24/7/365 Security Operation Centre Managed & Monitored

Sentinel5 for Endpoints & Servers

Third Sector Fully Managed Endpoint / Server Security Monitoring & Mitigation
ISKH's Sentinel5 is our Entry-Level Monthly Subscription that is a 'Fully Managed, So You Don't Have To' Cloud-based Mitigation service, which Manages and Monitors everything within your chosen Third Sector Organisations Desktop(s), Laptop(s) Endpoints & Servers. From Asset Management, Availability Monitoring, Compliance Management, Security Monitoring and Vulnerability Management. (See the full features further down this page)

Invariably, Remediation is carried out automatically on your behalf via our SOC and its Analysts, without any disruption to your device(s). However, if required where Remediation needs to reboot your device, it will only be carried out at an agreed 'Off-Peak' time slot of your choosing*, which you notify us of. This maintains your organisation's ability to keep your devices available and your business continuity. *Time Critical Remediation will be done immediately.

Sentinel5 assists you with the removal of many of your pain points, in an incredibly affordable and seamless manner. Can you afford not to embrace Fully Managed Endpoint / Server Mitigation as a Service?
Register & Begin your Mitigation Today

Personally Identifiable Infomration IconISKH's Sentinel5 for Endpoints & Servers Service, does NOT store any Personally Identifiable Information (PII) during the course of it's use and mitigation for your Third Sector Organisation.

The technology used by ISKH is of course required to scan the various elements of data within your infrastructure, that the given service aids mitigation points for; for traces of the many malicious traits that are known or found. Rest assured that your privacy including that of all your data, is always of huge paramount importance to us here at IS Know How.

How ISKH's Managed Sentinel5 for Endpoints & Servers Works?

No installation is required for the main Sentinel5 Management System Agent, which means that you are only required to install an incredibly lightweight Sentinel5 Endpoint / Server Agent and these are Fully Managed via IS Know How's Cloud system.

Once you install the Sentinel5 Endpoint / Server Agents to your Third Sector organisation's device(s), this will enable you to immediately begin mitigating the many risks to said devices data and that of your organisation as a whole. Sentinel5 is the perfect solution for your Desktop(s), Laptop(s) and Server devices, helping you to Mitigate your Reputational Risks. 

Technology vs. Process Flow

Technology vs. Process Flow

How Do We Install Sentinel5 for Endpoints & Servers?

1. Once you have Subscribed for this service, await the email notification of the Sentinel Agent Download Link.

Sentinel5 - Diagram1

2. Once notified, Download and Install the ISKH Sentinel Agent, which you then Deploy the required Agents to Devices in your Network from ISKH Managed Services that you have subscribed to.

Sentinel5 - Diagram2

3. Subscribed Devices will then Communicate with ISKH’S Cloud Backend and first phase automated setup is completed.

Sentinel5 - Diagram3

4. ISKH Cyber Watch Tower and Sentinel5 Service, will now begin to Manage and Monitor your IT Environment 24x7x365, that you've subscribed for - Mitigating Your Organisation's Risks.

Sentinel5 - Diagram4

How Is Information Collected?

IS Know How's Sentinel System will gather information from two vital sources – through locally installed agents on your desktop(s), laptop(s) or server devices, as well as by external testing completed via ISKH's Cloud-based system. The installed ISKH Sentinel5 Agent is a small application (about 2 Mb) that will run silently in the background using nearly zero resources, as it collects the required data from your designated devices. Affording your Third Sector organisation with incredible Best-of-Breed Mitigation.

ISKH Sentinel system will gather information about your organisation’s:

  • Hardware Type and Status
  • Software Installed and Usage
  • Network Statistics and Usage
  • Logged-in Users

*Note* At NO point, are your device files or their contents viewable from the whole ISKH Sentinel5 system or employee's.

The accumulated information is immediately encrypted and sent to ISKH Cyber Watch Tower, where the agent and cloud-based system validates one another, prior to exchanging data.

ISKH’s Cloud-based system will only receive information when needed e.g. a full list of installed software, or just the differences since last posting, resulting in just a few Kb of network bandwidth that this requires to be used.

The collected statistics are then analysed by an IS Know How Cyber Watch Tower Analyst to quickly spot areas of concern, flag issues, calculate inventory status and track usage statistics. The resource-intensive data collection process is done by ISKH’s Cloud-based system without putting extra strain on your organisation’s network.

