Sentrigo provides a full suite of database security solutions for the protection of sensitive information stored in Oracle, Microsoft SQL Server, and Sybase systems. Our flagship product, Hedgehog Enterprise, is a real-time database activity monitoring and intrusion prevention system (IPS), which also serves as the foundation of a broad product line, including: database auditing, vulnerability assessment, virtual patching and end-user accountability.
Sentrigo Database Security Solutions
Database Activity Monitoring (learn more...)
Whether you are concerned with external hackers gaining access to sensitive data, or the need to prove to compliance auditors that records are well protected from rogue insiders, database activity monitoring from Sentrigo can provide the necessary visibility. Hedgehog monitors all database transactions in real time, including those generated from privileged users, stored procedures, triggers, views, and obfuscated or encrypted data. Unlike other solutions, Hedgehog can be deployed across thousand of databases in days - not months.
Database Intrusion Prevention (learn more...)
It's one thing to review logs and discover who may have compromised your data, but it's even better if you can prevent the breach in the first place. By default, violations of security policy in Hedgehog Enterprise result in a real-time alert issued to the management dashboard, or alternately to a 3rd party event monitoring tool. For severe or high-risk violations, rules can be configured to terminate sessions, quarantine users for a set period of time, and even update the firewall to block access from the originating IP address.
Virtual Patching (learn more...)
To protect systems from known database vulnerabilities until you can apply vendor patches, Sentrigo offers a unique virtual patching solution, vPatch. Providing more than 330+ virtual patches out-of-the-box, vPatch immediately begins preventing attempts to exploit these vulnerabilities. A dedicated research team is constantly looking for new zero-day vulnerabilities, and updates for these, as well as any new vendor patches as they are released, are applied automatically to the system in a seamless, non-intrusive manner.
Database Audit (learn more...)
To comply with many regulations, a trusted log of all databases activity on sensitive databases can make it easier to prove to auditors that the necessary controls are in place. Yet, many organizations are reluctant to turn on auditing, as native audit solutions have significant performance impact on the database server. Sentrigo's auditing capabilities run with zero latency and very low overhead on the database server (typically less than 5% of a single CPU), and instead use the Hedgehog infrastructure to log all desired transactions securely on the management server.
Vulnerability Assessment (learn more...)
An important step in any database security initiative is understanding your current security posture. What databases do you have, the patch level for each, which contain sensitive data, and identifying other security problems. Sentrigo offers two solutions for database vulnerability assessment: Hedgehog DBscanner for enterprise networks, and Repscan for auditors, consultants and pen testers. Both products provide coverage of more than 3,000 security verifications for scanning the most popular databases. They detect insecure PL/SQL-code, vulnerability to SQL injection and buffer overflow attacks and any weak / default passwords, as well as 1000's of other checks.
End-user Accountability (learn more...)
Many popular business applications in use today make use of a client-server architecture, with the application connecting to the database via a pooled connection, and access to the database appearing to come from a single shared account. Hedgehog IDentifier extracts the actual user ID information and passes it through the connection to the database, and associates every action with the application end-user who performed it, providing the level of detail needed by auditors to certify compliance.
All Software - Download, Install, and Evaluate NOW
Sentrigo products are available for download from this website and can be installed in under an hour. If you decide to purchase, you will receive a new license key, however your work configuring the system, creating a security policy, and even the software download itself are already complete.
In addition, Sentrigo's unique architecture protects databases from the inside, yielding a number of other key advantages when compared with alternative products:
Visibility into all threats, including privileged users and sophisticated intra-database attacks
Less complex and more efficient, reducing both your time-to-compliance and total cost of ownership
Supports database virtualization and cloud computing models