Blogs

Be the first person to recommend this.
Not complying with data privacy laws can jeopardize an organization’s cybersecurity, finances, reputation, and more This article was originally published on the Delphix website here  December 1, 2022. O n Dec. 9, 2022, an important data privacy compliance deadline will pass for organizations that process U.S. consumers’ financial data. Under the Gramm-Leach-Bliley Act (GLBA)’s updated Safeguards Rule, organizations have until that day to comply with a series of data security practices that the landmark U.S. financial data privacy law has mandated, which include: Releasing periodic reports to boards of directors and governing ...
0 comments
1 person recommends this.
Infrastructure and operations (I&O) leaders can ready their organizations for an unpredictable future by making them more resilient and adaptable with the right skilled talent, adaptive infrastructure technology platforms, and adaptive operations. This article was originally published on the Delphix website here  November 20, 2022. I t was an exciting couple of days at the  2022 Gartner IT Infrastructure, Operations & Cloud Strategies Conference (IOCS)  in London, U.K., and given the fact it was a sold-out, in-person conference, this portends well for the future of in-person technology events. What I really like about ...
0 comments
1 person recommends this.
It's time for every CEO to become a technology CEO, as ‘digital know-how’ becomes the top differentiated skill for CEOs in 2022, displacing more traditional leadership skill sets This article was originally published on the Delphix website here  October 27, 2022. I t's time for every CEO to become a technology CEO, as ‘digital know-how’ becomes the top differentiated skill for CEOs in 2022, displacing more traditional leadership skill sets. This is exemplified in the findings from  IDCs 2022 Worldwide CEO Survey , which found that 95 percent of CEOs report they are pursuing a digital-first strategy. CEOs must take the ...
0 comments
1 person recommends this.
Any organization that extends credit or loans to US consumers needs to protect their personal information by the December deadline or risk non-compliance This article was originally published on the Delphix website here  September 15, 2022. B ack in 1999, the  Gramm-Leach-Bliley Act (GLBA) , also known as the Financial Modernization Act, opened new markets for financial institutions by allowing them to consolidate and offer any combination of investment banking, commercial banking, and insurance services to consumers. The GLBA has three primary sections: The Financial Privacy Rule, regulating the collection and disclosure ...
0 comments
1 person recommends this.
With automated test data, companies can achieve fast, quality software releases , more seamless cloud adoption, and improved data security and privacy for meeting emerging compliance requirements. This article was originally published on the Delphix website here  September 1, 2022. Too often, modern businesses are forced to choose between the speed of innovation and privacy and security for valuable data. The modern CIO must balance immense market and board pressure related to cybersecurity risks and compliance requirements, all while innovating fast enough for the business to achieve its goals. The truth is, data privacy and ...
0 comments
2 people recommend this.
Based entirely on 18 months’ worth of customer reviews on Gartner Peer Insights, Delphix is peer-recognized as a Customers’ Choice based on our Overall Rating and User Interest and Adoption This article was originally published on the Delphix website here  August 19, 2022. When it comes to excellence in business, nothing speaks louder than candid feedback from one’s customers or clients— after all, customers are the lifeblood of any business’s success. Giving customers an anonymized forum to share their opinions, however, gives such feedback even more weight by allowing customers to freely share their honest, unfiltered opinions ...
0 comments
1 person recommends this.
Delphix and Cockroach Labs partner to bring automation, compliance, and resilience to test data This article was originally published on the Delphix website here  August 12, 2022. Coauthored with Brian Muskoff . We are pleased to announce that Delphix and Cockroach Labs have partnered to build integrations between CockroachDB and the Delphix DevOps Data Platform. The joint solutions automate Continuous Data and Continuous Compliance for CockroachDB and enable data resiliency, compliance, and scalability for DevOps test data management (TDM). With the connectors, Delphix automates data provisioning and masking of CockroachDB ...
0 comments
Be the first person to recommend this.
We are aware of the recently published vulnerabilities in OpenSSL v3.0.0 - 3.0.6 ( CVE-2022-3602 & CVE-2022-3786 ). OpenSSL 1.1.1 and 1.0.2 are not affected by this issue.  These vulnerabilities are only realized in certain circumstances where an attacker can control the content of a certificate presented to either a client or server and either a CA has signed a malicious certificate or the victim continues certificate verification despite failure to construct a path to a trusted issuer.   Delphix products do not use any of the affected versions of OpenSSL. Impact: There is no impact to the Delphix Continuous Data (Virtualization) ...
0 comments
1 person recommends this.
Delphix's four Data Company Summits produced numerous insights about sustainability and digital transformation. Here are the three biggest takeaways from the series. This article was originally published on the Delphix website here  August 1, 2022. In May and June, visionary technology leaders representing global brands convened at four Data Company Summits (DCS) across the world to discuss strategies for uniting sustainability and digital transformation— issues that are paramount to modern enterprises. I’m proud to say that the panel discussions, keynote sessions, and networking receptions at each summit produced vibrant conversations ...
0 comments
1 person recommends this.
Three critical questions to ask when selecting an enterprise-scale solution for masking Salesforce sandboxes. This article was originally published on the Delphix website here  January 24, 2022. At most businesses, Salesforce data is the centerpiece of the customer record. With increasing cyber security threats and  data breaches , this data (which often contains critical PII data) can also be a big compliance and privacy risk. Companies rely on Salesforce data to test applications and provide their customers with new innovations to grow their business. As a result, many people across a business need access to Salesforce data ...
