Whitepaper: Meeting GDPR Challenges with Delphix - 70368

Report Details

GDPR introduces stringent controls over the processing of PII relating to people resident in the EU with high penalties for non-compliance.  Compliance requires costly controls that can be justified for processing of PII with direct business benefits.  However, using PII for non-production purposes such as development and test, incur the same risks and need the same costly controls.  Organizations can avoid these risks and costs by using data masking techniques to remove PII from data used for non-production purposes. The Delphix Dynamic Data Platform can help organizations to reduce the costs and risks associated with this use of personal data.


Date Title
Feb 28, 2018

Whitepaper: Meeting GDPR Challenges with Delphix - 70368

GDPR introduces stringent controls over the processing of PII relating to people resident in the EU with high penalties for non-compliance.  Compliance requires costly controls that can be justified for processing of PII with direct business benefits.  However, using PII for…

Read on KC PLUS

Latest Related Reports

Executive View

Oracle Cloud Guard

Poorly managed security controls within a cloud services tenant's resources are increasingly the cause of security incidents and compliance failures. CSPM (Cloud Security Posture Management) tools provide functionality to address this challenge. This report provides a review of Oracle Cloud…

Executive View

Oracle Data Safe

Oracle Data Safe is a cloud-based service that improves the security of Oracle databases on-premises and in the cloud by identifying risky configuration, users, and sensitive data, which allows customers to closely monitor user activities and ensure data protection and compliance.

Executive View

Microsoft Cloud App Security

Many organizations are using cloud services, but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use of the cloud, to control which cloud services can be accessed and to protect the data held in these services.…

Market Compass

Cloud-delivered Security

The KuppingerCole Market Compass provides an overview of the broad market of cybersecurity solutions delivered from the cloud, focusing primarily on Zero Trust and Secure Access Service Edge (SASE) functional capabilities and user experiences targeted towards employees and other end users.

Leadership Compass

Datenbank- und Big-Data-Sicherheit

Dieser Leadership Compass bietet einen Überblick über den Markt für Datenbank- und Big-Data-Sicherheitslösungen sowie einen Leitfaden und Empfehlungen für die Wahl von denjenigen Produkten zum Schutz und zur Verwaltung vertraulicher Daten, die Ihre Anforderungen am…

Leadership Compass

Database and Big Data Security

This Leadership Compass provides an overview of the market for database and big data security solutions along with guidance and recommendations for finding the sensitive data protection and governance products that best meet your requirements. We examine the broad range of technologies…

Executive View

Oracle APEX – secure low-code application development platform

Oracle Application Express (APEX) is a low-code development platform that allows business users with limited IT skills to design and maintain scalable enterprise applications, storing their data securely in the Oracle Autonomous Database. 

Leadership Compass

Enterprise Databases in the Cloud

This Leadership Compass provides an overview of the enterprise databases offered primarily as managed services to enable modern cloud-native application architectures as well as data processing and analytics at scale. We examine both the portfolios of large cloud service providers and…

Whitepaper

Safeguarding Your Most Valuable Data: Five Key Criteria to Assess Cloud Provider Security

This whitepaper focuses on defining the key security-focused selection criteria to help your company choose a secure platform for current and future cloud projects.

Executive View

R&S®Trusted Gate - Secure Glocalization von Rohde & Schwarz Cybersecurity

Rohde & Schwarz Cybersecurity ermöglicht eine zuverlässige Verarbeitung regulierter und sensibler Informationen für die Zusammenarbeit und zum Dateiaustausch in gemeinsamen SharePoint-Plattformen für Organisationen in verschiedenen Ländern und Regionen unter…


KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

IGA in a World of Zero Trust

IGA in a World of Zero Trust
Richard Hill

Zero Trust is a key paradigm for cybersecurity today, used well beyond the security circles. The goal is building cybersecurity that “never (blindly) trusts”, but “always verifies.” This traditionally meant verifying Who has access to What resource. In the past, the Who typically meant a human with a digital identity being given access to some application within an organization. Once the individual was given access to said application, that individual would be verified [...]

Hot Topics


Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00