Sentrigo, Inc. is a recognized innovator in database security. The company's Hedgehog software provides full-visibility database activity monitoring and real-time protection and has been rapidly adopted by Global 2000 companies and small/midsize enterprises to defend mission-critical data against insider misuse as well as outsider intrusion. Organizations across industry sectors, including telecommunications, life sciences, financial services, and more, are also using Sentrigo Hedgehog to accelerate compliance with regulatory requirements such as PCI DSS, Sarbanes-Oxley and HIPAA. Sentrigo has won wide acclaim for its industry and technology leadership by publications such as Network World and SC Magazine.

Our Website:

Latest Content From Sentrigo

Whitepaper: Database Security in Virtualization and Cloud Computing Environments

by SentrigoApr 09, 2010

Cloud Computing and Virtual Datacenters present unique challenges when it comes to securing sensitive data.��The benefits of these new architectures are clear, including: the ability to share resources through server consolidation, quickly scale up (and down) capacity based on changing needs, and to flexibly update servers without impacting production.

Less hardware can lower costs, and even mean a greener datacenter. However, the combination of dynamic system resources, complex network topology, and lack of control over privileged users, means that the way you implement database security is critical to meeting regulatory requirements.

In this technical whitepaper, you'll learn:
• The 3 Technology Challenges when protecting data in virtual environments
• What to look for in a Database Activity Monitoring solution for public / private clouds
• How a distributed monitoring architecture best fits these modern IT environments

Whitepaper: Database Security For Virtualization And Cloud Computing Environments

by SentrigoFeb 26, 2010

Running your database in a virtual environment, or even in the cloud, presents some unique challenges for database security. The benefits of virtualization are clear, including: the ability to share resources through server consolidation, quickly scale up (and down) capacity based on changing needs, and to flexibly update servers without impacting production. Less hardware can even mean a greener data center. But, this flexibility results in a much less static environment that must be carefully monitored to ensure that sensitive data is always protected. It is much harder to consistently monitor a database server, when it may in fact be on a different piece of hardware (or running across multiple physical servers), potentially spanning different network segments each day. In most virtual environments, additional VMs for the database are provisioned on demand to meet capacity requirements, and often move over the course of a day to balance workload.

Podcast: Podcast: EXPERT SERIES -- Charlie Le Grand on Accountability and Authorization Objectives

by SentrigoNov 08, 2009

Charlie Le Grand, the former CIO of The Institute of Internal Auditors Research Foundation, discusses how auditors and IT professionals need to work together to go beyond internal controls and perimeter security to minimize risk. (22 minutes in MP3 format).

Whitepaper: PCI DSS: Protecting Credit Card Data from Privileged Users

by SentrigoSep 01, 2009

Compliance with PCI DSS requires controls to protect cardholder data, both from external hackers and privileged insiders. This solution brief discusses how Database Activity Monitoring can help organizations meet the latest specification, and easily demonstrate compliance to auditors.

Whitepaper: Sarbanes-Oxley: Meeting Compliance Requirements for Database Security

by SentrigoSep 01, 2009

Is there a gaping hole in your SARBOX strategy? Your most sensitive information is stored in your databases, and yet your DBA�s are likely able to access any of this data undetected to perform their jobs. This paper discusses alternatives for detecting and preventing unauthorized access.

Whitepaper: Practical Guide to Database Security

by SentrigoSep 01, 2009

Every week it seems another breach is announced, with significant ramifications for the company in terms of liability and reputation. This guide outlines the five principles � and the 5 first steps � every organization should follow to protect valuable data from external and insider threats.