Top 15 Cyberarms Intrusion Detection and Defense System (IDDS) Alternative and Similar Softwares | May 2024

Out-of-the-box security for Remote Deskop, Exchange, OWA, SharePoint, CRM, generic IIS applications and many other server systems.

1. snort

snort Snort® is an open source network intrusion prevention and detection system (IDS/IPS) developed by Sourcefire. Combining the benefits of signature, protocol, and anomaly-based inspection, Snort is the most widely deployed IDS/IPS technology worldwide. With millions of downloads and nearly 400,000 registered users, Snort has become the de facto standard for......

2. Tripwire

Tripwire Open Source Tripwire software is a security and data integrity tool useful for monitoring and alerting on specific file change(s) on a range of systems.......

3. Anti DDoS Guardian

Anti DDoS Guardian DDoS Protection tool. Anti DDoS Guardian stops DDoS attacks for Windows servers, it prevents Remote Desktop Connection brute force attacks, Slow HTTP Get&Post attacks, SYN flood, TCP flood, UDP flood, ICMP flood, bandwidth attacks, etc.......

4. ModSecurity

ModSecurity ModSecurity is an open source web application firewall. Working embedded in the web server, or standalone as a network appliance, it detects and prevents attacks against web applications.......

5. SpyLog

SpyLog lua-spylog - Execute actions based on log records......

6. LogDog

LogDog LogDog (Log Dog) is a mobile Intrusion Detection System (IDS, also known as IDPS or IPS)* for your online accounts. It is an internet security service that gives you an immediate alert of any suspicious activity in your accounts – so you can take action and protect your privacy immediately.......

7. EvlWatcher

EvlWatcher Protected against RDP-Brute forcers. It installs a service which scans the event log for anomalies every 30 seconds (by default).When the service finds out that someone is taunting your server with RDP-login attempts, it adds the remote IP to a generic rule in the windows firewall which locks out the......

8. Shell Control Box

Shell Control Box Shell Control Box is a user monitoring appliance that controls privileged access to remote IT systems, records activities in searchable movie-like audit trails, and prevents malicious actions. SCB is a quickly deployable enterprise device, completely independent from clients and servers - integrating seamlessly into existing networks.......

9. GlassWire

GlassWire GlassWire is a free network security monitoring tool and analyzer that visualizes your network activity on an easy to use graph, alerts you of possible threats, manages your firewall, and more.......

10. SIEMonster

SIEMonster OverviewKustodian’s SIEMonster: SIEM for everyone with no limitsAs a security professional, protecting your company’s assets from internal or external attacks is a never ending complex job. It is crucial that you have visibility across your entire environment. It’s like having a house alarm, there is no point having some rooms......

11. Kismet

Kismet Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode, and (with appropriate hardware) can sniff 802.11b, 802.11a, 802.11g, and 802.11n traffic. Kismet also supports plugins which allow sniffing other media such as DECT.Kismet......

12. Deep Freeze

Deep Freeze Deep Freeze Cloud is the new product line introduced by Faronics, which is offered as Software as a Service (SaaS).It takes PC management, data protection, asset administration, power management to the next level. Now be in control of your IT assets, anytime and anywhere.......

13. AKMA Network Simulator

AKMA Network Simulator Network Simulator tool allows you to perform network bandwidth and delay simulation (simulate slow/congested links between nodes) on any connection from your computer to any remote node (on the local LAN or remote over Internet). The most useful feature of this utility is that you can install it on your......

14. ESET Endpoint Security

ESET Endpoint Security Antivirus and AntispywareEliminates all types of threats, including viruses, rootkits, worms and spywareOptional cloud-powered scanning: Whitelisting of safe files based on file reputation database in the cloud for better detection and faster scanning. Only information about executable and archive files is sent to the cloud – such data are not......

15. Sophos XG Firewall

Sophos XG Firewall With features you just can’t get anywhere else.Unified policies and streamlined workflows make it easy to manageControl Center and rich on-box reporting provide unprecedented visibilityLayer-8 user identity across all areas provides invaluable insights & controlSynchronized Security links your endpoints for advanced protectionXG hardware appliances with FastPath provides lightning performanceFull suite......