Scans · Daily Detection · 24/7 Monitoring Most Popular
Scans · Daily Detection · 24/7 Monitoring Most Popular
Scans · Daily Detection · 24/7 Monitoring Most Popular

See what's vulnerable. Know what's happening.

A scan tells you what could be exploited. Monitoring tells you what's actually going on. Sentinel combines monthly vulnerability scanning and daily threat detection with around-the-clock security monitoring on your servers. We deploy lightweight agents that watch for file tampering, malware, rootkits, and suspicious activity in real time - and automatically assess your server configurations against industry security benchmarks. You get a complete picture, not just a list of theoretical risks.

£229 /month Min. 3 months
£229 /month Min. 3 months
£229 /month Min. 3 months
Sentinel Dashboard
Live
0
Active threats detected
web-prod-01
File integrity · Log analysis
Healthy
app-server-02
CIS benchmarks · Malware scan
Healthy
db-server-03
Vulnerability detection
Healthy
Daily scan complete · No new CVEs matched
File integrity check · 0 unauthorised changes
i
Monthly report ready · Score: A · 3 medium findings
Sentinel Dashboard
Live
0
Active threats detected
web-prod-01
File integrity · Log analysis
Healthy
app-server-02
CIS benchmarks · Malware scan
Healthy
db-server-03
Vulnerability detection
Healthy
Daily scan complete · No new CVEs matched
File integrity check · 0 unauthorised changes
i
Monthly report ready · Score: A · 3 medium findings
Sentinel Dashboard
Live
0
Active threats detected
web-prod-01
File integrity · Log analysis
Healthy
app-server-02
CIS benchmarks · Malware scan
Healthy
db-server-03
Vulnerability detection
Healthy
Daily scan complete · No new CVEs matched
File integrity check · 0 unauthorised changes
i
Monthly report ready · Score: A · 3 medium findings

New vulnerabilities don't wait for monthly scans. Neither do we.

Every day, security researchers publish new vulnerabilities. A critical flaw in your web server software could be disclosed on a Tuesday and exploited by Thursday. With monthly-only scanning, you wouldn't know until the end of the month. Sentinel includes daily automated checks against over 8,000 vulnerability templates, updated continuously. If a new CVE affects something you're running, we detect it within 24 hours - and critical findings trigger an immediate email alert.

Real-time template updates

Our vulnerability templates are updated daily from public advisories, security research, and CVE databases. When a new exploit is published, we're checking for it the next morning.

Immediate alerts

Unlike Shield, Sentinel clients get an email alert within hours when a Critical or High severity issue is detected by daily scanning. You don't wait for the monthly report.

Smart, not noisy

Daily checks are lightweight and targeted - they won't affect your server performance. We only alert on confirmed matches, not theoretical risks.

Real-time template updates

Our vulnerability templates are updated daily from public advisories, security research, and CVE databases. When a new exploit is published, we're checking for it the next morning.

Immediate alerts

Unlike Shield, Sentinel clients get an email alert within hours when a Critical or High severity issue is detected by daily scanning. You don't wait for the monthly report.

Smart, not noisy

Daily checks are lightweight and targeted - they won't affect your server performance. We only alert on confirmed matches, not theoretical risks.

Real-time template updates

Our vulnerability templates are updated daily from public advisories, security research, and CVE databases. When a new exploit is published, we're checking for it the next morning.

Immediate alerts

Unlike Shield, Sentinel clients get an email alert within hours when a Critical or High severity issue is detected by daily scanning. You don't wait for the monthly report.

Smart, not noisy

Daily checks are lightweight and targeted - they won't affect your server performance. We only alert on confirmed matches, not theoretical risks.

Comprehensive external vulnerability scanning

We scan every public-facing IP address you give us - up to 10 - testing against a database of over 100,000 known vulnerabilities updated daily. If there's a published exploit for something you're running, we'll find it.

Known vulnerabilities (CVEs)

We check your systems against a database of over 100,000 known vulnerabilities, updated daily. If there's a published exploit for something you're running, we'll find it.

Open ports and exposed services

Every open port is a potential entry point. We map all accessible services and flag anything that shouldn't be public-facing: databases, admin panels, file shares, development tools.

