Database activity monitoring and vulnerability assessment

Sentrigo released Hedgehog Enterprise 4.1, a fully integrated database activity monitoring and vulnerability assessment solution.

Hedgehog DBscanner now conducts checks for nearly 4,000 potential weaknesses, including tests for operating system-level configuration aimed at identifying potential vulnerabilities that stem from the installation and setup of the database management systems, and not necessarily from the DBMS software itself. These OS-level checks further automate the process of achieving compliance for key security benchmarks.

To assist organizations in identifying which databases across the enterprise contain sensitive data, the data discovery functionality of Hedgehog DBscanner has also been extended to allow customers to define their own criteria for pattern matching (for example, social security, credit card or custom account number formats), and provides the ability to flexibly control the sampling and thresholds for evaluating database content against discovery rules.

The Hedgehog Enterprise database security suite also includes the ability to automatically scan networks to discover databases. To speed initial setup for those customers who already maintain a complete list of all databases in their organization, the new version allows immediate loading of all database configuration information and metadata in a single click. Once the import is completed, network scanning will then identify any missed, new or rogue databases that are found.

To protect from misuse by authorized users, Hedgehog Enterprise introduces the ability to monitor value changes by recording the values before and after a transaction. While authorized users may have privileges to update database records, being able to see precisely what was changed can assist auditors in determining if a change was appropriate.

Details of who made a change, at what time, and using which application, are now displayed along with the values both before and after the update.




Share this