Data Company Central

 View Only

Gartner® Peer Insights™ “Voice of the Customer” Report Identifies Delphix as Customers’ Choice for Data Masking

By Joshua Harbert posted 11-22-2022 09:00:53 AM

Based entirely on 18 months’ worth of customer reviews on Gartner Peer Insights,
Gartner® Peer Insights™ “Voice of the Customer” Report Identifies Delphix as Customers’ Choice for Data Masking
Delphix is peer-recognized as a Customers’ Choice based on our Overall Rating and User Interest and Adoption

This article was originally published on the Delphix website here August 19, 2022.

When it comes to excellence in business, nothing speaks louder than candid feedback from one’s customers or clients— after all, customers are the lifeblood of any business’s success. Giving customers an anonymized forum to share their opinions, however, gives such feedback even more weight by allowing customers to freely share their honest, unfiltered opinions and critiques without consequence.

Gartner provides precisely this type of anonymous forum for B2B enterprise software and services decision-makers with Gartner Peer Insights. Once a year, Gartner compiles unscripted and anonymous insights about technology vendors into valuable Voice of the Customer reports that summarize what enterprise customers think of top vendors within individual market segments.

We’re proud to announce that, based entirely on 18 months’ worth of customer reviews on Gartner Peer Insights, Delphix achieved the highest Overall Rating of 4.5/5, based on 33 reviews as of 30 April 2022, among 14 vendors in the data masking market segment. Delphix is peer-recognized as a Customers’ Choice based on our Overall Rating and User Interest and Adoption. 94% of our customers would recommend Delphix, with one $10-30 billion banking customer calling our Continuous Compliance data masking solution the “Ultimate Solution For All Data Masking Challenges.”

Data masking is an important tool for many contemporary businesses, as maximizing cybersecurity and data privacy compliance remain top priorities for enterprises across the world. Cybersecurity threats are on the rise, and the Identity Theft Resource Center reported over a 68 percent uptick in data compromises between 2020 and 2021. Hackers have also begun targeting enterprises’ non-production environments, with one hacker notoriously using an unprotected router to gain access to T-Mobile’s production, staging, and development servers in 2021. Non-production environments constitute about 80% of an enterprise’s attack surface area— and the T-Mobile breach both exposed 50 million customers’ sensitive information and ultimately cost the company half a billion dollars— $350 million for a class-action lawsuit settlement and an additional $150 million to enhance their security.

Meanwhile, numerous countries have implemented international data privacy/protection laws to protect their citizens’ data, including the European Union’s GDPR, Brazil’s LGPD, the United States’ Gramm-Leach-Bliley Act for U.S. providers of financial products and services, and California’s CCPA. Non-compliance with these regulations risks businesses reputational harm plus significant fines— each GDPR violation can cost up to 4 percent of a company’s annual global revenues or €20 million (about $22 million)— whichever is highest.

Data masking remains a pragmatic option for enterprises striving to both secure their data and achieve compliance with data privacy regulations across the globe. By irreversibly replacing sensitive data values with fictitious but realistic equivalents that maintain referential integrity in development environments, data masking ensures that an enterprise’s data complies with virtually any data privacy law without it being able to be nefariously exploited in the event of a breach.

However, data masking comprises just one part of DevOps test data management. According to Gartner, “DevOps Test Data Management (TDM) is the process of providing DevOps teams with data to evaluate the performance, functionality and security of applications. It typically includes copying production data, anonymization or masking, and, sometimes, virtualization. In some cases, specialized techniques, such as synthetic data generation, are appropriate. Given potential compliance and privacy issues, the effort frequently involves members of application and data security teams.”1

The Delphix DevOps Data Platform parallels the Gartner definition of DevOps TDM, while also automating DevOps TDM processes with APIs. Our Continuous Compliance solution identifies sensitive information across an enterprise and automates data masking wherever data resides. And whereas many masking solutions require specialized programming knowledge, expensive service engagements, and months to implement, Continuous Compliance can easily be operationalized in a span of days. But Continuous Compliance is just one half of the Delphix platform; the other half is our Continuous Data solution, which virtualizes data to decrease data footprints by 10 times, while accelerating provisioning by 100 times.  

Delphix’s work with Molina Healthcare exemplifies our platform’s ability to solve multiple DevOps TDM issues for our customers. Not only was Molina able to use Delphix to automate masking for its non-production data, but it was able to deliver secure datasets to those downstream environments. Implementing Delphix allowed Molina to save 4 PB in storage, reduce its environment provisioning time to 10 minutes and collectively reduce its application building schedules by 50 percent.

Learn more about how the Delphix platform can address your data masking needs while also solving the rest of your DevOps TDM challenges

1: Gartner Hype Cycle for Agile & DevOps, 13 July 2022 • ID G00772103
By Keith Mann, Joachim Herschmann, Akis Sklavounakis 
Gartner, Gartner Peer Insights ‘Voice of the Customer’: Data Masking, Peer Contributors, 30 June 2022. GARTNER is a registered trademark and service mark, and PEER INSIGHTS is a trademark and service mark, of Gartner, Inc. and/or its affiliates in the U.S. and internationally and are used herein with permission. All rights reserved. Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences with the vendors listed on the platform, should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.