SENTINEL™ is the AI-driven command layer for private security firms, executive protection details, and corporate security teams. Onboard a new principal in minutes. Generate advance work, route plans, and crisis protocols on demand. Match the right operators to the right principals — every assignment.
Three quiet failures that show up in after-action reports — long before they show up in headlines.
Every new principal, every new destination, every new movement requires hours of manual advance — venue surveys, route options, hospital lookups, threat scans, evac plans. When the calendar fills up, advance work gets thin or stops being done at all. That's where exposure happens.
Most firms match operators by availability — not by language, regional experience, threat-environment fit, or principal preference. A trilingual EP agent with Latin America experience sitting on a Greenwich detail while a junior runs a São Paulo movement is a staffing failure waiting to become an incident.
Principal preferences, medical history, family movements, residence layouts, trusted vendors, prior incident notes — most of it lives in WhatsApp threads and a senior agent's memory. When that agent rotates off, the next detail starts from zero. Institutional protection knowledge has no home.
SENTINEL closes those gaps — and gives every operator on your roster the same institutional memory and intelligence depth as your most senior agent.
Core Engine
The intelligence core powering SENTINEL. From the moment a new principal is onboarded, NEXUS deploys 10+ specialist AI agents in parallel — pulling from 35+ live intelligence feeds and a proprietary tradecraft library built from 15+ years in the protection space — to produce the full operational packet your detail needs to deploy.
to produce a full principal protection packet — advance, threat assessment, route plan, medical mapping, and detail SOPs — that traditionally takes a senior advance team 3–5 days of manual work per movement.
Each specialist runs dual-query vector search — cross-referencing 15+ years of protective tradecraft against live intelligence feeds — so every output is grounded in proven EP doctrine and current ground truth, not generic LLM answers.
Conflict mapping, sanctions monitoring, and country-risk scoring across 200+ countries. Continuously cross-references regional changes against your principal roster's exposure profiles.
OSINT, dark web, and social monitoring tied to principal identifiers, family members, and travel patterns.
Adverse media screening, OFAC and sanctions cross-reference, PEP database matching, and litigation history. Every principal vetted before they're onboarded — and re-screened on a recurring cadence.
Hospital mapping by blood type, trauma center capability, medevac routing, and pharmacy availability per destination.
Triage, escalation, and response protocols.
Matches operators to principals by language fluency, regional experience, threat-environment certification, specialization, and prior detail history. The right operator on the right detail — not just the available one.
POI mapping, safe houses, primary/alternate/emergency routes, and live overlay of current threats and road closures along the path.
Sanctions screening, export controls, and tamper-proof audit trail per principal per movement.
EP briefs, travel risk scoring, and movement plans formatted for the way detail leaders actually consume intelligence in the field — short, scannable, decision-oriented.
Comms cascade, SOPs, and the deployment brief packet handed to the detail leader before stepping off.
Auto-Generated
Six operational deliverables — generated automatically, updated continuously, and accessible from any device your detail uses in the field.
A complete, encrypted file on every protectee — built from the 21-question intake. Identity, family, medical (blood type, allergies, conditions, meds), travel patterns, residence layouts, vehicle preferences, vendor network, and past incident history. The single source of truth your detail can read on day one.
Per-movement deliverable. Primary, alternate, and emergency routes with timing. Venue surveys, choke points, parking and arrival/departure layouts. Photo and street-view annotations. Live overlay of current threats, protests, and road closures. Generated 48 hours pre-movement, refreshed in real time.
Region-specific threat profile per principal per destination. Active conflict zones, kidnap/ransom history, criminal patterns by neighborhood, hostile-surveillance indicators, adversary group activity, recent incidents (7/14/30-day lookback), and severity scoring tied to the principal's exposure.
Nearest Level-1 trauma centers, hospitals confirmed to carry the principal's blood type, English-speaking facilities, air ambulance providers and helipad locations, pharmacy availability for current meds. Evac route timing from every planned location. Medevac insurance contacts pre-loaded.
Standing operating procedures tailored to the principal — comms cadence, formation preferences, no-go behaviors, family member protocols, residence security requirements, vendor screening rules. Plus crisis playbooks: medical event, hostile contact, vehicle incident, principal separation, evac trigger.
The single deliverable handed to the detail leader before deployment. Synthesizes profile, advance, threat, medical, and SOPs into one operational brief. Available as PDF, in-platform read-only view, or pushed to the team's encrypted comms channel.
Safety Intelligence
Ten integrated modules fusing real-time flight data, geopolitical intelligence, location tracking, medical mapping, and crisis communication into one operational layer — built for the way executive protection details actually work in the field.
Political violence & protest data. Predictive conflict forecasting.
Free (Open Access)
Global events database. 15-min updates. 100+ languages.
