SlideShare a Scribd company logo
© 2018 Delphix. All Rights Reserved. Private and Confidential.© 2018 Delphix. All Rights Reserved. Private and Confidential.
Ilker Taskaya | Senior Solutions Engineer
David Wells | Director, Masking Professional Services
STEP UP YOUR
SECURITY & PRIVACY
WITH DATA MASKING
© 2018 Delphix. All Rights Reserved. Private and Confidential.
1 Introduction
2 Key elements of solution
3 How masking works
4 Demo
5 Questions and Answers
Agenda
2
© 2018 Delphix. All Rights Reserved. Private and Confidential.© 2018 Delphix. All Rights Reserved. Private and Confidential.
Introduction
3
© 2018 Delphix. All Rights Reserved. Private and Confidential.
Data Breach by the Numbers*
4
$3.62M
Average Total cost of a
data breach
$141
Average cost of lost
or stolen record
24,089
Average number of records
compromised in a breach
27.7%
Likelihood an organization
experiences a breach
over the next 2 years
*Ponemon Institute: 2017 Cost of Data Breach Study
© 2018 Delphix. All Rights Reserved. Private and Confidential.
Non-Production Data Represents a Major Hidden Risk
NON-PRODUCTION (80%)
PRODUCTION DATA (20%)
» Is constantly growing
» Entails multiple types of repositories
» Is often less protected by security and
governance measures
Non-Production Data:
© 2018 Delphix. All Rights Reserved. Private and Confidential.© 2018 Delphix. All Rights Reserved. Private and Confidential.
Key Elements of Solution
6
© 2018 Delphix. All Rights Reserved. Private and Confidential.
A Comprehensive Approach to Non-Prod Data Security
SECURE
APPLY automatic or
custom masking with
consistency,
repeatability
DISCOVER
IDENTIFY sensitive
data and create an
enterprise-wide risk
profile
DELIVER
DISTRIBUTE secure
data to non-production
environments in
minutes
© 2018 Delphix. All Rights Reserved. Private and Confidential.
Delphix Dynamic Data Platform
Deliver masked data in just minutes
Application
s
File
s
Database
s
Rich APIs
DD
Controls
Self
Service
Datapod
s
On-
Prem
Any
Server
Private
Cloud
Public
Cloud
Sync
Compress
Provision
Compliance
Policy
Masking
Distribute
Audit &
Report
Manage
VIRTUALIZE SECURE MANAGE
DBA
8
© 2018 Delphix. All Rights Reserved. Private and Confidential.
Mask virtual copy
one time
Repeatable and Secure Data Delivery
Mask once, deliver many
9
Production
Source
DEV
QA
• Provision a complete, virtual copy of production
• Automatically discover and mask sensitive data
• Distribute multiple masked copies packaged in data pods
• Provide testers with self-service control
• Easily refresh data copies
Distribute secure
copies in minutes
© 2018 Delphix. All Rights Reserved. Private and Confidential.
CLOUD
Enable Secure Dev/Test in Hybrid Cloud Architectures
10
ON-PREMISE
Production
Source
DEV
QA• Synchronize with on-prem source
• Compress and mask data
• Replicate secure data to cloud-based instance
• Provision data pods to consumers
© 2018 Delphix. All Rights Reserved. Private and Confidential.© 2018 Delphix. All Rights Reserved. Private and Confidential.
How Masking Works
11
© 2018 Delphix. All Rights Reserved. Private and Confidential.
Delphix Masking Protects Sensitive Data
“DATA AT
RISK” IS IN
DATABASES
Claimant Table
ID First_Name
1 George
2 Mary
3 John
Employee Table
ID First_Name
5 John
6 George
7 Mary
Claimant Table
ID First_Name
1 Romanth
2 Clara
3 Damien
Employee Table
ID First_Name
5 Damien
6 Romanth
7 Clara
UNMASKED DATA MASKED DATA
✓ REALISTIC
✓ REFERENTIAL INTEGRITY
✓ IRREVERSIBLE ✓ REPEATABLESENSITIVE DATA IN PRODUCTION
Social Security Numbers, Credit Card Information, Patient
Information, Email Addresses
© 2018 Delphix. All Rights Reserved. Private and Confidential.© 2018 Delphix. All Rights Reserved. Private and Confidential.
Demo
13
© 2018 Delphix. All Rights Reserved. Private and Confidential.
Benefits of Integrated Data Masking and Data Delivery
14
Provide
SELF SERVICE
Protect data
EVERYWHERE
your business
operates
• Implement data masking in on-prem, cloud, or hybrid environments
• Broad support for multiple platforms, databases, and file systems
• Automatically discover, protect, and audit sensitive data
• Mask once, then deliver secure data everywhere in just minutes
• Eliminate wait time for secure data
• Give data consumers self-service control to refresh, rewind, share, and branch data
• Maintain a single source or record for when, where, and how data is masked
Make data masking
EFFICIENT
for data consumers
© 2018 Delphix. All Rights Reserved. Private and Confidential.
Over 30% of the Fortune 100
FINANCIAL HEALTHCARE TELECOMMANUFACTURINGRETAILTECHNOLOGY
© 2018 Delphix. All Rights Reserved. Private and Confidential.
QUESTIONS?
ilker@delphix.com
david.wells@delphix.com

