Prevents, detects and responds to cyber attacks
Are you currently under attack?
Current topics
Enjoy the benefits of being ISO 27001 compliant

By implementing ISO 27001, which is an information security management system, you can better identify risks and implement appropriate controls to mitigate risks. No matter what stage you are in, we can be of assistance.

Read more
Can your organisation manage ransomware attacks?

The ransomware threat is increasing and causes major problems for organizations across the globe. Sentor answers to the threat with a unique managed detection and response service that kills malicious processes in near real-time.

Read more
Test your web applications before it is too late

Let a technical specialist look at the security aspects of networks, systems and applications in order to find security flaws that could cause widespread consequences. Sentor have consultants with expertize in technical IT security.

Read more

A few words from our clients

- Security is something we value highly on Klarna, and we work continuously to maintain a high level of protection. Sentor is a security partner with expertize that will help us ensure that this is the case.- Jonathan James, CSO at Klarna
- We employ Sentor to examine the security in our websites and applications. We are very pleased with the work Sentor has performed over the years and the feedback we have received. Clearly a trusted security partner.- Christopher Andersson, CIO at Sevenday Finance

Traditional defenses are no longer effective when the security landscape is changing and attack methods become more advanced. When a threat is detected, it must be handled immediately, a prime example is ransomware that is currently affecting organizations rapidly.

Sentor can, through our unique service, identify threats on clients and servers in near real-time. We can initiate the following actions (and many more) 24/7, all year round through our Security Operations Center.

  • Isolate clients/servers from network
  • Kill processes
  • Extract files for analysis
  • Lock users

More about endpoint protection

Want to get in touch?