SentryBox has been discontinued. Thank you for being part of the journey — learn more in our blog post
At some point, moving on becomes the right thing to do.
SentryBox has been a long climb with steep ups and downs. Over the past two years, we built an amazingly simple-to-use cybersecurity hardware product. Unfortunately, that’s no longer what the market demands.
The cybersecurity landscape has evolved toward SIEMs, cloud-based solutions, and highly sophisticated data analytics. The niche we thought we had discovered simply doesn’t exist anymore. Sometimes products come too early — sometimes too late. In our case, we were too late.
A trap for hackers that could be set up within minutes, offering visibility into potential cyberattacks without being intrusive to the rest of the network architecture, might have been a perfect product-market fit a few years ago.
Still, the journey has been incredible.
We learned how to design devices, build hardware, get certifications, develop locally running Linux software, create packaging, set up infrastructure and maintenance pipelines, fake TCP stacks, and run decoy services. It has been a true wow experience.
I want to say thank you to all our early supporters, beta customers, and partners who were willing to give us a chance. Trusting a newcomer is never easy — and you did it anyway. I will always be grateful for that opportunity.
A very special thanks to my founder associate Simon Moschek, who was there every step of the way and helped turn this vision into reality. A special thanks as well to Julian Adler, whose soldering skills made the very first SentryBoxes possible.
So — what’s next?
No worries. The next product is already in planning, and the founder journey continues.