{"id":33862,"date":"2024-07-11T11:00:00","date_gmt":"2024-07-11T09:00:00","guid":{"rendered":"https:\/\/www.dbi-services.com\/blog\/?p=33862"},"modified":"2024-07-14T10:43:36","modified_gmt":"2024-07-14T08:43:36","slug":"data-masking-with-delphix-continuous-compliance","status":"publish","type":"post","link":"https:\/\/www.dbi-services.com\/blog\/data-masking-with-delphix-continuous-compliance\/","title":{"rendered":"Data Masking with Delphix Continuous Compliance"},"content":{"rendered":"<div class=\"wp-block-image is-style-rounded\">\n<figure class=\"alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"http:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/delphix_logo.jpg\" alt=\"Delphix Logo\" class=\"wp-image-33905\" style=\"width:80px;height:auto\" srcset=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/delphix_logo.jpg 200w, https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/delphix_logo-150x150.jpg 150w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\" id=\"h-solution-overview\">Solution Overview<\/h2>\n\n\n\n<p class=\"has-text-align-left\">The DevOps Data Platform Continuous Compliance solution of <a href=\"#h-about-delphix\">Delphix<\/a> provides a comprehensive approach to data masking. It meets enterprise-class performance, scalability, and security requirements. <!--more--> Delphix enables businesses to successfully protect sensitive data through these key steps:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-discover-sensitive-data\"><strong>Discover: Sensitive Data<\/strong><\/h3>\n\n\n\n<p>Identify sensitive information such as names, email addresses, and payment information to provide an enterprise-wide view of risk and to pinpoint targets for masking.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-mask-continuous-compliance\"><strong>Mask: Continuous Compliance<\/strong><\/h3>\n\n\n\n<p>Apply masking to transform sensitive data values into fictitious yet realistic equivalents, while still preserving the business value and referential integrity of the data for use cases such as development and testing. Unlike approaches that leverage encryption, masking not only ensures that transformed data is still usable in non-production environments, but also entails an irreversible process. It prevents original data from being restored through decryption keys or other means (conforming with GDPR, CCPA, HIPAA and many other standards).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-provision-scaling-and-integration\"><strong>Provision: Scaling and Integration<\/strong><\/h3>\n\n\n\n<p>Extend the solution to meet enterprise security requirements and integrate into critical workflows.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"438\" src=\"http:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/ComplianceManagement-e1720523838138-1024x438.png\" alt=\"Three stages of data masking process with Delphix Continous Compliance\" class=\"wp-image-33878\" srcset=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/ComplianceManagement-e1720523838138-1024x438.png 1024w, https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/ComplianceManagement-e1720523838138-300x128.png 300w, https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/ComplianceManagement-e1720523838138-768x328.png 768w, https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/ComplianceManagement-e1720523838138-1536x656.png 1536w, https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/ComplianceManagement-e1720523838138.png 1701w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Taken together, these capabilities allow you to define, manage, and apply security policies from a single point of control across large, complex data estates. Delphix can enable global operations with support for international addresses and character sets. Moreover, you would be surprised how quickly Delphix masking is configured and deployed. This is provided via GUI-driven workflows without requiring any specialized programming expertise or lengthy services engagements.<\/p>\n\n\n\n<p>I personally rate this platform as a very effective solution to anonymize large data volumes and to maintain the automated setup of it. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-discover-sensitive-data-0\">Discover Sensitive Data<\/h2>\n\n\n\n<p>After connecting to a supported data source, Delphix identifies what data should be secured. Sensitive data discovery is performed using two different methods, column level discovery and data level discovery:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"480\" height=\"340\" src=\"http:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/masking_databasedpx_.svg\" alt=\"Database structure with sensitive content identified for data masking\" class=\"wp-image-33887\" style=\"aspect-ratio:1;width:223px;height:auto\" \/><\/figure>\n<\/div>\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Column Level Discovery<\/strong><br>Column level discovery uses regular expressions (regex) to scan the metadata (column names) of the selected data sources. There are several dozen pre-configured profile expressions designed to identify common sensitive data types (Social Security numbers, names, addresses, etc). Users also have the ability to write their own profile regular expressions.<br><br><code><strong>Example<\/strong><br>First Name Expression &lt;(?&gt;(fi?rst)<em>?(na?me?)|f<\/em>?name)(?!\\w*ID)&gt;<\/code><\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Data Level Discovery<\/strong><br>Data level discovery also uses regex, but to scan the actual data instead of the metadata. Similar to column level profiling, there are several dozen pre-configured expressions and users can add their own.<br><br><code><strong>Example<\/strong> <\/code><br><code>US Phone No. Expression &lt; (((?\\b[0-9]{3})?[-. ]?[0-9]{3}[-. ]?[0-9]{4}\\b)(?<\/code>&#8230;<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large is-style-default\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"691\" src=\"http:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/FindSensitiveData-1024x691.png\" alt=\"Transformation of the original data to masked data with Delphix Continuous Compliance\" class=\"wp-image-33871\" srcset=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/FindSensitiveData-1024x691.png 1024w, https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/FindSensitiveData-300x202.png 300w, https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/FindSensitiveData-768x518.png 768w, https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/FindSensitiveData.png 1153w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Delphix comes prepackaged with over 90 profile expressions. They have been developed after validation with dozens of very large customers around the world to help businesses discovering over 25 types (account numbers, addresses, names, etc.) of sensitive data using both column and data level discovery.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-securing-sensitive-data\">Securing Sensitive Data<\/h2>\n\n\n\n<p>Delphix\u2019s primary method for securing data is masking. Masking algorithms create a structurally similar but fictitious version of data. It can be used for purposes such as application development and testing. Masking protects the actual sensitive information while generating a functional substitute for occasions when the real data is not required.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Delphix Masking \u2013 Is Irreversible<\/strong><br>Masked data cannot be \u201creverse engineered\u201d and restored to its original unmasked state.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Creates Results Representative of the Source Data<\/strong><br>The output of Delphix masking resembles production data for non-production purposes. This could include geographic distributions, credit card distributions (e.g. leaving the first 4 numbers unchanged, but scrambling the rest), or maintaining human readability of (fake) names and addresses.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Preserves Referential Integrity<\/strong><br>Delphix has the ability to mask data consistently to maintain referential integrity. If an account number is a primary key and scrambled as part of masking, then all instances of that account number linked through key pairs will be masked identically. Additionally, the Delphix platform scales horizontally so that masking algorithms will preserve referential integrity across multiple, heterogeneous data sources.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-mask-or-tokenize\">Mask or Tokenize<\/h2>\n\n\n\n<p>Transform sensitive data to comply with privacy regulations in two ways:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Irreversibly <strong>mask data<\/strong> for non-production environments &#8211; or &#8211;<\/li>\n\n\n\n<li><strong>Tokenize data<\/strong> to enable teams to reverse transformation<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-key-benefits\">Key benefits<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Single solution for both masking and tokenization<\/li>\n\n\n\n<li>Masking completely and irreversibly neutralizes compliance risks in non-production environments<\/li>\n\n\n\n<li>Tokenization enables use cases requiring secure collaboration with third parties<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"783\" src=\"http:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/Masking-Tokenisation-1024x783.png\" alt=\"Compare Masking vs. Tokinization with Delphix Continuous Compliance\" class=\"wp-image-33874\" srcset=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/Masking-Tokenisation-1024x783.png 1024w, https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/Masking-Tokenisation-300x229.png 300w, https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/Masking-Tokenisation-768x587.png 768w, https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/Masking-Tokenisation.png 1074w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-2-examples-of-predefined-algorithms\">2 Examples of Predefined Algorithms<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-date-shift-framework\">Date Shift Framework<\/h3>\n\n\n\n<p>This algorithm masks date values to different dates based on a specified range around the input value. Masked values are calculated algorithmically using the algorithm\u2018s key, so rekeying the algorithm will cause different outputs to be generated for each input. All valid input values will be masked to a new value, and the new value will never match the input.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-style-default\"><img loading=\"lazy\" decoding=\"async\" width=\"992\" height=\"210\" src=\"http:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/Date-Shift-Framework.png\" alt=\"Example Algorithm for Date Shift Framework\" class=\"wp-image-33870\" srcset=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/Date-Shift-Framework.png 992w, https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/Date-Shift-Framework-300x64.png 300w, https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/Date-Shift-Framework-768x163.png 768w\" sizes=\"auto, (max-width: 992px) 100vw, 992px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-segment-mapping-algorithm-framework\">Segment Mapping Algorithm Framework<\/h3>\n\n\n\n<p>Segment mapping algorithms produce no overlaps or repetitions in the masked data. They let users create unique masked values by dividing a target value into a maximum of 36 segments and masking each segment individually. Businesses might use this method for information involving unique values, such as Social Security numbers, primary key columns, or foreign key columns. Segment mapping handles strings of a known format and preserves referential integrity.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"980\" height=\"360\" src=\"http:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/Segment-Mapping-Algorithm-Framework.png\" alt=\"Example Algorithm for Segment Mapping Algorithm Framework\" class=\"wp-image-33877\" srcset=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/Segment-Mapping-Algorithm-Framework.png 980w, https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/Segment-Mapping-Algorithm-Framework-300x110.png 300w, https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/Segment-Mapping-Algorithm-Framework-768x282.png 768w\" sizes=\"auto, (max-width: 980px) 100vw, 980px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-executing-masking-jobs\">Executing Masking Jobs<\/h2>\n\n\n\n<p>Masking jobs are created via a GUI-driven workflow. The user selects a target database, algorithms to use based on profiling results and resources allocated to the job. Optionally, SQL statements could be run before or\/and after execution of the job. <br>Delphix can process and output masked data values in two different ways:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-in-place-masking-same-database\">In-Place Masking (same Database)<\/h3>\n\n\n\n<p>An instance of Delphix Continuous Compliance will read data from a source, secure the data within the engine and then update the data source with the secure data. In-place masking only transforms the columns flagged as containing sensitive information, leaving the other columns alone. Since this method potentially requires copying production data into a non-production zone while the masking takes place, sensitive data might exist in the non-production zone until the masking is complete.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-style-default\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"270\" src=\"http:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/InplaceMasking-1024x270.png\" alt=\"Logical Process of In-Place Masking\" class=\"wp-image-33873\" srcset=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/InplaceMasking-1024x270.png 1024w, https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/InplaceMasking-300x79.png 300w, https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/InplaceMasking-768x202.png 768w, https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/InplaceMasking.png 1263w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-on-the-fly-masking-2-databases\">On-the-Fly Masking (2 Databases)<\/h3>\n\n\n\n<p>Delphix reads data from the data source, secures the data in the engine and then places the secure data in a target source (different from the location of the original data source) in an Extract Transform Load (ETL) process. Delphix extracts the data from a source environment, such as a production copy, gold copy, or disaster recovery copy (only reading from a database not an archived file). It masks the data in the memory of the application server on which it resides and then loads the masked data to the target environment. Delphix does not modify the original source data; only the target data changes.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-style-default\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"200\" src=\"http:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/OnTheFlyMasking-1024x200.png\" alt=\"Logical Process of On-the-Fly Masking\" class=\"wp-image-33875\" srcset=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/OnTheFlyMasking-1024x200.png 1024w, https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/OnTheFlyMasking-300x59.png 300w, https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/OnTheFlyMasking-768x150.png 768w, https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/OnTheFlyMasking.png 1191w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-performance-of-delphix-continuous-compliance\">Performance of Delphix Continuous Compliance<\/h2>\n\n\n\n<p>Key variables that influence masking performance are the number of tables to be masked, rows per table, columns per table, masking algorithm per column, data type, avg size per column, as well as indexes, constraints, and triggers on the masked table. But also the connected platforms (on-premise \/ cloud) are important as the assigned resources will limit the data throughput of the whole masking process.