Friday, September 01, 2017 9:56:40 AM
SENTINEL OVERVIEW
How Sentinel Empowers IT Professionals
Every day hackers are growing more sophisticated. Organizations are vulnerable, and the old-world model of reactive security is not equal to the challenge. Sentinel offers corporate networks another layer of protection that complements their existing Firewalls, Intruder Detection Systems and Antivirus solutions.
Sentinel features a new approach towards monitoring network traffic that outpaces every other approach in the industry. The system, composed of a passive hardware device connected to each subnet, monitors network traffic for suspicious activity using sophisticated algorithms, generating an alert and deploying countermeasures when triggered.
After a hacker has compromised one device on your network, they will attempt to break into as many servers, computers and devices as they can. Sentinel actively monitors network traffic directed towards it as well as other types of broadcast traffic that can be used to detect these attacks.
When attackers scan your network, Sentinel appears to be low hanging fruit, attractive targets that will be easy to hack and exploit. Attempting to scan or hack sentinel will result in the administrator getting an alert via text message and email. The administrator can then secure genuine resources on the network and use the Sentinel logs to determine what computers, services or devices a hacker has control over.
Sentinel mitigates risk by greatly reducing the time a hacker has to operate inside protected networks, planting malware and stealing data. Using the information collected by Sentinel, the IT staff/administrators can take the appropriate action to determine the scope of the intrusion and resolve it in a quick and concise manner. This Anti-Hacking system allows organizations, for the first time, to take a proactive rather than a reactive approach to cybersecurity.
Sentinel Release September 2017
$MGTI
How Sentinel Empowers IT Professionals
Every day hackers are growing more sophisticated. Organizations are vulnerable, and the old-world model of reactive security is not equal to the challenge. Sentinel offers corporate networks another layer of protection that complements their existing Firewalls, Intruder Detection Systems and Antivirus solutions.
Sentinel features a new approach towards monitoring network traffic that outpaces every other approach in the industry. The system, composed of a passive hardware device connected to each subnet, monitors network traffic for suspicious activity using sophisticated algorithms, generating an alert and deploying countermeasures when triggered.
After a hacker has compromised one device on your network, they will attempt to break into as many servers, computers and devices as they can. Sentinel actively monitors network traffic directed towards it as well as other types of broadcast traffic that can be used to detect these attacks.
When attackers scan your network, Sentinel appears to be low hanging fruit, attractive targets that will be easy to hack and exploit. Attempting to scan or hack sentinel will result in the administrator getting an alert via text message and email. The administrator can then secure genuine resources on the network and use the Sentinel logs to determine what computers, services or devices a hacker has control over.
Sentinel mitigates risk by greatly reducing the time a hacker has to operate inside protected networks, planting malware and stealing data. Using the information collected by Sentinel, the IT staff/administrators can take the appropriate action to determine the scope of the intrusion and resolve it in a quick and concise manner. This Anti-Hacking system allows organizations, for the first time, to take a proactive rather than a reactive approach to cybersecurity.
Sentinel Release September 2017
$MGTI
Recent MGTI News
- Form 10-K - Annual report [Section 13 and 15(d), not S-K Item 405] • Edgar (US Regulatory) • 03/17/2026 04:19:03 PM
- Form 8-K - Current report • Edgar (US Regulatory) • 02/10/2026 10:18:44 PM
- Form D - Notice of Exempt Offering of Securities • Edgar (US Regulatory) • 01/08/2026 10:14:25 PM
- Form 8-K - Current report • Edgar (US Regulatory) • 12/31/2025 09:01:46 PM
- Form 10-Q - Quarterly report [Sections 13 or 15(d)] • Edgar (US Regulatory) • 12/12/2025 06:07:19 PM
- Form 10-Q - Quarterly report [Sections 13 or 15(d)] • Edgar (US Regulatory) • 12/05/2025 08:37:16 PM
- Form 10-Q - Quarterly report [Sections 13 or 15(d)] • Edgar (US Regulatory) • 12/03/2025 10:12:02 PM
- Form 10-K - Annual report [Section 13 and 15(d), not S-K Item 405] • Edgar (US Regulatory) • 11/10/2025 09:24:02 PM
- Form 4 - Statement of changes in beneficial ownership of securities • Edgar (US Regulatory) • 09/26/2025 10:09:53 PM
- Form 4 - Statement of changes in beneficial ownership of securities • Edgar (US Regulatory) • 09/25/2025 09:30:33 PM
- Form 8-K - Current report • Edgar (US Regulatory) • 07/01/2025 10:10:08 AM
- Form 10-Q - Quarterly report [Sections 13 or 15(d)] • Edgar (US Regulatory) • 06/27/2025 09:00:52 PM
- Form 10-Q - Quarterly report [Sections 13 or 15(d)] • Edgar (US Regulatory) • 06/17/2025 08:10:38 PM
- Form 8-K - Current report • Edgar (US Regulatory) • 06/05/2025 10:03:44 AM
