Skip to main content

Blog

Insights, Innovations, and Best Practices from Perforce Experts

Blog

Synthetic Test Data vs. Test Data Masking: How to Use Both

Synthetic test data and test data masking as a combined approach can be ideal. Find out when and how to use both approaches in this blog by Steve Karam, Principal Product Manager for Perforce Delphix.
Data Management, Security & Compliance, DevOps
Blog

Testing file replace functionality

Testing file replace functionality
DevOps
Blog

Non-functional Requirements: What They Do, Examples, and Best Practices

Non-functional requirements are the easiest to miss and the costliest to rectify. Learn what they are, what they do, what they look like, and how to write them.
Application Lifecycle Management
Blog

Static Analysis 2024.2 Release Provides CI/CD Integration and Analysis Options for Modern Development

Helix QAC 2024.2 and Klocwork 2024.2 provide many improvements that streamline the CI/CD pipeline and enhance security. Here's how the new release enables modern embedded development.
Software Quality, DevOps
Blog

Perforce ALM vs HP ALM by Micro Focus

Compare HP ALM Quality Center / Micro Focus to Helix ALM by Perforce.
Application Lifecycle Management
Blog

9 Best Practices for PII Masking

Employing PII data masking is an excellent way to ensure data security and data privacy compliance. Find out the best practices for PII masking in this blog post.
Data Management, Security & Compliance
Blog

Static Data Masking vs. Dynamic Data Masking: What’s the Best Approach?

Hear from Perforce Delphix experts on the key differences between static data masking vs. dynamic data masking. Plus, find out why static data masking is a more powerful way to protect sensitive data in non-production environments.
Data Management, Security & Compliance
Blog

Application Planning: Why Is Data Privacy Important in the Planning Stage?

How do data privacy requirements impact application planning? Hear from a Perforce Delphix expert.
Data Management, Security & Compliance
Blog

Embedded Software Security for Industry 4.0 and the Internet of Things

What you need to know about software safety and security in embedded systems and internet of things, as well as industry 4.0 cybersecurity.
Security & Compliance, DevOps
Blog

What Are Quality Gates?

Here, we explain what are quality gates, how they work, and how to implement them using Static Analysis. 
DevOps
Blog

The Tightrope of Innovation & Risk: Balancing Innovation vs. Security Risks

Learn key findings from the 2024 US Security & Innovation Study and discover how businesses balance innovation and risks to security and compliance.
Security & Compliance, Data Management
Blog

The Secret to Faster Development Speed in the Enterprise

Data Management, DevOps