Sentinel Pro Microsite

Operational confidence for every Savant residence.

Savant brand mark Savant Pro App logo

Sentinel Pro is a homeowner-first monitoring and control-governance platform. This microsite presents the v4.2 engineering whitepaper narrative, transport and security model, and deployment resources for Savant projects managed in Cyprus.

v4.2Whitepaper revision
90 DaysDefault audit retention
PBKDF2210k iteration profile

Architecture Focus

Bridge, app and policy layers aligned by design.

Dynamic architecture tabs summarize the whitepaper model so technical teams and homeowners can quickly align on responsibilities.

Sentinel planes

StateCenter and runtime signals are harvested by the bridge and normalized into curated JSON for app presentation. The model prioritizes operational clarity without exposing unrestricted host internals.
Action requests are gated by authentication, role policy, ACL checks, and command-specific safeguards before host mutation. This enforces accountable support workflows while preserving homeowner authority.
Sentinel supports HTTPS transport, bridge fingerprint workflows, PBKDF2 password hashing, bearer-token sessions, and role-filtered audit trails with retention and revocation controls.

Communication profile

HTTP/1.1 JSON API, bearer authorization, REST-like endpoint families, and owner-governed pairing and acknowledgments.

Homeowner governance

Temporary disable and permanent integrator revoke are first-class controls backed by durable policy and audit behavior.

Whitepaper Pillars

Four pillars that define Sentinel Pro.

Visibility

Curated telemetry from StateCenter and runtime signals, presented for immediate homeowner and integrator clarity.

Governance

Role policy, ACL checks, and owner-centric consent workflows that keep operational authority explicit and revocable.

Security

HTTPS transport model, PBKDF2 password profile, session controls, and auditable event trails with retention boundaries.

Scalability

Harvest loop tuning, bounded state polling, and controlled host overhead for larger residential deployments.

Risk and hardening highlights

Transport protection, stronger password persistence, unauthorized endpoint controls, and auditable support governance are explicitly handled in the architecture baseline.

Operational certificate trust management, non-pinned TLS scenarios, and compromised trusted clients remain important operational considerations.

Recommended next steps include enforced pinning defaults, tighter privileged session controls, stronger mutation replay protections, and optional encrypted-at-rest stores.

Ready for live walkthroughs and local testing

Run ./start-local.command, open http://localhost:8000/sentinel-pro.html, then present the journey from Architecture to Risk Model.