Free (Open Source)
65,000+ locations. 7 risk categories. GPS-level scoring.
Commercial License
Real-time flight tracking. 30–60 sec latency.
From $49.99/mo
Premium flight data. Predictive ETAs. Historical since 2011.
Usage-Based
Airspace restrictions and temporary flight restrictions.
Free (FAA/ICAO)
US State Dept, UK FCDO, AU DFAT. Unified risk ratings.
Free (Public)
Severe weather, seismic, hurricane tracking. USGS/NOAA.
Free – $50/mo
| Module | Setup (One-Time) | Monthly | Priority |
|---|---|---|---|
| 01 — Geopolitical Threat Intelligence | $25K – $40K | $2K – $5K | Critical |
| 02 — Flight & Airspace Monitoring | $15K – $20K | $500 – $1.5K | Critical |
| 03 — Pre-Trip Intelligence Briefings | $15K – $25K | $1K – $2K | Core |
| 04 — Crisis Communication System | $20K – $30K | $1K – $3K | Critical |
| 05 — Real-Time Location & Geofencing | $25K – $35K | $2K – $4K | Core |
| 06 — Incident Logging & Compliance | $10K – $15K | $500 – $1K | Core |
| 07 — Dark Web & Social Monitoring | $20K – $30K | $2K – $4K | Advanced |
| 08 — Medical Emergency Integration | $10K – $15K | $500 – $1K | Add-On |
| 09 — Weather & Natural Disaster | $8K – $12K | $300 – $800 | Add-On |
| 10 — Asset & Vehicle Tracking | $15K – $25K | $1K – $2.5K | Advanced |
| Full Safety Platform (All 10)Bundle · Save 20–40% | $125,000 – $200,000 | $8K – $15K/mo |
What takes an analyst 4–6 hours per trip gets generated automatically in minutes.
From threat detection to field notification. Industry average: 15–30 minutes.
Every decision, alert, and communication logged automatically. ISO 31030 compliant.
Real-World Scenarios
Flight Diversion During Conflict Escalation
A close protection team is positioned at an international airport awaiting their principal's inbound flight. Airspace closures are announced due to escalating military activity. The principal's flight is diverted.
Civil Unrest Detected Near Client Hotel
Social media monitoring detects protest activity forming within 2km of a client's hotel. The system creates a dynamic geofence around the affected area and generates alternative route guidance.
Pre-Trip Risk Assessment for Executive Travel
An executive's trip is booked to a high-risk region. The system auto-generates a comprehensive briefing covering 30 days of security incidents, medical facilities, evacuation routes, and local risk scoring.
Platforms like Everbridge, International SOS, and Dataminr charge $100K–$500K annually. Here's why SENTINEL is different.
Modules 11–23
Beyond the core protection platform, 13 specialist modules cover the full spectrum of protective intelligence — from K&R crisis automation and insider threat monitoring to maritime security, disinformation detection, and the foundational 21-question principal intake that drives everything.
| Module | Setup | Monthly | Priority |
|---|---|---|---|
| 11 — Kidnap & Ransom Intelligence | $35K – $55K | $3K – $6K | Critical |
| 12 — Insider Threat & Workplace Violence | $30K – $50K | $2.5K – $5K | Critical |
| 13 — Fraud & Financial Crime Monitoring | $30K – $50K | $2K – $4.5K | Core |
| 14 — eDiscovery & Litigation Acceleration | $25K – $45K | $2K – $5K | Core |
| 15 — Crisis Simulation & Tabletop Exercises | $25K – $40K | $1.5K – $3.5K | Advanced |
| 16 — Regulatory Change Monitoring | $20K – $35K | $1.5K – $3K | Core |
| 17 — Maritime Security & Piracy Intel | $30K – $50K | $2.5K – $5K | Advanced |
| 18 — Secure Communications Infrastructure | $20K – $35K | $1.5K – $3K | Core |
| 19 — Multi-Language Intelligence Processing | $20K – $35K | $2K – $4K | Advanced |
| 20 — Physical Security Design AI | $25K – $40K | $1.5K – $3K | Add-On |
| 21 — Disinformation & Influence Ops Detection | $25K – $45K | $2.5K – $5K | Advanced |
| 22 — Independent Monitorship Automation | $20K – $35K | $1.5K – $3K | Core |
| 23 — Principal Intake & Profile Engine | $20K – $30K | $1.5K – $3K | Critical |
| All Specialist Modules (13) | $325,000 – $545,000 | $25.5K – $53K/mo |
Deploy individually, in phases, or as a complete platform. Every module integrates with every other module. Build the operational stack that matches your firm's footprint — expand as demand proves ROI.