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-steps-to-reach-compliance-with-data-masking\">Steps to Reach Compliance with Data Masking<\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<ol class=\"wp-block-list\">\n<li><strong>Execute Profiling Jobs<\/strong><br>Automatically identifies the most cases of sensitive data fields by analysing database structure names and pattern matching of the field content.<br><\/li>\n\n\n\n<li><strong>Adapt masking<\/strong><br>While the predefined out-of-the-box algorithms are useful in many cases, you will have special masking needs for some of your database columns, which have to be adapted after the automated recognition.<br><\/li>\n\n\n\n<li><strong>Execute Masking Jobs<\/strong><br>Transformation from original to masked data: the final masking process replaces same names allways with the same fictitious strings on all data spaces (in this example &#8220;George&#8221; becomes &#8220;Bob&#8221; all over).<br><img loading=\"lazy\" decoding=\"async\" width=\"1963\" height=\"1078\" class=\"wp-image-33883\" style=\"width: 700px\" src=\"http:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/masking_referental_integritydpx_.png\" alt=\"\" srcset=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/masking_referental_integritydpx_.png 1963w, https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/masking_referental_integritydpx_-300x165.png 300w, https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/masking_referental_integritydpx_-1024x562.png 1024w, https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/masking_referental_integritydpx_-768x422.png 768w, https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/masking_referental_integritydpx_-1536x844.png 1536w\" sizes=\"auto, (max-width: 1963px) 100vw, 1963px\" \/><\/li>\n\n\n\n<li><strong>Test the masked data with your Application<\/strong><br>Make sure that your application is still able to access the datebase without error although the relevant fields have been masked.<\/li>\n<\/ol>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-summary-of-delphix-continuous-compliance\">Summary of Delphix Continuous Compliance<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-fast-and-automated-masking\"><strong>Fast and Automated Masking<\/strong><\/h3>\n\n\n\n<p><a href=\"https:\/\/www.delphix.com\/platform\/continuous-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">Delphix Continuous Compliance<\/a> identifies sensitive information and automates data masking wherever data resides \u2014 from mainframes to modern cloud platforms. Unlike traditional solutions which take months to implement, <a href=\"https:\/\/www.dbi-services.com\" target=\"_blank\" rel=\"noreferrer noopener\">dbi services<\/a> implements Continuous Compliance for their customers within days. \ud83d\udc4d<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-combine-speed-and-compliance\"><strong>Combine Speed and Compliance<\/strong><\/h3>\n\n\n\n<p>Delphix provides an API-driven data platform to configure all data masking needs. Continuous Compliance includes data profiling to identify PII or sensitive data and templates to automatically mask or tokenize data. Delphix masking replaces data at risk with fictitious data while preserving referential integrity.<\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"wp-block-image is-style-rounded\">\n<figure class=\"alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"http:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/delphix_logo.jpg\" alt=\"Delphix Logo\" class=\"wp-image-33905\" style=\"width:179px;height:auto\" srcset=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/delphix_logo.jpg 200w, https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/delphix_logo-150x150.jpg 150w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading has-pale-cyan-blue-background-color has-background\" id=\"h-about-delphix\">About Delphix<\/h2>\n\n\n\n<p>Delphix is the industry leader for DevOps test data management. Businesses need to transform application delivery but struggle to balance speed with data security and compliance. Their DevOps Data Platform automates data security, while rapidly deploying test data to accelerate application releases. With Delphix, customers modernize applications, adopt multi-cloud, achieve CI\/CD, and recover from downtime events such as ransomware much faster.<br><br>Leading companies around the world use Delphix to accelerate digital transformation and enable zero trust data management.<\/p>\n\n\n\n<p class=\"has-text-align-right\"><a href=\"https:\/\/www.delphix.com\">https:\/\/www.delphix.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Solution Overview The DevOps Data Platform Continuous Compliance solution of Delphix provides a comprehensive approach to data masking. It meets enterprise-class performance, scalability, and security requirements.<\/p>\n","protected":false},"author":111,"featured_media":33869,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3402,1320,48],"tags":[3403,3399,494],"type_dbi":[3401,3400],"class_list":["post-33862","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-delphix","category-devops","category-technology-survey","tag-continuous-compliance","tag-data-masking","tag-delphix","type-data-masking","type-delphix"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Data Masking with Delphix Continuous Compliance - dbi Blog<\/title>\n<meta name=\"description\" content=\"Delphix Continuous Compliance identifies your sensitive information and automates data masking for you on any platform.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dbi-services.com\/blog\/data-masking-with-delphix-continuous-compliance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Masking with Delphix Continuous Compliance\" \/>\n<meta property=\"og:description\" content=\"Delphix Continuous Compliance identifies your sensitive information and automates data masking for you on any platform.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dbi-services.com\/blog\/data-masking-with-delphix-continuous-compliance\/\" \/>\n<meta property=\"og:site_name\" content=\"dbi Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-11T09:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-14T08:43:36+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/Masking.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Oliver Schwark\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Oliver Schwark\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/data-masking-with-delphix-continuous-compliance\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/data-masking-with-delphix-continuous-compliance\/\"},\"author\":{\"name\":\"Oliver Schwark\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/89cd62d9f9d736e0a347c558b806c70e\"},\"headline\":\"Data Masking with Delphix Continuous Compliance\",\"datePublished\":\"2024-07-11T09:00:00+00:00\",\"dateModified\":\"2024-07-14T08:43:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/data-masking-with-delphix-continuous-compliance\/\"},\"wordCount\":1420,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/data-masking-with-delphix-continuous-compliance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/Masking.png\",\"keywords\":[\"Continuous Compliance\",\"data masking\",\"delphix\"],\"articleSection\":[\"Delphix\",\"DevOps\",\"Technology Survey\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.dbi-services.com\/blog\/data-masking-with-delphix-continuous-compliance\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/data-masking-with-delphix-continuous-compliance\/\",\"url\":\"https:\/\/www.dbi-services.com\/blog\/data-masking-with-delphix-continuous-compliance\/\",\"name\":\"Data Masking with Delphix Continuous Compliance - dbi Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/data-masking-with-delphix-continuous-compliance\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/data-masking-with-delphix-continuous-compliance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/Masking.png\",\"datePublished\":\"2024-07-11T09:00:00+00:00\",\"dateModified\":\"2024-07-14T08:43:36+00:00\",\"author\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/89cd62d9f9d736e0a347c558b806c70e\"},\"description\":\"Delphix Continuous Compliance identifies your sensitive information and automates data masking for you on any platform.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/data-masking-with-delphix-continuous-compliance\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.dbi-services.com\/blog\/data-masking-with-delphix-continuous-compliance\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/data-masking-with-delphix-continuous-compliance\/#primaryimage\",\"url\":\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/Masking.png\",\"contentUrl\":\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/Masking.png\",\"width\":1080,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/data-masking-with-delphix-continuous-compliance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.dbi-services.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Masking with Delphix Continuous Compliance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/#website\",\"url\":\"https:\/\/www.dbi-services.com\/blog\/\",\"name\":\"dbi Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.dbi-services.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/89cd62d9f9d736e0a347c558b806c70e\",\"name\":\"Oliver Schwark\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/80f710482a5b33c0c4dd76b8404d0e152bfccca1fa8b236cf82b0bdeb454a377?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/80f710482a5b33c0c4dd76b8404d0e152bfccca1fa8b236cf82b0bdeb454a377?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/80f710482a5b33c0c4dd76b8404d0e152bfccca1fa8b236cf82b0bdeb454a377?s=96&d=mm&r=g\",\"caption\":\"Oliver Schwark\"},\"url\":\"https:\/\/www.dbi-services.com\/blog\/author\/oliverschwark\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Data Masking with Delphix Continuous Compliance - dbi Blog","description":"Delphix Continuous Compliance identifies your sensitive information and automates data masking for you on any platform.