ROI, ASAP . (Return on investment, as soon as possible)
How many hours does your team spend fixing bugs? How much time and money is wasted?
Errors result in lost trust from customers, lost revenue, and decreased team productivity. Better attention to error management and code performance saves you time — from developers writing functional code to maintaining your service.
Your business is our business
When all hell breaks loose, we're here to help.
Scale & High Availability
Our infrastructure is designed for higher volumes of traffic than you could ever send us. When your events spike, we'll be ready. Every part of the Sentry service uses properly-provisioned, redundant servers and is maintained regularly.
Automatic and Continuous improvement
Don't leave yourself vulnerable with an outdated instance. Hosted Sentry is constantly kept up to date and we deploy to production multiple times a day, (without you lifting a finger).
ReliabilityWe strive to always be available — Sentry rarely encounters issues. Check for yourself at status.sentry.io, our transparent dashboard that tracks our uptime in real time.
Sentry’s Support Engineers are here to help if you ever feel blocked, and our Customer Success Managers answer questions about features, collect product feedback, and provide best practices and recommendations tailored to your specific needs.
Compliance and Security
Sentry is committed to securing your application’s data, eliminating systems vulnerability, and ensuring continuity of access.
Sentry is hosted on a SOC 2 and SOC 3 compliant data center through Google Cloud Platform. Only designated, authorized Sentry employees have access to configure the infrastructure on an as-needed basis behind a two-factor authenticated virtual private network. Google's data centers feature a layered security model with extensive safeguards, including: custom-designed electronic access cards, alarms, vehicle access barriers, perimeter fencing, metal detectors, biometrics.
Sentry undergoes black box penetration testing on an annual basis. Information about security vulnerabilities successfully exploited through testing is used to set mitigation and remediation priorities. We provide a summary of penetration test findings upon request to Enterprise customers.
Intrusion detection and prevention
Suspicious behavior is among Sentry’s biggest concerns for infrastructure hosting and management. Google Cloud Platform’s intrusion detection and prevention systems (IDS/IPS) rely on both signature-based security and algorithm-based security to identify traffic patterns that are similar to known attack methods.
Role-based account access
We will gladly help you avoid painful conversations like: “Who set this up?” “Ted did.” “Ted quit last month.” “Does anyone else know how it works?” “Probably not.”
Sentry is designed so each user has a singular account that can be reused across multiple organizations (even those using SSO). Admins and owners can revoke access by project, team, or org and change user role. Additionally, the admin can request login and password history and revoke passwords and active sessions for any user via request to Sentry Support.
Sentry’s Single Tenant instances hosts a unique instance scaled to the needs of enterprise customers who require data isolation or data residency. On Sentry Single Tenant, Sentry will still maintain and automatically apply updates to keep your instance up to date and functioning, while your data at rest remains even more secure. Available on Google Cloud and soon on AWS and Microsoft Azure, in any available region.
User administration is central to security and management. Auditing user logs is often the first step in both an emergency response plan and policy compliance requirements. All Sentry customers get admin controls governing identity, access, and usage to keep your data safe, secure, and centrally managed.
In the audit log, all of the actions by user and event within the Sentry UI (e.g., member.invite, project.create) are listed chronologically by time and IP address, so you’ll always have a view into your organization’s most recent history.
Single Sign-On and SAML
Sentry’s single sign-on (SSO) implementation prioritizes security. We aggressively monitor linked accounts and will disable them with any reasonable sign that the account’s access has been revoked. SSO also improves user experience by streamlining login and improving access from trusted domains. Sentry currently offers SSO via Google Apps for Work and GitHub Organizations.
SAML facilitates authentication through the web browser and improves identity management for the increasing number of organizations using Sentry at scale. By streamlining signup and login from trusted domains, SAML increases access control and promotes regulatory compliance.
If you are dealing with any European Union data through a vendor (like Sentry), then you need a contractual agreement in place with each vendor so the EU knows you’re only doing business with companies that fully comply with the General Data Protection Regulation (GDPR). Sentry’s Data Processing Addendum (DPA) is a self-service form that you can fill out to make your organization automatically GDPR-compliant with Sentry.
HIPAA and HITECH
Sentry data is hosted on Google Cloud Platform, which encrypts all data at rest by default, in compliance with the Privacy Rule within HIPAA Title II. Sentry also exercises strong access control and technical and administrative safeguards in compliance with HIPAA’s Security Rule.
Sentry can sign a Business Associate Agreement (BAA) with Enterprise customers who require data services to ensure compliance with the Health Insurance Portability and Accountability Act (HIPAA), amended by the Health Information Technology for Economic and Clinical Health Act (HITECH).
For information that we receive from the European Union, Sentry has certified its compliance with the EU-U.S. Privacy Shield as set forth by the U.S. Department of Commerce regarding the collection, use, and retention of personal information from European Union countries and Switzerland.