{"id":41856,"date":"2025-12-22T11:43:15","date_gmt":"2025-12-22T10:43:15","guid":{"rendered":"https:\/\/www.dbi-services.com\/blog\/?p=41856"},"modified":"2025-12-22T11:43:17","modified_gmt":"2025-12-22T10:43:17","slug":"data-anonymization-as-a-service-with-delphix-continuous-compliance","status":"publish","type":"post","link":"https:\/\/www.dbi-services.com\/blog\/data-anonymization-as-a-service-with-delphix-continuous-compliance\/","title":{"rendered":"Data Anonymization as a Service with Delphix Continuous Compliance"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-context\">Context<\/h2>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<p>In the era of digital transformation, attack surfaces are constantly evolving and cyberattack techniques are becoming increasingly sophisticated. Maintaining the confidentiality, integrity, and availability of data is therefore a critical challenge for organizations, both from an operational and a regulatory standpoint (GDPR, ISO 27001, NIST). Therefore, data anonymization is crucial today.<\/p>\n\n\n\n<p>Contrary to a widely held belief, the risk is not limited to the production environment. Development, testing, and pre-production environments are prime targets for attackers, as they often benefit from weaker security controls. The use of production data that is neither anonymized nor pseudonymized directly exposes organizations to data breaches, regulatory non-compliance, and legal sanctions.<\/p>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-why-and-how-to-anonymize-data\">Why and How to Anonymize Data<\/h2>\n\n\n\n<p>Development teams require realistic datasets in order to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Test application performance<\/li>\n\n\n\n<li>Validate complex business processes<\/li>\n\n\n\n<li>Reproduce error scenarios<\/li>\n\n\n\n<li>Train Business Intelligence or Machine Learning algorithms<\/li>\n<\/ul>\n\n\n\n<p>However, the use of real data requires the implementation of anonymization or pseudonymization mechanisms ensuring:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Preservation of functional and referential consistency<\/li>\n\n\n\n<li>Prevention of data subject re-identification<\/li>\n<\/ul>\n\n\n\n<p>Among the possible anonymization techniques, the main ones include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Dynamic Data Masking<\/strong>, applied on-the-fly at access time but which does not anonymize data physically<\/li>\n\n\n\n<li><strong>Tokenization<\/strong>, which replaces a value with a surrogate identifier<\/li>\n\n\n\n<li><strong>Cryptographic hashing<\/strong>, with or without salting<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-direct-data-copy-from-production-to-development\">Direct data copy from Production to Development<\/h2>\n\n\n\n<p>In this scenario, a full backup of the production database is restored into a development environment. Anonymization is then applied using manually developed SQL scripts or ETL processes.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"848\" height=\"267\" src=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/12\/image-7.png\" alt=\"\" class=\"wp-image-41868\" style=\"width:592px;height:auto\" srcset=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/12\/image-7.png 848w, https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/12\/image-7-300x94.png 300w, https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/12\/image-7-768x242.png 768w\" sizes=\"auto, (max-width: 848px) 100vw, 848px\" \/><\/figure>\n<\/div>\n\n\n<p>This approach presents several critical weaknesses:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Temporary exposure of personal data in clear text<\/li>\n\n\n\n<li>Lack of formal traceability of anonymization processes<\/li>\n\n\n\n<li>Risk of human error in scripts<\/li>\n\n\n\n<li>Non-compliance with GDPR requirements<\/li>\n<\/ul>\n\n\n\n<p>This model should therefore be avoided in regulated environments.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-data-copy-via-a-staging-database-in-production\">Data copy via a Staging Database in Production<\/h2>\n\n\n\n<p>This model introduces an intermediate staging database located within a security perimeter equivalent to that of production. Anonymization is performed within this secure zone before replication to non-production environments.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"887\" height=\"337\" src=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/12\/image-8.png\" alt=\"\" class=\"wp-image-41869\" style=\"width:621px;height:auto\" srcset=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/12\/image-8.png 887w, https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/12\/image-8-300x114.png 300w, https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/12\/image-8-768x292.png 768w\" sizes=\"auto, (max-width: 887px) 100vw, 887px\" \/><\/figure>\n<\/div>\n\n\n<p>This approach makes it possible to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Ensure that no sensitive data in clear text leaves the secure perimeter<\/li>\n\n\n\n<li>Centralize anonymization rules<\/li>\n\n\n\n<li>Improve overall data governance<\/li>\n<\/ul>\n\n\n\n<p>However, several challenges remain:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Versioning and auditability of transformation rules<\/li>\n\n\n\n<li>Governance