Sentinel Intrusion Provention Systems - Proven network security, less work for you.

rock-solid technology, real human beings.

Advanced edge protection, internal visibility, managed detection and response, and a single pane of glass to bundle it all together. And don’t forget the best part: A team of security pros, available any time you need them.

 

Sentinel Outpost

See the bad guys coming a mile away.

Improved Network Performance

Enterprise Intrusion Prevention

We don’t replace your firewall – we just make it better. With Outpost, you’ll notice that your firewall is performing more efficiently. Sentinel Outpost can reduce the firewall’s workload up to 70 percent by preemptively dropping malicious traffic and stopping both inbound and outbound threats in their tracks, utilizing the most advanced Intrusion Prevention system available. Sentinel plugs in to your existing infrastructure, dramatically improving your security posture while still playing nice with your other devices. Everybody wins, but the hackers.

See how Outpost is deployed

Your perimeter security guard

Threat Intelligence Gateway

Outpost is an inline bridge device that continuously patrols the network edge to deflect inbound exploitation attempts and attacker reconnaissance before they ever get to your firewall or public infrastructure. Sentinel’s proprietary Network Cloaking™ makes your network completely invisible to these threats, and our Threat Intelligence Gateway, powered by CINS Active Threat Intelligence, ensures that if there’s an emerging threat brewing, the Sentinel has probably seen it coming and has already been configured to shut it down.

Try Outpost for free
 

The Inside Track on Vulnerabilities,
Malware and Infected Machines on the LAN.

Sentinel Internal Intelligence

Every day, every hour, hackers are looking for holes in your network — an open window where malware can sneak in, undetected. Sentinel Internal Intelligence gives you the detailed LAN visibility to make sure everything is locked up tight.

If there are system flaws, misconfigurations, or outdated applications and patches, our full-scale vulnerability scanner will find them, and prioritize the issues with suggested remediations.

If attackers are already in, they won’t stay hidden for long. Sentinel quickly identifies infected devices, then automatically prevents those compromised computers from beaconing outbound to malware, ransomware or adware command and control servers. So, even if an employee clicked on an attachment in a phishing email, Sentinel can provide a last line of defense.

Our support team also works with you to configure additional visibility for East/West traffic, customized for your internal systems and fine-tuned to provide only the information you want to see, when you want to see it.

 

How does Internal Intelligence fit in?
 

The Window to Your World.

Sentinel HQ

Multiple Sentinel installations? An MSP with multiple customers running Sentinel-protected networks? If you want to take a quick look at what’s going on with your Sentinel network, no problem.  Sentinel HQ is our equivalent of mission control; a single pane of glass that gives you a comprehensive view of every device in both your internal and external Sentinel networks.

You can review your critical alerts and notifications, check out your latest vulnerability scan, or pull scans from the archive. If you want to connect with your support team, pull a report or reconfigure a device, you can do it all here, too.

Get HQ working for you
 

It's like adding to your security team, without adding overhead.

Sentinel Security Operations

With Sentinel, you don’t just get a comprehensive network security solution, but a team of seasoned security experts looking out for you—monitoring critical alerts, researching new threats, and troubleshooting issues, 24/7, 365 days a year. When you need support, there’s a real, live person waiting to help, anytime, day or night. When you don’t, you can rest assured that there’s an extra set of eyes watching over your network.

So, you can get back to all of the other things on your to-do list, and maybe even sleep a little better at night. That’s easier to do when someone has your back. And we do.

You've never experienced personal support like this
 

A complete network-based protection and visibility solution

Sentinel on the Network

Sentinel Outpost is deployed as an edge protection device, and the Internal Intelligence unit provides visibility on the inside of the network. Vulnerability scanning is provided for both the external and internal networks. Sentinel HQ ties everything together, and our Security Operations team provides support whenever you need it.

Sentinel Network Diagram

More questions than answers at this point?

We get it. That’s why we offer a live demo and free evaluations. No pressure to buy, just a chance to learn more and get your questions answered.

Give Us A Shout