Loading

ALLIANCE TOKEN MANAGER BY TOWNSEND SECURITY

TRANSFORMATION OF SENSITIVE DATA FOR IBM I, SQL SERVER, ORACLE, MYSQL ENVIRONMENTS AMONG OTHERS.

Tokenization has a very specific definition, it is the substitution of the sensitive data for dummy data that maintains the characteristics of the original data and also keeps a relation with the original data, the tokenization may or may not allow the recovery of the original data in case That the client requires it.

Tokenization and encryption have become the technologies for regulatory compliance that require protection of sensitive data. Effective and persistent information security requires tokenization controls that can protect all layers of the IT platform.

CHARACTERISTICS
  • The core of the process lies in the token and not in the confidential data.
  • The token is equally operative to its confidential pair impacting as little as possible the developments and tests that process it or database that store it.
  • The tokenization process allows a process of recovering the encrypted data based on the vault encrypted with AES using a secure interface, this operation is called des-tokenization.
  • Cross-tokenization platform.
  • Central repository for tokens.
  • Cross-platform accesso a token para IBM i, IBM z, Windows, Linux, UNIX.
  • Secure SSL communication.
  • Common API set for token management.
ADVANTAGE
  • The original data is stored in a relational database encrypted with AES algorithm and using DES trip keys.
  • It keeps information secure with the highest encryption standards in the market today.
  • Tokenization can be used in multiple fields where confidential data is required to be protected, for example: Bank account numbers, medical information, judicial history information, license numbers, banknotes, social security number, telephone numbers or any other Personal data of a confidential nature.

TOKENIZATION PROCESS

www.exsystemusa.com

contact@exsystemusa.com

Teléfono: +1 (786) 352-8109

3785 NW 82nd Ave, Suite 309

Miami, FL 33166

PARTNERS

Report Abuse

If you feel that this video content violates the Adobe Terms of Use, you may report this content by filling out this quick form.

To report a Copyright Violation, please follow Section 17 in the Terms of Use.