SENTINEL
Proactive
Anti-Hacking

ImageImage
Image

Hacking is on the rise


Traditional security models cannot stop modern hackers. John McAfee should know - he pioneered those models in the early days of computing. But as networks have become more spohisticated, so have malicious hackers and their tools. Now even organizations that spend millions on data security can be broken into at will.

Sentinel is a system engineered by John McAfee to turn the tide. Designed using the Proactive Anti-Hacking model, Sentinel watches your network and reacts instantly to suspicious activity. Recent high-profile data breaches have lasted for months before being noticed.

Sentinel will alert you in seconds.

GIVE YOUR ORGANIZATION THE SENTINEL EDGE

Force Multiplier

Force Multiplier

Sentinel empowers your existing IT professionals to better protect your data for a fraction of the cost of hiring additional personnel.

Accurate Reporting

Accurate Reporting

Sentinel collects and reports timely and precise information about attacks including time of attack, the attacker's IP address and more.

Risk Mitigation

Risk Mitigation

Sentinel dramatically reduces the time hackers can spend undetected on your network and offers you the opportunity to fight back.

Plug and Protect

Plug And Protect

Sentinel ships ready to use right out of the box with no specialized skills or training required.



Sentinel ShowcaseSentinel Close UpSentinel BoardsSentinel Close UpSentinel Manual

TECHNOLOGY OVERVIEW

How Sentinel Empowers IT Professionals

Every day hackers are growing more sophisticated. Organizations are vulnerable, and the old-world model of reactive security is not equal to the challenge. Sentinel offers corporate networks another layer of protection that complements their existing Firewalls, Intruder Detection Systems and Antivirus solutions.

Sentinel features a new approach towards monitoring network traffic that outpaces every other approach in the industry. The system, composed of a passive hardware device connected to each subnet, monitors network traffic for suspicious activity using sophisticated algorithms, generating an alert and deploying countermeasures when triggered.

After a hacker has compromised one device on your network, they will attempt to break into as many servers, computers and devices as they can. Sentinel actively monitors network traffic directed towards it as well as other types of broadcast traffic that can be used to detect these attacks.

When attackers scan your network, Sentinel appears to be low hanging fruit, attractive targets that will be easy to hack and exploit. Attempting to scan or hack sentinel will result in the administrator getting an alert via text message and email. The administrator can then secure genuine resources on the network and use the Sentinel logs to determine what computers, services or devices a hacker has control over.

Sentinel mitigates risk by greatly reducing the time a hacker has to operate inside protected networks, planting malware and stealing data. Using the information collected by Sentinel, the IT staff/administrators can take the appropriate action to determine the scope of the intrusion and resolve it in a quick and concise manner. This Anti-Hacking system allows organizations, for the first time, to take a proactive rather than a reactive approach to cybersecurity.

Compact

Sentinel is about the size of a pack of playing cards, making it ideal for space limited installations.

Efficient

Ultra low power consumption saves money and produces minimal heat.

Silent

Fanless engineering means Sentinel produces no noise.

Effortless

Sentinel requires minimal configuration and virtually no ongoing maintenance.

Hardened

Custom engineered high security kernel and operating system delivered in rugged, purpose built hardware made in the USA.

Transparent

No impact on network performance and not vulnerable to high-frequency attacks.

SENTINEL NEWSROOM

John McAfee Talks About Equifax Breach and SentinelInfowars

Hacker Advisory Board Member Bryan Seely On Sentinel CNBC