More Related Content

What's hot

Data Lake Architecture – Modern Strategies & Approaches
Data Lake Architecture – Modern Strategies & ApproachesData Lake Architecture – Modern Strategies & Approaches
Data Lake Architecture – Modern Strategies & Approaches
DATAVERSITY
 
Introdução à Neo4j
Introdução à Neo4j Introdução à Neo4j
Introdução à Neo4j
Neo4j
 
Data ops in practice
Data ops in practiceData ops in practice
Data ops in practice
Lars Albertsson
 
Getting Started with Data Stewardship
Getting Started with Data StewardshipGetting Started with Data Stewardship
Getting Started with Data Stewardship
DATAVERSITY
 
Building a data warehouse with Pentaho and Docker
Building a data warehouse with Pentaho and DockerBuilding a data warehouse with Pentaho and Docker
Building a data warehouse with Pentaho and Docker
Wellington Marinho
 
Organizational Change Management for Data- and Analytics-Driven Projects
Organizational Change Management for Data- and Analytics-Driven ProjectsOrganizational Change Management for Data- and Analytics-Driven Projects
Organizational Change Management for Data- and Analytics-Driven Projects
DATAVERSITY
 
Agile Data Engineering - Intro to Data Vault Modeling (2016)
Agile Data Engineering - Intro to Data Vault Modeling (2016)Agile Data Engineering - Intro to Data Vault Modeling (2016)
Agile Data Engineering - Intro to Data Vault Modeling (2016)
Kent Graziano
 
International Data Transfer Update
International Data Transfer UpdateInternational Data Transfer Update
International Data Transfer Update
TrustArc
 
Chapter 1: The Importance of Data Assets
Chapter 1: The Importance of Data AssetsChapter 1: The Importance of Data Assets
Chapter 1: The Importance of Data Assets
Ahmed Alorage
 
Modeling Cybersecurity with Neo4j, Based on Real-Life Data Insights
Modeling Cybersecurity with Neo4j, Based on Real-Life Data InsightsModeling Cybersecurity with Neo4j, Based on Real-Life Data Insights
Modeling Cybersecurity with Neo4j, Based on Real-Life Data Insights
Neo4j
 
Will Lyon- Entity Resolution
Will Lyon- Entity ResolutionWill Lyon- Entity Resolution
Will Lyon- Entity Resolution
Neo4j
 
Five Things to Consider About Data Mesh and Data Governance
Five Things to Consider About Data Mesh and Data GovernanceFive Things to Consider About Data Mesh and Data Governance
Five Things to Consider About Data Mesh and Data Governance
DATAVERSITY
 
