This article will explain how to import the data classification metadata for a SQL Server database into Data Masker, providing a masking plan that you can use to ensure the protection of all this data. By applying the data masking operation as part of an automated database provisioning process, you make it fast, repeatable and auditable. Read more
SQL Clone 4 introduces a new access control feature called Teams, allowing granular control over the SQL Server instances, images and clones to which each group of users has access. I’ll explain how Teams makes it easier to manage the safe distribution of database copies throughout the organization, to the various teams that need them Read more
Rebecca Edwards premieres the new SQL Clone 3.0 dashboard, and explains new features to make it easier to manage clones, view recent activity on them, and reset clones with the push of a button. Read more
Chris Unwin explains how SQL Provision can create copies of multiple databases, each masked consistently, and deliver them as a group. This is useful when, for example, you are working with a Data Warehouse that contains several cross-database relationships. Read more
Chris Unwin describes a strategy, using data masking, cloned databases and PowerShell, which will allow you to sanitize data before provisioning test or development environments. Read more
SQL Clone 2.4 incorporates a new T-SQL script runner that the team can use to mask sensitive or personal data, or to modify security and other configuration settings, prior to creating a clone. Read more
Tony Davis takes a ‘first look’ at cloning databases with SQL Clone, reviewing some of the database provisioning challenges that we seek to overcome, explaining briefly how SQL Clone works, and then walking through a simple example of creating a clone from a live database. Read more
If you guard against database corruption by restoring backups to secondary server, licensed as per production, and then running DBCC CHECKDB integrity checks, then you might save a lot of restore time, and disk space, by offloading this task to a clone. Read more