Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

CipherTrust Tokenization significantly lessens the expenses and labor involved in adhering to security policies and regulatory requirements such as PCI DSS, while also providing an easy way to safeguard other sensitive information like personally identifiable information (PII). Although there are no universally accepted tokenization standards in the market, the majority of tokenization solutions can be categorized into two main architectures: vaultless and vaulted tokenization, both of which effectively secure and anonymize sensitive data assets. Tokenization software can be deployed in various environments, including data centers, big data setups, or cloud platforms. By utilizing tokenization, organizations can effectively eliminate cardholder data from PCI DSS scope with minimal investment and effort, leading to significant savings on compliance-related expenses. In today's modern IT frameworks, it is crucial to manage and protect PII securely. With CipherTrust tokenization, organizations can ensure the protection of PII without the complexities of encryption key management that typically burden software developers, thus streamlining data security processes. This innovative approach not only simplifies compliance but also enhances overall data governance strategies.

Description

Databunker is a lightning-fast, open-source vault developed in Go for secure storage of sensitive personal records. Protect user records from SQL and GraphQL injections with a simple API. Streamline GDPR, HIPAA, ISO 27001, and SOC2 compliance. Databunker is a special secure storage system designed to protect: - Personally Identifiable Information (PII) - Protected Health Information (PHI) - Payment Card Industry (PCI) data - Know Your Customer (KYC) records Databunker introduces a new approach to customer data protection: - Secure Indexing: Utilizes hash-based indexing for all search indexes - No Clear Text Storage: Ensures all information is encrypted, enhancing overall security - Restricted Bulk Retrieval: Bulk retrieval is disabled by default, adding an extra layer of defense - API-Based Communication: Backend interacts with Databunker through API calls, similar to NoSQL solutions - Record Token: Databunker creates a secured version of your data object - an object UUID token that is safe to use in your database

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Google Cloud Platform
MySQL
.NET
Amazon Web Services (AWS)
Apache Cassandra
Azure Marketplace
CipherTrust Data Security Platform
Docker
GraphQL
Java
Kubernetes
Microsoft Azure
Microsoft Hyper-V
NoSQL
Node.js
Oracle Database
PostgreSQL
SQL Server
SQLite

Integrations

Google Cloud Platform
MySQL
.NET
Amazon Web Services (AWS)
Apache Cassandra
Azure Marketplace
CipherTrust Data Security Platform
Docker
GraphQL
Java
Kubernetes
Microsoft Azure
Microsoft Hyper-V
NoSQL
Node.js
Oracle Database
PostgreSQL
SQL Server
SQLite

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

Free
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Thales Cloud Security

Country

United States

Website

cpl.thalesgroup.com/encryption/tokenization

Vendor Details

Company Name

Databunker

Country

United States

Website

databunker.org

Product Features

Data Privacy Management

Access Control
CCPA Compliance
Consent Management
Data Mapping
GDPR Compliance
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

GDPR Compliance

Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

Alternatives

Alternatives

AuricVault® Tokenization Reviews

AuricVault® Tokenization

Auric Systems International
ShieldConex Reviews

ShieldConex

Bluefin