The second part of this question has a fairly simple answer; using the Delphix profiler will save time when assigning algorithms to your sensitive columns. The profiler provides both the capability to scan your databases to discover PII through pattern recognition as well as the ability to administer a uniform masking policy by automating assignment of methods (algorithms) to each column containing PII. The first step in implementing a masking program is to determine the masking security policy. This is the union of what and how – what are we masking and how are we transforming the data. Delphix algorithms are deterministic and using the Delphix profiler will assign algorithms to columns by data type uniformly. Once the profiler is configured, assignment of algorithms is automated and your security policy is implemented.
To answer the first part of this question, information stored in other tools can be integrated with Delphix Masking by using the API. It’s always best, however, to manage the masking inventory in Delphix masking to ease implementation of schema changes. The rules used for discovery via another tool can likely be implemented in Delphix since most discovery tools use some form of pattern recognition that could be transferred to your Delphix masking security policy. If this transfer is not possible you can use the masking API to port table and column lists to Delphix to set up your masking inventory. Recent versions of Delphix Masking support population of the masking inventory via the masking API. Requirements to use this approach are your list of sensitive tables and columns and the algorithms to be applied to each column type (domain). For more information on using the API for this please refer to column metadata functions in the masking API doc https://maskingdocs.delphix.com/Delphix_Masking_APIs/Masking_Client/Masking_API_Client/