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dbi-services.com\/blog\/data-masking-with-delphix-continuous-compliance\/","og_locale":"en_US","og_type":"article","og_title":"Data Masking with Delphix Continuous Compliance","og_description":"Delphix Continuous Compliance identifies your sensitive information and automates data masking for you on any platform.","og_url":"https:\/\/www.dbi-services.com\/blog\/data-masking-with-delphix-continuous-compliance\/","og_site_name":"dbi Blog","article_published_time":"2024-07-11T09:00:00+00:00","article_modified_time":"2024-07-14T08:43:36+00:00","og_image":[{"width":1080,"height":1080,"url":"http:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/Masking.png","type":"image\/png"}],"author":"Oliver Schwark","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Oliver Schwark","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dbi-services.com\/blog\/data-masking-with-delphix-continuous-compliance\/#article","isPartOf":{"@id":"https:\/\/www.dbi-services.com\/blog\/data-masking-with-delphix-continuous-compliance\/"},"author":{"name":"Oliver Schwark","@id":"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/89cd62d9f9d736e0a347c558b806c70e"},"headline":"Data Masking with Delphix Continuous Compliance","datePublished":"2024-07-11T09:00:00+00:00","dateModified":"2024-07-14T08:43:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dbi-services.com\/blog\/data-masking-with-delphix-continuous-compliance\/"},"wordCount":1420,"commentCount":0,"image":{"@id":"https:\/\/www.dbi-services.com\/blog\/data-masking-with-delphix-continuous-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/Masking.png","keywords":["Continuous Compliance","data masking","delphix"],"articleSection":["Delphix","DevOps","Technology Survey"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.dbi-services.com\/blog\/data-masking-with-delphix-continuous-compliance\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.dbi-services.com\/blog\/data-masking-with-delphix-continuous-compliance\/","url":"https:\/\/www.dbi-services.com\/blog\/data-masking-with-delphix-continuous-compliance\/","name":"Data Masking with Delphix Continuous Compliance - dbi Blog","isPartOf":{"@id":"https:\/\/www.dbi-services.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dbi-services.com\/blog\/data-masking-with-delphix-continuous-compliance\/#primaryimage"},"image":{"@id":"https:\/\/www.dbi-services.com\/blog\/data-masking-with-delphix-continuous-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/Masking.png","datePublished":"2024-07-11T09:00:00+00:00","dateModified":"2024-07-14T08:43:36+00:00","author":{"@id":"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/89cd62d9f9d736e0a347c558b806c70e"},"description":"Delphix Continuous Compliance identifies your sensitive information and automates data masking for you on any platform.","breadcrumb":{"@id":"https:\/\/www.dbi-services.com\/blog\/data-masking-with-delphix-continuous-compliance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dbi-services.com\/blog\/data-masking-with-delphix-continuous-compliance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.dbi-services.com\/blog\/data-masking-with-delphix-continuous-compliance\/#primaryimage","url":"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/Masking.png","contentUrl":"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/07\/Masking.png","width":1080,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.dbi-services.com\/blog\/data-masking-with-delphix-continuous-compliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.dbi-services.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Data Masking with Delphix Continuous Compliance"}]},{"@type":"WebSite","@id":"https:\/\/www.dbi-services.com\/blog\/#website","url":"https:\/\/www.dbi-services.com\/blog\/","name":"dbi Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dbi-services.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/89cd62d9f9d736e0a347c558b806c70e","name":"Oliver Schwark","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/80f710482a5b33c0c4dd76b8404d0e152bfccca1fa8b236cf82b0bdeb454a377?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/80f710482a5b33c0c4dd76b8404d0e152bfccca1fa8b236cf82b0bdeb454a377?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/80f710482a5b33c0c4dd76b8404d0e152bfccca1fa8b236cf82b0bdeb454a377?s=96&d=mm&r=g","caption":"Oliver Schwark"},"url":"https:\/\/www.dbi-services.com\/blog\/author\/oliverschwark\/"}]}},"_links":{"self":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/posts\/33862","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/users\/111"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/comments?post=33862"}],"version-history":[{"count":54,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/posts\/33862\/revisions"}],"predecessor-version":[{"id":33976,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/posts\/33862\/revisions\/33976"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/media\/33869"}],"wp:attachment":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/media?parent=33862"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/categories?post=33862"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/tags?post=33862"},{"taxonomy":"type","embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/type_dbi?post=33862"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}