Security
Sentinel Decision Systems is designed for enterprise security expectations. This page is an overview of our approach.
Sentinel can operate with redaction, hashing, and pointer-based retrieval patterns to reduce sensitive payload retention.
Encryption in transit (TLS) and at rest. Key management options are available for enterprise deployments.
SSO (SAML/OIDC), role-based access control, and audit logging to support governance and least-privilege workflows.
SaaS and single-tenant/private deployment models are supported to align with customer security requirements.
For security questionnaires or assessment requests, contact: security@sentineldecision.com
Note: This page is informational and does not constitute contractual commitments.