Hosting, security, and development for teams that want reliable delivery.
CagsTech Sentinel
Automated security log analysis using pattern recognition to detect anomalies and threats. Upload your logs and get threat assessments via email within minutes.
$0.15
/ MB
Pay-per-use at $0.15/MB (uncompressed)
$5 minimum per analysis
Supports .log, .txt, .gz, .zip files
Pattern correlation across log files
Results delivered via email within minutes
30-day access to findings
Enterprise: REST API for IDS/IPS integration (Suricata, Snort, Wazuh)
Continuously scan your websites, APIs, or servers for common vulnerabilities and misconfigurations. Get alerted when issues are found, with tailored remediation steps included.
$25
/ month
Covers up to 3 assets.
Additional assets $10 / month.
Flat rate covers all features now and future—no hidden fees or upsells for new capabilities.
Monthly scans of all registered assets.
Ownership verification required to add assets.
Beta Offer: Subscribe during the beta period and receive 50% off your monthly rate — valid for the life of your subscription.
Flat rate: all features now and future are included. No hidden add-ons or upsells.
Penetration testing for apps and servers. Identify common flaws like XSS, CSRF, weak auth, and more for applications and firewall misconfiguration, exposed ports and services, etc for servers.
$25
/ endpoint
For web applications
Simulates an adversarial intrusion attempt
Looks for common vulnerabilities, weak directory permissions, weak authentication, and more
Summary report with issues, severity levels, and suggested fixes
Add-On: Post-fix rescan (20% project cost)
$250
/ server
For public-facing servers
Simulates an adversarial intrusion attempt
Looks for insecure services, weak firewalls, weak authentication, and more
Summary report with issues, severity levels, and suggested fixes
Add-On: Post-fix rescan ($100)
Due to the sensitive nature of security testing, consultation is required before scheduling. Scope and date/time of the test must be agreed upon in advance. Legal documentation indicating permission, scope of test, and liability waivers required.
All tests are black-box unless otherwise agreed. This means no foreknowledge of the architecture or hardness of the target. White-box or gray-box testing may be available upon request and approval.
If the application or server handles sensitive or regulated data (e.g., HIPAA, PCI-DSS, etc.), please disclose this during consultation so testing methods can be adjusted accordingly.
Clients are responsible for service continuity. While care is taken to avoid disruption and data loss, testing may unintentionally cause performance issues or downtime on vulnerable systems.