CodeOne
Company
About Us
Company History
Major Certifications and Awards
Clients
Contact Us
Products
Codeone AppScan Management System
Codeone Sentinelle(AI Security Operations)
Codeone Extinelle(Explanation System)
Codeone SecuFinder (AI Security Assistant)
HCL AppScan
HCL AppScan Standard
HCL AppScan Source
HCL AppScan Enterprise
IBM Security Qradar
IBM Security Qradar SIEM
IBM Security Qradar SOAR
IBM Security QRadar UBA
OpenText
Open Text Fortify Sonatype
Open Text Fortify SCA
Open Text Fortify SSC
Open Text Loadrunner
Group-IB
Group-IB ASM
Research
Security Research Lab
Research Areas
Research Lab Composition
Partners
IBM
HCL
OpenText
Paloalto
Group-IB
Services
System vulnerability diagnosis
Source code vulnerability diagnosis
Web Vulnerability Diagnosis
Penetration Testing

언어 선택

CodeOne


Sentinelle

What is Sentinelle?

Sentinelle (Security Operations Hyper-Automation Solution)

Deployment Model

·Designed to operate on top of existing SIEM without replacing it
·Can be deployed while maintaining the organization's existing security infrastructure as-is
·Applied by adding an AI automation layer on top of the current environment without changing existing SIEM operations
·Ensures operational continuity by minimizing upfront deployment costs and transition risks while leveraging existing SIEM capabilities

AX (AI Transformation)

·The core purpose of Sentinelle is to transform the operational structure so that AI handles the primary tasks previously performed by security operations personnel
·In traditional environments, analysts had to manually review tens of thousands of events per day and individually assess each one for potential attacks
·This environment structurally causes analyst fatigue to accumulate as event volumes grow, delaying response to real threats
·Sentinelle resolves this not through partial feature improvements but by transforming the operational structure itself
·Transitioning to a structure where AI leads operations and analysts focus on strategic decisions is the essential value of Sentinelle

Key Features

·Security events designated by users are automatically closed without additional personnel intervention
·Specific security events automatically execute playbooks based on user pre-configured settings
·Analysts can focus solely on strategic decisions based on AI-processed results
·Attack similarity analysis is performed in parallel even for general security events not classified as attacks
·Even events that do not trigger current detection criteria are continuously monitored for potential threat patterns
·This minimizes detection blind spots and ensures visibility to identify early warning signs of anomalies within the organization's environment
·Logs judged as attack events are continuously accumulated and used as retraining data for the operating AI detection engine
·Updated models are immediately reflected in the detection engine, applying improved criteria from the next event processing
·This progressively forms an environment-adaptive model optimized for a specific organization's log environment and attack patterns

Security Operations Center Support Features

·Helps security personnel directly configure the items they need and accurately understand the current security situation
·Sentinelle provides an intuitive real-time dashboard to improve the operational efficiency of the Security Operations Center
·Security personnel can rapidly understand complex threat data and make immediate response decisions
·Sentinelle provides a feature to generate security statistics and analysis results in report format by directly setting the period and items
·Generated reports can be downloaded in various file formats including PDF, DOC, and HWP
·Can be used for various purposes including management reporting, audit response, and compliance documentation

Why use Sentinelle?

The Need for AI Security Event Automatic Processing System


Product Introduction

Product Features

Auto-Processing

Solution-Suggestion

Similarity-Detection

Timeline-Management

Ticket-Management

Graphics

Reports

1. Threat Auto-Processing Function

AI automatic processing for low-level threats and designated specific attacks

· Ability to configure automatic processing for specific attacks
· Automatic processing of 20 million low-level attacks in 24 hours (based on 21 people working in 3 shifts for 24 hours, processing 10,000 per day/21 people)
· Verification of automatic processing results and statistics
· View of attack occurrence status by level

위협자동처리기능

<Threat Auto-Processing Function>


Introduction video