of responsibilities between teams (DBAs, security, business units)<\/li>\n\n\n\n<li>Maintaining inter-table referential integrity<\/li>\n\n\n\n<li>Performance management during large-scale anonymization<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-integration-of-delphix-continuous-compliance\">Integration of Delphix Continuous Compliance<\/h2>\n\n\n\n<p>In this architecture, <code><a href=\"https:\/\/cd.delphix.com\/docs\/latest\/overview\">Delphix<\/a><\/code> is integrated as the central engine for data virtualization and anonymization. The <em><a href=\"https:\/\/help.delphix.com\/cc\/\">Continuous Compliance<\/a><\/em> module enables process industrialization through:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>An automated data profiler identifying sensitive fields<\/li>\n\n\n\n<li>Deterministic or non-deterministic anonymization algorithms<\/li>\n\n\n\n<li>Massively parallelized execution<\/li>\n\n\n\n<li>Orchestration via REST APIs integrable into CI\/CD pipelines<\/li>\n\n\n\n<li>Full traceability of processing for audit purposes<\/li>\n<\/ul>\n\n\n\n<p>This approach enables the rapid provisioning of compliant, reproducible, and secure databases for all technical teams.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"915\" height=\"394\" src=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/12\/image-27.png\" alt=\"\" class=\"wp-image-42155\" style=\"aspect-ratio:2.3224468636599274;width:653px;height:auto\" srcset=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/12\/image-27.png 915w, https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/12\/image-27-300x129.png 300w, https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/12\/image-27-768x331.png 768w\" sizes=\"auto, (max-width: 915px) 100vw, 915px\" \/><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\" id=\"h-conclusion\">Conclusion<\/h2>\n\n\n\n<p>Database anonymization should no longer be viewed as a one-time constraint but as a structuring process within the data lifecycle. It is based on three fundamental pillars:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Governance<\/li>\n\n\n\n<li>Pipeline industrialization<\/li>\n\n\n\n<li>Regulatory compliance<\/li>\n<\/ul>\n\n\n\n<p>An in-house implementation is possible, but it requires a high level of organizational maturity, strong skills in anonymization algorithms, data engineering, and security, as well as a strict audit framework. Solutions such as Delphix provide an industrialized response to these challenges while reducing both operational and regulatory risks. <\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"535\" height=\"438\" src=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/12\/image-28.png\" alt=\"\" class=\"wp-image-42156\" style=\"aspect-ratio:1.2215047625842816;width:388px;height:auto\" srcset=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/12\/image-28.png 535w, https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/12\/image-28-300x246.png 300w\" sizes=\"auto, (max-width: 535px) 100vw, 535px\" \/><\/figure>\n<\/div>\n\n\n<p>To take this further, Microsoft&#8217;s article explaining the integration of Delphix into Azure pipelines analyzes the same issues discussed above, but this time in the context of the cloud : <a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/architecture\/databases\/guide\/data-obfuscation-with-delphix-in-azure-data-factory\">Use Delphix for Data Masking in Azure Data Factory and Azure Synapse Analytics<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-s-next\">What&#8217;s next ?<\/h2>\n\n\n\n<p>This use case is just one example of how Delphix can be leveraged to optimize data management and compliance in complex environments. In upcoming articles, we will explore other recurring challenges, highlighting both possible in-house approaches and industrialized solutions with Delphix, to provide a broader technical perspective on data virtualization, security, and performance optimization.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-about-you\">What about you ?<\/h2>\n\n\n\n<p>How confident are you about the management of your confidential data? <br>If you have any doubts, please don\u2019t hesitate to reach out to me to discuss them !<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Context In the era of digital transformation, attack surfaces are constantly evolving and cyberattack techniques are becoming increasingly sophisticated. Maintaining the confidentiality, integrity, and availability of data is therefore a critical challenge for organizations, both from an operational and a regulatory standpoint (GDPR, ISO 27001, NIST). Therefore, data anonymization is crucial today. Contrary to a [&hellip;]<\/p>\n","protected":false},"author":157,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[198,3402,149],"tags":[3775,1635,494,1247],"type_dbi":[3400],"class_list":["post-41856","post","type-post","status-publish","format-standard","hentry","category-database-management","category-delphix","category-security","tag-anonymization","tag-compliance","tag-delphix","tag-gdpr","type-delphix"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Data Anonymization with Delphix - dbi Blog<\/title>\n<meta name=\"description\" content=\"Database anonymization in non-production environments using Delphix Continuous Compliance for secure, compliant data pipelines.