If an issue is detected, it will be rectified automatically where possible but on the rare occassion that this is not possible; an ISKH Analyst alerts you through the ISKH Security Incident ticket system, also via an email or mobile phone text message. You will then receive another status message once the issue is fixed, to allow peace of mind and all without disruption to your device(s) that Sentinel5 for Endpoint or Servers is installed on.

.

Sentinel5 for Endpoints & Server Features

Sentinel5 Security Monitoring Icon

Security Monitoring Service

If you’re unaware that malware has successfully penetrated your firewall and antivirus protection, your network may be in deep trouble. Get the lowdown on compromised machines via up-to-the-minute Traffic Monitoring.

Third-party blacklists are utilised across your network to track down any connections to IP addresses that are known or suspected to be botnets, phishing or malware sites.

You’ll be notified of specific machines that are communicating with “bad guys” so you can restore order. Allow IS Know How to help you maximise your knowledge of malware and minimise the damage.

  • Monitor for compromised systems
  • Monitor more systems in less time
  • Automated blacklist updating

COMES WITH PROACTIVE PROTECTION

  • Active Virus Control
  • Two-Way Firewall with Intrusion Prevention  

Sentinel5 Security Monitoring Diagram
Sentinel5 Cyber Threat Watch Tower
  • Proactive Protection: Active Virus Control.
  • Proactive Protection: Two-way Firewall with Intrusion Prevention.
  • 24x7 Monitor for Compromised Systems.
  • 24x7 Track Down any Connections to IP Addresses that are Known or Suspected to be Botnets, Phishing or Malware Sites.
  • Notified of Specific Machines that are Communicating with “Bad Guys” so you Can Restore Order.
  • Help you Maximise your Knowledge of Malware and Minimise the Damage.
  • Automated Blacklist Updating.

.

Vulnerability Management Service

IS Know How’s Cloud-based solution, which features a single all-knowing managed service that covers all the IT bases, to keep your network running like a well-oiled machine.

With such integral features as Patch Management, Antivirus Checker, Traffic Monitoring, and Firewall Checker, IS Know How Managed Services via its Sentinel agent puts you on the path to improved security, increased user productivity, and total peace of mind.

Patch Management - Automate the entire process of monitoring and deploying patches for Windows, Office, and other applications.

Antivirus Checker - Make sure your systems' anti-virus protection is up-to-date and working properly.

Traffic Monitoring - Protect against machines talking with botnets or malware and phishing sites.

Firewall Checker - Ensure all systems have properly configured firewalls.

Notifications and Reports - Gain insight into and control of your network.

Sentinel5 Vulnerability Management Service Icon
Sentinel5 Cyber Threat Watch Tower 21
  • Integral features as Patch Management, Antivirus Checker, Traffic Monitoring, and Firewall Checker,. The Managed Services put you on the Path to Improved Security, Increased User Productivity, and Peace of Mind.
  • Patch Management - Automate the Entire Process of Monitoring and Deploying Patches for Windows, Office, and Other Applications.
  • Antivirus Checker - Make Sure your Systems' Anti-Virus Protection is Up-to-Date and Working Correctly.
  • Traffic Monitoring - Protect Against Machines Talking with Botnets or Malware and Phishing Sites.
  • Firewall Checker - Ensure All Systems have Properly Configured Firewalls.
  • Notifications and Reports - Gain Insight into and Control of Your Network.  

.

Sentinel5 Vulnerability Management Diagram
Sentinel5 Compliance Management Service

Compliance Management Service

The road to managing compliance is paved with good intentions. However, whilst the vast majority of people don't set out to intentionally misread unwanted software, bad passwords, phishing, and other negative influences; of course, the more users on your network, then the more difficult that road is to navigate and the more chances that you have of crash-landing in a pothole.

IS Know How's cost-effective cloud-based solution smooths out your ride, by providing the right tools to safely maintain compliance across your organisation. Additionally our detailed reports will steer you in the right direction, when it comes to User Behaviour, Unapproved Software or Theft Control. 

User Behaviour - Follow inappropriate user behaviour, fix it, and even take steps to prevent it from happening. Unapproved Software - Monitor to see if unapproved software is installed, such as file sharing applications that can drain bandwidth. Theft Control - View log-on, IP, and location as well as set-up a remote control session to assist in.

