Tekgem SENTINEL

Monitoring Cyber Security

Tekgem Sentinel

What Is Tekgem SENTINEL?

Sentinel is a real time cyber security platform designed to complement and work alongside our physical health check and risk assessment.

The checks and assessments provided by Tekgem are incredibly valuable to assess your current environment, but what happens after Tekgem leave? Your environment is not static, you need to make changes, and as soon as you do there is the potential to introduce attack vectors.

Sentinel is always on, and always checking the status of connected devices. If any device becomes insecure the industry standard security profile will flag it for attention immediately.

Sentinel ships with the Cyber Essentials risk profile, using it to provide essential monitoring of key vulnerabilities to help protect your network.

Download The Brochure

Who Is It For?

Sentinel was born from the need to protect operational technology (OT) and critical infrastructure and has been designed to do that from the ground up. 

The regulated Process Industry (COMAH, NIS) are required by law to demonstrate they are managing their cyber security. Sentinel has particular benefits in this area, allowing you to demonstrate how your organisation has made improvements over time. As Sentinel is an extension of our existing services that are designed to support organisations its a perfect fit.

Any organisations without direct internet access on their network for security or logistical reasons will still benefit from Sentinel. Just because a network is not directly connected to the internet does not give it automatic protection. Any external device whether it’s removable media, a third party laptop or a vendor supplied system has the potential to introduce an attack vector. Sentinel takes air-gapped systems into account and offers a mechanism to ensure they are just as protected as all other parts of your network.

It can be used in any industry across any network. Sentinel sits in your OT network to help you visualise your level of vulnerability. If you have operational technology, then Sentinel will work for you 24/7.

Why Cyber Essentials?

Cyber Essentials is the starting point and foundation that all organisations should be familiar with and in control of. It’s designed to help protect your organisation against a whole range of the most common attacks.

By getting the basics right and ensuring you are fully compliant against that, you can move into true defence in depth with your security increasing that protection further.  

Feature List

  • Real time vulnerability assessment dashboard based on the NCSC Cyber Essentials risk profile

  • Vulnerability breakdown with criticality rating

  • Security over time tracked

  • Live threat feed

  • Automated device inventory based on industry best practice

  • Exceptions register

  • Real time system health status

  • User configurable locations, network levels, security zones, and criticality classification

How Does It Work?

Sentinel consists of two elements: UNITY – a central aggregation and visualisation tool, and Collectors – data gatherers. 

A ‘Collector’ is installed within each of your security zones to ensure maximum network coverage.

The Collector runs on a virtual server within that zone so is never installed onto any control system directly. 

The Collector is designed to gather information from all systems within its security zone and pass it to Sentinel UNITY which aggregates the data and presents it to you via the dashboard.

Arrange A Personal Demo

Find Out How Sentinel Can Help You:

  • Gain visibility over your OT assets

  • Understand potential vulnerabilities in real time

  • Demonstrate an improvement in OT security

  • Demonstrate your commitment to cyber security

We Will Walk You Through The Platform Step By Step:

  • An empty, out of the box UNITY system

  • The simplicity of setting up a Collector from the very start

  • Setting up logical locations and security zones

  • The first collection

  • First results transfered into UNITY

  • Risk profile review and results

  • Fixing identified vulnerabilities

  • Security over time

  • Filtering

  • Device Inventory

  • System Health

Arrange A Demo