Blog
AI and Data Privacy: 3 Top Concerns and What to Do About Them
Enterprises have serious concerns when it comes to AI and data privacy — like theft of training data, privacy compliance, and personal data re-identification. Perforce Delphix expert Steve Karam dives into the latest research and explores what leaders can do to protect their organization.
Security & Compliance, Data Management, AI
Blog
What is CCPA Compliance? What Enterprises Need to Know
Get a primer on CCPA (California Consumer Privacy Act) — including what it is, who must comply, and the regulation’s key provisions — plus 7 steps to comply in this guide by Perforce Delphix experts Tom Syth and Vikram Kulkarni.
Data Management, Security & Compliance
Blog
Workday Data Masking Done Right: Cut Risk, Not Speed
Protecting sensitive Workday data is critical, but organizations struggle with slow, manual masking processes. Perforce Delphix expert Bob Patten breaks down the challenges of traditional Workday data masking and explains how modern automated solutions like Delphix maintain referential integrity and speed up development cycles.
Data Management, Security & Compliance
Blog
Developing Unmanned Aerial Vehicle Software for Safe and Secure Drone Operations
UAV software use has sky-rocketed in recent years, but as drone systems grow more complex, they introduce safety and security risks. In this blog, we explore the regulations, standards, tools and best practices that keep drone operations safe and secure.
Software Quality, Security & Compliance
Blog
Simplify Guidewire Data Masking: Protect Customer Data Without Slowing Development
Discover how to secure policyholder data in Guidewire systems with this guide by Perforce Dephix expert Jatinder Luthra. Explore the challenges of traditional masking methods and modern solutions that deploy masked environments in minutes.
Data Management, Security & Compliance
Blog
How Policy-Driven Data Obfuscation Solves Enterprise Data Security Challenges
Perforce Professional Services Engineer Robert Patten explains how policy-driven data obfuscation protects sensitive enterprise data in non-production environments using automated masking solutions.
Security & Compliance, Data Management