Unapproved Software - Monitor to see if unapproved software is installed, such as file sharing applications that can drain bandwidth at the very least. 

Theft Control - View log-on, IP, and location as well as set-up a remote control session to assist in recovery of stolen machines.

Notifications and Reports - Gain insight into, and control of, your network.

Sentinel5 Compliance Management Diagram
Sentinel5 Compliance Management Cyber Threat Watch Tower
  • User Behaviour, Fix It, and Even Take Steps to Prevent it from Happening.
  • Unapproved Software - Monitor to See if Unapproved Software is Installed, Such as File Sharing Applications that can Drain Bandwidth.
  • Theft Control - View Log-on, IP, and Location as well as Set-up a Remote Control Session to Assist in Recovery of Stolen Machines.
  • Notifications and Reports - Gain Insight into, and Control of, Your Network.
  • Reports will Steer you in the Right Direction when it comes to User Behaviour, Unapproved Software and Theft Control.

.

Availability Management & Monitoring Service

You’re available to your Third Sector organisation, when they need your unparalleled expertise. The same holds true for IS Know How's Managed Services. Our dependable Cloud-based solution, delivers best-of-breed Availability Management and Monitoring, to make certain that your network is operating problem-free around the clock.

The ever-present ISKH Managed Services keeps tabs on everything from servers, computers and printers, to email services, peripherals, and websites. This all-inclusive system, which identifies and corrects potential issues before they cause serious damage, is designed with your ultimate business continuity and uptime in mind.

Servers - Keep tabs on your server’s responsiveness and available disk space in an effort to reduce downtime.

Computers - Check all computers for overloaded processors and adapter errors to improve productivity.

Email Services - Make sure your SMTP server is available, replying, and not configured as an Open Relay.

Peripherals - Certify that your NAS devices and UPS are up and running to maintain valuable uptime.

Websites & Domains - Improve website uptime, keep domains from expiring, and track service level agreements.

Sentinel5 Availability Management & Monitoring Service Icon
Sentinel5 Availability Management & Monitoring Cyber Threat Watch Tower

Keeps tabs on everything from servers, computers, network devices, and printers to email services, peripherals, and websites. This all-inclusive system, which identifies and corrects potential issues before they cause serious damage, is designed with your ultimate uptime in mind.

  • Servers - keep tabs on your server’s responsiveness and available disk space in an effort to reduce downtime.
  • Computers - check all computers for overloaded processors and adapter errors to improve productivity.
  • Email services - make sure your SMTP server is available, replying, and not configured as an open relay.
  • Peripherals - certify that your NAS devices and ups are up and running to maintain valuable uptime.
  • Websites & domains - improve website uptime, keep domains from expiring, and track service level agreements.

.

Sentinel5 Availability Management & Monitoring Diagram
Sentinel5 Asset Management Service Icon

Asset Management Service

Old school Asset Management systems are challenging and clunky - not to mention time- and money consuming. Hardware and software inventory of servers, workstations, and laptops have to be taken on every network. So for e.g. if that network has more than 20 machines, or an array of machines in various locations, well, you do the calculations.

Leave that old school path behind and go to the head of the class with IS Know How’s Managed Services. Our cloud-based Asset Management system enables you to access vast amounts of information of the granular kind, to track every hardware set-up and software detail. And because it’s fully automated, you’ll graduate to a more efficient and cost-effective way of managing your assets.

Computers - Track network computers and standalone machines to gain access to more detailed information.

Servers - Effectively manage your servers and establish remote control server connections.

Virtual Machines - Attain an outstanding overview of everything from manufacturers to models to operating systems.

Peripherals - Automatically track all peripherals as assets and eliminate the need for physically checking switches.

Software - Save money by tracking unused licensed software and automatically update software asset management inventory.

Users - Delve deep into user usage history and save invaluable user inventory updating time.

Asset Reports - Easily pull hardware, software, and user reports to track assets and changes.

Sentinel5 Asset Management Service Diagram
Sentinel5 Asset Management Cyber Threat Watch Tower

Keeps tabs on everything from servers, computers, network devices, and printers to email services, peripherals, and websites. This all-inclusive system, which identifies and corrects potential issues before they cause serious damage, is designed with your ultimate uptime in mind.

  • Servers - keep tabs on your server’s responsiveness and available disk space in an effort to reduce downtime.
  • Computers - check all computers for overloaded processors and adapter errors to improve productivity.
  • Network devices - all simple network management protocol devices can be monitored for availability without time-intensive configurations.
  • Printers - track printer usage and status, monitor printers to ensure they are online, and proactively cut problems off at the pass.
  • Email services - make sure your SMTP server is available, replying, and not configured as an open relay.
  • Peripherals - certify that your NAS devices and ups are up and running to maintain valuable uptime.
  • Websites & domains - improve website uptime, keep domains from expiring, and track service level agreements.

System Requirements:

Windows OS's:
Microsoft Windows XP SP3 or newer for workstations. Resources - approximately 100 MB of free hard disk space provided you have .NET installed; Microsoft .NET 3.51 (SP1) or 4.x. If you do not already have .NET installed, an additional 768 MB to 2 GB of free disk space is required (depending on OS version)
Mac OS's
Mac OS X 10.6.x (Snow Leopard) to 10.11.x (El Capitan) 100 MB of free disk space and a local administrator account.
Linux OS's:
Sentinel 5 supports computers running different flavours of Linux, e.g. Ubuntu, Red Hat, Debian, CentOS, Amazon Linux AMI and requires approximately 100 MB of free disk space and a local administrator account.

To Begin Reducing Your Risks and Securing Your Reputation!

Sentinel5

24x7x365 Managed Security Monitoring and Mitigation For Your Organisations Endpoint & Server Devices.

Increase Your Third Sector Cyber Security Resilience & Mitigation

WebSentinel

24x7x365 Managed DDoS Multi-Layer Threat Monitoring Service For Your Third Sector Organisations Website(s).

Increase Your Third Sector Cyber Security Resilience & Mitigation

MCRS

24x7x365 Combined Best-of-Breed Managed Cyber Resilience Service (MCRS) For Your Organisations Devices.

Increase Your Third Sector Cyber Security Resilience & Mitigation

Contact Us

Phone
02921-679-021 (Sales ONLY)
Address
Britannia House, Caerphilly Business Park, Van Road, Caerphilly, Wales, UK. CF83 3GG
Legal Reg Info
Information Security Know How Ltd. is a Limited Company, Registered in England & Wales.

Company No: 09648503
VAT No: GB 232 2137 53

ISKH Site Newsletter

Sharpen your Third Sector Data & Cyber Security Mitigation Knowledge, by Subscribing to Our 'Mitigation Bits & Bytes'. Sharing a Myriad of Sector and Security Focused News, Infrequent Updates about IS Know How's Managed Cyber Security Service(s) Offers, Surveys, Research, Discussions and more...

Third Sector Organisation Personnel?

captcha 




By selecting 'Yes, Sign Me Up!' above, You Consent that we may Collect, Store and Process your Personal Data in accordance with Our Privacy Policy, Cookies Policy & Website Terms & Conditions.
All Newsletter Emails include an Unsubscribe / Modify Subscription link, where you may Opt-Out or Amend your Preferences at any time. You can also do the same from the 'My Account' menu, if you Register for a full FREE IS Know How Account.

Proud Members Of:

IS Know How is a Proud Member of Cyber Exchange

Our CEO & Founder, Robert Stones is also a ‘Member of the Fraud Advisory Panel’ See more information about them here: About the Fraud Advisory Panel

Payments By:

Powered by Stripe Logo
Stripe Subscription Accepted Payment Cards

Subscribe to the IS Know How 'Mitigation Bits & Bytes' Newsletter.

ISKHIcon100x100Instantly begin your Third Sector Data & Cyber Security Mitigation Journey Today!ISKHIcon100x100

Sharpen your Third Sector Data & Cyber Security Mitigation Knowledge, by Subscribing to Our 'Mitigation Bits & Bytes'. Sharing a Myriad of Sector and Security Focused News, Infrequent Updates about IS Know How's Managed Cyber Security Service(s) Offers, Surveys, Research, Discussions and more...

Third Sector Organisation Personnel?

captcha 




By selecting 'Yes, Sign Me Up!' above, You Consent that we may Collect, Store and Process your Personal Data in accordance with Our Privacy Policy, Cookies Policy & Website Terms & Conditions.
All Newsletter Emails include an Unsubscribe / Modify Subscription link, where you may Opt-Out or Amend your Preferences at any time. You can also do the same from the 'My Account' menu, if you Register for a full FREE IS Know How Account.