Outdated software

Running an old version of Apache, Nginx, OpenSSH, or PHP? We detect version numbers and flag anything with known security issues.

Default and weak credentials

We test for default passwords on common services: admin panels, databases, FTP servers, SNMP community strings, and management interfaces.

SSL/TLS configuration

We assess your encryption setup: protocol versions (flagging insecure SSLv3, TLS 1.0, TLS 1.1), cipher suite strength, certificate validity, chain of trust, and HSTS configuration.

Email security

We check your domain's SPF, DKIM, and DMARC records to see if attackers could spoof emails from your domain. Missing or misconfigured records are a common phishing enabler.

DNS configuration

We check for DNS zone transfer vulnerabilities, DNSSEC status, and dangling DNS records that could be hijacked.

Network misconfigurations

SNMP exposure, open relays, unnecessary services, verbose error messages, and other configuration weaknesses that give attackers a foothold.

Known vulnerabilities (CVEs)

We check your systems against a database of over 100,000 known vulnerabilities, updated daily. If there's a published exploit for something you're running, we'll find it.

Open ports and exposed services

Every open port is a potential entry point. We map all accessible services and flag anything that shouldn't be public-facing: databases, admin panels, file shares, development tools.

Outdated software

Running an old version of Apache, Nginx, OpenSSH, or PHP? We detect version numbers and flag anything with known security issues.

Default and weak credentials

We test for default passwords on common services: admin panels, databases, FTP servers, SNMP community strings, and management interfaces.

SSL/TLS configuration

We assess your encryption setup: protocol versions (flagging insecure SSLv3, TLS 1.0, TLS 1.1), cipher suite strength, certificate validity, chain of trust, and HSTS configuration.

Email security

We check your domain's SPF, DKIM, and DMARC records to see if attackers could spoof emails from your domain. Missing or misconfigured records are a common phishing enabler.

DNS configuration

We check for DNS zone transfer vulnerabilities, DNSSEC status, and dangling DNS records that could be hijacked.

Network misconfigurations

SNMP exposure, open relays, unnecessary services, verbose error messages, and other configuration weaknesses that give attackers a foothold.

Known vulnerabilities (CVEs)

We check your systems against a database of over 100,000 known vulnerabilities, updated daily. If there's a published exploit for something you're running, we'll find it.

Open ports and exposed services

Every open port is a potential entry point. We map all accessible services and flag anything that shouldn't be public-facing: databases, admin panels, file shares, development tools.

Outdated software

Running an old version of Apache, Nginx, OpenSSH, or PHP? We detect version numbers and flag anything with known security issues.

Default and weak credentials

We test for default passwords on common services: admin panels, databases, FTP servers, SNMP community strings, and management interfaces.

SSL/TLS configuration

We assess your encryption setup: protocol versions (flagging insecure SSLv3, TLS 1.0, TLS 1.1), cipher suite strength, certificate validity, chain of trust, and HSTS configuration.

Email security

We check your domain's SPF, DKIM, and DMARC records to see if attackers could spoof emails from your domain. Missing or misconfigured records are a common phishing enabler.

DNS configuration

We check for DNS zone transfer vulnerabilities, DNSSEC status, and dangling DNS records that could be hijacked.

Network misconfigurations

SNMP exposure, open relays, unnecessary services, verbose error messages, and other configuration weaknesses that give attackers a foothold.

Web application security testing

If you have a website or web application, we test it against the OWASP Top 10 - the industry-standard list of the most critical web security risks.

Injection attacks

SQL injection, command injection, LDAP injection, and XPath injection. If your application passes user input to a database or system command without proper validation, we'll flag it.

Cross-site scripting (XSS)

Reflected and stored XSS vulnerabilities that could allow attackers to inject malicious scripts into your web pages, stealing user sessions or redirecting visitors.

Broken authentication

Default credentials on login pages, weak session management, missing account lockout after failed attempts, and exposed admin panels.

Security headers

We check for the presence and correct configuration of Content-Security-Policy, Strict-Transport-Security, X-Frame-Options, X-Content-Type-Options, Referrer-Policy, and Permissions-Policy.