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dbi-services.com\/blog\/data-anonymization-as-a-service-with-delphix-continuous-compliance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Anonymization as a Service with Delphix Continuous Compliance\" \/>\n<meta property=\"og:description\" content=\"Database anonymization in non-production environments using Delphix Continuous Compliance for secure, compliant data pipelines.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dbi-services.com\/blog\/data-anonymization-as-a-service-with-delphix-continuous-compliance\/\" \/>\n<meta property=\"og:site_name\" content=\"dbi Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-22T10:43:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-22T10:43:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/12\/image-7.png\" \/>\n\t<meta property=\"og:image:width\" content=\"848\" \/>\n\t<meta property=\"og:image:height\" content=\"267\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Louis Tochon\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Louis Tochon\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/data-anonymization-as-a-service-with-delphix-continuous-compliance\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/data-anonymization-as-a-service-with-delphix-continuous-compliance\/\"},\"author\":{\"name\":\"Louis Tochon\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/e4195b0cb120295b3407a502c23e75b6\"},\"headline\":\"Data Anonymization as a Service with Delphix Continuous Compliance\",\"datePublished\":\"2025-12-22T10:43:15+00:00\",\"dateModified\":\"2025-12-22T10:43:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/data-anonymization-as-a-service-with-delphix-continuous-compliance\/\"},\"wordCount\":662,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/data-anonymization-as-a-service-with-delphix-continuous-compliance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/12\/image-7.png\",\"keywords\":[\"anonymization\",\"compliance\",\"delphix\",\"GDPR\"],\"articleSection\":[\"Database management\",\"Delphix\",\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.dbi-services.com\/blog\/data-anonymization-as-a-service-with-delphix-continuous-compliance\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/data-anonymization-as-a-service-with-delphix-continuous-compliance\/\",\"url\":\"https:\/\/www.dbi-services.com\/blog\/data-anonymization-as-a-service-with-delphix-continuous-compliance\/\",\"name\":\"Data Anonymization with Delphix - dbi Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/data-anonymization-as-a-service-with-delphix-continuous-compliance\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/data-anonymization-as-a-service-with-delphix-continuous-compliance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/12\/image-7.png\",\"datePublished\":\"2025-12-22T10:43:15+00:00\",\"dateModified\":\"2025-12-22T10:43:17+00:00\",\"author\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/e4195b0cb120295b3407a502c23e75b6\"},\"description\":\"Database anonymization in non-production environments using Delphix Continuous Compliance for secure, compliant data pipelines.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/data-anonymization-as-a-service-with-delphix-continuous-compliance\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.dbi-services.com\/blog\/data-anonymization-as-a-service-with-delphix-continuous-compliance\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/data-anonymization-as-a-service-with-delphix-continuous-compliance\/#primaryimage\",\"url\":\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/12\/image-7.png\",\"contentUrl\":\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/12\/image-7.png\",\"width\":848,\"height\":267},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/data-anonymization-as-a-service-with-delphix-continuous-compliance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.dbi-services.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Anonymization as a Service with Delphix Continuous Compliance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/#website\",\"url\":\"https:\/\/www.dbi-services.com\/blog\/\",\"name\":\"dbi Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.dbi-services.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/e4195b0cb120295b3407a502c23e75b6\",\"name\":\"Louis Tochon\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/ce0ee48c64e763e6c4076e21c80729d15bc4493288aeb8695125c69082100e10?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ce0ee48c64e763e6c4076e21c80729d15bc4493288aeb8695125c69082100e10?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ce0ee48c64e763e6c4076e21c80729d15bc4493288aeb8695125c69082100e10?s=96&d=mm&r=g\",\"caption\":\"Louis Tochon\"},\"url\":\"https:\/\/www.dbi-services.com\/blog\/author\/louistochon\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Data Anonymization with Delphix - dbi Blog","description":"Database anonymization in non-production environments using Delphix Continuous Compliance for secure, compliant data pipelines.