{"id":37343,"date":"2025-02-20T16:55:44","date_gmt":"2025-02-20T15:55:44","guid":{"rendered":"https:\/\/www.dbi-services.com\/blog\/?p=37343"},"modified":"2025-02-21T12:27:23","modified_gmt":"2025-02-21T11:27:23","slug":"delphix-data-virtualization-and-masking","status":"publish","type":"post","link":"https:\/\/www.dbi-services.com\/blog\/delphix-data-virtualization-and-masking\/","title":{"rendered":"Delphix Data Virtualization and Masking"},"content":{"rendered":"\n<p>After successfully completing several customer projects involving Delphix products,<strong> Data Virtualization <\/strong> and <strong>Data Masking<\/strong>, I decided to set up a complete infrastructure internally to test the combination of both products.<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/www.delphix.com\/platform\/continuous-data\">Delphix Data Virtualization<\/a><\/strong> Creates only a virtual copy of your database blocks instead of a full physical copy. For example this allows making a new big database available only in a few seconds.<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/www.delphix.com\/platform\/continuous-compliance\">Delphix Data Masking<\/a><\/strong> Protects sensitive data by replacing it with <strong>realistic but non-sensitive<\/strong> values, ensuring compliance with <strong>privacy regulations<\/strong> while maintaining data usability for development, testing, and analytics. For reference, dbi-services has developed Swiss masking rules for customers to apply all their specific needs.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-setup\"><strong>Setup<\/strong><\/h3>\n\n\n\n<p>As always, setting up the prerequisites took some time, but once the environment was built, it was truly rewarding to demonstrate the combined power of these tools to my colleagues. It&#8217;s a real pleasure, like a game, building database environments in a flash, where the data is directly masked.<\/p>\n\n\n\n<p>This allows you to rapidly provision databases to your internal or external developers, without taking any risk of a data phishing attack!<\/p>\n\n\n\n<p>Watch this video! It&#8217;s only a minute-long and you&#8217;ll see how easy it is! to create a new masked Oracle pluggable database VPDB2_masked on another server (These tasks can also be fully automated in a pipeline using an API)<\/p>\n\n\n\n<figure class=\"wp-block-video\"><video height=\"1080\" style=\"aspect-ratio: 1920 \/ 1080;\" width=\"1920\" autoplay controls loop muted src=\"http:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/02\/Delphix.mp4\" playsinline><\/video><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-relevant-outcomes\"><strong>Relevant outcomes<\/strong> <\/h3>\n\n\n\n<p>The Delphix pricing model is based on the size of your databases, thus you can apply the same Virtualization and Masking capabilities at least for PostgreSQL, SQL Server, and Sybase at no additional cost. Are you interested in making your database development environments fully secure? Don\u2019t wait, dbi    services has your solution!<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-for-those-who-are-interested-in-more-details\"><strong>For those who are interested in more details <\/strong><\/h3>\n\n\n\n<p>1. Table data from the source database PDB1<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-style-default\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"377\" src=\"http:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/02\/Screenshot-2025-02-20-at-15.53.21-1024x377.png\" alt=\"Original data of the table \" class=\"wp-image-37388\" srcset=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/02\/Screenshot-2025-02-20-at-15.53.21-1024x377.png 1024w, https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/02\/Screenshot-2025-02-20-at-15.53.21-300x111.png 300w, https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/02\/Screenshot-2025-02-20-at-15.53.21-768x283.png 768w, https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/02\/Screenshot-2025-02-20-at-15.53.21-1536x566.png 1536w, https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/02\/Screenshot-2025-02-20-at-15.53.21-2048x755.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>2. Table data in the new created and masked virtual database VPDB2_Masked <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"426\" src=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/02\/Screenshot-2025-02-20-at-15.55.24-1024x426.png\" alt=\"masked data table\" class=\"wp-image-37389\" srcset=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/02\/Screenshot-2025-02-20-at-15.55.24-1024x426.png 1024w, https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/02\/Screenshot-2025-02-20-at-15.55.24-300x125.png 300w, https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/02\/Screenshot-2025-02-20-at-15.55.24-768x320.png 768w, https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/02\/Screenshot-2025-02-20-at-15.55.24-1536x640.png 1536w, https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/02\/Screenshot-2025-02-20-at-15.55.24-2048x853.