Information disclosure

Server version headers, framework fingerprinting, directory listing, exposed backup files (.bak, .old, .sql), and accidentally public configuration files (.git, .env, .htaccess, web.config).

Cookie security

We verify that session cookies have the Secure, HttpOnly, and SameSite flags set correctly to prevent interception and cross-site attacks.

Cross-site request forgery (CSRF)

We check that your forms include anti-CSRF tokens to prevent attackers from tricking users into performing unintended actions.

Misconfigurations

CORS policy issues, dangerous HTTP methods enabled (PUT, DELETE, TRACE), sensitive paths exposed in robots.txt, and insecure file upload handling.

Injection attacks

SQL injection, command injection, LDAP injection, and XPath injection. If your application passes user input to a database or system command without proper validation, we'll flag it.

Cross-site scripting (XSS)

Reflected and stored XSS vulnerabilities that could allow attackers to inject malicious scripts into your web pages, stealing user sessions or redirecting visitors.

Broken authentication

Default credentials on login pages, weak session management, missing account lockout after failed attempts, and exposed admin panels.

Security headers

We check for the presence and correct configuration of Content-Security-Policy, Strict-Transport-Security, X-Frame-Options, X-Content-Type-Options, Referrer-Policy, and Permissions-Policy.

Information disclosure

Server version headers, framework fingerprinting, directory listing, exposed backup files (.bak, .old, .sql), and accidentally public configuration files (.git, .env, .htaccess, web.config).

Cookie security

We verify that session cookies have the Secure, HttpOnly, and SameSite flags set correctly to prevent interception and cross-site attacks.

Cross-site request forgery (CSRF)

We check that your forms include anti-CSRF tokens to prevent attackers from tricking users into performing unintended actions.

Misconfigurations

CORS policy issues, dangerous HTTP methods enabled (PUT, DELETE, TRACE), sensitive paths exposed in robots.txt, and insecure file upload handling.

Injection attacks

SQL injection, command injection, LDAP injection, and XPath injection. If your application passes user input to a database or system command without proper validation, we'll flag it.

Cross-site scripting (XSS)

Reflected and stored XSS vulnerabilities that could allow attackers to inject malicious scripts into your web pages, stealing user sessions or redirecting visitors.

Broken authentication

Default credentials on login pages, weak session management, missing account lockout after failed attempts, and exposed admin panels.

Security headers

We check for the presence and correct configuration of Content-Security-Policy, Strict-Transport-Security, X-Frame-Options, X-Content-Type-Options, Referrer-Policy, and Permissions-Policy.

Information disclosure

Server version headers, framework fingerprinting, directory listing, exposed backup files (.bak, .old, .sql), and accidentally public configuration files (.git, .env, .htaccess, web.config).

Cookie security

We verify that session cookies have the Secure, HttpOnly, and SameSite flags set correctly to prevent interception and cross-site attacks.

Cross-site request forgery (CSRF)

We check that your forms include anti-CSRF tokens to prevent attackers from tricking users into performing unintended actions.

Misconfigurations

CORS policy issues, dangerous HTTP methods enabled (PUT, DELETE, TRACE), sensitive paths exposed in robots.txt, and insecure file upload handling.

24/7 server monitoring. Not just scanning - watching

Vulnerability scanning tells you what could be exploited from the outside. Endpoint monitoring tells you what's happening on the inside. We deploy lightweight security agents on up to 5 of your servers that monitor around the clock - detecting file changes, malware, rootkits, and suspicious activity as it happens. If something changes that shouldn't, we know about it.

File integrity monitoring

We watch your critical system files and application directories for unauthorised changes. If a core file is modified, a new file appears where it shouldn't, or permissions change unexpectedly, we detect it. Attacks often start with a small file change - we make sure it doesn't go unnoticed.

Rootkit and malware detection

Daily automated checks scan your servers for known rootkits, trojans, and malware signatures. We check for hidden processes, suspicious file attributes, and anomalous system calls that indicate a compromised server.

Log collection and analysis

We collect and analyse your server logs - authentication attempts, application errors, system events. Failed login patterns, privilege escalation attempts, and unusual access patterns are flagged automatically. Your logs stay on UK infrastructure.