Daniel Zitter: The Expectations of Project Managers from Artificial Intelligence
Daniel Zitter: The Expectations of Project Managers from Artificial IntelligenceDaniel Zitter: The Expectations of Project Managers from Artificial Intelligence
Daniel Zitter: The Expectations of Project Managers from Artificial Intelligence
Edunomica
 
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Alan McSweeney
 
Tietosuojavastaavan tehtävä ja henkilötietojen käsittelyn perusteita
Tietosuojavastaavan tehtävä ja henkilötietojen käsittelyn perusteitaTietosuojavastaavan tehtävä ja henkilötietojen käsittelyn perusteita
Tietosuojavastaavan tehtävä ja henkilötietojen käsittelyn perusteita
Harto Pönkä
 
Enabling a Data Mesh Architecture with Data Virtualization
Enabling a Data Mesh Architecture with Data VirtualizationEnabling a Data Mesh Architecture with Data Virtualization
Enabling a Data Mesh Architecture with Data Virtualization
Denodo
 
Agile & Data Modeling – How Can They Work Together?
Agile & Data Modeling – How Can They Work Together?Agile & Data Modeling – How Can They Work Together?
Agile & Data Modeling – How Can They Work Together?
DATAVERSITY
 
Plan kontabel, gjeneruar nga financa 5
Plan kontabel, gjeneruar nga financa 5Plan kontabel, gjeneruar nga financa 5
Plan kontabel, gjeneruar nga financa 5
Self-employed
 
Synthetic data generation
Synthetic data generationSynthetic data generation
Synthetic data generation
Sandeep Joshi
 
Introduction to e-Discovery
Introduction to e-Discovery Introduction to e-Discovery
Introduction to e-Discovery
Malla Reddy Donapati
 

What's hot (20)

Data Lake Architecture – Modern Strategies & Approaches
Data Lake Architecture – Modern Strategies & ApproachesData Lake Architecture – Modern Strategies & Approaches
Data Lake Architecture – Modern Strategies & Approaches
 
Introdução à Neo4j
Introdução à Neo4j Introdução à Neo4j
Introdução à Neo4j
 
Data ops in practice
Data ops in practiceData ops in practice
Data ops in practice
 
Getting Started with Data Stewardship
Getting Started with Data StewardshipGetting Started with Data Stewardship
Getting Started with Data Stewardship
 
Building a data warehouse with Pentaho and Docker
Building a data warehouse with Pentaho and DockerBuilding a data warehouse with Pentaho and Docker
Building a data warehouse with Pentaho and Docker
 
Organizational Change Management for Data- and Analytics-Driven Projects
Organizational Change Management for Data- and Analytics-Driven ProjectsOrganizational Change Management for Data- and Analytics-Driven Projects
Organizational Change Management for Data- and Analytics-Driven Projects
 
Agile Data Engineering - Intro to Data Vault Modeling (2016)
Agile Data Engineering - Intro to Data Vault Modeling (2016)Agile Data Engineering - Intro to Data Vault Modeling (2016)
Agile Data Engineering - Intro to Data Vault Modeling (2016)
 
International Data Transfer Update
International Data Transfer UpdateInternational Data Transfer Update
International Data Transfer Update
 
Chapter 1: The Importance of Data Assets
Chapter 1: The Importance of Data AssetsChapter 1: The Importance of Data Assets
Chapter 1: The Importance of Data Assets
 
Modeling Cybersecurity with Neo4j, Based on Real-Life Data Insights
Modeling Cybersecurity with Neo4j, Based on Real-Life Data InsightsModeling Cybersecurity with Neo4j, Based on Real-Life Data Insights
Modeling Cybersecurity with Neo4j, Based on Real-Life Data Insights
 
Will Lyon- Entity Resolution
Will Lyon- Entity ResolutionWill Lyon- Entity Resolution
Will Lyon- Entity Resolution
 
Five Things to Consider About Data Mesh and Data Governance
Five Things to Consider About Data Mesh and Data GovernanceFive Things to Consider About Data Mesh and Data Governance
Five Things to Consider About Data Mesh and Data Governance
 
Daniel Zitter: The Expectations of Project Managers from Artificial Intelligence
Daniel Zitter: The Expectations of Project Managers from Artificial IntelligenceDaniel Zitter: The Expectations of Project Managers from Artificial Intelligence
Daniel Zitter: The Expectations of Project Managers from Artificial Intelligence
 
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
 
Tietosuojavastaavan tehtävä ja henkilötietojen käsittelyn perusteita
Tietosuojavastaavan tehtävä ja henkilötietojen käsittelyn perusteitaTietosuojavastaavan tehtävä ja henkilötietojen käsittelyn perusteita
Tietosuojavastaavan tehtävä ja henkilötietojen käsittelyn perusteita
 
Enabling a Data Mesh Architecture with Data Virtualization
Enabling a Data Mesh Architecture with Data VirtualizationEnabling a Data Mesh Architecture with Data Virtualization
Enabling a Data Mesh Architecture with Data Virtualization
 
Agile & Data Modeling – How Can They Work Together?
Agile & Data Modeling – How Can They Work Together?Agile & Data Modeling – How Can They Work Together?
Agile & Data Modeling – How Can They Work Together?
 
Plan kontabel, gjeneruar nga financa 5
Plan kontabel, gjeneruar nga financa 5Plan kontabel, gjeneruar nga financa 5
Plan kontabel, gjeneruar nga financa 5
 
Synthetic data generation
Synthetic data generationSynthetic data generation
Synthetic data generation
 
Introduction to e-Discovery
Introduction to e-Discovery Introduction to e-Discovery
Introduction to e-Discovery
 

Similar to Data Masking With The Delphix Dynamic Data Platform

Why Your Approach To Data Governance Needs a Major Update
Why Your Approach To Data Governance Needs a Major UpdateWhy Your Approach To Data Governance Needs a Major Update
Why Your Approach To Data Governance Needs a Major Update
Delphix
 
A Data Privacy & Security Year in Review: Top 10 Trends and Predictions
A Data Privacy & Security Year in Review: Top 10 Trends and PredictionsA Data Privacy & Security Year in Review: Top 10 Trends and Predictions
A Data Privacy & Security Year in Review: Top 10 Trends and Predictions
Delphix
 
DevOps + DataOps = Digital Transformation
DevOps + DataOps = Digital Transformation DevOps + DataOps = Digital Transformation
DevOps + DataOps = Digital Transformation
Delphix
 
The Power of DataOps for Cloud and Digital Transformation
The Power of DataOps for Cloud and Digital Transformation The Power of DataOps for Cloud and Digital Transformation
The Power of DataOps for Cloud and Digital Transformation
Delphix
 
GDPR Fast Start
GDPR Fast StartGDPR Fast Start
GDPR Fast Start
Delphix
 
DataOps in Financial Services: enable higher-quality test ing + lower levels ...
DataOps in Financial Services: enable higher-quality test ing + lower levels ...DataOps in Financial Services: enable higher-quality test ing + lower levels ...
DataOps in Financial Services: enable higher-quality test ing + lower levels ...
Ugo Pollio
 
Accelerate Design and Development of Data Projects Using AWS
Accelerate Design and Development of Data Projects Using AWSAccelerate Design and Development of Data Projects Using AWS
Accelerate Design and Development of Data Projects Using AWS
Delphix
 
Strengthen Cloud Security
Strengthen Cloud SecurityStrengthen Cloud Security
Strengthen Cloud Security
Lora O'Haver
 
Accelerating Secure SAP Application Delivery
Accelerating Secure SAP Application Delivery Accelerating Secure SAP Application Delivery
Accelerating Secure SAP Application Delivery
Delphix
 
Confessions of the AppDev VP Webinar (Delphix)
Confessions of the AppDev VP Webinar (Delphix)Confessions of the AppDev VP Webinar (Delphix)
Confessions of the AppDev VP Webinar (Delphix)
Sam Molmud
 
Confessions of the AppDev VP
Confessions of the AppDev VPConfessions of the AppDev VP
Confessions of the AppDev VP
Delphix
 
Oracle Open World 2017 Delphix and DBVisit
Oracle Open World 2017 Delphix and DBVisitOracle Open World 2017 Delphix and DBVisit
Oracle Open World 2017 Delphix and DBVisit
Kellyn Pot'Vin-Gorman
 
Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely
Skytap Cloud
 
Empowering Agile Development with Containers
Empowering Agile Development with ContainersEmpowering Agile Development with Containers
Empowering Agile Development with Containers
Kellyn Pot'Vin-Gorman
 
The GDPR and What It Means to You
The GDPR and What It Means to YouThe GDPR and What It Means to You
The GDPR and What It Means to You
Delphix
 
Build a modern platform for anti-money laundering 9.19.18
Build a modern platform for anti-money laundering 9.19.18Build a modern platform for anti-money laundering 9.19.18
Build a modern platform for anti-money laundering 9.19.18
Cloudera, Inc.
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
IBM Security
 
Data Agility for Enterprise DevOps Adoption
Data Agility for Enterprise DevOps AdoptionData Agility for Enterprise DevOps Adoption
Data Agility for Enterprise DevOps Adoption
Delphix
 
Secure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift EnvironmentsSecure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift Environments
DevOps.com
 
CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud
 

Similar to Data Masking With The Delphix Dynamic Data Platform (20)

Why Your Approach To Data Governance Needs a Major Update
Why Your Approach To Data Governance Needs a Major UpdateWhy Your Approach To Data Governance Needs a Major Update
Why Your Approach To Data Governance Needs a Major Update
 
A Data Privacy & Security Year in Review: Top 10 Trends and Predictions
A Data Privacy & Security Year in Review: Top 10 Trends and PredictionsA Data Privacy & Security Year in Review: Top 10 Trends and Predictions
A Data Privacy & Security Year in Review: Top 10 Trends and Predictions
 
DevOps + DataOps = Digital Transformation
DevOps + DataOps = Digital Transformation DevOps + DataOps = Digital Transformation
DevOps + DataOps = Digital Transformation
 
The Power of DataOps for Cloud and Digital Transformation
The Power of DataOps for Cloud and Digital Transformation The Power of DataOps for Cloud and Digital Transformation
The Power of DataOps for Cloud and Digital Transformation
 
GDPR Fast Start
GDPR Fast StartGDPR Fast Start
GDPR Fast Start
 
DataOps in Financial Services: enable higher-quality test ing + lower levels ...
DataOps in Financial Services: enable higher-quality test ing + lower levels ...DataOps in Financial Services: enable higher-quality test ing + lower levels ...
DataOps in Financial Services: enable higher-quality test ing + lower levels ...
 
Accelerate Design and Development of Data Projects Using AWS
Accelerate Design and Development of Data Projects Using AWSAccelerate Design and Development of Data Projects Using AWS
Accelerate Design and Development of Data Projects Using AWS
 
Strengthen Cloud Security
Strengthen Cloud SecurityStrengthen Cloud Security
Strengthen Cloud Security
 
Accelerating Secure SAP Application Delivery
Accelerating Secure SAP Application Delivery Accelerating Secure SAP Application Delivery
Accelerating Secure SAP Application Delivery
 
Confessions of the AppDev VP Webinar (Delphix)
Confessions of the AppDev VP Webinar (Delphix)Confessions of the AppDev VP Webinar (Delphix)
Confessions of the AppDev VP Webinar (Delphix)
 
Confessions of the AppDev VP
Confessions of the AppDev VPConfessions of the AppDev VP
Confessions of the AppDev VP
 
Oracle Open World 2017 Delphix and DBVisit
Oracle Open World 2017 Delphix and DBVisitOracle Open World 2017 Delphix and DBVisit
Oracle Open World 2017 Delphix and DBVisit
 
Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely
 
Empowering Agile Development with Containers
Empowering Agile Development with ContainersEmpowering Agile Development with Containers
Empowering Agile Development with Containers
 
