Sentrigo
   HOME

TheInfoList



OR:

Sentrigo was a privately held software company located in Santa Clara,
California California is a U.S. state, state in the Western United States, located along the West Coast of the United States, Pacific Coast. With nearly 39.2million residents across a total area of approximately , it is the List of states and territori ...
,
USA The United States of America (U.S.A. or USA), commonly known as the United States (U.S. or US) or America, is a country Continental United States, primarily located in North America. It consists of 50 U.S. state, states, a Washington, D.C., ...
, until its acquisition in April, 2011 by
McAfee McAfee Corp. ( ), formerly known as McAfee Associates, Inc. from 1987 to 1997 and 2004 to 2014, Network Associates Inc. from 1997 to 2004, and Intel Security Group from 2014 to 2017, is an American global computer security software company head ...
.Acquisition by McAfee
/ref> The company was founded in 2006 by Nathan Shuchami and Slavik Markovich, to address several key challenges in
Database security Database security concerns the use of a broad range of information security controls to protect databases (potentially including the data, the database applications or stored functions, the database systems, the database servers and the associated ...
. Specifically, the inability to monitor activity of privileged usersRogue DBAs and the Insider Threat
by Ericka Chickowski, ''Channel Insider'', July 14, 2009
and those who have established such credentials through nefarious means, and the difficulty in maintaining a DBMS at the most current patch level. The company's products have expanded to include a broader suite of database security offerings, including database audit and vulnerability assessment as well. Investors in Sentrigo included: ''
Benchmark Capital Benchmark is a venture capital firm based in San Francisco that provides seed money to startups. History The firm's most successful investment was a 1997 investment of $6.7 million in eBay for 22.1% of the company. In 2011, it invested $12 mill ...
'', ''Stata Ventures'' and ''
Juniper Networks Juniper Networks, Inc. is an American multinational corporation headquartered in Sunnyvale, California. The company develops and markets networking products, including routers, switches, network management software, network security products, ...
''.Benchmark Series A Investment
Series C Financing


Hedgehog Database Security Suite

Hedgehog is a family of products providing
vulnerability assessment A vulnerability assessment is the process of identifying, quantifying, and prioritizing (or ranking) the vulnerabilities in a system. Examples of systems for which vulnerability assessments are performed include, but are not limited to, informatio ...
and
database activity monitoring Database activity monitoring (DAM, a.k.a. Enterprise database auditing and Real-time protection) is a database security technology for monitoring and analyzing database activity. DAM may combine data from network-based monitoring and native audit ...
for the purposes of reducing the risks of a data breach and meeting compliance regulations related to sensitive data. Hedgehog allows customers to protect databases such as
Oracle An oracle is a person or agency considered to provide wise and insightful counsel or prophetic predictions, most notably including precognition of the future, inspired by deities. As such, it is a form of divination. Description The word '' ...
,
Microsoft SQL Server Microsoft SQL Server is a relational database management system developed by Microsoft. As a database server, it is a software product with the primary function of storing and retrieving data as requested by other software applications—which ma ...
, and
Sybase Sybase, Inc. was an enterprise software and services company. The company produced software to manage and analyze information in relational databases, with facilities located in California and Massachusetts. Sybase was acquired by SAP in 2010; ...
, without interfering with their day-to-day operations.


Hedgehog Enterprise Database Activity Monitoring

The company's primary product, introduced in 2007, Hedgehog Enterprise provides the core monitoring capability based on a sensor and server model. The sensor resides on the database server's OS and monitors the memory/cache for suspect database transactions, sending alerts in real-time to the management console. Thus, unlike network-based or host-based intrusion detection systems (IDS) or intrusion prevention systems (IPS), Hedgehog can fully monitor databases running on
Virtual Machines In computing, a virtual machine (VM) is the virtualization/emulation of a computer system. Virtual machines are based on computer architectures and provide functionality of a physical computer. Their implementations may involve specialized hardw ...
or even in the
cloud In meteorology, a cloud is an aerosol consisting of a visible mass of miniature liquid droplets, frozen crystals, or other particles suspended in the atmosphere of a planetary body or similar space. Water or various other chemicals may co ...
. The server is a Java-based application that communicates with the sensors and can centrally monitor hundreds of databases. Based on a set of policies and rules, the system can audit, alert on, or suspend sessions that violate preset conditions.


Hedgehog DBscanner

Announced in September, 2010, Hedgehog DBscanner is an enterprise vulnerability assessment solution for databases. It includes capabilities for automatically finding databases on the network, and then subjects them to more than 3,000 different security checks. Reports provide details on discovered vulnerabilities such as the current patch level, weak passwords, shared accounts, configuration errors, and insecure database code. DBscanner can be implemented along with Hedgehog Enterprise, in which case it shares a common management console, or can be run as a standalone module.


Hedgehog vPatch

vPatch, is a solution for "virtual patching" of databases to overcome the problem that many customers are unable to apply security patches to their databases in a timely manner.Many Oracle Users Don't Apply Security Patches
by Charles Babcock, ''Information Week'', January 14, 2008
This may be due to the inability to schedule downtime for a production system, the time lag for testing / 3rd party support for applications on top of the database, or numerous other reasons. Sentrigo vPatch includes a set of rules which generate alerts when known vulnerabilities are exploited, and can be used to terminate attackers' database sessions. vPatch rules are updated on a frequent basis as new security updates are issued by the DBMS vendor, or as new vulnerabilities are discovered by Sentrigo's research team or partners.


Hedgehog IDentifier

A common practice in developing applications (and web applications in particular) is the use of fat database accounts (common schema) and pooled connections to enhance application performance. Using this approach raises a problem with full end-to-end user tracking in the database layer. The database is unable to see end-user details like username and IP address, only seeing the application server IP and the common schema account. Hedgehog IDentifier solves this problem by providing an application server plug-in that captures end-user information and transparently propagates it to the database tier by using standard database APIs. No application changes are required. IDentifier supports custom
Java Java (; id, Jawa, ; jv, ꦗꦮ; su, ) is one of the Greater Sunda Islands in Indonesia. It is bordered by the Indian Ocean to the south and the Java Sea to the north. With a population of 151.6 million people, Java is the world's List ...
and .NET applications as well as all the major business applications. Some technical details are available in this blog entry.First entry in a 3 posts series about implementing IDentifier
/ref>


FuzzOr

FuzzOr (fuzzer for Oracle) is an open source software tool developed by Sentrigo. FuzzOr provides database administrators and programmers with the ability to test PL/SQL code for security vulnerabilities. The tool discovers vulnerabilities by attempting to exploit the code and is particularly helpful in finding
SQL Injection In computing, SQL injection is a code injection technique used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker). SQL inj ...
and
Buffer Overflow In information security and programming, a buffer overflow, or buffer overrun, is an anomaly whereby a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory locations. Buffers are areas of memory ...
vulnerabilities. Sentrigo provides the tool free of charge.


References

{{Reflist


External links


Official SiteMusings on Database Security by Slavik Markovich
Defunct software companies of the United States Companies based in Santa Clara, California Computer security software companies Software companies of Israel