SENTINEL
Proactive
Anti-Hacking

Image

Hacking is on the rise

For most organizations, the reality is that hackers are already on your network. Sentinel is a system that detects hackers as they probe throughout your network in an attempt to further their infiltration and identify attractive targets.
Image

Force Multiplier

Add next generation protection to your existing networks for a fraction of the cost of hiring additional IT professionals. Sentinel empowers your existing personnel to better protect your networks.

Image

Accurate Reporting

Collects and reports timely and precise information about attacks including time of attack, the attacker's IP address and more.

Image

Risk Mitigation

Stealing data takes time. Sentinel dramatically reduces the time hackers can spend undetected on your network and offers the opportunity to fight back.

Image

Plug And Protect

Sentinel ships ready to use right out of the box - just plug and protect. No specialized skills required.

OVERVIEW

How Sentinel Empowers IT Professionals

Every day hackers are growing more sophisticated. Organizations are vulnerable, and the old-world model of reactive security is not equal to the challenge. Sentinel offers corporate networks another layer of protection that complements their existing Firewalls, Intruder Detection Systems and Antivirus solutions.

Sentinel features a new approach towards monitoring network traffic that outpaces every other approach in the industry. The system, composed of a passive hardware device connected to each subnet, monitors network traffic for suspicious activity using sophisticated algorithms, generating an alert and deploying countermeasures when triggered.

After a hacker has compromised one device on your network, they will attempt to break into as many servers, computers and devices as they can. Sentinel actively monitors network traffic directed towards it as well as other types of broadcast traffic that can be used to detect these attacks.

When attackers scan your network, Sentinel appears to be low hanging fruit, attractive targets that will be easy to hack and exploit. Attempting to scan or hack sentinel will result in the administrator getting an alert via text message and email. The administrator can then secure genuine resources on the network and use the Sentinel logs to determine what computers, services or devices a hacker has control over.

Sentinel mitigates risk by greatly reducing the time a hacker has to operate inside protected networks, planting malware and stealing data. Using the information collected by Sentinel, the IT staff/administrators can take the appropriate action to determine the scope of the intrusion and resolve it in a quick and concise manner. This Anti-Hacking system allows organizations, for the first time, to take a proactive rather than a reactive approach to cybersecurity.

Compact

Sentinel is about the size of a pack of playing cards, making it ideal for space limited installations.

Efficient

Ultra low power consumption saves money and produces minimal heat.

Silent

Fanless engineering means Sentinel produces no noise.

Effortless

Sentinel requires minimal configuration and virtually no ongoing maintenance.

Hardened

Custom engineered high security kernel and operating system delivered in rugged, purpose built hardware made in the USA.

Transparent

No impact on network performance and not vulnerable to high-frequency attacks.

John McAfee Updates MGT Shareholders Spring 2017

Image