Mar 16, 2015
Sentrycs Data will protect your Identity and your Content Integrity.
Nov 02, 2014
You can finally retire username/password for any Web or Mobile application. You can also apply a security layer for Internet of Things (IoT) devices.
Nov 23, 2013
Take a moment to check it out on Indiegogo and also share it with your friends. All the tools are there. Get perks, make a contribution, or simply follow updates. If enough of us get behind it, we can make 'Sentrycs happen!
Apr 29, 2013
IT security engaged in a game of cat and mouse with hackers as fast as they deploy security countermeasures, these rogue elements discover new avenues of attack. Traditional security have relied upon guarding the perimeter of a company’s network.
Nov 12, 2012
SentryCom Ltd., your Internet Trust-as-a-Service Gateway Company, launches Sentrycs™ enabling Confidential & Certified, Files & Transactions, over the Web. Sentrycs™ is Software-as-a-Service (SaaS) offering to users Free, Basic and Premium plans.
Jun 28, 2011
Credit card fraud is the number one form of Identity Theft and is consumers number one fear. We are announcing the availability of Secure Transactions Solution , not only using consumer's desktop, but using any modern smart-phone or tablet as well,
Apr 04, 2011
While the benefits of using a public cloud infrastructure are clear, it introduces significant security and privacy risks.SentryCom allows the users of public cloud infrastructure to keep their sensitive files secure and private using software app.
Oct 28, 2010
SentryCom technology is gaining recognition. It participated in 2010 American Security Challenge and reached due diligence finalist stage. It also reached finals in 2010 SC Security Innovators Throwdown at the SC World Congress on Nov. 10-11 in NYC.
Sep 10, 2010
Traditional IT security means such as Anti-Virus and others- fail to prevent from malware to infest our computers. While our defences shown to be indequate - novel software methods are announced to prevent from malware to steal valuable data.
Jun 10, 2010
Traditional security have relied upon guarding the perimeter of a company’s network. Businesses realize that rather than continuing to add layers of security, it’s more effective to protect critical data , regardless of where it resides or moves.