Recon Sentinel Cyber Security User's Guide and FAQs

Last Updated: Apr 23, 2018 01:06PM EDT


Q: Is Recon Sentinel always checking the network? 
A:  Yes, once the scan is complete and devices recognized. Recon Sentinel sits on your network like a trusted soldier, constantly looking for signs of cybercriminal reconnaissance, intrusion or other nefarious activity.

Once detected, Recon Sentinel will take actions to disrupt the communications of the attacking device, breaking the ability of the cybercriminal to carry out their intentions and alerting 
of their presence.

Q: Is it easy to connect to my network? 
A:  Yes, The Recon Sentinel was designed with usability at its heart. Cybersecurity can be difficult. The Recon Sentinel requires no complex setup, works will all existing devices (including IoT Devices), and provides instant feedback via the onboard display. Easy to use cloud management and mobile application give you up to the second information, on all your Recon Sentinels, anywhere you have an Internet connection, and drill down displays show all the details for the tech-minded buyer.

Q: What kind of features does the device provide? 
A:  Once the scan is completed it will provide

Real-time Network Inventory -  You can't defend what you don't know. Recon Sentinel provides a real-time inventory of all devices on your network.
Active Cyber Defense Countermeasures - Detects and blocks Unauthorized Devices, Hacking Activity, and Attacks on your network. 
Deceptive traps Detect Hacking Activity -  Cyber Deception Traps lure malware and hackers into interacting with the Recon Sentinel, immediately 
alerting you of their presence.
Network Reconnaissance Scanning Detection - Detects the scans used by malware and hackers performing network reconnaissance looking for vulnerable devices. 
Instant Alerts -  If a nefarious activity is detected, the Recon Sentinel will send an email alert to you, notifying you of what is happening and what you can do to fix the issue.
Works with all your devices - No matter what router, firewall, wireless access point and anti-virus you have, the Recon Sentinel works with all of them, adding a virtual layer of detection and protection to your network.

Q: Does the Recon Sentinel replace the need for anti-virus or malware software?
A:  No, you should still maintain software to protect you from malware or viruses and for good reason. Cybersecurity is best done in layers, like an onion. The more layers of defense you have, the harder it is for an attacker to make you a target. The Recon Sentinel adds missing pieces to antivirus and firewall products, giving you another "layering the onion".

Q: Are there any parental controls I can use? 
A:  Actually you can use the ability to block a device by accessing the app, select the device on the network and click block. This will disable internet access to that device until you turn it back on. Turn it back on by clicking Unblock when access is allowed.

Please see below for full instructions in the attached copy of the Manual for this device.
seconds ago
a minute ago
minutes ago
an hour ago
hours ago
a day ago
days ago
Invalid characters found