Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

CipherTrust Tokenization significantly lessens the expenses and labor involved in adhering to security policies and regulatory requirements such as PCI DSS, while also providing an easy way to safeguard other sensitive information like personally identifiable information (PII). Although there are no universally accepted tokenization standards in the market, the majority of tokenization solutions can be categorized into two main architectures: vaultless and vaulted tokenization, both of which effectively secure and anonymize sensitive data assets. Tokenization software can be deployed in various environments, including data centers, big data setups, or cloud platforms. By utilizing tokenization, organizations can effectively eliminate cardholder data from PCI DSS scope with minimal investment and effort, leading to significant savings on compliance-related expenses. In today's modern IT frameworks, it is crucial to manage and protect PII securely. With CipherTrust tokenization, organizations can ensure the protection of PII without the complexities of encryption key management that typically burden software developers, thus streamlining data security processes. This innovative approach not only simplifies compliance but also enhances overall data governance strategies.

Description

IBM InfoSphere® Optim™ Data Privacy offers a comprehensive suite of tools designed to effectively mask sensitive information in non-production settings like development, testing, quality assurance, or training. This singular solution employs various transformation methods to replace sensitive data with realistic, fully functional masked alternatives, ensuring the confidentiality of critical information. Techniques for masking include using substrings, arithmetic expressions, generating random or sequential numbers, manipulating dates, and concatenating data elements. The advanced masking capabilities maintain contextually appropriate formats that closely resemble the original data. Users can apply an array of masking techniques on demand to safeguard personally identifiable information and sensitive corporate data within applications, databases, and reports. By utilizing these data masking features, organizations can mitigate the risk of data misuse by obscuring, privatizing, and protecting personal information circulated in non-production environments, thereby enhancing data security and compliance. Ultimately, this solution empowers businesses to navigate privacy challenges while maintaining the integrity of their operational processes.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

SQL Server
.NET
Amdocs Customer Experience Suite
Apache Cassandra
Azure Marketplace
CipherTrust Data Security Platform
Google Cloud Platform
Hadoop
IBM Cloud
IBM Db2
IBM InfoSphere Optim
IBM Informix
JD Edwards EnterpriseOne
Java
Microsoft Hyper-V
MySQL
Oracle Database
Oracle PeopleSoft
Oracle Siebel CRM

Integrations

SQL Server
.NET
Amdocs Customer Experience Suite
Apache Cassandra
Azure Marketplace
CipherTrust Data Security Platform
Google Cloud Platform
Hadoop
IBM Cloud
IBM Db2
IBM InfoSphere Optim
IBM Informix
JD Edwards EnterpriseOne
Java
Microsoft Hyper-V
MySQL
Oracle Database
Oracle PeopleSoft
Oracle Siebel CRM

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Thales Cloud Security

Country

United States

Website

cpl.thalesgroup.com/encryption/tokenization

Vendor Details

Company Name

IBM

Founded

1911

Country

United States

Website

www.ibm.com/il-en/products/infosphere-optim-data-privacy

Product Features

Data Privacy Management

Access Control
CCPA Compliance
Consent Management
Data Mapping
GDPR Compliance
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

Alternatives

AuricVault® Tokenization Reviews

AuricVault® Tokenization

Auric Systems International

Alternatives

ShieldConex Reviews

ShieldConex

Bluefin
PK Protect Reviews

PK Protect

PKWARE
LeapYear Reviews

LeapYear

LeapYear Technologies