Sentrigo
Encyclopedia
Sentrigo was a privately-held software company located in Santa Clara
Santa Clara, California
Santa Clara , founded in 1777 and incorporated in 1852, is a city in Santa Clara County, in the U.S. state of California. The city is the site of the eighth of 21 California missions, Mission Santa Clara de Asís, and was named after the mission. The Mission and Mission Gardens are located on the...

, California
California
California is a state located on the West Coast of the United States. It is by far the most populous U.S. state, and the third-largest by land area...

, USA
United States
The United States of America is a federal constitutional republic comprising fifty states and a federal district...

, until its acquisition in April, 2011 by McAfee
McAfee
McAfee, Inc. is a computer security company headquartered in Santa Clara, California, USA. It markets software and services to home users, businesses and the public sector. On August 19, 2010, electronics company Intel agreed to purchase McAfee for $7.68 billion...

.

The company was founded in 2006 by Nathan Shuchami and Slavik Markovich, to address several key challenges in Database security
Database security
Database security concerns the use of a broad range of information security controls to protect databases against compromises of their confidentiality, integrity and availability...

. Specifically, the inability to monitor activity of privileged users and those who have established such credentials through nefarious means, and the difficulty in maintaining a DBMS at the most current patch level. The company's products have expanded to include a broader suite of database security offerings, including database audit and vulnerability assessment as well.

Investors in Sentrigo included: Benchmark Capital
Benchmark Capital
Benchmark Capital is a venture capital firm responsible for the early stage funding of some very successful startups. In 1997, the firm invested $6.7 million in eBay, which became worth more than $5 billion by the spring of 1999. Other high-profile investments include Ariba, Juniper Networks, Red...

, Stata Ventures and Juniper Networks
Juniper Networks
Juniper Networks is an information technology and computer networking products multinational company, founded in 1996. It is head quartered in Sunnyvale, California, USA. The company designs and sells high-performance Internet Protocol network products and services...

.

Hedgehog Database Security Suite

Hedgehog is a family of products providing vulnerability assessment
Vulnerability assessment
A vulnerability assessment is the process of identifying, quantifying, and prioritizing the vulnerabilities in a system. Examples of systems for which vulnerability assessments are performed include, but are not limited to, information technology systems, energy supply systems, water supply...

 and database activity monitoring
Database activity monitoring
Database activity monitoring is a database security technology for monitoring and analyzing database activity that operates independently of the database management system and does not rely on any form of native auditing or native logs such as trace or transaction logs...

 for the purposes of reducing the risks of a data breach and meeting compliance regulations related to sensitive data. Hedgehog allows customers to protect databases such as Oracle
Oracle Database
The Oracle Database is an object-relational database management system produced and marketed by Oracle Corporation....

, Microsoft SQL Server
Microsoft SQL Server
Microsoft SQL Server is a relational database server, developed by Microsoft: It is a software product whose primary function is to store and retrieve data as requested by other software applications, be it those on the same computer or those running on another computer across a network...

, and Sybase
Sybase
Sybase, an SAP company, is an enterprise software and services company offering software to manage, analyze, and mobilize information, using relational databases, analytics and data warehousing solutions and mobile applications development platforms....

, without interfering with their day to day operations.

Hedgehog Enterprise Database Activity Monitoring

The company's primary product, introduced in 2007, Hedgehog Enterprise provides the core monitoring capability based on a sensor and server model. The sensor resides on the database server's OS and monitors the memory/cache for suspect database transactions, sending alerts in real-time to the management console. Thus, unlike network-based or host-based intrusion detection systems (IDS) or intrusion prevention systems (IPS), Hedgehog can fully monitor databases running on Virtual Machines
Virtual machine
A virtual machine is a "completely isolated guest operating system installation within a normal host operating system". Modern virtual machines are implemented with either software emulation or hardware virtualization or both together.-VM Definitions:A virtual machine is a software...

 or even in the cloud
Cloud computing
Cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility over a network ....

. The server is a Java based application that communicates with the sensors and can centrally monitor hundreds of databases. Based on a set of policies and rules, the system can audit, alert on, or suspend sessions that violate preset conditions.

Hedgehog DBscanner

Announced in September, 2010, Hedgehog DBscanner is an enterprise vulnerability assessment solution for databases. It includes capabilities for automatically finding databases on the network, and then subjects them to more than 3,000 different security checks. Reports provide details on discovered vulnerabilities such as the current patch level, weak passwords, shared accounts, configuration errors, and insecure database code. DBscanner can be implemented along with Hedgehog Enterprise, in which case it shares a common management console, or can be run as a standalone module.

Hedgehog vPatch

vPatch, is a solution for "virtual patching" of databases to overcome the problem that many customers are unable to apply security patches to their databases in a timely manner. This may be due to the inability to schedule downtime for a production system, the time lag for testing / 3rd party support for applications on top of the database, or numerous other reasons. Sentrigo vPatch includes a set of rules which generate alerts when known vulnerabilities are exploited, and can be used to terminate attackers' database sessions. vPatch rules are updated on a frequent basis as new security updates are issued by the DBMS vendor, or as new vulnerabilities are discovered by Sentrigo's research team or partners.

Hedgehog IDentifier

A common practice in developing applications (and web applications in particular) is the use of fat database accounts (common schema) and pooled connections to enhance application performance. Using this approach raises a problem with full end-to-end user tracking in the database layer. The database is unable to see end-user details like username and IP address, only seeing the application server IP and the common schema account. Hedgehog IDentifier solves this problem by providing an application server plug-in that captures end-user information and transparently propagates it to the database tier by using standard database APIs. No application changes are required. IDentifier supports custom Java and .NET
.NET Framework
The .NET Framework is a software framework that runs primarily on Microsoft Windows. It includes a large library and supports several programming languages which allows language interoperability...

 applications as well as all the major business applications. Some technical details are available in this blog entry.

FuzzOr

FuzzOr (fuzzer for Oracle) is an open source software tool developed by Sentrigo. FuzzOr provides database administrators and programmers with the ability to test PL/SQL code for security vulnerabilities. The tool discovers vulnerabilities by attempting to exploit the code and is particularly helpful in finding SQL Injection
SQL injection
A SQL injection is often used to attack the security of a website by inputting SQL statements in a web form to get a badly designed website in order to dump the database content to the attacker. SQL injection is a code injection technique that exploits a security vulnerability in a website's software...

 and Buffer Overflow
Buffer overflow
In computer security and programming, a buffer overflow, or buffer overrun, is an anomaly where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory. This is a special case of violation of memory safety....

vulnerabilities. Sentrigo provides the tool free of charge.

External links

The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK