Listing Thumbnail

    Sentry

     Info
    Sold by: Yulevo 
    Deployed on AWS
    Sentry is a full-lifecycle security solution designed for multi-cloud, hybrid-cloud and containerized environments. Addressing the security challenges posed by private clouds, containers and Kubernetes, it uses a unified agent to deliver asset inventory, risk discovery, intrusion detection & response, anti-ransomware and compliance-baseline management across physical servers, VMs, cloud hosts, containers and clusters, enabling organizations to build global security situational awareness and proactive defense.

    Overview

    1. Asset Visibility : Security knows the business better than Dev or Ops
      1.1. 60 second discovery : a single agent auto-detects cloud hosts, containers and clusters and syncs with any CMDB via REST API; assets appear in the inventory within one minute of probe installation.
      1.2. 2 000+ asset types: six macro categories (Kubernetes, hosts, OS, containers, applications, web apps) covering 180 object types and 2000+ sub-types, with deep recognition of open-source components.
      1.3. 20+ security-relevant contexts: every asset is analysed from an attacker's viewpoint - e.g. web-framework details include service type, language, version, associated JARs and full file paths.

    2. Risk Discovery - continuous, agent-based assessment of OS, clusters, containers and apps for vulnerabilities, missing patches, weak passwords and insecure configuration, across the entire application life-cycle.
      2.1. Zero-impact: weak-password detection uses loss-less hash collision; white-box vulnerability scans create no dirty data.
      2.2. High accuracy: POC verification for Apache, Shiro, WebLogic, FastJSON, Java and more to confirm exploitable flaws.
      2.3. Actionable intel: each vulnerability is tagged with availability of public exploit, remote-exploit feasibility, reboot requirement and exact fix command to prioritise remediation.
      2.4. Real-time feed: an in-house security lab tracks the latest CVEs and pushes them into the product within hours.

    3. Compliance Baselines - out-of-the-box templates for China Classified Protection 2.0 and CIS Benchmarks, covering mainstream OS, web servers and databases.
      3.1. 100+ rules, OS-to-app coverage: baselines for every workload object-OS, Kubernetes, database, etc. mapped to MLPS 2.0 and CIS.
      3.2. Adaptive, job-driven checks: create a baseline job and the platform uses the asset inventory to auto-select only the applicable rules.
      3.3. Fully customisable: clone and edit templates or add industry-specific rules (e.g. financial-sector hardening standards).

    4. Intrusion Detection & Response
      4.1. Full ATT&CK spectrum: >90 % of documented techniques covered, from cluster to OS to container and application layer.
      4.2. Multi-engine detection:

      • Signature engine: known IOC matching.
      • Behaviour engine: anomalous commands, lateral movement, memory-only webshell injection.
      • AI engine: self-learning of normal business behaviour to cut false positives.
        4.3. Attack-chain visualisation: correlates scattered alerts into a single incident and renders a 2.5-D topology of the kill chain.
        4.4. Smart noise reduction: automatic alert clustering plus behaviour-based whitelisting.
        4.5. Response arsenal: auto or manual kill of malicious processes, container quarantine, one-click host isolation, IP/file/kernel-module blocking; out-of-the-box SOAR playbooks.
    5. Anti-Malware -12 integrates multiple top-tier AV engines for real-time detection of trojans, viruses and malicious documents, plus a home-grown engine optimised for server-side script attacks.
      5.1 Script-command engine: uses AI-driven normalisation and inference instead of regex to detect obfuscated or polymorphic scripts.
      5.2. Multi-engine scanning: high detection rate against miners, worms and hack-tools; QingTeng's own engine specialises in cryptojacking and ransomware payloads.

    6. Anti-Ransomware
      6.1. Dual-decoy strategy: static and dynamic bait files placed in critical directories to maximise trigger probability during ransomware enumeration.
      6.2. Behaviour blocking: monitors hallmark ransomware actions and instantly kills the process before encryption spreads.
      6.3. File recovery: hooks encryption APIs and key-generation routines at launch; leverages a continuously updated ransomware-family rule set to decrypt affected files for families such as GlobeImposter and WannaCry.

    Highlights

    • 1. Asset Inventory: 1-minute rapid collection, 2000+ asset types, 20+ contextual recognitions, making security more business-savvy. 2. Risk Discovery: Zero-impact vulnerability scanning, precise POC validation, comprehensive and fast-updated information.
    • 3. Compliance Baseline: 100+ CIS baseline rules, adaptive task-based baseline checks, flexible and customizable baselines. 4. Intrusion Detection & Response: ATT&CK chain visualization, triple-engine full-model detection, intelligent noise reduction with instant blocking.
    • 5. Anti-Virus: Proprietary script engine + multi-AV engines, dual-layer eradication. 6. Anti-Ransomware: Static & dynamic decoys for double protection, behavioral identification, one-click encryption rollback.

    Details

    Sold by

    Delivery method

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    1-month contract (2)

     Info
    Dimension
    Description
    Cost/month
    Sentry Security for Servers
    Sentry Security for Servers
    $18.90
    Sentry Security for Containers
    Sentry Security for Containers
    $38.90

    Vendor refund policy

    No refunds

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Similar products

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 reviews
    No customer reviews yet
    Be the first to review this product . We've partnered with PeerSpot to gather customer feedback. You can share your experience by writing or recording a review, or scheduling a call with a PeerSpot analyst.