Thales banner

Tokenization Solution

Tokenize sensitive data, vaulted or vaultless

Get in Touch

CipherTrust Tokenization Solution

CipherTrust Tokenization dramatically reduces the cost and effort required to comply with security policies and regulatory mandates like PCI DSS while also making it simple to protect other sensitive data including personally identifiable information (PII). Most tokenization solutions fall into one of two architectures: vaultless or vaulted tokenization. Both types of tokenization secure and anonymize sensitive assets. The tokens can reside in a database, data lake or data warehouse.

 

CipherTrust Tokenization Overview

 

If you are seeking a tokenization solution, consider:

  • CipherTrust RESTful Data Protection
  • CipherTrust Vaultless Tokenization
  • CipherTrust Vaulted Tokenization

Learn how tokenization can be a valuable tool to aid in securing your digital transformation:

Tokenization: Ready for Prime Time

Tokenization: Ready for Prime Time - Webinar

The digital transformation has changed how the world does business, creating whole new enterprises and industries, but it has also left many organizations vulnerable to new and destructive threats.  Tokenization protects sensitive data by substituting non-sensitive data. In this webinar, we will examine the key elements of a tokenization solution and review several use cases.
• Understand the problems tokenization addresses
• Describe the architectures needed to support tokenization
• Review relevant tokenization use cases

Watch the Webinar

SAP Partner

Explore our tokenization and
data encryption solutions for SAP applications

Learn More
  • Benefits
  • Features

Efficiently Reduce PCI DSS Compliance Scope

Tokenization can remove card holder data from the PCI DSS scope with minimal cost and effort, enabling organizations to save on costs associated with PCI DSS compliance.

Conveniently Protect Personally Identifiable Information

Modern IT architectures require both use and protection of personally identifiable information (PII) and sensitive data. With CipherTrust Tokenization, software developers access tokenized data representing sensitive data that is protected by an easy-to-use, cloud-friendly and highly secure solution.

Encourage Innovation Without Introducing Risk

Tokenize data and maintain control and compliance when moving data to the cloud or big data environments. Cloud providers have no access to token vaults or any of the associated keys.

Architect for Your Requirements: Vaultless or Vaulted

Both Vaultless and Vaulted tokenization solutions leverage CipherTrust Manager as a secure encryption key source that offers a FIPS 140-2 Level 3 HSM as a Root of Trust.

Tokenization Choices

CipherTrust RESTful Data Protection (CRDP) is a Vaultless Tokenization solution that includes both Dynamic and Static Data Masking and centrally-manages your tokenization from the CipherTrust Manager GUI. CRDP enables data protection (tokenization or encryption) with a single line of code per field. CRDP can be scaled up to provide high availability and performance.

CRDP uses a REST API to protect sensitive data with format-preserving tokenization.

  • Dynamic Data Masking is a version of data redaction that applies a mask, based on the user or group, to hide a portion of sensitive data. Administrators establish policies, based on user or group, to dynamically mask parts of a field. For example, a security team could establish policies allowing a customer service representative to receive a credit card number with only the last four digits in the clear, while a customer service supervisor could be authorized to receive the full credit card number in the clear.
  • Static Data Masking is a version of data redaction that applies a static mask to a portion of the sensitive data to exclude it from being tokenized. For example, if most people accessing a database are customer service representatives, and they only need to see the last four digits of a credit card number to verify an account, static data masking offers a significant performance improvement over dynamic data masking by eliminating the need to detokenize the data for every single data access all day long.
  • Multi-tenancy is available through CipherTrust Manager.
  • Centrally managed protection policies and access policies enable the Data Security Admin to create and maintain policies to protect each type of data with the relevant cipher, parameters and key and restrict who can access the data in the clear.

CipherTrust Vaultless Tokenization (CT-VL) is a Vaultless Tokenization solution that includes Dynamic Data Masking and manages your tokenization with a REST API or the CT-VL GUI. CT-VL enables data protection (tokenization or encryption) with a single line of code per field.

CT-VL uses a REST API to protect sensitive data with format-preserving tokenization. CT-VL can be clustered to provide high availability and performance.

  • Dynamic Data Masking is a version of data redaction that modifies the mask based on the user or group. Administrators establish policies, based on user or group, to dynamically mask parts of a field. For example, a security team could establish policies allowing a customer service representative to receive a credit card number with only the last four digits in the clear, while a customer service supervisor could be authorized to receive the full credit card number in the clear.
  • Multi-tenancy is provided with CT-VL tokenization groups, which ensures that data tokenized by one group cannot be detokenized by another group. CT-VL centrally manages all tokenization groups.
  • Centralized Tokenization Templates allow you to describe how you want data protected within your CT-VL cluster.
Vaultess Tokenization

 

CipherTrust Vaulted Tokenization (CT-V) is a vaulted tokenization solution that offers non-mathematically reversible format-preserving tokenization with a wide range of existing formats and the ability to define custom tokenization formats. Data tokenization can be compiled directly into your Java application or offered as a RESTful web service. A full range of predefined tokenization formats are provided with the distribution and additional formats can be created.

 

Related Resources

ciphertrust tokenization

CipherTrust Tokenization - Product Brief

CipherTrust Tokenization offers application-level tokenization services in two convenient solutions that deliver complete customer flexibility: Vaultless Tokenization with Dynamic Data Masking and Vaulted Tokenization. Discover the benefits of CipherTrust Tokenization today....

Cipher Trust Vaultless Tokenization with Dynamic Data Masking - White Paper

CipherTrust Vaultless Tokenization with Dynamic Data Masking - White Paper

Today’s enterprise security teams have a lot on their plates and a lot on their minds. According to the Thales 2021 Global Data Threat Report, data breaches remain a widespread challenge. In the survey for the report, respondents indicated that 56% of organizations have ever...

CipherTrust Data Security Platform - Data Sheet

CipherTrust Data Security Platform - Data Sheet

The CipherTrust Data Security Platform (CDSP) increases data security, accelerates time to compliance, and secures cloud migration – which decreases resources required for data security operations. You can discover, protect and control your organization’s sensitive data to...

Fortrex: Evaluation Of The Vormetric Token Server

Fortrex: Evaluation Of The Vormetric Token Server - White Paper

Fortrex: Evaluation of the Vormetric Token Server Since 1997, Fortrex Technologies has served as a trusted security and risk management advisor to its clients throughout the world. Fortrex focuses exclusively on IT security, operational risk and regulatory compliance and...

Fortrex: Using Encryption And Access Control For HIPAA Compliance - White Paper

Fortrex: Using Encryption And Access Control For HIPAA Compliance - White Paper

Since 1997 Fortrex Technologies, Inc. has been providing IT Governance, Risk, and Compliance advisory services and solutions. In this white paper Fortrex explores how encryption, access control and file access audit logs from Thales can Contributes to HIPAA compliance and...