SlideShare uma empresa Scribd logo
1 de 16
© 2018 Delphix. All Rights Reserved. Private and Confidential.© 2018 Delphix. All Rights Reserved. Private and Confidential.
Ilker Taskaya | Senior Solutions Engineer
David Wells | Director, Masking Professional Services
STEP UP YOUR
SECURITY & PRIVACY
WITH DATA MASKING
© 2018 Delphix. All Rights Reserved. Private and Confidential.
1 Introduction
2 Key elements of solution
3 How masking works
4 Demo
5 Questions and Answers
Agenda
2
© 2018 Delphix. All Rights Reserved. Private and Confidential.© 2018 Delphix. All Rights Reserved. Private and Confidential.
Introduction
3
© 2018 Delphix. All Rights Reserved. Private and Confidential.
Data Breach by the Numbers*
4
$3.62M
Average Total cost of a
data breach
$141
Average cost of lost
or stolen record
24,089
Average number of records
compromised in a breach
27.7%
Likelihood an organization
experiences a breach
over the next 2 years
*Ponemon Institute: 2017 Cost of Data Breach Study
© 2018 Delphix. All Rights Reserved. Private and Confidential.
Non-Production Data Represents a Major Hidden Risk
NON-PRODUCTION (80%)
PRODUCTION DATA (20%)
» Is constantly growing
» Entails multiple types of repositories
» Is often less protected by security and
governance measures
Non-Production Data:
© 2018 Delphix. All Rights Reserved. Private and Confidential.© 2018 Delphix. All Rights Reserved. Private and Confidential.
Key Elements of Solution
6
© 2018 Delphix. All Rights Reserved. Private and Confidential.
A Comprehensive Approach to Non-Prod Data Security
SECURE
APPLY automatic or
custom masking with
consistency,
repeatability
DISCOVER
IDENTIFY sensitive
data and create an
enterprise-wide risk
profile
DELIVER
DISTRIBUTE secure
data to non-production
environments in
minutes
© 2018 Delphix. All Rights Reserved. Private and Confidential.
Delphix Dynamic Data Platform
Deliver masked data in just minutes
Application
s
File
s
Database
s
Rich APIs
DD
Controls
Self
Service
Datapod
s
On-
Prem
Any
Server
Private
Cloud
Public
Cloud
Sync
Compress
Provision
Compliance
Policy
Masking
Distribute
Audit &
Report
Manage
VIRTUALIZE SECURE MANAGE
DBA
8
© 2018 Delphix. All Rights Reserved. Private and Confidential.
Mask virtual copy
one time
Repeatable and Secure Data Delivery
Mask once, deliver many
9
Production
Source
DEV
QA
• Provision a complete, virtual copy of production
• Automatically discover and mask sensitive data
• Distribute multiple masked copies packaged in data pods
• Provide testers with self-service control
• Easily refresh data copies
Distribute secure
copies in minutes
© 2018 Delphix. All Rights Reserved. Private and Confidential.
CLOUD
Enable Secure Dev/Test in Hybrid Cloud Architectures
10
ON-PREMISE
Production
Source
DEV
QA• Synchronize with on-prem source
• Compress and mask data
• Replicate secure data to cloud-based instance
• Provision data pods to consumers
© 2018 Delphix. All Rights Reserved. Private and Confidential.© 2018 Delphix. All Rights Reserved. Private and Confidential.
How Masking Works
11
© 2018 Delphix. All Rights Reserved. Private and Confidential.
Delphix Masking Protects Sensitive Data
“DATA AT
RISK” IS IN
DATABASES
Claimant Table
ID First_Name
1 George
2 Mary
3 John
Employee Table
ID First_Name
5 John
6 George
7 Mary
Claimant Table
ID First_Name
1 Romanth
2 Clara
3 Damien
Employee Table
ID First_Name
5 Damien
6 Romanth
7 Clara
UNMASKED DATA MASKED DATA
✓ REALISTIC
✓ REFERENTIAL INTEGRITY
✓ IRREVERSIBLE ✓ REPEATABLESENSITIVE DATA IN PRODUCTION
Social Security Numbers, Credit Card Information, Patient
Information, Email Addresses
© 2018 Delphix. All Rights Reserved. Private and Confidential.© 2018 Delphix. All Rights Reserved. Private and Confidential.
Demo
13
© 2018 Delphix. All Rights Reserved. Private and Confidential.
Benefits of Integrated Data Masking and Data Delivery
14
Provide
SELF SERVICE
Protect data
EVERYWHERE
your business
operates
• Implement data masking in on-prem, cloud, or hybrid environments
• Broad support for multiple platforms, databases, and file systems
• Automatically discover, protect, and audit sensitive data
• Mask once, then deliver secure data everywhere in just minutes
• Eliminate wait time for secure data
• Give data consumers self-service control to refresh, rewind, share, and branch data
• Maintain a single source or record for when, where, and how data is masked
Make data masking
EFFICIENT
for data consumers
© 2018 Delphix. All Rights Reserved. Private and Confidential.
Over 30% of the Fortune 100
FINANCIAL HEALTHCARE TELECOMMANUFACTURINGRETAILTECHNOLOGY
© 2018 Delphix. All Rights Reserved. Private and Confidential.
QUESTIONS?
ilker@delphix.com
david.wells@delphix.com

