Listing Thumbnail

    Sentrilite - Cloud Cost, Runtime Security & Vulnerability Assessment

     Info
    Sold by: Sentrilite 
    Deployed on AWS
    AWS Free Tier
    Sentrilite delivers real-time cloud cost attribution at the service level - going deeper than pod-level to show exactly which process is driving your AWS spend. No manual tagging, no instrumentation, no code changes. Includes runtime security with zero-day threat detection and one-click vulnerability assessment for your entire Kubernetes and hybrid-cloud infrastructure.

    Overview

    Open image

    Sentrilite is a lightweight, kernel-level intelligence platform that gives you complete visibility into your cloud costs and security posture - from a single agent, with one command to install. Unlike traditional cost tools that stop at the pod or container level, Sentrilite uses system call hooks to attribute compute and network egress costs all the way down to the individual service and process - across AWS, GCP, Azure, on-premises bare metal, and Kubernetes workloads. No manual cost allocation tags, no Prometheus dependency, no cloud billing API credentials required. Just launch the AMI, open the dashboard, and get a full service-level cost breakdown in minutes.

    On the security side, Sentrilite's kernel-level runtime engine detects privilege escalation, namespace escapes, process masquerade, lateral movement, and zero-day attacks in real time - before they become incidents. Fully customizable Detection-As-Code rules let your team define exactly what to watch for in your environment. One-click PDF reports give you audit-ready Cost Intelligence, Runtime Security, and Vulnerability Assessment reports instantly, with full context and remediation details.

    Highlights

    • Cloud Cost Intelligence: Hybrid Cloud Cost Intelligence Report. Start saving on Cloud Spend in Minutes! Go beyond Pod-level abstractions and manual tagging. Get a complete Service-level cost breakdown for the entire Cloud Infrastructure!
    • Runtime Security: Zero-Day Threat Defense . Respond to Newly Disclosed CVEs Instantly with Custom Threat Detection Rules.
    • Sentrilite's built-in Vulnerability Assessment scans your entire infrastructure in minutes - Linux servers, Kubernetes clusters, and cloud environments - and delivers a prioritised, plain-English report of every misconfiguration and risk.

    Details

    Delivery method

    Delivery option
    64-bit (x86) Amazon Machine Image (AMI)

    Latest version

    Operating system
    Rhel 8

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Sentrilite - Cloud Cost, Runtime Security & Vulnerability Assessment

     Info
    Pricing and entitlements for this product are managed through an external billing relationship between you and the vendor. You activate the product by supplying a license purchased outside of AWS Marketplace, while AWS provides the infrastructure required to launch the product. AWS Subscriptions have no end date and may be canceled any time. However, the cancellation won't affect the status of the external license.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    Vendor refund policy

    Refunds are handled in accordance with AWS Marketplace policies. Customers may request a refund through AWS Support. Refunds are evaluated on a case-by-case basis and may be granted for technical issues or billing errors. For assistance, please contact our support team.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    64-bit (x86) Amazon Machine Image (AMI)

    Amazon Machine Image (AMI)

    An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.

    Version release notes

    Service-level cloud cost attribution using kernel-level - goes deeper than pod or container level with zero manual tagging Real-time egress cost breakdown across AWS, GCP, and Azure with cross-region and high-volume anomaly detection Compute cost intelligence with CPU and memory waste identification and idle pod detection One-click Cost Intelligence PDF report with full service-level breakdown, charts, and remediation guidance Runtime security engine with real-time detection of privilege escalation, namespace escapes, process masquerade, lateral movement, and zero-day threats Fully customizable Detection-As-Code rules - define your own detection logic in plain JSON One-click Vulnerability Assessment covering misconfigurations, exposed credentials, insecure file permissions, open ports, and unauthorized kernel modules Interactive real-time dashboard with WebSocket-based live alert feed Lightweight single-agent deployment - one Docker command or Helm chart, running in under 5 minutes Supports AWS EC2, EKS, bare metal, VMs, and hybrid on-premises workloads

    Additional details

    Usage instructions

    Open the dashboard on http://server-ip:8080  to see live telemetry and report generation for cloud cost, runtime security and vulnerability assessment.

    Support

    Vendor support

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Similar products

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 reviews
    No customer reviews yet
    Be the first to review this product . We've partnered with PeerSpot to gather customer feedback. You can share your experience by writing or recording a review, or scheduling a call with a PeerSpot analyst.