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>   3. Output of the masking job<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"512\" src=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/02\/Screenshot-2025-02-20-at-16.19.13-1024x512.png\" alt=\"output from a masking job\" class=\"wp-image-37391\" srcset=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/02\/Screenshot-2025-02-20-at-16.19.13-1024x512.png 1024w, https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/02\/Screenshot-2025-02-20-at-16.19.13-300x150.png 300w, https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/02\/Screenshot-2025-02-20-at-16.19.13-768x384.png 768w, https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/02\/Screenshot-2025-02-20-at-16.19.13-1536x768.png 1536w, https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/02\/Screenshot-2025-02-20-at-16.19.13.png 1899w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-useful-information-related-to-delphix\"><strong>Useful information related to Delphix<\/strong><\/h3>\n\n\n\n<p>Blog that presents Data Masking in detail<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-dbi-blog wp-block-embed-dbi-blog\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"PSc3ktDQaF\"><a href=\"https:\/\/www.dbi-services.com\/blog\/data-masking-with-delphix-continuous-compliance\/\">Data Masking with Delphix Continuous Compliance<\/a><\/blockquote><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; visibility: hidden;\" title=\"&#8220;Data Masking with Delphix Continuous Compliance&#8221; &#8212; dbi Blog\" src=\"https:\/\/www.dbi-services.com\/blog\/data-masking-with-delphix-continuous-compliance\/embed\/#?secret=s1fPl8S0x3#?secret=PSc3ktDQaF\" data-secret=\"PSc3ktDQaF\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<p>Customer success story <\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-dbi-services wp-block-embed-dbi-services\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"l34mKnQlGt\"><a href=\"https:\/\/www.dbi-services.com\/testimonials\/galenicas-data-security-standards-with-delphix\/\">Galenica&#8217;s data security standards with Delphix<\/a><\/blockquote><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; visibility: hidden;\" title=\"&#8220;Galenica&#8217;s data security standards with Delphix&#8221; &#8212; dbi services\" src=\"https:\/\/www.dbi-services.com\/testimonials\/galenicas-data-security-standards-with-delphix\/embed\/#?secret=Gnu6rNzWLH#?secret=l34mKnQlGt\" data-secret=\"l34mKnQlGt\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<p>Webinar that presents Data Virtualization <\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Delphix - Continuous Data pour Oracle\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/yRv8i5vML7s?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>After successfully completing several customer projects involving Delphix products, Data Virtualization and Data Masking, I decided to set up a complete infrastructure internally to test the combination of both products. Delphix Data Virtualization Creates only a virtual copy of your database blocks instead of a full physical copy. For example this allows making a new [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":37423,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3402,1320,59,83,99],"tags":[1635,280,3548,3547],"type_dbi":[3400,3017,3549,2728,2749],"class_list":["post-37343","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-delphix","category-devops","category-oracle","category-postgresql","category-sql-server","tag-compliance","tag-database","tag-datafishing","tag-masking","type-delphix","type-devops","type-masking","type-oracle","type-postgresql"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Delphix Data Virtualization and Masking - dbi Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dbi-services.com\/blog\/delphix-data-virtualization-and-masking\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Delphix Data Virtualization and Masking\" \/>\n<meta property=\"og:description\" content=\"Delphix Data Virtualization and Masking makes your development team secure\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dbi-services.com\/blog\/delphix-data-virtualization-and-masking\/\" \/>\n<meta property=\"og:site_name\" content=\"dbi Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-20T15:55:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-21T11:27:23+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/02\/Screenshot-2025-02-21-at-12.20.05.