Delphix Rolls Out Data Masking For App Dev Security - InformationWeek
IoT
IoT
Cloud // Platform as a Service
Commentary
4/11/2016
10:06 AM
50%
50%

Delphix Rolls Out Data Masking For App Dev Security

Delphix 5.0 adds selective data distribution, which includes masking, as well as support for Oracle E-Business Suite and IBM DB2 to existing data virtualization capabilities.

7 Reasons The IoT Will Run On PaaS
7 Reasons The IoT Will Run On PaaS
(Click image for larger view and slideshow.)

Security protocols and agile development needs can sometimes collide. When they do, at least one important aspect of IT will suffer. Delphix has provided data virtualization software to help development and testing teams for some time. With the new 5.0 release of its eponymous software, the company has added data masking to help minimize clashes between developers and security officers.

Many development and testing groups have used synthetic data -- data that is in the form of the actual application data, but with gibberish content -- for building applications. The problem is that synthetic data can either introduce (or sometimes mask) issues within the application that might be based on patterns within the data itself.

(Image: 4x6/iStockphoto)

(Image: 4x6/iStockphoto)

The Delphix masking process replaces the data in sensitive fields, such as customer name, social security number, or other identifying information, with data that is similar in form but completely unrelated to the actual data. In combination with the data virtualization capability, this means that every developer on a team can be given their own database to use during development. Later in the process, every tester can also have a data set to call their own.

The masking capability is part of Delphix Selective Data Distribution, in which data sets are synchronized, masked, and replicated in real time. In a telephone interview with InformationWeek, Daniel Graves, VP of products at Delphix, said that replicated data sets can be key to moving development environments to a cloud infrastructure, where the "bursty" nature of development and test runs can be economically absorbed in rapid setup and tear down cycles.

Learn to integrate the cloud into legacy systems and new initiatives. Attend the Cloud Connect Track at Interop Las Vegas, May 2-6. Register now!

When asked about the possibility of using data masking for obfuscating information to allow, for example, offshore processing of sensitive medical data, Graves pointed out that Delphix offers two possibilities for keeping sensitive data safe -- data masking is a non-reversible processes designed to allow safe data set virtualization, while data tokenization is a reversible process that can be used to obfuscate data sent for processing, then reversed when the processed data set is returned. Delphix software can perform both operations on the same data set, masking some fields while others are tokenized.

In addition to selective data distribution, Delphix 5.0 adds support for a greater swath of the application stack and a new database. The application stack is specifically the one that runs up and down the Oracle E-Business Suite, allowing Delphix to populate a full application for testing and development purposes. Delphix can now virtualize data from Oracle, SAP, PeopleSoft, SharePoint, and other enterprise applications platforms.

Delphix has also added support for IBM DB2, bringing it alongside Oracle, Microsoft SQL Server, and other popular enterprise databases as candidates for virtualization. Delphix is available as either on-premises or cloud implementations to provide data as a service to developers and testers. Delphix 5.0 is available immediately from Delphix and from its partner channel.

Curtis Franklin Jr. is Senior Editor at Dark Reading. In this role he focuses on product and technology coverage for the publication. In addition he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and ... View Full Bio
We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
Commentary
AI as a Human Right
Guest Commentary, Guest Commentary,  3/8/2019
News
How to Become a Master Scrum Master
John Edwards, Technology Journalist & Author,  2/28/2019
News
TaylorMade IT Spin-Off Taps Cloud Database
Jessica Davis, Senior Editor, Enterprise Apps,  2/15/2019
White Papers
Register for InformationWeek Newsletters
Video
Current Issue
Security and Privacy vs. Innovation: The Great Balancing Act
This InformationWeek IT Trend Report will help you better understand and address the growing challenge of balancing the need for innovation with the real-world threats and regulations.
Slideshows
Flash Poll