{"id":91847,"date":"2024-08-20T16:27:09","date_gmt":"2024-08-20T08:27:09","guid":{"rendered":"https:\/\/v2catalog.com\/?p=91574"},"modified":"2025-03-24T12:54:56","modified_gmt":"2025-03-24T04:54:56","slug":"delphixs-state-of-data-compliance-and-security-report-reveals-54-of-organizations-have-experienced-data-breaches-or-theft-in-non-production-environments","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2024\/08\/delphixs-state-of-data-compliance-and-security-report-reveals-54-of-organizations-have-experienced-data-breaches-or-theft-in-non-production-environments\/","title":{"rendered":"Delphix\u2019s State of Data Compliance and Security Report Reveals 54% of Organizations Have Experienced Data Breaches or Theft in Non-Production Environments"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"91847\" class=\"elementor elementor-91847\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-71ae5294 post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"71ae5294\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4a899f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1e9119cd\" data-id=\"1e9119cd\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4f04f8cb elementor-widget elementor-widget-text-editor\" data-id=\"4f04f8cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><p><em><span class=\"TextRun SCXW212273320 BCX0 NormalTextRun\" lang=\"EN-US\">Survey respondents also share concerns about data privacy in AI environments, with 68% perceiving a lack of solutions<\/span><\/em><span class=\"EOP SCXW212273320 BCX0\">\u00a0<\/span><\/p><\/div><p><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/www.perforce.com\/sites\/default\/files\/inline-images\/image-pr-delphix-sodc-report-opt2-v2.jpg_0.jpeg\" alt=\"A graphic showing security issues and announcing the 2024 State of Data Compliance and Security Report\" width=\"7040\" height=\"4152\" data-entity-uuid=\"e3be05f6-e2dc-4294-a98c-364738daa475\" data-entity-type=\"file\" \/><\/p><p>\u00a0<\/p><div><p><span class=\"TextRun MacChromeBold SCXW212273320 BCX0 NormalTextRun\" lang=\"EN-US\"><strong>MINNEAPOLIS, August 20, 2024<\/strong><\/span><span class=\"TextRun SCXW212273320 BCX0 NormalTextRun\" lang=\"EN-US\">\u00a0\u2013 Perforce Software, the DevOps company for global teams requiring speed, quality, security, and compliance at scale along the development lifecycle, today announced the findings of the\u00a0<\/span><span class=\"TextRun SCXW212273320 BCX0 NormalTextRun SpellingErrorV2Themed\" lang=\"EN-US\">Delphix<\/span><span class=\"TextRun SCXW212273320 BCX0 NormalTextRun\" lang=\"EN-US\">\u00a02024 State of Data Compliance and Security Report. This inaugural report delivers exclusive research on the challenges of protecting sensitive data in non-production or lower environments, such as development, testing, analytics, and AI\/ML.<\/span><span class=\"EOP SCXW212273320 BCX0\">\u00a0<\/span><\/p><\/div><div><p><span class=\"TextRun SCXW212273320 BCX0 NormalTextRun\" lang=\"EN-US\">\u201cOur goal with this report is to share the realities of sensitive data exposures in non-production to help enterprises better protect their data moving forward,\u201d said Ann Rosen, Director of Product Marketing for\u00a0<\/span><span class=\"TextRun SCXW212273320 BCX0 NormalTextRun SpellingErrorV2Themed\" lang=\"EN-US\">Delphix<\/span><span class=\"TextRun SCXW212273320 BCX0 NormalTextRun\" lang=\"EN-US\">\u00a0by Perforce. \u201cProtecting sensitive data \u2014 data with personal identifiable information (PII) \u2014 in non-production has become more important over the years as cyberattacks target these environments. Companies need to do more to protect sensitive data.\u201d<\/span><span class=\"EOP SCXW212273320 BCX0\">\u00a0<\/span><\/p><\/div><div><p><span class=\"TextRun SCXW212273320 BCX0 NormalTextRun\" lang=\"EN-US\">The report also reveals that the challenge of protecting sensitive data will only get more complex with the rise of AI. 85% of enterprises report concerns about regulatory non-compliance in AI environments. Even more troubling, 68% of organizations surveyed perceive a lack of solutions to tackle data privacy in AI environments.\u00a0<\/span><span class=\"EOP SCXW212273320 BCX0\">\u00a0<\/span><\/p><\/div><div><p><span class=\"TextRun SCXW212273320 BCX0 NormalTextRun\" lang=\"EN-US\">\u201cAI is transforming industries, and data is at the heart of AI,\u201d said Rod Cope, Chief Technology Officer of Perforce Software. \u201cWhen it comes to AI and data, it can be a double-edged sword. There\u2019s a lot of excitement around the innovation possible in AI, but data in AI environments must be protected. The findings in the State of Data Compliance and Security Report underline the importance of complying with data privacy regulations in AI environments, too.