Mais conteúdo relacionado

Semelhante a Data Masking Secures Non-Prod Data

Why Your Approach To Data Governance Needs a Major Update
Why Your Approach To Data Governance Needs a Major UpdateWhy Your Approach To Data Governance Needs a Major Update
Why Your Approach To Data Governance Needs a Major UpdateDelphix
 
A Data Privacy & Security Year in Review: Top 10 Trends and Predictions
A Data Privacy & Security Year in Review: Top 10 Trends and PredictionsA Data Privacy & Security Year in Review: Top 10 Trends and Predictions
A Data Privacy & Security Year in Review: Top 10 Trends and PredictionsDelphix
 
DevOps + DataOps = Digital Transformation
DevOps + DataOps = Digital Transformation DevOps + DataOps = Digital Transformation
DevOps + DataOps = Digital Transformation Delphix
 
The Power of DataOps for Cloud and Digital Transformation
The Power of DataOps for Cloud and Digital Transformation The Power of DataOps for Cloud and Digital Transformation
The Power of DataOps for Cloud and Digital Transformation Delphix
 
GDPR Fast Start
GDPR Fast StartGDPR Fast Start
GDPR Fast StartDelphix
 
DataOps in Financial Services: enable higher-quality test ing + lower levels ...
DataOps in Financial Services: enable higher-quality test ing + lower levels ...DataOps in Financial Services: enable higher-quality test ing + lower levels ...
DataOps in Financial Services: enable higher-quality test ing + lower levels ...Ugo Pollio
 
Accelerate Design and Development of Data Projects Using AWS
Accelerate Design and Development of Data Projects Using AWSAccelerate Design and Development of Data Projects Using AWS
Accelerate Design and Development of Data Projects Using AWSDelphix
 
Strengthen Cloud Security
Strengthen Cloud SecurityStrengthen Cloud Security
Strengthen Cloud SecurityLora O'Haver
 
Accelerating Secure SAP Application Delivery
Accelerating Secure SAP Application Delivery Accelerating Secure SAP Application Delivery
Accelerating Secure SAP Application Delivery Delphix
 
Confessions of the AppDev VP Webinar (Delphix)
Confessions of the AppDev VP Webinar (Delphix)Confessions of the AppDev VP Webinar (Delphix)
Confessions of the AppDev VP Webinar (Delphix)Sam Molmud
 
Confessions of the AppDev VP
Confessions of the AppDev VPConfessions of the AppDev VP
Confessions of the AppDev VPDelphix
 