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dbi-services.com\/blog\/data-anonymization-as-a-service-with-delphix-continuous-compliance\/","og_locale":"en_US","og_type":"article","og_title":"Data Anonymization as a Service with Delphix Continuous Compliance","og_description":"Database anonymization in non-production environments using Delphix Continuous Compliance for secure, compliant data pipelines.","og_url":"https:\/\/www.dbi-services.com\/blog\/data-anonymization-as-a-service-with-delphix-continuous-compliance\/","og_site_name":"dbi Blog","article_published_time":"2025-12-22T10:43:15+00:00","article_modified_time":"2025-12-22T10:43:17+00:00","og_image":[{"width":848,"height":267,"url":"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/12\/image-7.png","type":"image\/png"}],"author":"Louis Tochon","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Louis Tochon","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dbi-services.com\/blog\/data-anonymization-as-a-service-with-delphix-continuous-compliance\/#article","isPartOf":{"@id":"https:\/\/www.dbi-services.com\/blog\/data-anonymization-as-a-service-with-delphix-continuous-compliance\/"},"author":{"name":"Louis Tochon","@id":"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/e4195b0cb120295b3407a502c23e75b6"},"headline":"Data Anonymization as a Service with Delphix Continuous Compliance","datePublished":"2025-12-22T10:43:15+00:00","dateModified":"2025-12-22T10:43:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dbi-services.com\/blog\/data-anonymization-as-a-service-with-delphix-continuous-compliance\/"},"wordCount":662,"commentCount":0,"image":{"@id":"https:\/\/www.dbi-services.com\/blog\/data-anonymization-as-a-service-with-delphix-continuous-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/12\/image-7.png","keywords":["anonymization","compliance","delphix","GDPR"],"articleSection":["Database management","Delphix","Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.dbi-services.com\/blog\/data-anonymization-as-a-service-with-delphix-continuous-compliance\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.dbi-services.com\/blog\/data-anonymization-as-a-service-with-delphix-continuous-compliance\/","url":"https:\/\/www.dbi-services.com\/blog\/data-anonymization-as-a-service-with-delphix-continuous-compliance\/","name":"Data Anonymization with Delphix - dbi Blog","isPartOf":{"@id":"https:\/\/www.dbi-services.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dbi-services.com\/blog\/data-anonymization-as-a-service-with-delphix-continuous-compliance\/#primaryimage"},"image":{"@id":"https:\/\/www.dbi-services.com\/blog\/data-anonymization-as-a-service-with-delphix-continuous-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/12\/image-7.png","datePublished":"2025-12-22T10:43:15+00:00","dateModified":"2025-12-22T10:43:17+00:00","author":{"@id":"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/e4195b0cb120295b3407a502c23e75b6"},"description":"Database anonymization in non-production environments using Delphix Continuous Compliance for secure, compliant data pipelines.","breadcrumb":{"@id":"https:\/\/www.dbi-services.com\/blog\/data-anonymization-as-a-service-with-delphix-continuous-compliance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dbi-services.com\/blog\/data-anonymization-as-a-service-with-delphix-continuous-compliance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.dbi-services.com\/blog\/data-anonymization-as-a-service-with-delphix-continuous-compliance\/#primaryimage","url":"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/12\/image-7.png","contentUrl":"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/12\/image-7.png","width":848,"height":267},{"@type":"BreadcrumbList","@id":"https:\/\/www.dbi-services.com\/blog\/data-anonymization-as-a-service-with-delphix-continuous-compliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.dbi-services.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Data Anonymization as a Service with Delphix Continuous Compliance"}]},{"@type":"WebSite","@id":"https:\/\/www.dbi-services.com\/blog\/#website","url":"https:\/\/www.dbi-services.com\/blog\/","name":"dbi Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dbi-services.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/e4195b0cb120295b3407a502c23e75b6","name":"Louis Tochon","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/ce0ee48c64e763e6c4076e21c80729d15bc4493288aeb8695125c69082100e10?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ce0ee48c64e763e6c4076e21c80729d15bc4493288aeb8695125c69082100e10?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ce0ee48c64e763e6c4076e21c80729d15bc4493288aeb8695125c69082100e10?s=96&d=mm&r=g","caption":"Louis Tochon"},"url":"https:\/\/www.dbi-services.com\/blog\/author\/louistochon\/"}]}},"_links":{"self":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/posts\/41856","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/users\/157"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/comments?post=41856"}],"version-history":[{"count":27,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/posts\/41856\/revisions"}],"predecessor-version":[{"id":42157,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/posts\/41856\/revisions\/42157"}],"wp:attachment":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/media?parent=41856"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/categories?post=41856"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/tags?post=41856"},{"taxonomy":"type","embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/type_dbi?post=41856"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}