Data Compliance in a Zero
Trust World

Traditional perimeter-based security policies are no longer sufficient for today’s complex and decentralised enterprise IT environments. Once attackers breach the perimeter, movement can be difficult to detect. 

Zero Trust assumes there is no implicit trust granted to assets, user accounts, microservices, or data based solely on their location. Under a Zero Trust policy, every user and transaction must be validated before access to an enterprise resource is granted. 

A comprehensive data compliance program is a foundational element of a Zero Trust model. And for non-production environments used by application development and analytics teams, ‘verify but still not trust’ is a principal concept.

Learn how to:

  • Ensure data protection when sharing data across your business ecosystem
  • Establish a ‘default deny’ policy with automated anonymisation of sensitive data
  • Maintain referential integrity when integrating diverse data sources  
  • Eliminate risk of non-compliance with new and evolving privacy regulations






Henry Carse - Senior Solutions Engineer, Delphix

Coming from a Healthcare Systems implementation background, Henry knows first hand the importance of masking sensitive data and the headaches that come with trying to do that without the right tools. Moving into a technical, pre-sales allowed him to make a positive impact to more organisations by fitting customer needs to great products.


Zoran Duvnjak - Senior Solutions Engineer, Delphix

With a solid background as java developer, load and performance expert and APM pre-sales, Zoran worked on both sides of the customer. As an IT consultant always focusing on the needs and demands of the customer and as APM pre-sales also providing business value to those needs. Connecting business value to the technical and security requirements of an IT project are crucial for every product launch.