\u201d<\/span><span class=\"EOP SCXW212273320 BCX0\">\u00a0<\/span><\/p><\/div><div><p><span class=\"TextRun SCXW212273320 BCX0 NormalTextRun\" lang=\"EN-US\">Overall, 91% of organizations are concerned about the expanded exposure footprint across all lower environments (including software development, testing, and data analytics). Yet 86% of organizations allow data compliance exceptions in non-production. As a result, 54% of organizations have already experienced a data breach or theft involving sensitive data in non-production environments. In\u00a0<\/span><span class=\"TextRun SCXW212273320 BCX0 NormalTextRun SpellingErrorV2Themed\" lang=\"EN-US\">Delphix\u2019s<\/span><span class=\"TextRun SCXW212273320 BCX0 NormalTextRun\" lang=\"EN-US\">\u00a0experience, if this data is not protected, the consequences can be dire. Indeed, 53% have already experienced audit issues and failures related to non-production.<\/span><span class=\"EOP SCXW212273320 BCX0\">\u00a0<\/span><\/p><\/div><div><p><span class=\"TextRun SCXW212273320 BCX0 NormalTextRun\" lang=\"EN-US\">To mitigate these concerns, organizations are turning to tools and approaches like static data masking, cited as a current solution by 66% of organizations surveyed.\u00a0<\/span><span class=\"EOP SCXW212273320 BCX0\">\u00a0<\/span><\/p><\/div><div><p>\u00a0<\/p><\/div><div><p><span class=\"TextRun SCXW212273320 BCX0 NormalTextRun\" lang=\"EN-US\">\u201cWe hear all the time from customers that exceptions are given because it\u2019s too complicated and time-consuming to achieve compliance without slowing down development or impacting quality,\u201d said David Wells, Product Lead of Compliance Products for\u00a0<\/span><span class=\"TextRun SCXW212273320 BCX0 NormalTextRun SpellingErrorV2Themed\" lang=\"EN-US\">Delphix<\/span><span class=\"TextRun SCXW212273320 BCX0 NormalTextRun\" lang=\"EN-US\">\u00a0by Perforce. \u201cAt\u00a0<\/span><span class=\"TextRun SCXW212273320 BCX0 NormalTextRun SpellingErrorV2Themed\" lang=\"EN-US\">Delphix<\/span><span class=\"TextRun SCXW212273320 BCX0 NormalTextRun\" lang=\"EN-US\">\u00a0and Perforce, we believe that with the right approach, you can achieve compliance rapidly without bottlenecking innovation. Static data masking is the best way to protect your test and development data. You need production-realistic data to detect defects as early as possible in the development lifecycle, but you certainly shouldn\u2019t use production data for this purpose. That\u2019s why we\u2019re continuously evolving\u00a0<\/span><span class=\"TextRun SCXW212273320 BCX0 NormalTextRun SpellingErrorV2Themed\" lang=\"EN-US\">Delphix<\/span><span class=\"TextRun SCXW212273320 BCX0 NormalTextRun\" lang=\"EN-US\">\u00a0masking solutions to meet the ever-expanding data compliance landscape, regardless of data source or environment.\u201d\u00a0<\/span><span class=\"EOP SCXW212273320 BCX0\">\u00a0\u00a0<\/span><\/p><\/div><div><p><span class=\"TextRun SCXW212273320 BCX0 NormalTextRun\" lang=\"EN-US\">Interested parties can download the full\u00a0<\/span><a class=\"Hyperlink SCXW212273320 BCX0\" href=\"https:\/\/www.delphix.com\/report\/state-of-data-compliance-and-security\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"FieldRange SCXW212273320 BCX0 TextRun Underlined NormalTextRun\" lang=\"EN-US\">2024 State of Data Compliance and Security Report by visiting Delphix.com<\/span><\/a><span class=\"TextRun SCXW212273320 BCX0 NormalTextRun\" lang=\"EN-US\">.<\/span><span class=\"EOP SCXW212273320 BCX0\">\u00a0\u00a0<\/span><\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a1b0f4 elementor-widget elementor-widget-shortcode\" data-id=\"1a1b0f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"91828\" class=\"elementor elementor-91828\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6461a578 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"6461a578\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2f063c39\" data-id=\"2f063c39\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-14e1df2a elementor-widget elementor-widget-text-editor\" data-id=\"14e1df2a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Perforce <\/strong><br>The best run DevOps teams in the world choose Perforce. Perforce products are purpose-built to develop, build and maintain high-stakes applications. Companies can finally manage complexity, achieve speed without compromise, improve security and compliance, and run their DevOps toolchains with full integrity. With a global footprint spanning more than 80 countries and including over 75% of the Fortune 100, Perforce is trusted by the world\u2019s leading brands to deliver solutions to even the toughest challenges. Accelerate technology delivery, with no shortcuts.