Vulnerability detection

Every package and library installed on your servers is cross-referenced against CVE databases. When a new vulnerability is published that affects software you're running, we know - even before the next external scan picks it up.

Security configuration assessment

We automatically assess your server configurations against CIS benchmarks - the industry standard for secure configuration. Weak SSH settings, permissive file permissions, unnecessary services, missing security patches. You get a pass/fail score for each check with specific guidance on how to fix failures.

Immediate alerting

Critical and High severity events trigger an immediate email alert to your designated contact. A suspicious file change at 3am doesn't wait until your next monthly report - you hear about it straight away.

File integrity monitoring

We watch your critical system files and application directories for unauthorised changes. If a core file is modified, a new file appears where it shouldn't, or permissions change unexpectedly, we detect it. Attacks often start with a small file change - we make sure it doesn't go unnoticed.

Rootkit and malware detection

Daily automated checks scan your servers for known rootkits, trojans, and malware signatures. We check for hidden processes, suspicious file attributes, and anomalous system calls that indicate a compromised server.

Log collection and analysis

We collect and analyse your server logs - authentication attempts, application errors, system events. Failed login patterns, privilege escalation attempts, and unusual access patterns are flagged automatically. Your logs stay on UK infrastructure.

Vulnerability detection

Every package and library installed on your servers is cross-referenced against CVE databases. When a new vulnerability is published that affects software you're running, we know - even before the next external scan picks it up.

Security configuration assessment

We automatically assess your server configurations against CIS benchmarks - the industry standard for secure configuration. Weak SSH settings, permissive file permissions, unnecessary services, missing security patches. You get a pass/fail score for each check with specific guidance on how to fix failures.

Immediate alerting

Critical and High severity events trigger an immediate email alert to your designated contact. A suspicious file change at 3am doesn't wait until your next monthly report - you hear about it straight away.

File integrity monitoring

We watch your critical system files and application directories for unauthorised changes. If a core file is modified, a new file appears where it shouldn't, or permissions change unexpectedly, we detect it. Attacks often start with a small file change - we make sure it doesn't go unnoticed.

Rootkit and malware detection

Daily automated checks scan your servers for known rootkits, trojans, and malware signatures. We check for hidden processes, suspicious file attributes, and anomalous system calls that indicate a compromised server.

Log collection and analysis

We collect and analyse your server logs - authentication attempts, application errors, system events. Failed login patterns, privilege escalation attempts, and unusual access patterns are flagged automatically. Your logs stay on UK infrastructure.

Vulnerability detection

Every package and library installed on your servers is cross-referenced against CVE databases. When a new vulnerability is published that affects software you're running, we know - even before the next external scan picks it up.

Security configuration assessment

We automatically assess your server configurations against CIS benchmarks - the industry standard for secure configuration. Weak SSH settings, permissive file permissions, unnecessary services, missing security patches. You get a pass/fail score for each check with specific guidance on how to fix failures.

Immediate alerting

Critical and High severity events trigger an immediate email alert to your designated contact. A suspicious file change at 3am doesn't wait until your next monthly report - you hear about it straight away.

Intelligent reporting across scans and monitoring

Sentinel combines scan results and monitoring data into a single monthly report. Every finding is prioritised, every alert is contextualised, and your overall security score tells you at a glance where you stand.

SSL Certificate Alerts

Automatic alerts at 30, 14, and 7 days before any certificate expires. No more surprise outages.

Certificate Chain Validation

We verify your chain is complete and trusted, flagging self-signed certs, missing intermediates, and revoked certificates.

Asset Discovery

We flag any services, ports, or applications discovered that weren't in the agreed scope. Shadow IT identification included.

Security Score (A-F)

Every report starts with a clear grade combining scan results and monitoring health. Boards and management teams understand A-F without needing CVSS explained.

Combined Monthly Report

One report covering everything: external scan findings, web application results, monitoring alerts, file integrity events, vulnerability detection, and CIS benchmark compliance.

Prioritised Remediation

Every finding comes with specific, actionable guidance on how to fix it, ordered by severity. Scan findings and monitoring alerts are cross-referenced so you see the full picture.

