
Sentinel
With Sentinel, you can get automatic notifications about the security of your online services.
Sentinel is the first entry point into the Let's Guard It suite. It's an automated system that continuously inspects your online services, providing an up-to-date picture of their security. The system currently focuses on analyzing web services, which are currently the de facto standard for online services and mobile applications.
The context
Did you know that all online services are constantly under attack by botnets set up by cybercriminals, looking for vulnerabilities to exploit? A single vulnerability can be enough to cause your services and the data you manage to be compromised.
Even the simplest service is tempting for criminals as it can become part of their illegal infrastructure that is typically exploited for financial gain (e.g. selling the use of your systems or the exfiltrated data on the underground market).
It is a good idea to be constantly updated on your vulnerabilities in order to promptly remedy them, before they are exploited illegally with much greater costs and economic consequences.
Sentinel is the solution
Any vulnerability is reported to you via automatic notifications, and you can display the details through a dedicated interface, with suggested mitigation measures prioritized according to the estimated threat. The threat assessment takes into account the presence of exploits, which are known programs or procedures capable of exploiting the identified vulnerabilities.
The plans
You can register a personal account on the platform completely free of charge to monitor your site using the Community plan. To view technical details on collected evidence and references to publicly available exploits, you can subscribe to the Professional plan. With the Business plan, your organization can also automatically collect results through its own SIEM (Security Information and Event Management) system, so that you can correlate and integrate the analyses performed by Sentinel with those from other security systems.
Are your services business-critical or do they handle confidential data?
We recommend a more comprehensive and tailored assessment by an expert, using our vulnerability assessment service.