Skip to main content

Blog

Insights, Innovations, and Best Practices from Perforce Experts

Blog

5 Ways Perforce Helps with DORA Regulation Compliance

The Digital Operational Resilience Act (DORA) regulation mandates cyber resilience requirements for financial institutions. Find out how Perforce helps with the DORA regulation.
Security & Compliance, DevOps, Data Management
Blog

The Future of Gaming: Game Development Trends from Our 2024 Report

We surveyed game developers around the globe for insights on the future of gaming and game development trends in the industry. Get an overview of our 2024 report.
Digital Creation & Collaboration, Version Control
Blog

Protecting Sensitive Data in Non-Production Environments: No Trade-Offs Necessary!

Learn why protecting sensitive data is critical, especially in non-production environments, and how to mitigate risks using effective masking techniques in this blog from Ann Rosen, Director of Product Marketing for Perforce Delphix.
Data Management, Security & Compliance
Blog

Masked vs. Unmasked Data: Unmasking the Real Value of Masked Data

Well-masked production data preserves existing implicit data relationships across the enterprise. Dive deeper into the real value of masked data.
Data Management, Security & Compliance
Blog

5 Military Aerospace Software Trends That Can Benefit From DO-178C

Growing trends in the aerospace and defense industry are pushing the adoption of DO-178C, the essential functional safety standard for aircraft software systems. Here are five trends increasing DO-178C certification for military software applications.
Coding Best Practices, Security & Compliance
Blog

AI and Data Privacy: 3 Things You Need to Know

AI data privacy has unique considerations compared to general data privacy. Find out key things to know about AI and data privacy in this blog post.
Security & Compliance, Data Management, AI
Blog

Using GitLab With Helix QAC

GitLab is an integrated solution that covers the entire DevOps lifecycle. And, Helix QAC is a static code analyzer that has been designed to optimize DevOps processes, like CI/CD Pipelines. When used together, these tools provide software development teams with a powerful solution.
DevOps
Blog

Data Masking vs. Data Encryption: How to Make the Right Choice

Discover the differences between data masking and data encryption. In this blog by Woody Evans, Vice President of Global Sales Engineering for Perforce Delphix, learn when to use each and how masking ensures compliance and security for non-production data. Plus, find out why data masking with Perforce Delphix is the best way to protect your data.
Data Management, Security & Compliance
Blog

Future-Proofing Your Enterprise Against Regulatory Compliance Changes

Regulatory compliance changes fast. But there are steps you can take to future-proof against regulatory changes. Get expert advice in this blog.
Data Management, Security & Compliance
Blog

Synthetic Test Data vs. Test Data Masking: How to Use Both

Synthetic test data and test data masking as a combined approach can be ideal. Find out when and how to use both approaches in this blog by Steve Karam, Principal Product Manager for Perforce Delphix.
Data Management, Security & Compliance, DevOps
Blog

Testing file replace functionality

Testing file replace functionality
DevOps
Blog

Non-functional Requirements: What They Do, Examples, and Best Practices

Non-functional requirements are the easiest to miss and the costliest to rectify. Learn what they are, what they do, what they look like, and how to write them.
Application Lifecycle Management