Trend Tracking

From month two, every report shows how your security posture is changing across both scanning and monitoring: new vulnerabilities, resolved issues, recurring problems, configuration improvements.

Email Summary

A plain-text email alongside the PDF highlighting what's new, what's fixed, and what's still outstanding - including any monitoring alerts that fired during the month.

SSL Certificate Alerts

Automatic alerts at 30, 14, and 7 days before any certificate expires. No more surprise outages.

Certificate Chain Validation

We verify your chain is complete and trusted, flagging self-signed certs, missing intermediates, and revoked certificates.

Asset Discovery

We flag any services, ports, or applications discovered that weren't in the agreed scope. Shadow IT identification included.

Security Score (A-F)

Every report starts with a clear grade combining scan results and monitoring health. Boards and management teams understand A-F without needing CVSS explained.

Combined Monthly Report

One report covering everything: external scan findings, web application results, monitoring alerts, file integrity events, vulnerability detection, and CIS benchmark compliance.

Prioritised Remediation

Every finding comes with specific, actionable guidance on how to fix it, ordered by severity. Scan findings and monitoring alerts are cross-referenced so you see the full picture.

Trend Tracking

From month two, every report shows how your security posture is changing across both scanning and monitoring: new vulnerabilities, resolved issues, recurring problems, configuration improvements.

Email Summary

A plain-text email alongside the PDF highlighting what's new, what's fixed, and what's still outstanding - including any monitoring alerts that fired during the month.

SSL Certificate Alerts

Automatic alerts at 30, 14, and 7 days before any certificate expires. No more surprise outages.

Certificate Chain Validation

We verify your chain is complete and trusted, flagging self-signed certs, missing intermediates, and revoked certificates.

Asset Discovery

We flag any services, ports, or applications discovered that weren't in the agreed scope. Shadow IT identification included.

Security Score (A-F)

Every report starts with a clear grade combining scan results and monitoring health. Boards and management teams understand A-F without needing CVSS explained.

Combined Monthly Report

One report covering everything: external scan findings, web application results, monitoring alerts, file integrity events, vulnerability detection, and CIS benchmark compliance.

Prioritised Remediation

Every finding comes with specific, actionable guidance on how to fix it, ordered by severity. Scan findings and monitoring alerts are cross-referenced so you see the full picture.

Trend Tracking

From month two, every report shows how your security posture is changing across both scanning and monitoring: new vulnerabilities, resolved issues, recurring problems, configuration improvements.

Email Summary

A plain-text email alongside the PDF highlighting what's new, what's fixed, and what's still outstanding - including any monitoring alerts that fired during the month.

What's Included

Monthly external vulnerability scan
Daily threat detection against 8,000+ vulnerability templates
Up to 10 public-facing IPs and 1 web application
100,000+ vulnerability checks, updated daily
Network, web application, SSL/TLS, email, and DNS testing
OWASP Top 10 web application assessment
Security monitoring agents on up to 5 endpoints
Real-time file integrity monitoring
Rootkit and malware detection
Log collection and analysis (UK infrastructure)
Vulnerability detection (CVE matching against installed packages)
Security configuration assessment against CIS benchmarks
Industry-standard severity ratings
Overall security score (A-F grade) in every report
SSL/TLS certificate expiry monitoring with 30/14/7-day alerts
Asset discovery and shadow IT identification
Combined monthly report covering scans and monitoring
Prioritised remediation guidance for each finding
Email summary of new, resolved, and recurring vulnerabilities
Month-on-month trend tracking
Immediate email alerts for Critical/High severity events
Monthly external vulnerability scan
Daily threat detection against 8,000+ vulnerability templates
Up to 10 public-facing IPs and 1 web application
100,000+ vulnerability checks, updated daily
Network, web application, SSL/TLS, email, and DNS testing
OWASP Top 10 web application assessment
Security monitoring agents on up to 5 endpoints
Real-time file integrity monitoring
Rootkit and malware detection
Log collection and analysis (UK infrastructure)
Vulnerability detection (CVE matching against installed packages)
Security configuration assessment against CIS benchmarks
Industry-standard severity ratings
Overall security score (A-F grade) in every report
SSL/TLS certificate expiry monitoring with 30/14/7-day alerts
Asset discovery and shadow IT identification
Combined monthly report covering scans and monitoring
Prioritised remediation guidance for each finding
Email summary of new, resolved, and recurring vulnerabilities
Month-on-month trend tracking
Immediate email alerts for Critical/High severity events
Monthly external vulnerability scan
Daily threat detection against 8,000+ vulnerability templates
Up to 10 public-facing IPs and 1 web application
100,000+ vulnerability checks, updated daily
Network, web application, SSL/TLS, email, and DNS testing
OWASP Top 10 web application assessment
Security monitoring agents on up to 5 endpoints
Real-time file integrity monitoring
Rootkit and malware detection
Log collection and analysis (UK infrastructure)
Vulnerability detection (CVE matching against installed packages)
Security configuration assessment against CIS benchmarks
Industry-standard severity ratings
Overall security score (A-F grade) in every report
SSL/TLS certificate expiry monitoring with 30/14/7-day alerts
Asset discovery and shadow IT identification
Combined monthly report covering scans and monitoring
Prioritised remediation guidance for each finding
Email summary of new, resolved, and recurring vulnerabilities
Month-on-month trend tracking
Immediate email alerts for Critical/High severity events

