Sentrigo To Distribute Repscan Database Vulnerability Assessment SoftwareSentrigo To Distribute Repscan Database Vulnerability Assessment Software
Repscan scans and reports on Oracle database weaknesses and vulnerabilities
April 18, 2009
SAN MATEO, Calif.--(BUSINESS WIRE)--Sentrigo, Inc., the innovator in database security software, today announced that it has become the sole distributor of Repscan by Red-Database-Security, the only 360-degree database vulnerability assessment and security scanning software available for Oracle databases. The product complements and integrates with Sentrigo's Hedgehog family of database activity monitoring software—the industry's leading software solution for protecting corporate databases from privileged insiders as well as malicious hackers. Repscan and Hedgehog products are available for download and free evaluation from the Sentrigo website.
Repscan scans and reports on Oracle database weaknesses and vulnerabilities. With more than 3,000 security verifications, Repscan is able to detect insecure PL/SQL code and forensic traces; database modifications; insecure system configuration settings; and weak, shared and default passwords.
Repscan was developed by Alexander Kornbrust, a world-renowned expert on Oracle database security, and his team. Kornbrust's firm, Red-Database-Security, brings together developers and database administrators (DBAs) to offer specialized Oracle security services and solutions. Key Repscan features include:
Insecure PL/SQL code detection
Weak or default passwords from Oracle database users (e.g., OID/APEX/HTMLDB/OVS passwords)
More than 115 Oracle tables verified for password information
Report-driven penetration testing
Modified database object detection, including discovery of Oracle Root kits
Altered data detection (privileged and user tables)
Neglected patch detection
Forensic trace discovery from common security and hacker tools
Automatic conversion of the weaknesses found by Repscan into protection rules and policies in the Sentrigo Hedgehog Database Security Suite
"We developed Repscan in response to a clear market need for a superior vulnerability assessment tool for Oracle databases," said Kornbrust. "Many organizations will run vulnerability assessments only once, but such an approach in a dynamic environment invites trouble. To protect corporate data, all repositories should be scanned on a regular basis, and also be protected by Hedgehog. Repscan makes this easy to do, in organizations with thousands of databases or in medium or small-size operations."
Dan Sarel, vice president of products at Sentrigo, commented: "Alex and his team of experts at Red-Database-Security have been a strong partner to Sentrigo for more than a year and we're pleased to expand our relationship with them. By becoming the exclusive distributor of Repscan, Sentrigo is able to offer our customers the type of product that many have been asking for—a best of breed vulnerability assessment solution that can be used on an ongoing basis alongside our Hedgehog products for database activity monitoring. Repscan, together with the Sentrigo PL/SQL fuzzing utility, FuzzOr, fully integrated with Sentrigo's Hedgehog Database Security Suite, provides organizations with a full and comprehensive solution for their database compliance and data security needs."
About Sentrigo Sentrigo, Inc. is a recognized innovator in database security. The company's Hedgehog software provides full-visibility database activity monitoring and real-time protection and has been rapidly adopted by Fortune 1000 companies to defend mission-critical data against insider misuse as well as outsider intrusion. Enterprises across industry sectors are also using Sentrigo Hedgehog to accelerate compliance with regulatory requirements such as PCI DSS, Sarbanes-Oxley and HIPAA. Sentrigo has won wide acclaim for its industry and technology leadership by publications such as Network World and SC Magazine. For additional information and to download Hedgehog, visit www.sentrigo.com.
You May Also Like
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
What's In Your Cloud?Nov 30, 2023
Everything You Need to Know About DNS AttacksNov 30, 2023
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
AI in Cybersecurity: Using artificial intelligence to mitigate emerging security risks
Protecting Critical Infrastructure: The 2021 Energy, Utilities, and Industrials Cyber Threat Landscape Report
Supply Chain Cyber Risk Management Whitepaper