Oracle Open World 2017 Delphix and DBVisit
Oracle Open World 2017 Delphix and DBVisitOracle Open World 2017 Delphix and DBVisit
Oracle Open World 2017 Delphix and DBVisitKellyn Pot'Vin-Gorman
 
Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely Skytap Cloud
 
Empowering Agile Development with Containers
Empowering Agile Development with ContainersEmpowering Agile Development with Containers
Empowering Agile Development with ContainersKellyn Pot'Vin-Gorman
 
The GDPR and What It Means to You
The GDPR and What It Means to YouThe GDPR and What It Means to You
The GDPR and What It Means to YouDelphix
 
Build a modern platform for anti-money laundering 9.19.18
Build a modern platform for anti-money laundering 9.19.18Build a modern platform for anti-money laundering 9.19.18
Build a modern platform for anti-money laundering 9.19.18Cloudera, Inc.
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud IBM Security
 
Data Agility for Enterprise DevOps Adoption
Data Agility for Enterprise DevOps AdoptionData Agility for Enterprise DevOps Adoption
Data Agility for Enterprise DevOps AdoptionDelphix
 
Secure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift EnvironmentsSecure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift EnvironmentsDevOps.com
 
CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101CipherCloud
 

Semelhante a Data Masking Secures Non-Prod Data (20)

Why Your Approach To Data Governance Needs a Major Update
Why Your Approach To Data Governance Needs a Major UpdateWhy Your Approach To Data Governance Needs a Major Update
Why Your Approach To Data Governance Needs a Major Update
 
A Data Privacy & Security Year in Review: Top 10 Trends and Predictions
A Data Privacy & Security Year in Review: Top 10 Trends and PredictionsA Data Privacy & Security Year in Review: Top 10 Trends and Predictions
A Data Privacy & Security Year in Review: Top 10 Trends and Predictions
 
DevOps + DataOps = Digital Transformation
DevOps + DataOps = Digital Transformation DevOps + DataOps = Digital Transformation
DevOps + DataOps = Digital Transformation
 
The Power of DataOps for Cloud and Digital Transformation
The Power of DataOps for Cloud and Digital Transformation The Power of DataOps for Cloud and Digital Transformation
The Power of DataOps for Cloud and Digital Transformation
 
GDPR Fast Start
GDPR Fast StartGDPR Fast Start
GDPR Fast Start
 
DataOps in Financial Services: enable higher-quality test ing + lower levels ...
DataOps in Financial Services: enable higher-quality test ing + lower levels ...DataOps in Financial Services: enable higher-quality test ing + lower levels ...
DataOps in Financial Services: enable higher-quality test ing + lower levels ...
 
Accelerate Design and Development of Data Projects Using AWS
Accelerate Design and Development of Data Projects Using AWSAccelerate Design and Development of Data Projects Using AWS
Accelerate Design and Development of Data Projects Using AWS
 
Strengthen Cloud Security
Strengthen Cloud SecurityStrengthen Cloud Security
Strengthen Cloud Security
 
Accelerating Secure SAP Application Delivery
Accelerating Secure SAP Application Delivery Accelerating Secure SAP Application Delivery
Accelerating Secure SAP Application Delivery
 
Confessions of the AppDev VP Webinar (Delphix)
Confessions of the AppDev VP Webinar (Delphix)Confessions of the AppDev VP Webinar (Delphix)
Confessions of the AppDev VP Webinar (Delphix)
 
Confessions of the AppDev VP
Confessions of the AppDev VPConfessions of the AppDev VP
Confessions of the AppDev VP
 
Oracle Open World 2017 Delphix and DBVisit
Oracle Open World 2017 Delphix and DBVisitOracle Open World 2017 Delphix and DBVisit
Oracle Open World 2017 Delphix and DBVisit
 
Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely
 
Empowering Agile Development with Containers
Empowering Agile Development with ContainersEmpowering Agile Development with Containers
Empowering Agile Development with Containers
 
The GDPR and What It Means to You
The GDPR and What It Means to YouThe GDPR and What It Means to You
The GDPR and What It Means to You
 