Is Sentinel right for you?

Sentinel is for

  • Businesses that run their own servers (VPS, dedicated, or cloud) and want to know what's happening on them
  • Companies where a security breach would cause serious reputational or financial damage
  • Organisations preparing for or maintaining Cyber Essentials, ISO 27001, or similar certifications
  • IT teams that want a second pair of eyes on their infrastructure without hiring a dedicated security analyst
  • Anyone who's had Shield and wants the next level of protection

Important to know

  • Sentinel is an automated vulnerability assessment with endpoint monitoring, not a manual penetration test - we identify known weaknesses and monitor for suspicious activity automatically
  • Sentinel does not include breach monitoring or threat briefings - for those, see Citadel
  • For businesses on shared hosting without server access, Shield is the right fit (we can't deploy monitoring agents without SSH/RDP access)

Sentinel is for

  • Businesses that run their own servers (VPS, dedicated, or cloud) and want to know what's happening on them
  • Companies where a security breach would cause serious reputational or financial damage
  • Organisations preparing for or maintaining Cyber Essentials, ISO 27001, or similar certifications
  • IT teams that want a second pair of eyes on their infrastructure without hiring a dedicated security analyst
  • Anyone who's had Shield and wants the next level of protection

Important to know

  • Sentinel is an automated vulnerability assessment with endpoint monitoring, not a manual penetration test - we identify known weaknesses and monitor for suspicious activity automatically
  • Sentinel does not include breach monitoring or threat briefings - for those, see Citadel
  • For businesses on shared hosting without server access, Shield is the right fit (we can't deploy monitoring agents without SSH/RDP access)

Sentinel is for

  • Businesses that run their own servers (VPS, dedicated, or cloud) and want to know what's happening on them
  • Companies where a security breach would cause serious reputational or financial damage
  • Organisations preparing for or maintaining Cyber Essentials, ISO 27001, or similar certifications
  • IT teams that want a second pair of eyes on their infrastructure without hiring a dedicated security analyst
  • Anyone who's had Shield and wants the next level of protection

Important to know

  • Sentinel is an automated vulnerability assessment with endpoint monitoring, not a manual penetration test - we identify known weaknesses and monitor for suspicious activity automatically
  • Sentinel does not include breach monitoring or threat briefings - for those, see Citadel
  • For businesses on shared hosting without server access, Shield is the right fit (we can't deploy monitoring agents without SSH/RDP access)

How it works

1

Sign up and tell us what to scan

Fill in the form with your domain(s), IP addresses, web application URLs, and details of the servers you want monitored.

2

Verify your domain

We'll give you a short DNS TXT record to add to your domain. This confirms you own what you're asking us to test - standard practice, takes two minutes.

