Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

1/18/2011
01:29 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Sentrigo Rolls Out New Hedgehog Enterprise Suite

New version includes added support to Hedgehog DBscanner for Sybase and MySQL

SANTA CLARA, Calif.—January 11, 2011 — Sentrigo, Inc., the innovator in database security and provider of data protection solutions for the datacenter and the cloud, today announced version 4.1 of its Hedgehog Enterprise database security suite – a fully integrated database activity monitoring and vulnerability assessment solution for enterprise organizations. Leading the suite’s enhancements is additional platform support of Sybase and MySQL databases in Hedgehog DBscanner – the enterprise-class vulnerability assessment and security scanning solution the company introduced in September, 2010.

As part of v4.1, Hedgehog DBscanner now conducts checks for nearly 4,000 potential weaknesses, including tests for operating system-level configuration aimed at identifying potential vulnerabilities that stem from the installation and setup of the database management systems, and not necessarily from the DBMS software itself. These OS-level checks further automate the process of achieving compliance for key security benchmarks.

To assist organizations in identifying which databases across the enterprise contain sensitive data, the data discovery functionality of Hedgehog DBscanner has also been extended to allow customers to define their own criteria for pattern matching (for example, social security, credit card or custom account number formats), and provides the ability to flexibly control the sampling and thresholds for evaluating database content against discovery rules.

“In the four months since we introduced our integrated security scanning and database activity monitoring products, we have seen that most customers see them as two sides of the same coin, and quickly grasp the value of our solution suite,” stated Dan Sarel, vice president of products at Sentrigo. “Our latest release brings more customer value from the integration between the two modules and answers their database security and audit requirements in a single, easy to install and configure solution. Extending Hedgehog DBscanner to support additional platforms, combined with its robust set of system checks and expanded data discovery capabilities, further establishes the Hedgehog Enterprise database security suite as the most comprehensive data security solution on the market.”

The Hedgehog Enterprise database security suite also includes the ability to automatically scan networks to discover databases. To speed initial setup for those customers who already maintain a complete list of all databases in their organization, the new version allows immediate loading of all database configuration information and metadata in a single click. Once the import is completed, network scanning will then identify any missed, new or rogue databases that are found.

To protect from misuse by authorized users, Hedgehog Enterprise v4.1, Sentrigo’s flagship database activity monitoring solution, introduces the ability to monitor value changes by recording the values before and after a transaction. While authorized users may have privileges to update database records, being able to see precisely what was changed can assist auditors in determining if a change was appropriate. Details of who made a change, at what time, and using which application, are now displayed along with the values both before and after the update.

“In certain cases of privileged users with direct access to the DBMS, providing a greater level of transparency into their changes within the system is the only way to identify potential malicious activity,” added Sarel.

Product Support and Availability

Hedgehog Enterprise v4.1 and Hedgehog DBscanner are available immediately for existing customers with current support contracts, and free evaluation versions of either individual product or the integrated suite may be downloaded from the Sentrigo website. Hedgehog DBscanner supports scanning of Oracle version 8.1 or later, Microsoft SQL Server 2000 or later, IBM DB2 version 8i or later for Linux, UNIX and Windows, and now supports Sybase ASE version 12.5 or later and MySQL version 4.0 or later.

More information about Hedgehog Enterprise v4.1 and Hedgehog DBscanner is available at http://www.sentrigo.com.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/9/2020
Omdia Research Launches Page on Dark Reading
Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
Mobile App Fraud Jumped in Q1 as Attackers Pivot from Browsers
Jai Vijayan, Contributing Writer,  7/10/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-14174
PUBLISHED: 2020-07-13
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to view titles of a private project via an Insecure Direct Object References (IDOR) vulnerability in the Administration Permission Helper. The affected versions are before version 7.13.6, from version 8.0.0 before 8.5....
CVE-2019-20901
PUBLISHED: 2020-07-13
The login.jsp resource in Jira before version 8.5.2, and from version 8.6.0 before version 8.6.1 allows remote attackers to redirect users to a different website which they may use as part of performing a phishing attack via an open redirect in the os_destination parameter.
CVE-2019-20898
PUBLISHED: 2020-07-13
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to access sensitive information without being authenticated in the Global permissions screen. The affected versions are before version 8.8.0.
CVE-2019-20899
PUBLISHED: 2020-07-13
The Gadget API in Atlassian Jira Server and Data Center in affected versions allows remote attackers to make Jira unresponsive via repeated requests to a certain endpoint in the Gadget API. The affected versions are before version 8.5.4, and from version 8.6.0 before 8.6.1.
CVE-2019-20900
PUBLISHED: 2020-07-13
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the Add Field module. The affected versions are before version 8.7.0.