Cyber Partnership
SENTINEL handles threat monitoring, alert aggregation, and compliance screening. For hands-on offensive security, penetration testing, and incident response, we partner with Maksec — a specialized cybersecurity firm embedded in our network — giving you a complete cyber capability layer.
Internal, external, network, web application, cloud, and AI application pen testing — simulating real-world attacks to identify vulnerabilities before adversaries do.
Simulated advanced persistent threats testing defenses against sophisticated, multi-vector attacks with detailed mitigation reports.
Comprehensive mapping of exposure — identifying and recommending ways to reduce vulnerable entry points across digital and physical assets.
Specialized testing for AI systems including prompt injection, model manipulation, data poisoning, and output integrity.
Comprehensive security strategy development, incident response plan creation, and cloud security architecture consulting.
Simulated phishing campaigns, social engineering awareness programs, role-based security training, and cybersecurity best practices workshops.
Securing development pipelines, integrating security into DevOps workflows, automating configuration management, and continuous monitoring.
Developing frameworks, policies, and technical guardrails for deploying artificial intelligence safely, ethically, and in compliance with emerging regulations.
NutriCove serves as the automation + intelligence layer. Maksec delivers hands-on security assessments and technical implementation. You maintain the client relationship and strategic advisory. One engagement, three capability tiers, zero gaps.
One platform, six deployment patterns — used by EP firms, corporate security teams, family offices, and government details.
Run twice the principals with the same team. SENTINEL handles the advance work, route planning, threat assessments, and detail SOPs — your operators focus on the close-protection work only humans can do.
Travel risk for the C-suite, board, and key personnel. Pre-trip briefs in minutes instead of days, real-time movement monitoring, ISO 31030 duty-of-care evidence chain, and crisis playbooks that hold up in front of legal and the board.
Single-principal operating system covering the principal, spouse, children, residences, vehicles, vessels, and aircraft. Trusted-vendor network, medical-on-deck, school routes, and travel patterns — all under encrypted access controlled by the family's chief of staff.
Pre-trip risk briefs for high-risk destinations, real-time flight and airspace monitoring, dynamic geofencing around the principal's location, and 24/7 crisis response coordination across SMS, WhatsApp, voice, and encrypted comms.
Multi-jurisdiction threat intelligence, sanctions and PEP screening, host-nation liaison documentation, and protective operations across embassies, consulates, and visiting delegations — with full audit trails for accountability reviews.
Modular architecture adapts to non-standard programs — celebrity touring, faith-based protection, oil & gas expat security, journalism in conflict zones, NGO field operations. Custom modules from $3,500 — full purpose-built programs scoped per engagement.
From the Field
Private EP firms, family offices, and corporate security teams using the platform in active protection programs today.




Director of Operations · Private EP Firm
We were turning down two principals a quarter because we didn't have advance bandwidth. SENTINEL changed the math overnight — our two senior agents now cover six principals each instead of three, with deeper intel than we used to deliver.
Engagement Models
Start small with a single principal. Scale to your full roster. Deploy enterprise-wide. Each tier reconciles with the per-module pricing — no surprises in procurement.
1 principal · 60-day proof of concept
Up to 25 principals
Unlimited principals · all 23 modules
Specialized programs — celebrity touring, faith-based protection, expat security, NGO field operations, journalism in conflict zones. Custom modules from $3,500. Full purpose-built systems scoped per engagement with proprietary IP options.
All tiers reconcile to per-module pricing. Add or remove modules at renewal — your CFO can verify every line item against the module tables above.
Client data belongs to you. Generated reports, deliverables, and client knowledge bases are 100% your property. Export anytime, no lock-in.
HIPAA-ready architecture. Encryption at rest and in transit. Full audit trails for compliance documentation.
You own all custom modules contracted as proprietary. NutriCove retains the engine framework and base knowledge library. No hidden clauses.
Enterprise license includes full white-label capability. Your brand, your portal, your client experience. We're invisible.
We run a real principal scenario through NEXUS live. You watch the engine produce a complete protection packet — profile, advance, threat assessment, medical map, detail SOPs — in under five minutes. No slides. Just the platform.
Pick one principal from your roster for a 60-day pilot. Real intake, real movements, real deliverables. Your detail leaders use the platform on actual assignments while we tune it to your firm's tradecraft.
Onboard the rest of your principals onto SENTINEL. We migrate existing intel, profiles, and SOPs into the system. Your detail matching, advance work, and crisis playbooks now run from one operational layer.
Expand to the full firm with a license + custom module roadmap for your specialized programs. SENTINEL becomes your permanent intelligence layer — recurring, scalable, and invisible to the principals you protect.
See SENTINEL run a live principal scenario end-to-end in under five minutes. If it doesn't change how your firm thinks about advance work, we'll end the call early.