


Explore More


Full Specifications

GENERAL
Release
Latest update
Version
2.0.322
OPERATING SYSTEMS
Platform
Windows
Operating System
  • Windows 7
  • Windows Server
  • Windows 8
  • Windows 10
Additional Requirements
Microsoft .NET Framework 4.0
POPULARITY
Total Downloads
483
Downloads Last Week
0

Report Software

Program available in other languages


Last Updated


Developer’s Description

Create a host-based intrusion detection system or intrusion prevention system on PC.
Cyberarms gives a pro-active Intrusion Detection and Defense System (IDDS). It's pro-active, because it not only logs, but also reacts to intrusion attempts. It uses the Windows event log for security analysis and intrusion detection (among other sources), and it configures the Windows firewall to dynamically deny access to hackers on a very low system level. It enhances security by denying access to intruders on the network level, full API access for developers to secure own applications, not using Windows authentication, extremely small footprint, ultra low system overhead, plug-in system to enhance Cyberarms products with custom agents, per-agent security settings, configuration of threshold values, and automatic unlock after per-agent defined unlock times.

Download.com
Your review for Cyberarms Intrusion Detection (32-bit)