CagsTech CagsTech
BETA

CagsTech Sentinel

Automated security log analysis using pattern recognition to detect anomalies and threats. Upload your logs and get threat assessments via email within minutes.

From $0.15 / MB

$0.15 / MB
  • Pay-per-use at $0.15/MB (uncompressed)
  • $5 minimum per analysis
  • Supports .log, .txt, .gz, .zip files
  • Pattern correlation across log files
  • Results delivered via email within minutes
  • 30-day access to findings

  • Enterprise: HTTPS endpoint for IDS/IPS integration (Suricata, Snort, Wazuh)

Code Testing

Scan your code for common vulnerabilities, weaknesses, and errors using static analysis tools and custom logic.

From $0.05 / line

$0.05 / line
  • Static analysis for common vulnerabilities
  • Custom logic checks based on project language and scope
  • Linting and style compliance (optional per client preference)
  • Summary report with issues, severity levels, and suggested fixes
  • Add-On: Post-fix rescan (20% of project cost)

Server Configuration Audit

Audit your server stack for insecure configs, outdated packages, bad firewall rules, and more. Get a clear compliance-minded report.

From $500 / server

$500 / server
  • Scans against OWASP benchmarks for kernel, firewall, directory and service hardening
  • Actionable Report: Clear, prioritized findings with remediation steps
  • Add-On: Post-fix rescan ($100)

Black-Box Pentesting

Penetration testing for apps and servers. Identify common flaws like XSS, CSRF, weak auth, and more for applications and firewall misconfiguration, exposed ports and services, etc for servers.

From $25 / endpoint

$25 / endpoint
  • For web applications
  • Simulates an adversarial intrusion attempt
  • Looks for common vulnerabilities, weak directory permissions, weak authentication, and more
  • Summary report with issues, severity levels, and suggested fixes
  • Add-On: Post-fix rescan (20% project cost)
$250 / server
  • For public-facing servers
  • Simulates an adversarial intrusion attempt
  • Looks for insecure services, weak firewalls, weak authentication, and more
  • Summary report with issues, severity levels, and suggested fixes
  • Add-On: Post-fix rescan ($100)
  • Due to the sensitive nature of security testing, consultation is required before scheduling. Scope and date/time of the test must be agreed upon in advance. Legal documentation indicating permission, scope of test, and liability waivers required.
  • All tests are black-box unless otherwise agreed. This means no foreknowledge of the architecture or hardness of the target. White-box or gray-box testing may be available upon request and approval.
  • If the application or server handles sensitive or regulated data (e.g., HIPAA, PCI-DSS, etc.), please disclose this during consultation so testing methods can be adjusted accordingly.
  • Clients are responsible for service continuity. While care is taken to avoid disruption and data loss, testing may unintentionally cause performance issues or downtime on vulnerable systems.
X

Contact Me