The GDPR and What It Means to You
The GDPR and What It Means to YouThe GDPR and What It Means to You
The GDPR and What It Means to You
 
Build a modern platform for anti-money laundering 9.19.18
Build a modern platform for anti-money laundering 9.19.18Build a modern platform for anti-money laundering 9.19.18
Build a modern platform for anti-money laundering 9.19.18
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
 
Data Agility for Enterprise DevOps Adoption
Data Agility for Enterprise DevOps AdoptionData Agility for Enterprise DevOps Adoption
Data Agility for Enterprise DevOps Adoption
 
Secure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift EnvironmentsSecure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift Environments
 
CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101
 

More from Delphix

Fast Data Flow Is the Secret to Accelerating Digital Transformation
Fast Data Flow Is the Secret to Accelerating Digital TransformationFast Data Flow Is the Secret to Accelerating Digital Transformation
Fast Data Flow Is the Secret to Accelerating Digital Transformation
Delphix
 
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
Delphix
 
90% of Enterprises are Using DataOps. Why Aren’t You?
90% of Enterprises are Using DataOps. Why Aren’t You?90% of Enterprises are Using DataOps. Why Aren’t You?
90% of Enterprises are Using DataOps. Why Aren’t You?
Delphix
 
Simplify and Accelerate SQL Server Migration to Azure
Simplify and Accelerate SQL Server Migration to AzureSimplify and Accelerate SQL Server Migration to Azure
Simplify and Accelerate SQL Server Migration to Azure
Delphix
 
Move and Secure Your Data
Move and Secure Your DataMove and Secure Your Data
Move and Secure Your Data
Delphix
 
Confessions of a CIO
Confessions of a CIOConfessions of a CIO
Confessions of a CIO
Delphix
 
Let Data Flow: Removing the Latest DevOps Constraints with DataOps
Let Data Flow: Removing the Latest DevOps Constraints with DataOpsLet Data Flow: Removing the Latest DevOps Constraints with DataOps
Let Data Flow: Removing the Latest DevOps Constraints with DataOps
Delphix
 
Confessions of an IT Director
Confessions of an IT Director Confessions of an IT Director
Confessions of an IT Director
Delphix
 
Confessions of the Tester
Confessions of the TesterConfessions of the Tester
Confessions of the Tester
Delphix
 
Confessions of a Developer
Confessions of a DeveloperConfessions of a Developer
Confessions of a Developer
Delphix
 
Confessions of a DBA: “I always avoid requests from DevOps” and Other Admissions
Confessions of a DBA: “I always avoid requests from DevOps” and Other AdmissionsConfessions of a DBA: “I always avoid requests from DevOps” and Other Admissions
Confessions of a DBA: “I always avoid requests from DevOps” and Other Admissions
Delphix
 
Solving the Data Management Challenge for Healthcare
Solving the Data Management Challenge for HealthcareSolving the Data Management Challenge for Healthcare
Solving the Data Management Challenge for Healthcare
Delphix
 
The Rise of DataOps: Making Big Data Bite Size with DataOps
The Rise of DataOps: Making Big Data Bite Size with DataOpsThe Rise of DataOps: Making Big Data Bite Size with DataOps
The Rise of DataOps: Making Big Data Bite Size with DataOps
Delphix
 
451 Research: Data Is the Key to Friction in DevOps
451 Research: Data Is the Key to Friction in DevOps451 Research: Data Is the Key to Friction in DevOps
451 Research: Data Is the Key to Friction in DevOps
Delphix
 
Platform for Cloud Migration — Accelerating and De-Risking your Cloud Journey
Platform for Cloud Migration — Accelerating and De-Risking your Cloud JourneyPlatform for Cloud Migration — Accelerating and De-Risking your Cloud Journey
Platform for Cloud Migration — Accelerating and De-Risking your Cloud Journey
Delphix
 

More from Delphix (15)

Fast Data Flow Is the Secret to Accelerating Digital Transformation
Fast Data Flow Is the Secret to Accelerating Digital TransformationFast Data Flow Is the Secret to Accelerating Digital Transformation
Fast Data Flow Is the Secret to Accelerating Digital Transformation
 
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
 
90% of Enterprises are Using DataOps. Why Aren’t You?
90% of Enterprises are Using DataOps. Why Aren’t You?90% of Enterprises are Using DataOps. Why Aren’t You?
90% of Enterprises are Using DataOps. Why Aren’t You?
 
