Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

12/21/2010
02:58 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Sentrigo Secures $6 Million In Series C Funding

Round included participation from existing investors Benchmark Capital and Stata Venture Partners

SANTA CLARA, Calif.—December 21, 2010—Sentrigo, Inc., the innovator in database security and provider of data protection solutions for the datacenter and the cloud, today announced that it has secured $6 million in a Series C funding round. The round included participation from existing investors Benchmark Capital and Stata Venture Partners, as well as a new strategic investment from Juniper Networks, through the Junos' Innovation Fund. The financing will allow Sentrigo to increase global sales and marketing activities in support of its rapid revenue growth rate, as well as to continue expanding its database security and data integrity solutions for the cloud.

“With Juniper’s leadership and focus on securing the next-generation data center, we believe there are significant synergies with companies such as Sentrigo,” said Douglas Murray, senior vice president and general manager, high-end security and services at Juniper Networks. “As the market continues to move toward virtualization and cloud computing, Sentrigo is in a unique position to protect sensitive data, leveraging the strengths of its distributed architecture. We look forward to working with the company through this investment.”

Sentrigo’s suite of database security and compliance solutions includes components for vulnerability assessment, real-time monitoring, virtual patching and low-overhead audit. Sentrigo’s products monitor database threats and activity locally on each database server, allowing efficient and effective operation regardless of the deployment model. Sentrigo Hedgehog Enterprise is designed to protect sensitive data either on premises or in the cloud, from both external attacks as well as misuse by privileged insiders, addressing critical issues related to compliance audits for key industry regulations.

“Sentrigo’s approach to securing sensitive information is a key enabler to cloud computing, allowing organizations to deploy the applications they desire, while maintaining compliance,” said Nathan Shuchami, CEO of Sentrigo. “We have experienced tremendous growth this year, and as more and more customer infrastructure moves to the cloud, Sentrigo is uniquely positioned to become the leading provider of real-time protection for critical data. Backed by both customer and investor support, we look forward to continuing to innovate with our products, and to bringing their benefits to a wider range of users.”

Tweet this: Database and Cloud Security Vendor Sentrigo secures $6M in Series C funding

Follow Sentrigo on Twitter at: http://twitter.com/sentrigo

About Sentrigo

Sentrigo is a recognized innovator in database security solutions, offering a full suite of products for vulnerability assessment, virtual patching and database monitoring/auditing. The company’s flagship product, Hedgehog Enterprise, provides Database Activity Monitoring (DAM) and real-time Intrusion Prevention, protecting sensitive data from external threats and misuse by privileged insiders. Hedgehog can be quickly and easily deployed at small and midsize organizations, and scales to handle the largest enterprises, providing full visibility into all database activity and allowing enterprises to enforce security policy and comply with regulatory requirements, such as PCI DSS, Sarbanes-Oxley, and HIPAA. The company is a member of the Cloud Security Alliance (CSA), and recently received the Cloud Computing World Series Award as the ‘Best Security Solution’, the 2010 Global Product Excellence Award for Database Security from Info Security Products Guide, the 2010 Editors’ Best and Community Choice Awards from SQL Server Magazine, and was a recipient of the 2010 Red Herring 100 North America Award. For additional information and to download Hedgehog, visit www.sentrigo.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-4682
PUBLISHED: 2021-01-28
IBM MQ 7.5, 8.0, 9.0, 9.1, 9.2 LTS, and 9.2 CD could allow a remote attacker to execute arbitrary code on the system, caused by an unsafe deserialization of trusted data. An attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 186509.
CVE-2020-4888
PUBLISHED: 2021-01-28
IBM QRadar SIEM 7.4.0 to 7.4.2 Patch 1 and 7.3.0 to 7.3.3 Patch 7 could allow a remote attacker to execute arbitrary commands on the system, caused by insecure deserialization of user-supplied content by the Java deserialization function. By sending a malicious serialized Java object, an attacker co...
CVE-2020-13569
PUBLISHED: 2021-01-28
A cross-site request forgery vulnerability exists in the GACL functionality of OpenEMR 5.0.2 and development version 6.0.0 (commit babec93f600ff1394f91ccd512bcad85832eb6ce). A specially crafted HTTP request can lead to the execution of arbitrary requests in the context of the victim. An attacker can...
CVE-2021-20620
PUBLISHED: 2021-01-28
Cross-site scripting vulnerability in Aterm WF800HP firmware Ver1.0.9 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors.
CVE-2021-20621
PUBLISHED: 2021-01-28
Cross-site request forgery (CSRF) vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors.