Miscellaneous R&D Technology [2010]

Sentar has developed other purpose-designed technologies that solve specific needs in critical, often-secure computing environments. These technologies are often easily adaptable to your unique challenges.

accrediScan™ [2010]


knowbased accrediScan darkerSentar's accrediScan Toolkit is a DIACAP auditing tool targeted to the Information Assurance professional for enabling easier auditing of DISA STIG compliance. It automatically checks the security configuration information on a network of distributed systems and records the results to a central database. accrediScan™ audits multiple versions of Windows®, Unix, and Linux platforms using the DISA-provided Security Readiness Review (SRR) scripts and Gold Disk. The central accrediScan™ console displays detailed platform audit results to simplify DIACAP self-assessment and Scorecard reporting, and reducing a manual, tedious, time-consuming activity down to a matter of minutes with a single click.

Read our accrediScan brochure.

AEA-IDS, Agent Enabled Advanced Intrusion Detection System [2004]

aeaidssmallSentar's Agent-Enabled Advanced Intrusion Detection System protects networks against cyber attacks. The AEA-IDS architecture combines intrusion detection and prevention techniques with Sentar's previous work in intelligent agents. This combines intelligent agents, statistical anomaly detection, and model-based profiles to provide high attack detection rates and the ability to detect previously unknown attacks with a dramatic reduction in false alarm rates. The overall result is a user friendly, flexible infrastructure capable of rapidly adapting new intrusion detection capabilities to enable security managers to stay out in front of growing and ever-changing cyber threats.

PAWS, Protection Analysis Workstation [2005]

pawssmallSentar's Protection Analysis Work Station (PAWS) complements Sentar’s situation awareness systems. Inputs to PAWS consist of existing plans and guidelines for system protection along with a variety of data, information and knowledge on cyber threats, sensor responses, analysis results, and system behavior. PAWS will perform a variety of analysis on all the inputs, including forensics to determine threats, attack patterns, validity of current response plans and guidelines. The output of PAWS are updates to security plans and cyber threat evaluation and response guidelines. Thus, in conjunction with the situation awareness systems, PAWS will provide for continuous evaluation of responses to cyber threats.

SDG, Software and Database Guard [2003]

sdgsmallSentar’s Software and Database Guard (SDG) is used to secure mission critical software and databases from malicious code. This provides attack sensing and situation awareness of trust status discrepancies in databases and software. SDG uses advanced technologies such as proof carrying code, statistical anomaly detection, artificial diversity, nested processes, and security wrappers in combination with intelligent agents to provide indications and warnings of malicious data corruption or code tampering to security managers. SDG provides military and commercial organizations with a capability to secure a wide range of applications against malicious data corruption or code tampering. SDG improves network defense and information assurance for military, homeland security, intelligence, logistics, and commercial systems.

The Mission Critical SDG software technology is designed to protect crucial information assets by applying and enhancing security wrappers to:

  • Specify which software applications, program scripts, data files, and databases to monitor
  • Identify under what conditions the security wrappers should trigger
  • Define how the protection system will interpret the suspected protection violation attempts
  • Define how the protection system will respond to detected violations

The security wrappers are a lightweight monitoring capability designed to minimize the performance impact on the host applications and systems. The protection system uses knowledge-based rules to quickly identify sophisticated attacks and to prevent malicious or accidental damage. The decision support rules are used to assess the likelihood of malicious intent and thwart an attempted protection violation before damage results. Active response is supported by intercepting host operating system calls and controlling program execution.

The advantage of Sentar's SDG approach over other technologies is the combination of low-level protection techniques with high-level decision support. The functions are separated in the SDG system so as to minimize the performance impact on the protected system and still provide decision making knowledge. This separation allows the reuse of the low-level security wrappers with high-level rules of use. Other approaches place the decision making aspect in the low-level protection technology, often with severe performance impacts.