Build a modern platform for anti-money laundering 9.19.18
Build a modern platform for anti-money laundering 9.19.18Build a modern platform for anti-money laundering 9.19.18
Build a modern platform for anti-money laundering 9.19.18
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
 
Data Agility for Enterprise DevOps Adoption
Data Agility for Enterprise DevOps AdoptionData Agility for Enterprise DevOps Adoption
Data Agility for Enterprise DevOps Adoption
 
Secure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift EnvironmentsSecure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift Environments
 
CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101
 

Mais de Delphix

Fast Data Flow Is the Secret to Accelerating Digital Transformation
Fast Data Flow Is the Secret to Accelerating Digital TransformationFast Data Flow Is the Secret to Accelerating Digital Transformation
Fast Data Flow Is the Secret to Accelerating Digital TransformationDelphix
 
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020Delphix
 
90% of Enterprises are Using DataOps. Why Aren’t You?
90% of Enterprises are Using DataOps. Why Aren’t You?90% of Enterprises are Using DataOps. Why Aren’t You?
90% of Enterprises are Using DataOps. Why Aren’t You?Delphix
 
Simplify and Accelerate SQL Server Migration to Azure
Simplify and Accelerate SQL Server Migration to AzureSimplify and Accelerate SQL Server Migration to Azure
Simplify and Accelerate SQL Server Migration to AzureDelphix
 
Move and Secure Your Data
Move and Secure Your DataMove and Secure Your Data
Move and Secure Your DataDelphix
 
Confessions of a CIO
Confessions of a CIOConfessions of a CIO
Confessions of a CIODelphix
 
Let Data Flow: Removing the Latest DevOps Constraints with DataOps
Let Data Flow: Removing the Latest DevOps Constraints with DataOpsLet Data Flow: Removing the Latest DevOps Constraints with DataOps
Let Data Flow: Removing the Latest DevOps Constraints with DataOpsDelphix
 
Confessions of an IT Director
Confessions of an IT Director Confessions of an IT Director
Confessions of an IT Director Delphix
 
Confessions of the Tester
Confessions of the TesterConfessions of the Tester
Confessions of the TesterDelphix
 
Confessions of a Developer
Confessions of a DeveloperConfessions of a Developer
Confessions of a DeveloperDelphix
 
Confessions of a DBA: “I always avoid requests from DevOps” and Other Admissions
Confessions of a DBA: “I always avoid requests from DevOps” and Other AdmissionsConfessions of a DBA: “I always avoid requests from DevOps” and Other Admissions
Confessions of a DBA: “I always avoid requests from DevOps” and Other AdmissionsDelphix
 
Solving the Data Management Challenge for Healthcare
Solving the Data Management Challenge for HealthcareSolving the Data Management Challenge for Healthcare
Solving the Data Management Challenge for HealthcareDelphix
 
The Rise of DataOps: Making Big Data Bite Size with DataOps
The Rise of DataOps: Making Big Data Bite Size with DataOpsThe Rise of DataOps: Making Big Data Bite Size with DataOps
The Rise of DataOps: Making Big Data Bite Size with DataOpsDelphix
 
451 Research: Data Is the Key to Friction in DevOps
451 Research: Data Is the Key to Friction in DevOps451 Research: Data Is the Key to Friction in DevOps
451 Research: Data Is the Key to Friction in DevOpsDelphix
 
Platform for Cloud Migration — Accelerating and De-Risking your Cloud Journey
Platform for Cloud Migration — Accelerating and De-Risking your Cloud JourneyPlatform for Cloud Migration — Accelerating and De-Risking your Cloud Journey
Platform for Cloud Migration — Accelerating and De-Risking your Cloud JourneyDelphix
 

Mais de Delphix (15)

Fast Data Flow Is the Secret to Accelerating Digital Transformation
Fast Data Flow Is the Secret to Accelerating Digital TransformationFast Data Flow Is the Secret to Accelerating Digital Transformation
Fast Data Flow Is the Secret to Accelerating Digital Transformation
 
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
 
90% of Enterprises are Using DataOps. Why Aren’t You?
90% of Enterprises are Using DataOps. Why Aren’t You?90% of Enterprises are Using DataOps. Why Aren’t You?
90% of Enterprises are Using DataOps. Why Aren’t You?
 
Simplify and Accelerate SQL Server Migration to Azure
Simplify and Accelerate SQL Server Migration to AzureSimplify and Accelerate SQL Server Migration to Azure
Simplify and Accelerate SQL Server Migration to Azure
 
Move and Secure Your Data
Move and Secure Your DataMove and Secure Your Data
Move and Secure Your Data
 
Confessions of a CIO
Confessions of a CIOConfessions of a CIO
Confessions of a CIO
 
Let Data Flow: Removing the Latest DevOps Constraints with DataOps
Let Data Flow: Removing the Latest DevOps Constraints with DataOpsLet Data Flow: Removing the Latest DevOps Constraints with DataOps
Let Data Flow: Removing the Latest DevOps Constraints with DataOps
 
Confessions of an IT Director
Confessions of an IT Director Confessions of an IT Director
Confessions of an IT Director
 
Confessions of the Tester
Confessions of the TesterConfessions of the Tester
Confessions of the Tester
 
Confessions of a Developer
Confessions of a DeveloperConfessions of a Developer
Confessions of a Developer
 
Confessions of a DBA: “I always avoid requests from DevOps” and Other Admissions
Confessions of a DBA: “I always avoid requests from DevOps” and Other AdmissionsConfessions of a DBA: “I always avoid requests from DevOps” and Other Admissions
Confessions of a DBA: “I always avoid requests from DevOps” and Other Admissions
 
Solving the Data Management Challenge for Healthcare
Solving the Data Management Challenge for HealthcareSolving the Data Management Challenge for Healthcare
Solving the Data Management Challenge for Healthcare
 
The Rise of DataOps: Making Big Data Bite Size with DataOps
The Rise of DataOps: Making Big Data Bite Size with DataOpsThe Rise of DataOps: Making Big Data Bite Size with DataOps
The Rise of DataOps: Making Big Data Bite Size with DataOps
 
451 Research: Data Is the Key to Friction in DevOps
451 Research: Data Is the Key to Friction in DevOps451 Research: Data Is the Key to Friction in DevOps
451 Research: Data Is the Key to Friction in DevOps
 
Platform for Cloud Migration — Accelerating and De-Risking your Cloud Journey
Platform for Cloud Migration — Accelerating and De-Risking your Cloud JourneyPlatform for Cloud Migration — Accelerating and De-Risking your Cloud Journey
Platform for Cloud Migration — Accelerating and De-Risking your Cloud Journey
 

