Video
Automate Sensitive Data Discovery and Compliance with Perforce Delphix
Data Management,
Security & Compliance
Overview: Discovering Sensitive Data with Perforce Delphix
Delivering secure, compliant data for development and analytics is a critical business need, but it shouldn't introduce risk or slow down your teams. The Perforce Delphix DevOps Data Platform empowers enterprises to automatically discover and irreversibly mask sensitive data across a vast range of sources. This ensures your data is secure and compliant before it is delivered to non-production environments.
Watch this comprehensive demo to see how you can:
- Automate Sensitive Data Discovery: Effortlessly identify PII and other sensitive information like names, birth dates, and social security numbers across hundreds of data sources.
- Leverage Advanced Masking: Utilize pre-built, sophisticated masking algorithms to replace sensitive data with realistic yet fictitious values, ensuring full compliance with GDPR, CCPA, and HIPAA.
- Eliminate Compliance Bottlenecks: Integrate automated data compliance directly into your data operations to provide secure, ready-to-use data for application development and AI model training.
- Ensure High-Quality Data: Preserve analytical value and referential integrity across your data estate, enabling reliable testing, machine learning, and reporting with compliant data.
- Streamline Your Data Strategy: Implement a complete framework that automates data profiling, classification, reporting, and masking without writing a single line of code.
With Delphix, you can transform complex, manual compliance tasks into a continuous, automated process. Deliver high-quality, compliant data at the speed and scale your enterprise demands for true innovation.
Get in Touch with Our Sensitive Data Discovery Experts
Want to learn more about how Delphix can help you automate sensitive data masking, accelerate development cycles, and ensure compliance?
Our team is here to help. Request a custom demo to go in depth on sensitive data discovery and masking for your enterprise.
Full Transcript
Hello, everyone. My name is Felipe Casali. I'm a Perforce Solutions Engineer, and today, I will be presenting how to discover sensitive data with Delphix.
Many customers do not understand their privacy risk exposure or have no effective way of finding sensitive data values. When discussing sensitive data discovery, the challenge goes far beyond just running a search. We are dealing with massive volumes across different database technologies—relational, NoSQL, and even data lakes.
Sensitive information can be hidden everywhere, often in consistent formats for names, IDs, or addresses.
Every company relies on specific software solutions, ranging from very complex ERPs to homemade systems that may or may not be related to each other—or may or may not contain sensitive information.
To make it even more complex, we must handle multiple PII types, assess varying risk levels, and map the entire ecosystem—not just isolated databases.
Without addressing these challenges, achieving compliance and data governance becomes nearly impossible.
Delphix enables teams to automatically discover sensitive data, identify the surface area of risk, and lay the groundwork for protecting the data via masking.
Once we understand the complexity of locating sensitive data, the next step is automation.
This is where Delphix comes in, scanning both metadata and actual data values to pinpoint information subject to privacy laws. For example, it identifies names, Social Security numbers, and dates of birth across datasets.
These insights allow us to quickly flag and report sensitive fields so they can be masked or protected without slowing down development or compliance processes.
Now, let's see how quickly we can discover sensitive data in Delphix using the out-of-the-box profiling capabilities.
Delphix ships with an ASDD profile set that already includes classifiers for common regulations like GDPR, HIPAA, and PCI. These cover fields like names, addresses, phone numbers, credit cards, IBANs, and more. This means we can get meaningful results without building anything from scratch. The ASDD profiler goes beyond column names—it scans both data values and metadata to detect sensitive fields.
Metadata scanning leverages path classifiers for exact or pattern-based column name matches. Data scanning uses lists, regex, or type classifiers to look inside the actual stored values. Lists can detect things like a city or state from a known list. Regex supports checks and validations, such as Luhn for credit cards or Mod 97 for IBANs.
Types can be validated based on SQL data types. These classifiers are part of the standard ASDD profile set. So whether it's a column name, custom ID, or custom number, if its values match a sensitive pattern, it will be flagged and included in our sensitive data inventory.
Now, I'll run a profiling job with that ASDD profile set.
The profiler intelligently samples data, even in large tables with many rows, to improve detection efficiency.
Once the job completes, we get a detailed report showing the sensitive fields found, the classifier that detected them, the confidence score of the match, and the suggested masking algorithm for each field. This output becomes our ready-to-use masking inventory—perfect for compliance audits and for planning masking jobs. If needed, we can tweak the assignment thresholds in the profile sets to adjust how strict the matching should be. With ASDD, profiling sensitive data becomes fast, accurate, and maintainable—no custom code required.
Now, let's see how quickly we can discover sensitive data in Delphix using the out-of-the-box profiling capabilities.
Delphix ships with an ASDD profile set that already includes classifiers for common regulations like GDPR, HIPAA, and PCI. These cover fields like names, addresses, phone numbers, credit cards, IBANs, and more. This means we can get meaningful results without building anything from scratch. The ASDD profiler goes beyond column names—it scans both data values and metadata to detect sensitive fields.
Metadata scanning leverages path classifiers for exact or pattern-based column name matches. Data scanning uses lists, regex, or type classifiers to look inside the actual stored values. Lists can detect things like a city or state from a known list. Regex supports checks and validations, such as Luhn for credit cards or Mod 97 for IBANs.
Types can be validated based on SQL data types. These classifiers are part of the standard ASDD profile set. So whether it's a column name, custom ID, or custom number, if its values match a sensitive pattern, it will be flagged and included in our sensitive data inventory.
Now, I'll run a profiling job with that ASDD profile set.
The profiler intelligently samples data, even in large tables with many rows, to improve detection efficiency.
Once the job completes, we get a detailed report showing the sensitive fields found, the classifier that detected them, the confidence score of the match, and the suggested masking algorithm for each field. This output becomes our ready-to-use masking inventory—perfect for compliance audits and for planning masking jobs. If needed, we can tweak the assignment thresholds in the profile sets to adjust how strict the matching should be. With ASDD, profiling sensitive data becomes fast, accurate, and maintainable.
What we've just seen is more than technology—it's a framework to move from chaos to compliance.
By combining precise discovery, accurate classification, strict validation, and ongoing governance, Delphix transforms sensitive data management from a one-time task into a continuous, automated process. For you, that means a better understanding of your compliance and security risks, a strong position to protect your data, and an easy, out-of-the-box approach. This leads to fewer risks, faster compliance, and the assurance that your data remains under control—no matter how complex your environment is.
Thank you for watching, and stay tuned for more videos where we'll show how to mask data with Delphix and explore other incredible features of our tools.
Goodbye, and obrigado!