SENTISEC control-plane logoSENTISEC
AGENT SECURITY FOR THE WHOLE ENGINEERING ORG

Ship AI coding agents without shipping the next incident.

Team workspaces, shared policies, SSO, and Slack alerts for the Claude Code / Cursor / Codex / n8n stack your engineers are already using. Same substrate as the individual tier — with the guardrails a security-aware org actually needs.

SSO · SAMLSLACK · DISCORD ALERTSSHARED POLICY BUNDLES
team × policy × agent ⇒ ∀ action : action ∈ allow
FIG. 01 · TEAM TIER
§01 BLAST RADIUS

One compromised agent on one laptop is a security-org problem.

A Cursor agent pair-programming on a production repo. A Claude Code session running `Bash(curl …)` against a shared infrastructure. An n8n workflow forwarding email with broad OAuth scopes. In a team, the blast radius of a single prompt-injection is everyone's problem. The existing answer — disable the useful tools — scales badly. Sentisec gives your org a single control plane for every developer agent, without touching each engineer's workflow.

01
One policy, many engineers
Define the egress allowlist and filesystem blocklist once, at the workspace level; apply it across every developer's Claude Code and Cursor sessions.
02
One inbox for incidents
Slack or Discord alert when any engineer's agent tries a blocked action. No more hoping each engineer reads their own logs.
03
One audit trail
Every session produces a signed, hash-chained trace. SOC 2 auditors stop asking about AI agents.
04
One identity layer
SSO and SAML via Clerk. Workspace membership mirrors your IdP. Revoking access revokes everywhere.
§02 HOW IT WORKS

Same control plane. Team-scoped policy.

Each engineer's agent points at a team-scoped base URL. Every proposed action receives a cognitive integrity score under the team's policy, not the individual's. Halt events land in Slack and in the shared dashboard.

01
Task alignment
The control plane scores whether the proposed action still matches the user's task. Team-wide policy controls how cautious the halt behavior should be.
02
Workspace boundaries
Team-wide destination and protocol boundaries are applied before the action leaves the agent loop.
03
Shared sensitive-action policy
Sensitive local actions are handled consistently across all workspace members, without asking every engineer to maintain their own safety list.
DIAGRAM · TEXT
IN  →  team member's proposed action
└── [ TEAM-SCOPED COGNITIVE INTEGRITY CONTROL PLANE ] ──┐
                                                          ▼
OUT →  allow · halt · Slack alert · shared trace
Every verdict is logged per-member and per-workspace. Full technical detail is shared with team customers under NDA.
§03 PRICING

Two team tiers. Start on the small one.

Preliminary pricing for the team tier. We bill monthly, no annual lock-in, cancel from the dashboard. The individual tier ($29/mo) stays available under /for-developers.

Team
$199 / MO
5 seats included, shared workspaces, Slack/Discord alerts, 1-year retention, shared policy bundles.
Start team trial
Team-plus
$999 / MO
20 seats, SSO/SAML via Clerk, custom policies, SIEM export, priority onboarding, dedicated forensic retention.
Start team-plus trial
Larger org, regulated vertical, procurement-led buy? The enterprise tier is a separate surface: partners@sentisec.ch.
§04 GET STARTED

Team trial. Under five minutes. No credit card.

Self-serve signup. Connect your IdP for SSO, invite engineers, ship policies. We'll help with the first policy bundle on request.