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0d98aab elementor-widget elementor-widget-text-editor\" data-id=\"0d98aab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Delphix by Perforce <\/strong><br>Delphix by Perforce powers multicloud data automation and compliance by deploying masked, production-quality data to development, test, and AI\/ML environments. Leading companies rely on Delphix to adopt multicloud, create pipelines for data science, automate test data management, and achieve CI\/CD while ensuring data privacy and governance. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Survey respondents also share concerns about data priva [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1273,1298,61],"tags":[1272,1302],"class_list":["post-91847","post","type-post","status-publish","format-standard","hentry","category-1273","category-openlogic","category-press-release","tag-1272","tag-openlogic"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Delphix\u2019s State of Data Compliance and Security Report Reveals 54% of Organizations Have Experienced Data Breaches or Theft in Non-Production Environments - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/guardz.com\/blog\/12-must-read-books-every-msp-should-own\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Delphix\u2019s State of Data Compliance and Security Report Reveals 54% of Organizations Have Experienced Data Breaches or Theft in Non-Production Environments - Version 2\" \/>\n<meta property=\"og:description\" content=\"Survey respondents also share concerns about data priva [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/guardz.com\/blog\/12-must-read-books-every-msp-should-own\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-20T08:27:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-24T04:54:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.perforce.com\/sites\/default\/files\/inline-images\/image-pr-delphix-sodc-report-opt2-v2.jpg_0.jpeg\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/guardz.com\\\/blog\\\/12-must-read-books-every-msp-should-own\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/08\\\/delphixs-state-of-data-compliance-and-security-report-reveals-54-of-organizations-have-experienced-data-breaches-or-theft-in-non-production-environments\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Delphix\u2019s State of Data Compliance and Security Report Reveals 54% of Organizations Have Experienced Data Breaches or Theft in Non-Production Environments\",\"datePublished\":\"2024-08-20T08:27:09+00:00\",\"dateModified\":\"2025-03-24T04:54:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/08\\\/delphixs-state-of-data-compliance-and-security-report-reveals-54-of-organizations-have-experienced-data-breaches-or-theft-in-non-production-environments\\\/\"},\"wordCount\":589,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/guardz.com\\\/blog\\\/12-must-read-books-every-msp-should-own\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.perforce.com\\\/sites\\\/default\\\/files\\\/inline-images\\\/image-pr-delphix-sodc-report-opt2-v2.jpg_0.jpeg\",\"keywords\":[\"2024\",\"OpenLogic\"],\"articleSection\":[\"2024\",\"Openlogic\",\"Press Release\"],\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/guardz.com\\\/blog\\\/12-must-read-books-every-msp-should-own\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/08\\\/delphixs-state-of-data-compliance-and-security-report-reveals-54-of-organizations-have-experienced-data-breaches-or-theft-in-non-production-environments\\\/\",\"url\":\"https:\\\/\\\/guardz.com\\\/blog\\\/12-must-read-books-every-msp-should-own\\\/\",\"name\":\"Delphix\u2019s State of Data Compliance and Security Report Reveals 54% of Organizations Have Experienced Data Breaches or Theft in Non-Production Environments - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/guardz.com\\\/blog\\\/12-must-read-books-every-msp-should-own\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/guardz.com\\\/blog\\\/12-must-read-books-every-msp-should-own\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.perforce.com\\\/sites\\\/default\\\/files\\\/inline-images\\\/image-pr-delphix-sodc-report-opt2-v2.jpg_0.jpeg\",\"datePublished\":\"2024-08-20T08:27:09+00:00\",\"dateModified\":\"2025-03-24T04:54:56+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/guardz.com\\\/blog\\\/12-must-read-books-every-msp-should-own\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/guardz.com\\\/blog\\\/12-must-read-books-every-msp-should-own\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/guardz.com\\\/blog\\\/12-must-read-books-every-msp-should-own\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.perforce.com\\\/sites\\\/default\\\/files\\\/inline-images\\\/image-pr-delphix-sodc-report-opt2-v2.jpg_0.