Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

1/18/2011
01:29 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Sentrigo Rolls Out New Hedgehog Enterprise Suite

New version includes added support to Hedgehog DBscanner for Sybase and MySQL

SANTA CLARA, Calif.—January 11, 2011 — Sentrigo, Inc., the innovator in database security and provider of data protection solutions for the datacenter and the cloud, today announced version 4.1 of its Hedgehog Enterprise database security suite – a fully integrated database activity monitoring and vulnerability assessment solution for enterprise organizations. Leading the suite’s enhancements is additional platform support of Sybase and MySQL databases in Hedgehog DBscanner – the enterprise-class vulnerability assessment and security scanning solution the company introduced in September, 2010.

As part of v4.1, Hedgehog DBscanner now conducts checks for nearly 4,000 potential weaknesses, including tests for operating system-level configuration aimed at identifying potential vulnerabilities that stem from the installation and setup of the database management systems, and not necessarily from the DBMS software itself. These OS-level checks further automate the process of achieving compliance for key security benchmarks.

To assist organizations in identifying which databases across the enterprise contain sensitive data, the data discovery functionality of Hedgehog DBscanner has also been extended to allow customers to define their own criteria for pattern matching (for example, social security, credit card or custom account number formats), and provides the ability to flexibly control the sampling and thresholds for evaluating database content against discovery rules.

“In the four months since we introduced our integrated security scanning and database activity monitoring products, we have seen that most customers see them as two sides of the same coin, and quickly grasp the value of our solution suite,” stated Dan Sarel, vice president of products at Sentrigo. “Our latest release brings more customer value from the integration between the two modules and answers their database security and audit requirements in a single, easy to install and configure solution. Extending Hedgehog DBscanner to support additional platforms, combined with its robust set of system checks and expanded data discovery capabilities, further establishes the Hedgehog Enterprise database security suite as the most comprehensive data security solution on the market.”

The Hedgehog Enterprise database security suite also includes the ability to automatically scan networks to discover databases. To speed initial setup for those customers who already maintain a complete list of all databases in their organization, the new version allows immediate loading of all database configuration information and metadata in a single click. Once the import is completed, network scanning will then identify any missed, new or rogue databases that are found.

To protect from misuse by authorized users, Hedgehog Enterprise v4.1, Sentrigo’s flagship database activity monitoring solution, introduces the ability to monitor value changes by recording the values before and after a transaction. While authorized users may have privileges to update database records, being able to see precisely what was changed can assist auditors in determining if a change was appropriate. Details of who made a change, at what time, and using which application, are now displayed along with the values both before and after the update.

“In certain cases of privileged users with direct access to the DBMS, providing a greater level of transparency into their changes within the system is the only way to identify potential malicious activity,” added Sarel.

Product Support and Availability

Hedgehog Enterprise v4.1 and Hedgehog DBscanner are available immediately for existing customers with current support contracts, and free evaluation versions of either individual product or the integrated suite may be downloaded from the Sentrigo website. Hedgehog DBscanner supports scanning of Oracle version 8.1 or later, Microsoft SQL Server 2000 or later, IBM DB2 version 8i or later for Linux, UNIX and Windows, and now supports Sybase ASE version 12.5 or later and MySQL version 4.0 or later.

More information about Hedgehog Enterprise v4.1 and Hedgehog DBscanner is available at http://www.sentrigo.com.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
Browsers to Enforce Shorter Certificate Life Spans: What Businesses Should Know
Kelly Sheridan, Staff Editor, Dark Reading,  7/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-17366
PUBLISHED: 2020-08-05
An issue was discovered in NLnet Labs Routinator 0.1.0 through 0.7.1. It allows remote attackers to bypass intended access restrictions or to cause a denial of service on dependent routing systems by strategically withholding RPKI Route Origin Authorisation ".roa" files or X509 Certificate...
CVE-2020-9036
PUBLISHED: 2020-08-05
Jeedom through 4.0.38 allows XSS.
CVE-2020-15127
PUBLISHED: 2020-08-05
In Contour ( Ingress controller for Kubernetes) before version 1.7.0, a bad actor can shut down all instances of Envoy, essentially killing the entire ingress data plane. GET requests to /shutdown on port 8090 of the Envoy pod initiate Envoy's shutdown procedure. The shutdown procedure includes flip...
CVE-2020-15132
PUBLISHED: 2020-08-05
In Sulu before versions 1.6.35, 2.0.10, and 2.1.1, when the "Forget password" feature on the login screen is used, Sulu asks the user for a username or email address. If the given string is not found, a response with a `400` error code is returned, along with a error message saying that th...
CVE-2020-7298
PUBLISHED: 2020-08-05
Unexpected behavior violation in McAfee Total Protection (MTP) prior to 16.0.R26 allows local users to turn off real time scanning via a specially crafted object making a specific function call.