Video
Mitigate Security Risk with Data Masking Using Perforce Delphix: Demo
Data Management,
Security & Compliance
The need to innovate quickly is often at odds with the mandate to protect sensitive data. Exposing this data in non-production environments creates significant vulnerabilities, increasing the risk of breaches and non-compliance with regulations like GDPR and HIPAA. Perforce Delphix provides a powerful solution to mitigate security risk with data masking, empowering organizations to automate data compliance for non-production environments and accelerate development without compromising security.
With Perforce Delphix, enterprises can effectively mitigate security risks:
- Automate Sensitive Data Discovery and Masking: Mitigate security risks by eliminating manual, error-prone processes. The Delphix platform connects to your databases and runs profiling jobs to automatically identify sensitive PII. It then assigns appropriate out-of-the-box or custom masking algorithms to secure data in minutes, not weeks, drastically reducing your risk exposure.
- Maintain Referential Integrity Across Datasets: A common risk in data masking is breaking application logic by failing to preserve data relationships. Delphix ensures that relationships between tables are consistently maintained post-masking. This provides development and testing teams with fully functional, realistic data that behaves like production data, safeguarding data reliability and simplifying development logic.
- Accelerate Development and Testing Cycles Securely: Remove data bottlenecks and mitigate the risk of using unsecured data in your pipelines. Provide teams with fast, self-service access to secure and compliant data, allowing them to provision and refresh masked environments on demand. This enables them to build and test faster while ensuring data for dev and test is always secure.
- Ensure Enterprise-Grade Compliance: Mitigate the risk of compliance violations with pre-built profiles for major regulations, including GDPR, CCPA, and HIPAA. You can also create custom profiles to adhere to strict internal policies, ensuring your data management practices are always audit-ready and secure.
See How Delphix Can Transform Your Data Security
Ready to see how you can mitigate security risk with data masking while accelerating your development workflows? Request a personalized demo to discover how you can innovate faster and without risk.
Demo Delphix to Mitigate Security Risk
Full Transcript
Welcome, everyone. I'm Bruce, a solutions engineer with Perforce Delphix overseeing the APAC region.
Thank you for joining today's session, where we will focus on the critical topic of safeguarding data in non-production environments.
During this discussion, I will provide insights into how the Perforce Delphix solution can seamlessly identify and capture sensitive data, thereby mitigating associated risks.
Organizations today face three big challenges in securing sensitive data.
First, regulatory pressure. New privacy laws keep emerging worldwide, and compliance is no longer optional.
Second, non-production vulnerability. Over 80% of sensitive data resides in non-production environments, such as dev and test, making them major risk areas.
And third, legacy tool limitations. Many companies still rely on outdated tools or manual masking, which is slow and breaks data integrity.
This is where Perforce Delphix steps in to address these pain points directly.
Perforce Delphix data masking works in four simple steps.
First, create a masking job using ready-to-use algorithms; no coding is needed. Just pick and configure.
Second, execute the masking job on dev, test, or QA to safely replace sensitive data with realistic, secure values.
Third, verify the results.
All sensitive data is masked while keeping relationships intact so applications still work.
Finally, pair it with virtualization to deliver secure, on-demand data environments, boosting both security and speed.
We will also highlight why maintaining referential integrity is critical throughout the entire journey.
The view now displays two sets of data: one representing the production environment and the other representing a non-production environment.
First, we will use the Perforce Delphix compliance engine to scan and profile the sensitive data, thereby creating a comprehensive data inventory.
Subsequently, we will apply data masking techniques while preserving the relationships among tables and the underlying referential integrity.
What is referential integrity? Referential integrity is a rule that keeps relationships between tables in a relational database consistent.
For example, if the same data exists in different tables, we will consistently mask it. Referential integrity protects the data model from inconsistencies, simplifies application logic, and upholds the business rules embedded in the schema. I will share an example with you in my demo later.
Now, we will commence the live demonstration.
First, we will review the available algorithms. All the out-of-the-box solutions are ready to be deployed with a simple plug-and-play approach.
As illustrated, the platform profiles and captures every element of PII data and then applies masking according to your defined policies.
For instance, you can preserve specific digits of a credit card number, national ID, or postal code, allowing you to retain usable data for analytical purposes.
Additionally, the solution offers abbreviated formats for constructing a data dictionary. The framework is highly flexible and fully customizable, enabling you to manage masking jobs with ease.
You can also create your own profile with different combinations of algorithms to ensure your data fully complies with regulations such as GDPR, PDPA, and CCPA.
Now, let's move on to building your first masking job. I want to emphasize again that the process is very straightforward.
Using the standard JDBC protocol, you simply connect to the target database, select the table you want to profile and mask, and, if needed, define the logical key to maintain relationships across tables.
From here, we arrive at the most crucial step: profiling and creating a masking job for your data.
Once we trigger the profiling job, the system automatically identifies all sensitive information and assigns the appropriate masking algorithms, so there is no need to configure each one manually.
If everything looks correct, we can proceed to trigger the masking job. For this demonstration, I have built a simple website to simulate API requests.
As you can see, the webpage contains two buttons: one to call the Delphix API to initiate the masking job and another to refresh the database. For illustration purposes, I have connected this setup to two databases, iOS and Android.
Now, I will show you how quickly and accurately Perforce Delphix can mask data while preserving referential integrity.
Once I click the mask button, the backend automatically executes the masking process according to the policies we defined.
Refreshing the application connected to both databases, you can see that the first name, Kristen, has been masked to Junie, and the last name has also been updated.
When loading reference data, such as email addresses, you will notice that the integrity of relationships is maintained, ensuring both data quality and consistency.
This clearly demonstrates why referential integrity is so essential in data masking. It safeguards data reliability while simplifying development logic.
This concludes our demonstration on the importance of referential integrity in data masking.
Thank you for watching.