Secure mission-critical apps with Sentry for OutSystems Developer Cloud

Get supercharged protection for your enterprise cloud-native applications with advanced security tools. Build confidently, knowing that your development platform adheres to the most rigorous security and privacy standards.

outsystems sentry

Safeguard your mission-critical apps

When your app development platform is cloud-native, security can be a maze. OutSystems Developer Cloud (ODC) provides enterprise-grade compliance, elevated protection, and self-service capabilities that reduce your security operations workload.
  • bullet-point-grey-icon
    Address higher security and compliance expectations.
  • bullet-point-grey-icon
    Ensure your OutSystems platform is constantly monitored and protected 24/7.
  • bullet-point-grey-icon
    Customize app security controls on your own.
  • The compliance you need to build confidently

    Manage above-average compliance and security needs while developing your business-critical apps, knowing OutSystems meticulously meets multiple security and compliance requirements.
  • bullet-point-grey-icon
    Benefit from adherence to numerous global, industry, and administrative security standards and privacy laws.
  • bullet-point-grey-icon
    Ensure your sensitive business data is thoughtfully protected according to SOC 2 Type II, HIPAA, and PCI DSS attestation.
  • bullet-point-grey-icon
    Expand your reach with government agencies and critical public services that rely on Esquema Nacional de Seguridad (ENS), Dubai Electronic Security Center (DESC) Information Security Regulation (ISR), or the Italian National Cybersecurity Agency (ACN) standards.
  • bullet-point-grey-icon
    Get direct access to compliance documentation, such as SOC 2 Type II, ENS, PCI, and HIPAA.
  • Stop the spread of malicious activity

    Automatic traffic monitoring identifies illicit network and intrusion activity before it can spread.
  • bullet-point-grey-icon
    Protect the network at the perimeter and critical points from known, unknown, and undisclosed threats.
  • bullet-point-grey-icon
    Prevent integrity loss by monitoring for unexpected endpoint communication, abnormal commands, and anomalous behavior that could signal an attack.
  • bullet-point-grey-icon
    Benefit from automatic observation and analysis of your operating systems, networks, and file events to detect potential malicious activity at runtime.
  • Scan and defeat malware in real-time

    Intelligent real-time antivirus scanning detects unexpected, unauthorized, or malicious activities in ODC services and networks.
  • bullet-point-grey-icon
    Rest easy. Sentry's multi-layered defense mechanisms continuously monitor and protect the platform against malicious files and crypto-mining threats.
  • bullet-point-grey-icon
    Stay safe from viruses and attacks with automatic, continuous scans of Amazon Elastic Cloud Compute (EC2) instances, Kubernetes, and containerized infrastructure.
  • bullet-point-grey-icon
    Rely on OutSystems to reference global lists of known malware as it searches for unexpected, potentially unauthorized, and malicious activity that could affect privacy.
  • Stream audit logs with complete visibility and control

    Gain real-time visibility into critical platform activity by securely streaming detailed audit logs to your external security monitoring systems or log repository. Maintain full ownership of your audit data while integrating seamlessly with the tools your security teams already rely on.
  • bullet-point-grey-icon
    Maintain complete visibility and control by automatically streaming Audit Trail data, including user access and lifecycle events, directly to your SIEM, log management tools, or private repositories.
  • bullet-point-grey-icon
    Meet compliance and governance requirements by retaining audit logs for as long as your organization needs.
  • bullet-point-grey-icon
    Ensure end-to-end integrity with secure, encrypted transmission designed for high-compliance and security-sensitive environments.
  • Your apps, your rules, your protection

    Take charge of your OutSystems applications and network traffic with IP filtering, selectively allowing or blocking access. No VPN required.
  • bullet-point-grey-icon
    Restrict traffic coming into your apps based on the IP address of the request.
  • bullet-point-grey-icon
    Create rules at the app level, within app groups, or at development stages to only allow certain traffic.
  • bullet-point-grey-icon
    Easily apply this to all applications, configurable by stage.