3

We configure your scans and deploy monitoring

Within 48 hours of payment and verification, your daily threat detection is live and your first full monthly scan is scheduled. We'll arrange access to deploy monitoring agents on your servers - a quick, lightweight installation that takes about 15 minutes per server.

4

Agents go live

Once deployed, your monitoring agents start collecting data immediately: file integrity baselines, log ingestion, vulnerability inventory, and CIS benchmark assessment. Critical alerts are active from day one.

5

Your first report lands

Within 5 working days, you'll receive your first combined report covering scan findings and initial monitoring data. Each subsequent monthly report builds on the last, showing trends and progress.

6

Ongoing protection

Daily threat detection runs every night. Monthly full scans run automatically. Monitoring agents watch around the clock. Critical events trigger immediate alerts. Each monthly report shows the full picture: what's new, what's fixed, and how your security posture is trending.

1

Sign up and tell us what to scan

Fill in the form with your domain(s), IP addresses, web application URLs, and details of the servers you want monitored.

2

Verify your domain

We'll give you a short DNS TXT record to add to your domain. This confirms you own what you're asking us to test - standard practice, takes two minutes.

3

We configure your scans and deploy monitoring

Within 48 hours of payment and verification, your daily threat detection is live and your first full monthly scan is scheduled. We'll arrange access to deploy monitoring agents on your servers - a quick, lightweight installation that takes about 15 minutes per server.

4

Agents go live

Once deployed, your monitoring agents start collecting data immediately: file integrity baselines, log ingestion, vulnerability inventory, and CIS benchmark assessment. Critical alerts are active from day one.

5

Your first report lands

Within 5 working days, you'll receive your first combined report covering scan findings and initial monitoring data. Each subsequent monthly report builds on the last, showing trends and progress.

6

Ongoing protection

Daily threat detection runs every night. Monthly full scans run automatically. Monitoring agents watch around the clock. Critical events trigger immediate alerts. Each monthly report shows the full picture: what's new, what's fixed, and how your security posture is trending.

1

Sign up and tell us what to scan

Fill in the form with your domain(s), IP addresses, web application URLs, and details of the servers you want monitored.

2

Verify your domain

We'll give you a short DNS TXT record to add to your domain. This confirms you own what you're asking us to test - standard practice, takes two minutes.

3

We configure your scans and deploy monitoring

Within 48 hours of payment and verification, your daily threat detection is live and your first full monthly scan is scheduled. We'll arrange access to deploy monitoring agents on your servers - a quick, lightweight installation that takes about 15 minutes per server.

4

Agents go live

Once deployed, your monitoring agents start collecting data immediately: file integrity baselines, log ingestion, vulnerability inventory, and CIS benchmark assessment. Critical alerts are active from day one.

5

Your first report lands

Within 5 working days, you'll receive your first combined report covering scan findings and initial monitoring data. Each subsequent monthly report builds on the last, showing trends and progress.

6

Ongoing protection

Daily threat detection runs every night. Monthly full scans run automatically. Monitoring agents watch around the clock. Critical events trigger immediate alerts. Each monthly report shows the full picture: what's new, what's fixed, and how your security posture is trending.

A quick comparison

For anyone deciding between the three packages.

Shield Sentinel Citadel
Full scan frequency Monthly Monthly Weekly
Daily threat detection
Public-facing IPs Up to 5 Up to 10 Up to 15
Web applications 1 1 3
Endpoint monitoring - Up to 5 Up to 10
File integrity monitoring -
Rootkit/malware detection -
Log analysis -
CIS benchmark assessment -
Breach monitoring - -
Threat briefing - - Monthly
iSOS Verified badge - -
Reporting Monthly Monthly Weekly + Monthly
Immediate alerts - Critical/High Critical/High
Priority support - - Next business day
Price £99/month £229/month £449/month

All packages include daily threat detection and monthly reporting. Sentinel adds endpoint monitoring. Citadel adds weekly scanning, breach monitoring, threat intelligence, and the iSOS Verified badge.

Shield Sentinel
Monthly full scan
Daily threat detection
Public-facing IPs Up to 5 Up to 10
Web applications 1 1
Endpoint monitoring - Up to 5 servers
File integrity monitoring -
Rootkit/malware detection -
Log analysis -
CIS benchmark assessment -
Immediate alerts - Critical/High events
Price £99/month £229/month

In short: Shield tells you what's vulnerable from the outside. Sentinel tells you what's vulnerable AND what's happening on the inside.