Simplify and Accelerate SQL Server Migration to Azure
Simplify and Accelerate SQL Server Migration to AzureSimplify and Accelerate SQL Server Migration to Azure
Simplify and Accelerate SQL Server Migration to Azure
 
Move and Secure Your Data
Move and Secure Your DataMove and Secure Your Data
Move and Secure Your Data
 
Confessions of a CIO
Confessions of a CIOConfessions of a CIO
Confessions of a CIO
 
Let Data Flow: Removing the Latest DevOps Constraints with DataOps
Let Data Flow: Removing the Latest DevOps Constraints with DataOpsLet Data Flow: Removing the Latest DevOps Constraints with DataOps
Let Data Flow: Removing the Latest DevOps Constraints with DataOps
 
Confessions of an IT Director
Confessions of an IT Director Confessions of an IT Director
Confessions of an IT Director
 
Confessions of the Tester
Confessions of the TesterConfessions of the Tester
Confessions of the Tester
 
Confessions of a Developer
Confessions of a DeveloperConfessions of a Developer
Confessions of a Developer
 
Confessions of a DBA: “I always avoid requests from DevOps” and Other Admissions
Confessions of a DBA: “I always avoid requests from DevOps” and Other AdmissionsConfessions of a DBA: “I always avoid requests from DevOps” and Other Admissions
Confessions of a DBA: “I always avoid requests from DevOps” and Other Admissions
 
Solving the Data Management Challenge for Healthcare
Solving the Data Management Challenge for HealthcareSolving the Data Management Challenge for Healthcare
Solving the Data Management Challenge for Healthcare
 
The Rise of DataOps: Making Big Data Bite Size with DataOps
The Rise of DataOps: Making Big Data Bite Size with DataOpsThe Rise of DataOps: Making Big Data Bite Size with DataOps
The Rise of DataOps: Making Big Data Bite Size with DataOps
 
451 Research: Data Is the Key to Friction in DevOps
451 Research: Data Is the Key to Friction in DevOps451 Research: Data Is the Key to Friction in DevOps
451 Research: Data Is the Key to Friction in DevOps
 
Platform for Cloud Migration — Accelerating and De-Risking your Cloud Journey
Platform for Cloud Migration — Accelerating and De-Risking your Cloud JourneyPlatform for Cloud Migration — Accelerating and De-Risking your Cloud Journey
Platform for Cloud Migration — Accelerating and De-Risking your Cloud Journey
 

Recently uploaded

UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 

Recently uploaded (20)

UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 

Data Masking With The Delphix Dynamic Data Platform

  • 1. © 2018 Delphix. All Rights Reserved. Private and Confidential.© 2018 Delphix. All Rights Reserved. Private and Confidential. Ilker Taskaya | Senior Solutions Engineer David Wells | Director, Masking Professional Services STEP UP YOUR SECURITY & PRIVACY WITH DATA MASKING
  • 2. © 2018 Delphix. All Rights Reserved. Private and Confidential. 1 Introduction 2 Key elements of solution 3 How masking works 4 Demo 5 Questions and Answers Agenda 2
  • 3. © 2018 Delphix. All Rights Reserved. Private and Confidential.© 2018 Delphix. All Rights Reserved. Private and Confidential. Introduction 3
  • 4. © 2018 Delphix. All Rights Reserved. Private and Confidential. Data Breach by the Numbers* 4 $3.62M Average Total cost of a data breach $141 Average cost of lost or stolen record 24,089 Average number of records compromised in a breach 27.7% Likelihood an organization experiences a breach over the next 2 years *Ponemon Institute: 2017 Cost of Data Breach Study
  • 5. © 2018 Delphix. All Rights Reserved. Private and Confidential. Non-Production Data Represents a Major Hidden Risk NON-PRODUCTION (80%) PRODUCTION DATA (20%) » Is constantly growing » Entails multiple types of repositories » Is often less protected by security and governance measures Non-Production Data:
  • 6. © 2018 Delphix. All Rights Reserved. Private and Confidential.© 2018 Delphix. All Rights Reserved. Private and Confidential. Key Elements of Solution 6
  • 7. © 2018 Delphix. All Rights Reserved. Private and Confidential. A Comprehensive Approach to Non-Prod Data Security SECURE APPLY automatic or custom masking with consistency, repeatability DISCOVER IDENTIFY sensitive data and create an enterprise-wide risk profile DELIVER DISTRIBUTE secure data to non-production environments in minutes
  • 8. © 2018 Delphix. All Rights Reserved. Private and Confidential. Delphix Dynamic Data Platform Deliver masked data in just minutes Application s File s Database s Rich APIs DD Controls Self Service Datapod s On- Prem Any Server Private Cloud Public Cloud Sync Compress Provision Compliance Policy Masking Distribute Audit & Report Manage VIRTUALIZE SECURE MANAGE DBA 8
  • 9. © 2018 Delphix. All Rights Reserved. Private and Confidential. Mask virtual copy one time Repeatable and Secure Data Delivery Mask once, deliver many 9 Production Source DEV QA • Provision a complete, virtual copy of production • Automatically discover and mask sensitive data • Distribute multiple masked copies packaged in data pods • Provide testers with self-service control • Easily refresh data copies Distribute secure copies in minutes
  • 10. © 2018 Delphix. All Rights Reserved. Private and Confidential. CLOUD Enable Secure Dev/Test in Hybrid Cloud Architectures 10 ON-PREMISE Production Source DEV QA• Synchronize with on-prem source • Compress and mask data • Replicate secure data to cloud-based instance • Provision data pods to consumers
  • 11. © 2018 Delphix. All Rights Reserved. Private and Confidential.© 2018 Delphix. All Rights Reserved. Private and Confidential. How Masking Works 11
  • 12. © 2018 Delphix. All Rights Reserved. Private and Confidential. Delphix Masking Protects Sensitive Data “DATA AT RISK” IS IN DATABASES Claimant Table ID First_Name 1 George 2 Mary 3 John Employee Table ID First_Name 5 John 6 George 7 Mary Claimant Table ID First_Name 1 Romanth 2 Clara 3 Damien Employee Table ID First_Name 5 Damien 6 Romanth 7 Clara UNMASKED DATA MASKED DATA ✓ REALISTIC ✓ REFERENTIAL INTEGRITY ✓ IRREVERSIBLE ✓ REPEATABLESENSITIVE DATA IN PRODUCTION Social Security Numbers, Credit Card Information, Patient Information, Email Addresses
  • 13. © 2018 Delphix. All Rights Reserved. Private and Confidential.© 2018 Delphix. All Rights Reserved. Private and Confidential. Demo 13
  • 14. © 2018 Delphix. All Rights Reserved. Private and Confidential. Benefits of Integrated Data Masking and Data Delivery 14 Provide SELF SERVICE Protect data EVERYWHERE your business operates • Implement data masking in on-prem, cloud, or hybrid environments • Broad support for multiple platforms, databases, and file systems • Automatically discover, protect, and audit sensitive data • Mask once, then deliver secure data everywhere in just minutes • Eliminate wait time for secure data • Give data consumers self-service control to refresh, rewind, share, and branch data • Maintain a single source or record for when, where, and how data is masked Make data masking EFFICIENT for data consumers
  • 15. © 2018 Delphix. All Rights Reserved. Private and Confidential. Over 30% of the Fortune 100 FINANCIAL HEALTHCARE TELECOMMANUFACTURINGRETAILTECHNOLOGY
  • 16. © 2018 Delphix. All Rights Reserved. Private and Confidential. QUESTIONS? ilker@delphix.com david.wells@delphix.com