Data Security Manager

Tokenization

Protect Personally Identifiable Information (PII) and Avoid Regulatory Penalties with Tokenization

What you get:

  • Cloud-based integrated solution for Tokenization, Key Management and Encryption
  • Rest API driven Tokenization to substitute sensitive data, tokenize any data or custom object
  • Tokenize data on the fly with Format Preserving Tokenization (FPE) and role-based access control (RBAC)
Tokenization

Tokenization can replace sensitive personally identifiable information (PII) such as credit card account numbers with non-sensitive and random string of characters, known as a ‘Token’. A token has no meaningful value if breached and therefore, can be handled and used by applications without violating privacy regulations.

WHY IS TOKENIZATION IMPORTANT?

Tokenization helps achieve higher overall security standards. Tokenization is also required to meet standards set by Payment Card Industry Council and compliance requirements like HIPAA and GDPR.

Rest API driven Tokenization Solution

Tokenization solution substitutes tokens for sensitive data using REST APIs to achieve privacy compliance. This helps eliminate the link to sensitive data and protect against data breaches and avoid regulatory penalties from data privacy regulations such as General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA). Tokenization can also prevent insiders from accidentally or intentionally exposing customer data.

What Tokenization Does

Vaultless Tokenization
Vaultless Tokenization
Vaultless Tokenization is more secure. Fortanix Vaultless Tokenization uses a FIPS 140-2 Level 3 compliant HSM to tokenize data. There is no centralized token database required.
Advanced data masking
Advanced data masking
A user can choose to dynamically mask an entire field of tokenized data or part of the field based on user or group.
Add encryption to secure data
Add encryption to secure data
Tokenization can also be combined with data encryption at rest to provide an additional layer of security that protects against insiders having access to decrypted sensitive data.
Tokenize any custom object or data type
Tokenize any custom object or data type
User can tokenize any custom objects to protect any kind of data other than a credit card or SSN. Depending on the type of data the users want to protect, they can create security objects belonging to the tokenized data types.
Format Preserving Encryption with Granular Access Controls
Format Preserving Encryption with Granular Access Controls
The combination of Format Preserving Tokenization and role-based access control (RBAC) for applications helps in protecting sensitive data. With Fortanix, authorized users can get authenticated through RBAC, query the data, and tokenize data on the fly.
Tokenization Feature Image

Benefits

Integrated data security platform

Integrated data security platform

Fortanix includes Hardware Security Module, Key Management, Encryption and Tokenization for your hybrid and cloud native apps, all from a single integrated solution. Cloud providers do not get access to the tokens or keys allowing for a secure migration to cloud. 

Reduce the cost and effort for PCI-DSS compliance

Reduce the cost and effort for PCI-DSS compliance

In the payment world, the customer’s 16-digit Primary Credit Card Account Number is replaced with a custom, randomly generated alphanumeric number, and stored securely to enable online transmission of this data.

Secure inside FIPS 140-2 level 3 certified HSM

Secure inside FIPS 140-2 level 3 certified HSM

The entire tokenization runs inside HSM, always within the trust zone.

Privacy Compliance for Personally Identifiable Information

Privacy Compliance for Personally Identifiable Information (GDRP, CCPA)

Sensitive data such as credit card, social security numbers can be masked to achieve compliance with a variety of privacy regulations like GDPR and CCPA. Comply with HIPAA regulations by substituting electronically protected health information (ePHI) and non-public personal information (NPPI) using a tokenized value.

Flexible Consumption

Flexible Consumption

The solution is available as an appliance, software and Cloud SaaS.

Ease of implementation, flexible and extensible with plugins

Ease of implementation, flexible and extensible with plugins

GUI-driven offers easy configuration. The solution can utilize plugins allowing for greater flexibility and extensibility.

gartner
quote iconSecurity and risk management leaders should use data masking to desensitize or protect sensitive data to mitigate threats and address compliance requirements. Privacy regulations, migration to the public cloud and data analytics projects continue to drive strong interest in this technology market.
Market Guide for Data Masking
25 November 2019 - ID G00369703

Gartner
quote icon