Shield Sentinel
Monthly full scan
Daily threat detection
Public-facing IPs Up to 5 Up to 10
Web applications 1 1
Endpoint monitoring - Up to 5 servers
File integrity monitoring -
Rootkit/malware detection -
Log analysis -
CIS benchmark assessment -
Immediate alerts - Critical/High
Price £99/month £229/month

In short: Shield tells you what's vulnerable from the outside. Sentinel tells you what's vulnerable AND what's happening on the inside.

Ready to strengthen your security?

Book a free, no-obligation consultation with our team. We'll discuss your concerns, assess your needs, and recommend the right level of protection.

£229/month
Minimum 3-month commitment

Ready to strengthen your security?

Book a free, no-obligation consultation with our team. We'll discuss your concerns, assess your needs, and recommend the right level of protection.

£229/month
Minimum 3-month commitment

Ready to strengthen your security?

Book a free, no-obligation consultation with our team. We'll discuss your concerns, assess your needs, and recommend the right level of protection.

£229/month
Minimum 3-month commitment
Our Services

What We Do

Tech Solutions for Tomorrow

Web Development

Having a website is no longer enough. Your custom site must be easily found, engaging, and deliver a clear message to your audience.

Read More

Claris Databases

With over 400 custom Claris FileMaker databases delivered in 10 years, iSOS understands why organisations invest in new database software.

Read More

macOS & Windows Support

We offer expert macOS and Windows support, ensuring your systems run smoothly and efficiently so you can focus on your business.

Read More

Ready to Elevate Your Digital Presence?

Don't get left behind

Ensure your business stays ahead with cutting-edge digital solutions. Contact us today to keep your company at the forefront of your industry and continue thriving.

Stay Connected with iSOS

At iSOS.com, we specialise in custom software development, web development, and IT consultancy, leveraging Claris FileMaker, Laravel, and AI technologies to create tailored digital solutions that enhance business efficiency and maximise ROI.

Copyright: © 2026 iSOS. All Rights Reserved.

Our Services

What We Do

Tech Solutions for Tomorrow

Web Development

Having a website is no longer enough. Your custom site must be easily found, engaging, and deliver a clear message to your audience.

Read More

Claris Databases

With over 400 custom Claris FileMaker databases delivered in 10 years, iSOS understands why organisations invest in new database software.

Read More

macOS & Windows Support

We offer expert macOS and Windows support, ensuring your systems run smoothly and efficiently so you can focus on your business.

Read More

Ready to Elevate Your Digital Presence?

Don't get left behind

Ensure your business stays ahead with cutting-edge digital solutions. Contact us today to keep your company at the forefront of your industry and continue thriving.

Stay Connected with iSOS

At iSOS.com, we specialise in custom software development, web development, and IT consultancy, leveraging Claris FileMaker, Laravel, and AI technologies to create tailored digital solutions that enhance business efficiency and maximise ROI.

Copyright: © 2026 iSOS. All Rights Reserved.

Our Services

What We Do

Tech Solutions for Tomorrow

Web Development

Having a website is no longer enough. Your custom site must be easily found, engaging, and deliver a clear message to your audience.

Read More

Claris Databases

With over 400 custom Claris FileMaker databases delivered in 10 years, iSOS understands why organisations invest in new database software.

Read More

macOS & Windows Support

We offer expert macOS and Windows support, ensuring your systems run smoothly and efficiently so you can focus on your business.

Read More

Ready to Elevate Your Digital Presence?

Don't get left behind

Ensure your business stays ahead with cutting-edge digital solutions. Contact us today to keep your company at the forefront of your industry and continue thriving.

Stay Connected with iSOS

At iSOS.com, we specialise in custom software development, web development, and IT consultancy, leveraging Claris FileMaker, Laravel, and AI technologies to create tailored digital solutions that enhance business efficiency and maximise ROI.

Copyright: © 2026 iSOS. All Rights Reserved.