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.perforce.com\\\/sites\\\/default\\\/files\\\/inline-images\\\/image-pr-delphix-sodc-report-opt2-v2.jpg_0.jpeg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/guardz.com\\\/blog\\\/12-must-read-books-every-msp-should-own\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Delphix\u2019s State of Data Compliance and Security Report Reveals 54% of Organizations Have Experienced Data Breaches or Theft in Non-Production Environments\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Delphix\u2019s State of Data Compliance and Security Report Reveals 54% of Organizations Have Experienced Data Breaches or Theft in Non-Production Environments - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/guardz.com\/blog\/12-must-read-books-every-msp-should-own\/","og_locale":"zh_HK","og_type":"article","og_title":"Delphix\u2019s State of Data Compliance and Security Report Reveals 54% of Organizations Have Experienced Data Breaches or Theft in Non-Production Environments - Version 2","og_description":"Survey respondents also share concerns about data priva [&hellip;]","og_url":"https:\/\/guardz.com\/blog\/12-must-read-books-every-msp-should-own\/","og_site_name":"Version 2","article_published_time":"2024-08-20T08:27:09+00:00","article_modified_time":"2025-03-24T04:54:56+00:00","og_image":[{"url":"https:\/\/www.perforce.com\/sites\/default\/files\/inline-images\/image-pr-delphix-sodc-report-opt2-v2.jpg_0.jpeg","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"3 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/guardz.com\/blog\/12-must-read-books-every-msp-should-own\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/08\/delphixs-state-of-data-compliance-and-security-report-reveals-54-of-organizations-have-experienced-data-breaches-or-theft-in-non-production-environments\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Delphix\u2019s State of Data Compliance and Security Report Reveals 54% of Organizations Have Experienced Data Breaches or Theft in Non-Production Environments","datePublished":"2024-08-20T08:27:09+00:00","dateModified":"2025-03-24T04:54:56+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/08\/delphixs-state-of-data-compliance-and-security-report-reveals-54-of-organizations-have-experienced-data-breaches-or-theft-in-non-production-environments\/"},"wordCount":589,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/guardz.com\/blog\/12-must-read-books-every-msp-should-own\/#primaryimage"},"thumbnailUrl":"https:\/\/www.perforce.com\/sites\/default\/files\/inline-images\/image-pr-delphix-sodc-report-opt2-v2.jpg_0.jpeg","keywords":["2024","OpenLogic"],"articleSection":["2024","Openlogic","Press Release"],"inLanguage":"zh-HK","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/guardz.com\/blog\/12-must-read-books-every-msp-should-own\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/08\/delphixs-state-of-data-compliance-and-security-report-reveals-54-of-organizations-have-experienced-data-breaches-or-theft-in-non-production-environments\/","url":"https:\/\/guardz.com\/blog\/12-must-read-books-every-msp-should-own\/","name":"Delphix\u2019s State of Data Compliance and Security Report Reveals 54% of Organizations Have Experienced Data Breaches or Theft in Non-Production Environments - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/guardz.com\/blog\/12-must-read-books-every-msp-should-own\/#primaryimage"},"image":{"@id":"https:\/\/guardz.com\/blog\/12-must-read-books-every-msp-should-own\/#primaryimage"},"thumbnailUrl":"https:\/\/www.perforce.com\/sites\/default\/files\/inline-images\/image-pr-delphix-sodc-report-opt2-v2.jpg_0.jpeg","datePublished":"2024-08-20T08:27:09+00:00","dateModified":"2025-03-24T04:54:56+00:00","breadcrumb":{"@id":"https:\/\/guardz.com\/blog\/12-must-read-books-every-msp-should-own\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/guardz.com\/blog\/12-must-read-books-every-msp-should-own\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/guardz.com\/blog\/12-must-read-books-every-msp-should-own\/#primaryimage","url":"https:\/\/www.perforce.com\/sites\/default\/files\/inline-images\/image-pr-delphix-sodc-report-opt2-v2.jpg_0.jpeg","contentUrl":"https:\/\/www.perforce.com\/sites\/default\/files\/inline-images\/image-pr-delphix-sodc-report-opt2-v2.jpg_0.jpeg"},{"@type":"BreadcrumbList","@id":"https:\/\/guardz.com\/blog\/12-must-read-books-every-msp-should-own\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Delphix\u2019s State of Data Compliance and Security Report Reveals 54% of Organizations Have Experienced Data Breaches or Theft in Non-Production Environments"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-nTp","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/91847","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=91847"}],"version-history":[{"count":7,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/91847\/revisions"}],"predecessor-version":[{"id":108745,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/91847\/revisions\/108745"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=91847"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=91847"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=91847"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}