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1402\" \/>\n\t<meta property=\"og:image:height\" content=\"860\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Herv\u00e9 Schweitzer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Herv\u00e9 Schweitzer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/delphix-data-virtualization-and-masking\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/delphix-data-virtualization-and-masking\/\"},\"author\":{\"name\":\"Herv\u00e9 Schweitzer\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/7fb08fbefcb9b2c146ef4533cfee00c7\"},\"headline\":\"Delphix Data Virtualization and Masking\",\"datePublished\":\"2025-02-20T15:55:44+00:00\",\"dateModified\":\"2025-02-21T11:27:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/delphix-data-virtualization-and-masking\/\"},\"wordCount\":356,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/delphix-data-virtualization-and-masking\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/02\/Screenshot-2025-02-21-at-12.20.05.png\",\"keywords\":[\"compliance\",\"database\",\"datafishing\",\"masking\"],\"articleSection\":[\"Delphix\",\"DevOps\",\"Oracle\",\"PostgreSQL\",\"SQL Server\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.dbi-services.com\/blog\/delphix-data-virtualization-and-masking\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/delphix-data-virtualization-and-masking\/\",\"url\":\"https:\/\/www.dbi-services.com\/blog\/delphix-data-virtualization-and-masking\/\",\"name\":\"Delphix Data Virtualization and Masking - dbi Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/delphix-data-virtualization-and-masking\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/delphix-data-virtualization-and-masking\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/02\/Screenshot-2025-02-21-at-12.20.05.png\",\"datePublished\":\"2025-02-20T15:55:44+00:00\",\"dateModified\":\"2025-02-21T11:27:23+00:00\",\"author\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/7fb08fbefcb9b2c146ef4533cfee00c7\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/delphix-data-virtualization-and-masking\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.dbi-services.com\/blog\/delphix-data-virtualization-and-masking\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/delphix-data-virtualization-and-masking\/#primaryimage\",\"url\":\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/02\/Screenshot-2025-02-21-at-12.20.05.png\",\"contentUrl\":\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/02\/Screenshot-2025-02-21-at-12.20.05.png\",\"width\":1402,\"height\":860},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/delphix-data-virtualization-and-masking\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.dbi-services.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Delphix Data Virtualization and Masking\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/#website\",\"url\":\"https:\/\/www.dbi-services.com\/blog\/\",\"name\":\"dbi Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.dbi-services.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/7fb08fbefcb9b2c146ef4533cfee00c7\",\"name\":\"Herv\u00e9 Schweitzer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/0730552c0cfc0a9297c56f2efe56dadd8de399885ca6161a2bee83aebe291afc?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0730552c0cfc0a9297c56f2efe56dadd8de399885ca6161a2bee83aebe291afc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0730552c0cfc0a9297c56f2efe56dadd8de399885ca6161a2bee83aebe291afc?s=96&d=mm&r=g\",\"caption\":\"Herv\u00e9 Schweitzer\"},\"description\":\"Herv\u00e9 Schweitzer has more than ten years of experience in database and infrastructure management, engineering, and optimization. He is specialized in Oracle technologies such as standardisation, Backup and Recovery, Tuning, and in High Availability solutions such as Oracle Data Guard, Oracle Grid Infrastructure, Oracle Real Application Clusters (RAC), Oracle GoldenGate, and Oracle Failsafe. Herv\u00e9 Schweitzer is \\\"Oracle Certified Master 11g (OCM 11g)\\\". Prior to joining dbi services, Herv\u00e9 Schweitzer was Senior Consultant at Trivadis in Basel. He also worked as an IT Administrator and Oracle DBA at Crossair in Basel. Herv\u00e9 Schweitzer holds a BTS degree in Information Systems from France. His branch-related experience covers Pharma, Transport and Logistics, Banking, Energy, Automotive etc.\",\"url\":\"https:\/\/www.dbi-services.com\/blog\/author\/herve-schweitzer\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Delphix Data Virtualization and Masking - dbi Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dbi-services.com\/blog\/delphix-data-virtualization-and-masking\/","og_locale":"en_US","og_type":"article","og_title":"Delphix Data Virtualization and Masking","og_description":"Delphix Data Virtualization and Masking makes your development team secure","og_url":"https:\/\/www.dbi-services.com\/blog\/delphix-data-virtualization-and-masking\/","og_site_name":"dbi Blog","article_published_time":"2025-02-20T15:55:44+00:00","article_modified_time":"2025-02-21T11:27:23+00:00","og_image":[{"width":1402,"height":860,"url":"http:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/02\/Screenshot-2025-02-21-at-12.20.05.png","type":"image\/png"}],"author":"Herv\u00e9 Schweitzer","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Herv\u00e9 Schweitzer","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dbi-services.com\/blog\/delphix-data-virtualization-and-masking\/#article","isPartOf":{"@id":"https:\/\/www.dbi-services.com\/blog\/delphix-data-virtualization-and-masking\/"},"author":{"name":"Herv\u00e9 