Skip to main content
Headshot of Ilker Taskaya, Field CTO for Perforce Delphix.

Ilker Taskaya

Field CTO, Perforce Delphix

Latest Content from Ilker Taskaya

Blog

Snowflake Data Masking: How It’s Used & How It Works with Perforce Delphix

Snowflake data masking offers built-in protection of sensitive data. Learn how it’s used and how Snowflake masking works with Perforce Delphix from Perforce experts Jatinder Luthra and Ilker Taskaya.
Security & Compliance, Data Management, AI
Blog

3 Best Practices for SQL Data Masking at Scale

Discover how to efficiently mask SQL data at scale. Explore the best practices based on our extensive experience with large enterprises.
Security & Compliance, Data Management
Blog

Oracle Data Masking at Scale: How Delphix Transforms Your Approach

Discover Oracle data masking techniques and solutions. Learn how Delphix enables seamless masking for hybrid environments, protecting sensitive data across Oracle and beyond.
Data Management, Security & Compliance
Video

2024 Masking Insights: Revealed and Analyzed by the Delphix Experts

How are enterprises securing sensitive data in non-production environments? This webinar reveals insights from 200+ global leaders, covering data masking and compliance strategies.
Data Management, Security & Compliance, Delphix
Blog

9 Best Practices for PII Masking

Employing PII data masking is an excellent way to ensure data security and data privacy compliance. Find out the best practices for PII masking in this blog post.
Data Management, Security & Compliance
Blog

Static Data Masking vs. Dynamic Data Masking: What’s the Best Approach?

Hear from Perforce Delphix experts on the key differences between static data masking vs. dynamic data masking. Plus, find out why static data masking is a more powerful way to protect sensitive data in non-production environments.
Data Management, Security & Compliance
Blog

De-identification with Healthcare Data - What the Salesperson Can’t Tell You!

Learn the one secret a salesperson can’t tell you when it comes to de-identifying your sensitive data.
Data Management, Security & Compliance