View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Hardware
March 11, 2020

Bottlenecks, Silos and Compliance: How to Overcome the Barriers to Data Transformation

A Delphix Dining Club tackles the topics...

By CBR Staff Writer

Data has the potential to transform businesses – driving critical operations and acting as the foundation of application development that is creating new digital experiences.

So far so good but challenges persist. Namely, many organisations are struggling to move, manage and harness their data at speed. It sits in multiple places, access remains a manual process in many instances, and data ownership and use are subject to increasing regulation – such as GDPR, PCI and HIPPA – and audit requirements. This confluence of forces means that data is now often the slowest part of the application development value chain.

To explore the data challenge Computer Business Review, in association with Delphix, brought together senior IT, security and data leaders together to discuss bottlenecks, silos and compliance – and sought to understand how to overcome the barriers to data transformation.

Delphix’s Gary Hallam kicked off the evening explaining the merits of his company’s approach to data access and back up.

Rather than producing complete copies of databases, Delphix reduces time and overhead by copying only the data that has changed, masking data that needs to be secured, and providing users pointers to the data that is relevant to them.

Among the issues that created most debate as the evening progressed, attendees wanted to understand how to protect personally identifiable data, ensure compliance to GDPR and other regulations, how to delete data and restore databases, and how to manage data in the cloud.

‘Bottlenecks, silos and compliance: How to overcome the barriers to data transformation’, a CBR Dining Club event in association with Delphix, took place on Thursday 5 March at Christopher’s Grill, Covent Garden, London

Content from our partners
Unlocking growth through hybrid cloud: 5 key takeaways
How businesses can safeguard themselves on the cyber frontline
How hackers’ tactics are evolving in an increasingly complex landscape

Topics in this article : , ,
Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU