{"id":50399,"date":"2023-02-24T10:57:31","date_gmt":"2023-02-24T15:57:31","guid":{"rendered":"https:\/\/sdtimes.com\/?p=50399"},"modified":"2023-02-24T10:57:31","modified_gmt":"2023-02-24T15:57:31","slug":"dont-let-data-compliance-block-software-innovation-automation-is-the-key","status":"publish","type":"post","link":"https:\/\/sdtimes.com\/software-development\/dont-let-data-compliance-block-software-innovation-automation-is-the-key\/","title":{"rendered":"Don\u2019t let data compliance block software innovation; automation is the key"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">The need for the digital transformation of business processes, operations, and products is nearly ubiquitous. This is putting development teams under immense pressure to accelerate software releases, despite time and budget constraints. At the same time, compliance with data privacy and protection mandates, as well as other risk mitigation efforts (e.g., zero trust), often choke the rate of innovation by making it harder for development teams to acquire and use high-quality test data.<\/span> <span style=\"font-weight: 400;\">Is it possible to achieve both of these seemingly opposing requirements, speed and protection?\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The answer lies in a familiar tactic: automation. Development teams are increasingly adept at automating huge chunks of their work, from setting up the necessary infrastructure environments to building, integrating, testing, and releasing software. Call it DevOps or CI\/CD, the tactic is the same: ruthlessly automate mundane or repetitive tasks. To ensure compliance requirements don\u2019t hinder development, IT leaders must similarly prioritize automating data profiling and protection as a normal part of their development pipelines.\u00a0<\/span><\/p>\n<h5><b>The growing impact of data privacy on software development<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">The regulatory landscape for data privacy and protection continues to grow, resulting in ever-increasing, and increasingly complex, compliance requirements. In fact, McKinsey found <\/span><a href=\"https:\/\/www.mckinsey.com\/capabilities\/risk-and-resilience\/our-insights\/localization-of-data-privacy-regulations-creates-competitive-opportunities\"><span style=\"font-weight: 400;\">three quarters of all countries<\/span><\/a><span style=\"font-weight: 400;\"> have adopted data localization rules, which have \u201cmajor implications for the IT footprints, data governance, and data architectures of companies, as well as their interactions with local regulators.\u201d\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Existing data privacy regulations such GDPR in the EU and HIPAA in the US, updates to older mandates (e.g., the recently updated <\/span><a href=\"http:\/\/link_to_steven_blog_post\/\"><span style=\"font-weight: 400;\">Federal Trade Commission (FTC) Safeguards Rule<\/span><\/a><span style=\"font-weight: 400;\"> mandated by the Gramm-Leach-Bliley Act), and new and emerging laws (e.g., Virginia Consumer Data Protection Act, Canada\u2019s Consumer Privacy Protection Act) all threaten to slow down software development and innovation by adding layers of security requirements onto the development process.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Even without the introduction of new privacy mandates, the impact of data privacy and security requirements on development is almost certain to grow. For one thing, development and testing environments have proven to be rich attack targets for threat actors. From source code management systems to infrastructure such as virtual test servers to the test data itself, all are attractive targets for bad actors seeking to compromise systems and data. Add in the many different cloud development platforms like Salesforce and SAP, and it\u2019s clear there is plenty of opportunity for a hungry hacker with nefarious intentions.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Therefore teams must ensure the entire application lifecycle is secure, including development and test environments, whether on-prem or in the cloud. How do IT and security accomplish this without slowing development and release cycles? The answer lies in test data automation.<\/span><\/p>\n<h5><b>Test data management meets DevOps<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">The software development process is reliant on access to fresh test data. Traditional methods for managing and provisioning test data are typically manual and tremendously slow \u2013 think ticketing systems and siloed, request-fulfill models that can take days or even weeks. These processes are very much at odds with modern development methods such as DevOps and CI\/CD, which demand fast, iterative release cycles.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is where application innovation often grinds to a halt. DevOps and DevSecOps processes have automated quality assurance testing and security and compliance testing throughout the CI\/CD pipeline. But data provisioning and governance has remained a manual and time-consuming practice. Enter DevOps test data management (TDM) which automates the \u201clast mile\u201d of DevOps and provides fast delivery of lightweight, protected data in minutes instead of days, weeks or months. With DevOps TDM, organizations can accelerate development and testing, and in turn, can increase compliance and innovation.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Just how much can DevOps TDM accelerate software innovation? Consider <\/span><a href=\"https:\/\/www.delphix.com\/webinar\/how-dell-flipped-developer-productivity\"><span style=\"font-weight: 400;\">one example<\/span><\/a><span style=\"font-weight: 400;\"> from Dell Technologies. The technology giant\u2019s developers needed quick access to fresh test data, but, like many other organizations, manually provisioning the data was a slow, tedious process.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">By automating DevOps test data management, Dell significantly increased the speed and efficiency of its test data provisioning and governance. Now, 92% of Dell\u2019s ~160 global, non-production database environments are refreshed automatically on a bi-weekly basis. Developers can now initiate releases through their CI\/CD pipelines in just 17 minutes. This has allowed the Dell team to run 6 million pipelines the first quarter of 2022, and <\/span><i><span style=\"font-weight: 400;\">more than 50 million <\/span><\/i><span style=\"font-weight: 400;\">since they implemented this standardized, automated approach.\u00a0<\/span><\/p>\n<h5><b>Shrink the surface area of private data<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">Antiquated approaches to test data management often rely on scripts or otherwise poorly integrated processes that result in the proliferation of sensitive data throughout the enterprise. It\u2019s not uncommon for each development environment to have its own copy of sensitive production data for testing purposes. And often developers maintain their own copies for coding and unit testing. Many enterprises end up with hundreds or even thousands of uncontrolled copies of sensitive data.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Privacy mandates and security policies treat these copies of sensitive data no differently than the production databases from which they were spawned. Sensitive data such as personally identifiable information (PII) or cardholder data must be secured to the same degree, whether or not it&#8217;s in production. This often <\/span><a href=\"https:\/\/ico.org.uk\/for-organisations\/guide-to-data-protection\/guide-to-the-general-data-protection-regulation-gdpr\/security\/encryption\/\"><span style=\"font-weight: 400;\">translates into requiring encryption<\/span><\/a><span style=\"font-weight: 400;\"> both at rest and in transit, as well as carefully managed access controls and other protections. And then there are the near-universal requirements for the right to be forgotten. Privacy mandates regularly require businesses to destroy personal data upon request. It does not matter where that data lives.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The solution is eliminating the replication of sensitive data through the use of data masking. To provide production-quality data to your teams and non-production environments without multiplying the burden of security and privacy protections, DevOps TDM approaches \u2014 when implemented properly \u2014 automate the masking of sensitive data. In effect, this step shrinks the surface area that you must protect. This reduces your compliance and security risks as well as the impact on your budget.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Quite simply, having less sensitive data strewn about your business means less you to protect. Automation can make that possible.<\/span><\/p>\n<h5><b>Starting small but thinking big<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">Automating with DevOps TDM may appear overwhelming at first. Where do you start? But this is one change where it is very easy to start small, automating test data delivery and masking for just one or a handful of applications. Many businesses begin by addressing their most sensitive environments and where CI\/CD pipelines already exist, such as customer-facing apps. Here, the need for protection and the underlying automation framework (i.e., the DevOps toolchains) already exist.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">But businesses should also think big as they evaluate solutions. The number of distinct data sources is likely to expand over time. You might have a SQL database on AWS today, but then add your Salesforce platform and mainframe DB2 into the mix in the future. Masking these data sources while preserving referential integrity across them may prove challenging but is essential to effective integration and user acceptance testing.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Ultimately, businesses centralize DevOps TDM while giving their development teams autonomy over the acquisition and use of test data. Centralization means you can apply policies for the masking of sensitive fields and use database virtualization to cost-effectively provision data.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The benefits of DevOps TDM are substantial. Not only do businesses improve compliance and mitigate risks, they also speed up development and reduce costs. It represents one of those rare instances where a tradeoff between faster, better (safer) and cheaper is no longer required.<\/span><\/p>\n<!-- AddThis Advanced Settings generic via filter on the_content --><!-- AddThis Share Buttons generic via filter on the_content -->","protected":false},"excerpt":{"rendered":"<p>The need for the digital transformation of business processes, operations, and products is nearly ubiquitous. This is putting development teams under immense pressure to accelerate software releases, despite time and budget constraints. At the same time, compliance with data privacy and protection mandates, as well as other risk mitigation efforts (e.g., zero trust), often choke  &hellip; <a class=\"read-more\" href=\"https:\/\/sdtimes.com\/software-development\/dont-let-data-compliance-block-software-innovation-automation-is-the-key\/\">continue reading<\/a><!-- AddThis Advanced Settings generic via filter on get_the_excerpt --><!-- AddThis Share Buttons generic via filter on get_the_excerpt --><\/p>\n","protected":false},"author":1142,"featured_media":50400,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"cybocfi_hide_featured_image":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[1],"tags":[1058,2850,5646,737],"coauthors":[16511],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Don\u2019t let data compliance block software innovation; automation is the key - SD Times<\/title>\n<meta name=\"description\" content=\"IT leaders mus prioritize automating data profiling and protection as a normal part of their development pipelines.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sdtimes.com\/software-development\/dont-let-data-compliance-block-software-innovation-automation-is-the-key\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Don\u2019t let data compliance block software innovation; automation is the key - SD Times\" \/>\n<meta property=\"og:description\" content=\"IT leaders mus prioritize automating data profiling and protection as a normal part of their development pipelines.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sdtimes.com\/software-development\/dont-let-data-compliance-block-software-innovation-automation-is-the-key\/\" \/>\n<meta property=\"og:site_name\" content=\"SD Times\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/SDTimesD2\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-24T15:57:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sdtimes.com\/wp-content\/uploads\/2023\/02\/Screen-Shot-2023-02-24-at-10.56.07-AM.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"790\" \/>\n\t<meta property=\"og:image:height\" content=\"520\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Steven Chung\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sdtimes\" \/>\n<meta name=\"twitter:site\" content=\"@sdtimes\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Steven Chung\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sdtimes.com\/software-development\/dont-let-data-compliance-block-software-innovation-automation-is-the-key\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sdtimes.com\/software-development\/dont-let-data-compliance-block-software-innovation-automation-is-the-key\/\"},\"author\":{\"name\":\"Steven Chung\",\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/person\/b95ba7fb800a8434551e89efd5c7f6e4\"},\"headline\":\"Don\u2019t let data compliance block software innovation; automation is the key\",\"datePublished\":\"2023-02-24T15:57:31+00:00\",\"dateModified\":\"2023-02-24T15:57:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sdtimes.com\/software-development\/dont-let-data-compliance-block-software-innovation-automation-is-the-key\/\"},\"wordCount\":1228,\"publisher\":{\"@id\":\"https:\/\/sdtimes.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/sdtimes.com\/software-development\/dont-let-data-compliance-block-software-innovation-automation-is-the-key\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2023\/02\/Screen-Shot-2023-02-24-at-10.56.07-AM.jpg\",\"keywords\":[\"automation\",\"data\",\"innovation\",\"software\"],\"articleSection\":[\"Latest News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sdtimes.com\/software-development\/dont-let-data-compliance-block-software-innovation-automation-is-the-key\/\",\"url\":\"https:\/\/sdtimes.com\/software-development\/dont-let-data-compliance-block-software-innovation-automation-is-the-key\/\",\"name\":\"Don\u2019t let data compliance block software innovation; automation is the key - SD Times\",\"isPartOf\":{\"@id\":\"https:\/\/sdtimes.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sdtimes.com\/software-development\/dont-let-data-compliance-block-software-innovation-automation-is-the-key\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sdtimes.com\/software-development\/dont-let-data-compliance-block-software-innovation-automation-is-the-key\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2023\/02\/Screen-Shot-2023-02-24-at-10.56.07-AM.jpg\",\"datePublished\":\"2023-02-24T15:57:31+00:00\",\"dateModified\":\"2023-02-24T15:57:31+00:00\",\"description\":\"IT leaders mus prioritize automating data profiling and protection as a normal part of their development pipelines.\",\"breadcrumb\":{\"@id\":\"https:\/\/sdtimes.com\/software-development\/dont-let-data-compliance-block-software-innovation-automation-is-the-key\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sdtimes.com\/software-development\/dont-let-data-compliance-block-software-innovation-automation-is-the-key\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sdtimes.com\/software-development\/dont-let-data-compliance-block-software-innovation-automation-is-the-key\/#primaryimage\",\"url\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2023\/02\/Screen-Shot-2023-02-24-at-10.56.07-AM.jpg\",\"contentUrl\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2023\/02\/Screen-Shot-2023-02-24-at-10.56.07-AM.jpg\",\"width\":790,\"height\":520},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sdtimes.com\/software-development\/dont-let-data-compliance-block-software-innovation-automation-is-the-key\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sdtimes.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Don\u2019t let data compliance block software innovation; automation is the key\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sdtimes.com\/#website\",\"url\":\"https:\/\/sdtimes.com\/\",\"name\":\"SD Times\",\"description\":\"Software Development News\",\"publisher\":{\"@id\":\"https:\/\/sdtimes.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sdtimes.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sdtimes.com\/#organization\",\"name\":\"SD Times\",\"url\":\"https:\/\/sdtimes.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2014\/05\/deafaultlogo.png\",\"contentUrl\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2014\/05\/deafaultlogo.png\",\"width\":225,\"height\":90,\"caption\":\"SD Times\"},\"image\":{\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/SDTimesD2\",\"https:\/\/x.com\/sdtimes\",\"https:\/\/www.linkedin.com\/company\/sdtimes\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/person\/b95ba7fb800a8434551e89efd5c7f6e4\",\"name\":\"Steven Chung\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/person\/image\/5385075cc6466dc18a104b1257420e67\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5a520d91727af7ea13288415ffb24540?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5a520d91727af7ea13288415ffb24540?s=96&d=mm&r=g\",\"caption\":\"Steven Chung\"},\"description\":\"Steve is in charge of strategic and commercial operations globally at Delphix. This consists of sales, business development, marketing, customer success, technical services, product support, solutions engineering, partnerships, and office of the CTO.\",\"url\":\"https:\/\/sdtimes.com\/author\/steven-chung\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Don\u2019t let data compliance block software innovation; automation is the key - SD Times","description":"IT leaders mus prioritize automating data profiling and protection as a normal part of their development pipelines.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sdtimes.com\/software-development\/dont-let-data-compliance-block-software-innovation-automation-is-the-key\/","og_locale":"en_US","og_type":"article","og_title":"Don\u2019t let data compliance block software innovation; automation is the key - SD Times","og_description":"IT leaders mus prioritize automating data profiling and protection as a normal part of their development pipelines.","og_url":"https:\/\/sdtimes.com\/software-development\/dont-let-data-compliance-block-software-innovation-automation-is-the-key\/","og_site_name":"SD Times","article_publisher":"https:\/\/www.facebook.com\/SDTimesD2","article_published_time":"2023-02-24T15:57:31+00:00","og_image":[{"width":790,"height":520,"url":"https:\/\/sdtimes.com\/wp-content\/uploads\/2023\/02\/Screen-Shot-2023-02-24-at-10.56.07-AM.jpg","type":"image\/jpeg"}],"author":"Steven Chung","twitter_card":"summary_large_image","twitter_creator":"@sdtimes","twitter_site":"@sdtimes","twitter_misc":{"Written by":"Steven Chung","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sdtimes.com\/software-development\/dont-let-data-compliance-block-software-innovation-automation-is-the-key\/#article","isPartOf":{"@id":"https:\/\/sdtimes.com\/software-development\/dont-let-data-compliance-block-software-innovation-automation-is-the-key\/"},"author":{"name":"Steven Chung","@id":"https:\/\/sdtimes.com\/#\/schema\/person\/b95ba7fb800a8434551e89efd5c7f6e4"},"headline":"Don\u2019t let data compliance block software innovation; automation is the key","datePublished":"2023-02-24T15:57:31+00:00","dateModified":"2023-02-24T15:57:31+00:00","mainEntityOfPage":{"@id":"https:\/\/sdtimes.com\/software-development\/dont-let-data-compliance-block-software-innovation-automation-is-the-key\/"},"wordCount":1228,"publisher":{"@id":"https:\/\/sdtimes.com\/#organization"},"image":{"@id":"https:\/\/sdtimes.com\/software-development\/dont-let-data-compliance-block-software-innovation-automation-is-the-key\/#primaryimage"},"thumbnailUrl":"https:\/\/sdtimes.com\/wp-content\/uploads\/2023\/02\/Screen-Shot-2023-02-24-at-10.56.07-AM.jpg","keywords":["automation","data","innovation","software"],"articleSection":["Latest News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sdtimes.com\/software-development\/dont-let-data-compliance-block-software-innovation-automation-is-the-key\/","url":"https:\/\/sdtimes.com\/software-development\/dont-let-data-compliance-block-software-innovation-automation-is-the-key\/","name":"Don\u2019t let data compliance block software innovation; automation is the key - SD Times","isPartOf":{"@id":"https:\/\/sdtimes.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sdtimes.com\/software-development\/dont-let-data-compliance-block-software-innovation-automation-is-the-key\/#primaryimage"},"image":{"@id":"https:\/\/sdtimes.com\/software-development\/dont-let-data-compliance-block-software-innovation-automation-is-the-key\/#primaryimage"},"thumbnailUrl":"https:\/\/sdtimes.com\/wp-content\/uploads\/2023\/02\/Screen-Shot-2023-02-24-at-10.56.07-AM.jpg","datePublished":"2023-02-24T15:57:31+00:00","dateModified":"2023-02-24T15:57:31+00:00","description":"IT leaders mus prioritize automating data profiling and protection as a normal part of their development pipelines.","breadcrumb":{"@id":"https:\/\/sdtimes.com\/software-development\/dont-let-data-compliance-block-software-innovation-automation-is-the-key\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sdtimes.com\/software-development\/dont-let-data-compliance-block-software-innovation-automation-is-the-key\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sdtimes.com\/software-development\/dont-let-data-compliance-block-software-innovation-automation-is-the-key\/#primaryimage","url":"https:\/\/sdtimes.com\/wp-content\/uploads\/2023\/02\/Screen-Shot-2023-02-24-at-10.56.07-AM.jpg","contentUrl":"https:\/\/sdtimes.com\/wp-content\/uploads\/2023\/02\/Screen-Shot-2023-02-24-at-10.56.07-AM.jpg","width":790,"height":520},{"@type":"BreadcrumbList","@id":"https:\/\/sdtimes.com\/software-development\/dont-let-data-compliance-block-software-innovation-automation-is-the-key\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sdtimes.com\/"},{"@type":"ListItem","position":2,"name":"Don\u2019t let data compliance block software innovation; automation is the key"}]},{"@type":"WebSite","@id":"https:\/\/sdtimes.com\/#website","url":"https:\/\/sdtimes.com\/","name":"SD Times","description":"Software Development News","publisher":{"@id":"https:\/\/sdtimes.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sdtimes.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sdtimes.com\/#organization","name":"SD Times","url":"https:\/\/sdtimes.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sdtimes.com\/#\/schema\/logo\/image\/","url":"https:\/\/sdtimes.com\/wp-content\/uploads\/2014\/05\/deafaultlogo.png","contentUrl":"https:\/\/sdtimes.com\/wp-content\/uploads\/2014\/05\/deafaultlogo.png","width":225,"height":90,"caption":"SD Times"},"image":{"@id":"https:\/\/sdtimes.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/SDTimesD2","https:\/\/x.com\/sdtimes","https:\/\/www.linkedin.com\/company\/sdtimes\/"]},{"@type":"Person","@id":"https:\/\/sdtimes.com\/#\/schema\/person\/b95ba7fb800a8434551e89efd5c7f6e4","name":"Steven Chung","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sdtimes.com\/#\/schema\/person\/image\/5385075cc6466dc18a104b1257420e67","url":"https:\/\/secure.gravatar.com\/avatar\/5a520d91727af7ea13288415ffb24540?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5a520d91727af7ea13288415ffb24540?s=96&d=mm&r=g","caption":"Steven Chung"},"description":"Steve is in charge of strategic and commercial operations globally at Delphix. This consists of sales, business development, marketing, customer success, technical services, product support, solutions engineering, partnerships, and office of the CTO.","url":"https:\/\/sdtimes.com\/author\/steven-chung\/"}]}},"_links":{"self":[{"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/posts\/50399"}],"collection":[{"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/users\/1142"}],"replies":[{"embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/comments?post=50399"}],"version-history":[{"count":1,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/posts\/50399\/revisions"}],"predecessor-version":[{"id":50401,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/posts\/50399\/revisions\/50401"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/media\/50400"}],"wp:attachment":[{"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/media?parent=50399"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/categories?post=50399"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/tags?post=50399"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/coauthors?post=50399"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}