0 comments
1 person recommends this.
The new Terraform Provider for Delphix allows users to automatically provision fresh, compliant, and complete test data environments. This article was originally published on the Delphix website here  September 08, 2022. Introducing the new Terraform Provider for Delphix Over the last decade, almost all parts of the enterprise application stack have been automated.  Today, APIs can be used to provision software, servers, storage, and networks in private and public clouds.  Terraform , backed by HashiCorp, has played a significant role in enabling that automation and has become a near-ubiquitous tool for managing infrastructure-as-code. ...
0 comments
1 person recommends this.
Once-a- day backups leave a whole day’s worth of transactions unprotected. In the digital economy, losing such an enormous amount of data can significantly hurt a business, even putting it at risk of liabilities. This article was first published in SC Magazine  Nov 2, 2021. When ransomware shut down  Colonial Pipeline  in May, after a week of deliberating the company finally gave in and paid the ransom. When ransomware shuts down plants that process one-fifth of the meat in the U.S., the parent company paid the ransom. More than one-third of healthcare organizations faced a  ransomware attack  in 2020, facing the same stark choices. ...
0 comments
1 person recommends this.
Ransoms are just one portion of the total cost of a ransomware attack. Recovery becomes costly as businesses suffer the majority of their losses through lost productivity, and backups don’t preclude expensive recovery. This article was originally published on the Delphix website here  September 29, 2021. Modern-day ransomware attacks are vastly different from the malware attacks from the past. Threat actors have become so sophisticated in their techniques that it’s become tougher and tougher for companies to detect and recover from these malicious activities.  Since 2016,  more than 4,000 ransomware attacks  have happened ...
0 comments
2 people recommend this.
Whether it’s challenges related to data privacy, compliance or a lack of resources and skills, FS organisations need to overcome the hurdles currently impeding the Open Banking revolution. This article was first published in Finance Digest . The financial services (FS) sector is currently undergoing a massive transformation. With the adoption of new digital habits, consumers expect greater convenience, choice, and flexibility in their banking relationships. At the same time, concerted regulatory pressure to encourage innovation and drive competition in banking has accelerated FS organisations’ investment in Open Banking initiatives ...
0 comments
1 person recommends this.
MSSQL Advanced database connectors are widely used to permit customers to access their databases via a domain user account on the Delphix Continuous Compliance engine (KBA reference: Configuring_Masking_Connector_for_Microsoft_SQL_(MSSQL)_(KBA1214) ). However, starting from Delphix Continuous Compliance version 6.0.6.0, customers are able to provide a Customer Properties File where they can pass on to the JDBC driver all the extra properties required. Please consider updating your configuration to take advantage of this new functionality, as we may deprecate the MSSQL Advanced connectors in a future release. Advanced Connector Configuration ...
0 comments
1 person recommends this.
Even if organizations have backups, the associated data loss and disruption caused by long restore times is often more costly than just paying off the criminals and being done with it. This article was first published on GCN  Sept 7, 2021. One of the reasons ransomware attacks are successful is that victims cannot afford to be offline. Even if organizations have backups, the associated data loss and disruption caused by long restore times is often more costly than just paying off the criminals and being done with it. Sometimes it’s even worse: Cybercriminals have been known not only to encrypt an organization’s data but also to ...
0 comments
1 person recommends this.
With pride for our first two data company summits , we’re excited for what lies ahead. This article was originally published on the Delphix website here  June 21, 2021. In 2021, approximately  74 zettabytes  — or 74 billion terabytes — of data were consumed across the world. That number will more than double by 2024, when the world is projected to consume 149 zettabytes of data. Data will only grow in importance as an essential component of IT innovation— and as enterprises prioritize digital transformation, technology executives have the opportunity to adopt more effective and sustainable data management processes to set a new ...
0 comments
3 people recommend this.
We are excited to announce that with the upcoming 6.0.15 release targeted for July 2022, we will have completed the transition of all of our masking algorithms to the new algorithm library. The completed algorithm library affords our customers a number of important improvements over our legacy algorithm technology, including performance, extensibility, security, and portability. As we have upgraded our algorithms, we have strived to make sure we are producing the same output values as before in order to minimize re-mask events in your environments. We took this approach because we are extremely sensitive to the amount of effort required to re-mask interdependent ...
0 comments
1 person recommends this.
Healthcare companies are embracing DevOps automation for faster digital transformation, but slow, manual data delivery constrains success This article was originally published on the Delphix website here  September 7, 2021. With rising competition and increasing member/patient demand for digital services, health insurers and providers have adopted DevOps processes to accelerate software modernization, AI/ML, and cloud migration. But, the data needed for DevOps is often hard to deliver and access. Due to the sheer size and complexity of data in  healthcare systems —including claims processing, member management, billing, policy ...
0 comments
3 people recommend this.
We are aware of the recently reported denial of service (DoS) vulnerability in Spring Framework , reported as CVE-2022-22950 . This vulnerability is only realized in cases where the Spring Expressions Language (SpEL) is in use (see both the announcement from spring.io and the analysis from Checkmarx ).  Delphix products do not make use of SpEL and are not impacted by this vulnerability. Impact There is no impact to either the Delphix Virtualization (Continuous Data) engine or the Delphix Masking (Continuous Compliance) Engine. There is no impact to Data Control Tower (DCT) SaaS. There is no impact to Data ...
0 comments