Último

What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 

Data Masking Secures Non-Prod Data

  • 1. © 2018 Delphix. All Rights Reserved. Private and Confidential.© 2018 Delphix. All Rights Reserved. Private and Confidential. Ilker Taskaya | Senior Solutions Engineer David Wells | Director, Masking Professional Services STEP UP YOUR SECURITY & PRIVACY WITH DATA MASKING
  • 2. © 2018 Delphix. All Rights Reserved. Private and Confidential. 1 Introduction 2 Key elements of solution 3 How masking works 4 Demo 5 Questions and Answers Agenda 2
  • 3. © 2018 Delphix. All Rights Reserved. Private and Confidential.© 2018 Delphix. All Rights Reserved. Private and Confidential. Introduction 3
  • 4. © 2018 Delphix. All Rights Reserved. Private and Confidential. Data Breach by the Numbers* 4 $3.62M Average Total cost of a data breach $141 Average cost of lost or stolen record 24,089 Average number of records compromised in a breach 27.7% Likelihood an organization experiences a breach over the next 2 years *Ponemon Institute: 2017 Cost of Data Breach Study
  • 5. © 2018 Delphix. All Rights Reserved. Private and Confidential. Non-Production Data Represents a Major Hidden Risk NON-PRODUCTION (80%) PRODUCTION DATA (20%) » Is constantly growing » Entails multiple types of repositories » Is often less protected by security and governance measures Non-Production Data:
  • 6. © 2018 Delphix. All Rights Reserved. Private and Confidential.© 2018 Delphix. All Rights Reserved. Private and Confidential. Key Elements of Solution 6
  • 7. © 2018 Delphix. All Rights Reserved. Private and Confidential. A Comprehensive Approach to Non-Prod Data Security SECURE APPLY automatic or custom masking with consistency, repeatability DISCOVER IDENTIFY sensitive data and create an enterprise-wide risk profile DELIVER DISTRIBUTE secure data to non-production environments in minutes
  • 8. © 2018 Delphix. All Rights Reserved. Private and Confidential. Delphix Dynamic Data Platform Deliver masked data in just minutes Application s File s Database s Rich APIs DD Controls Self Service Datapod s On- Prem Any Server Private Cloud Public Cloud Sync Compress Provision Compliance Policy Masking Distribute Audit & Report Manage VIRTUALIZE SECURE MANAGE DBA 8
  • 9. © 2018 Delphix. All Rights Reserved. Private and Confidential. Mask virtual copy one time Repeatable and Secure Data Delivery Mask once, deliver many 9 Production Source DEV QA • Provision a complete, virtual copy of production • Automatically discover and mask sensitive data • Distribute multiple masked copies packaged in data pods • Provide testers with self-service control • Easily refresh data copies Distribute secure copies in minutes
  • 10. © 2018 Delphix. All Rights Reserved. Private and Confidential. CLOUD Enable Secure Dev/Test in Hybrid Cloud Architectures 10 ON-PREMISE Production Source DEV QA• Synchronize with on-prem source • Compress and mask data • Replicate secure data to cloud-based instance • Provision data pods to consumers
  • 11. © 2018 Delphix. All Rights Reserved. Private and Confidential.© 2018 Delphix. All Rights Reserved. Private and Confidential. How Masking Works 11
  • 12. © 2018 Delphix. All Rights Reserved. Private and Confidential. Delphix Masking Protects Sensitive Data “DATA AT RISK” IS IN DATABASES Claimant Table ID First_Name 1 George 2 Mary 3 John Employee Table ID First_Name 5 John 6 George 7 Mary Claimant Table ID First_Name 1 Romanth 2 Clara 3 Damien Employee Table ID First_Name 5 Damien 6 Romanth 7 Clara UNMASKED DATA MASKED DATA ✓ REALISTIC ✓ REFERENTIAL INTEGRITY ✓ IRREVERSIBLE ✓ REPEATABLESENSITIVE DATA IN PRODUCTION Social Security Numbers, Credit Card Information, Patient Information, Email Addresses
  • 13. © 2018 Delphix. All Rights Reserved. Private and Confidential.© 2018 Delphix. All Rights Reserved. Private and Confidential. Demo 13
  • 14. © 2018 Delphix. All Rights Reserved. Private and Confidential. Benefits of Integrated Data Masking and Data Delivery 14 Provide SELF SERVICE Protect data EVERYWHERE your business operates • Implement data masking in on-prem, cloud, or hybrid environments • Broad support for multiple platforms, databases, and file systems • Automatically discover, protect, and audit sensitive data • Mask once, then deliver secure data everywhere in just minutes • Eliminate wait time for secure data • Give data consumers self-service control to refresh, rewind, share, and branch data • Maintain a single source or record for when, where, and how data is masked Make data masking EFFICIENT for data consumers
  • 15. © 2018 Delphix. All Rights Reserved. Private and Confidential. Over 30% of the Fortune 100 FINANCIAL HEALTHCARE TELECOMMANUFACTURINGRETAILTECHNOLOGY
  • 16. © 2018 Delphix. All Rights Reserved. Private and Confidential. QUESTIONS? ilker@delphix.com david.wells@delphix.com