Schweitzer","@id":"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/7fb08fbefcb9b2c146ef4533cfee00c7"},"headline":"Delphix Data Virtualization and Masking","datePublished":"2025-02-20T15:55:44+00:00","dateModified":"2025-02-21T11:27:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dbi-services.com\/blog\/delphix-data-virtualization-and-masking\/"},"wordCount":356,"commentCount":0,"image":{"@id":"https:\/\/www.dbi-services.com\/blog\/delphix-data-virtualization-and-masking\/#primaryimage"},"thumbnailUrl":"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/02\/Screenshot-2025-02-21-at-12.20.05.png","keywords":["compliance","database","datafishing","masking"],"articleSection":["Delphix","DevOps","Oracle","PostgreSQL","SQL Server"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.dbi-services.com\/blog\/delphix-data-virtualization-and-masking\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.dbi-services.com\/blog\/delphix-data-virtualization-and-masking\/","url":"https:\/\/www.dbi-services.com\/blog\/delphix-data-virtualization-and-masking\/","name":"Delphix Data Virtualization and Masking - dbi Blog","isPartOf":{"@id":"https:\/\/www.dbi-services.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dbi-services.com\/blog\/delphix-data-virtualization-and-masking\/#primaryimage"},"image":{"@id":"https:\/\/www.dbi-services.com\/blog\/delphix-data-virtualization-and-masking\/#primaryimage"},"thumbnailUrl":"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/02\/Screenshot-2025-02-21-at-12.20.05.png","datePublished":"2025-02-20T15:55:44+00:00","dateModified":"2025-02-21T11:27:23+00:00","author":{"@id":"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/7fb08fbefcb9b2c146ef4533cfee00c7"},"breadcrumb":{"@id":"https:\/\/www.dbi-services.com\/blog\/delphix-data-virtualization-and-masking\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dbi-services.com\/blog\/delphix-data-virtualization-and-masking\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.dbi-services.com\/blog\/delphix-data-virtualization-and-masking\/#primaryimage","url":"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/02\/Screenshot-2025-02-21-at-12.20.05.png","contentUrl":"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/02\/Screenshot-2025-02-21-at-12.20.05.png","width":1402,"height":860},{"@type":"BreadcrumbList","@id":"https:\/\/www.dbi-services.com\/blog\/delphix-data-virtualization-and-masking\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.dbi-services.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Delphix Data Virtualization and Masking"}]},{"@type":"WebSite","@id":"https:\/\/www.dbi-services.com\/blog\/#website","url":"https:\/\/www.dbi-services.com\/blog\/","name":"dbi Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dbi-services.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/7fb08fbefcb9b2c146ef4533cfee00c7","name":"Herv\u00e9 Schweitzer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/0730552c0cfc0a9297c56f2efe56dadd8de399885ca6161a2bee83aebe291afc?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0730552c0cfc0a9297c56f2efe56dadd8de399885ca6161a2bee83aebe291afc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0730552c0cfc0a9297c56f2efe56dadd8de399885ca6161a2bee83aebe291afc?s=96&d=mm&r=g","caption":"Herv\u00e9 Schweitzer"},"description":"Herv\u00e9 Schweitzer has more than ten years of experience in database and infrastructure management, engineering, and optimization. He is specialized in Oracle technologies such as standardisation, Backup and Recovery, Tuning, and in High Availability solutions such as Oracle Data Guard, Oracle Grid Infrastructure, Oracle Real Application Clusters (RAC), Oracle GoldenGate, and Oracle Failsafe. Herv\u00e9 Schweitzer is \"Oracle Certified Master 11g (OCM 11g)\". Prior to joining dbi services, Herv\u00e9 Schweitzer was Senior Consultant at Trivadis in Basel. He also worked as an IT Administrator and Oracle DBA at Crossair in Basel. Herv\u00e9 Schweitzer holds a BTS degree in Information Systems from France. His branch-related experience covers Pharma, Transport and Logistics, Banking, Energy, Automotive etc.","url":"https:\/\/www.dbi-services.com\/blog\/author\/herve-schweitzer\/"}]}},"_links":{"self":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/posts\/37343","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/comments?post=37343"}],"version-history":[{"count":20,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/posts\/37343\/revisions"}],"predecessor-version":[{"id":37412,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/posts\/37343\/revisions\/37412"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/media\/37423"}],"wp:attachment":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/media?parent=37343"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/categories?post=37343"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/tags?post=37343"},{"taxonomy":"type","embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/type_dbi?post=37343"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}