Banner Default Image

Streamlined Tokenization and Dynamic Data Masking

Now you can hide sensitive data in plain sight

Vormetric Tokenization with Dynamic Data Masking

data-masking image

Vormetric Tokenization with Dynamic Data Masking dramatically reduces the cost and effort required to comply with security policies and regulatory mandates like PCI DSS while also making it simple to protect other sensitive data including Personally Identifiable Information (PII). Dynamic Data Masking protects data in use while tokenization is protecting data at rest. You can efficiently address your objectives for securing and anonymizing sensitive assets—whether they reside in data center, big data, container or cloud environments. Beyond performing data tokenization, the Tokenization Server centralizes all tokenization configuration with a graphical user interface for creating templates for both tokenization and data masking. Simplicity results from the ability, with a few as just one line of code inserted into applications, to tokenize or detokenize with dynamic data masking.

Image

 

CipherTrust Data Security Platform - Data Sheet

CipherTrust Data Security Platform - Data Sheet

As security breaches continue to happen with alarming regularity and data protection compliance mandates get more stringent, your organization needs to extend data protection across more environments, systems, applications, processes and users. With the CipherTrust Data...

  • Benefits
  • Features
  • Specifications

Efficiently Reduce PCI DSS Compliance Scope

Remove card holder data from PCI DSS scope with minimal cost and effort and save big on complying with the industry standard with Vormetric Tokenization with Dynamic Data Masking.

Conveniently Protect Personally Identifiable Information

Modern IT architectures require both use and protection of personally identifiable information (PII). Tokenization with Dynamic Data Masking enables both with one line of code for protection and just one more for dynamically masked use of PII. Even more, protection is gained without any encryption key management required by the software developer!

Foster Innovation Without Introducing Risk

Tokenize data and maintain control and compliance when moving data to the cloud, or big data environments.

Scale Globally

Deploy the Vormetric Tokenization Server globally without concerns about token synchronization or performance. Server clustering enables easy scalability.

Tokenization Choices

Vormetric Tokenization combines the scalability and availability benefits of a vaultless solution with business-centric options for protecting data: both format-preserving and random tokenization. Format-preserving tokenization enables data protection without changing database schemas and offers irreversible tokens. Random tokenization offers high performance, convenient data protection. Date-specific tokenization supporting the full range of international date formats helps ensure PII and transaction security.

Dynamic Data Masking

Administrators can establish policies to return an entire field tokenized or dynamically mask parts of a field. For example, a security team could establish policies so that a user with customer service representative credentials would only receive a credit card number with the last four digits visible, while a customer service supervisor could access the full credit card number in the clear. Looking for static data masking? Vormetric Tokenization offers static data masking, but, for the broad range of static data masking use cases, consider Vormetric Batch Data Transformation.

Multi-tenancy Support

The Tokenization Server supports multi-tenancy with Tokenization groups. Tokenization groups ensure that data tokenized by one group cannot be detokenized by another, and are centrally managed.

Centralized Tokenization Templates

At the core of the programming simplicity of Vormetric Tokenization is the tokenization template.

test

The centralization of tokenization configuration enables a tokenization request to contain, simply, the tokenization group name, template name and the data to tokenize (along with username and password and the URL of the Tokenization Server). From there, all tokenization work is performed centrally on behalf of the software engineer.

Simple, Non-Disruptive Implementation

Tokenization mechanisms, methods and dynamic data masking rules are defined in a centralized, friendly graphical user interface (GUI). This dramatically reduces programming required for data protection. In addition, a range of format-preserving tokenization mechanisms are available to reduce requirements for changing the database schema. The Tokenization Server’s virtual appliance form factor enables fast scaling.

Tokenization Server Dashboard

Once deployed, the Vormetric Tokenization Server becomes a mission-critical part of the data security infrastructure. In support of that, the server presents an information-rich dashboard upon login, showing users and use of the server with exportable data.

test


Tokenization Server Dashboard

Tokenization capabilities:

Alphanumeric format preserving (FF1/FF3) or random tokenization up to 128KB, Date tokenization

Dynamic data masking capabilities:

Alpha/numeric, custom mask character

Data validation:

Luhn check

Deployment options:

Open Virtualization Format (.ova), International Organization for Standardization (.iso), Microsoft Hyper-V, Microsoft Azure Marketplace, Amazon Machine Image (.ami), Google Cloud Platform

Application integration:

REST APIs

Authentication integration:

Lightweight Directory Access Protocol (LDAP); Active Directory (AD); Client Certificate; OAuth2

High-Performance:

  • Over 1 million tokenization transactions per second per tokenization server
  • Clustering for redundant, geographically dispersed, or scale-up tokenization servers

Related Resources

Analyst Report: KuppingerCole Executive View

Analyst Report: KuppingerCole Executive View

This white paper reviews the Vormetric Application Crypto Suite from KuppingerCole’s perspective on information security.

Vormetric Tokenization with Dynamic Data Masking

Vormetric Tokenization with Dynamic Data Masking - White Paper

Today’s enterprise security teams have a lot on their plates and a lot on their minds. Attacks are becoming more sophisticated and persistent while insider threats continue to be an Achilles heel. According to the 2019 Thales Data Threat Report1, 86% of respondents feel some...

Image

Vormetric Tokenization with Dynamic Data Masking - Product Brief

Vormetric Tokenization with Dynamic Data Masking dramatically reduces the cost and effort required to comply with security policies and regulatory mandates like PCI DSS while also making it simple to protect other sensitive data including Personally Identifiable Information ...

Fortrex: Evaluation Of The Vormetric Token Server

Fortrex: Evaluation Of The Vormetric Token Server - White Paper

Fortrex: Evaluation of the Vormetric Token Server Since 1997, Fortrex Technologies has served as a trusted security and risk management advisor to its clients throughout the world. Fortrex focuses exclusively on IT security, operational risk and regulatory compliance and...