Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

CipherTrust Tokenization significantly lessens the expenses and labor involved in adhering to security policies and regulatory requirements such as PCI DSS, while also providing an easy way to safeguard other sensitive information like personally identifiable information (PII). Although there are no universally accepted tokenization standards in the market, the majority of tokenization solutions can be categorized into two main architectures: vaultless and vaulted tokenization, both of which effectively secure and anonymize sensitive data assets. Tokenization software can be deployed in various environments, including data centers, big data setups, or cloud platforms. By utilizing tokenization, organizations can effectively eliminate cardholder data from PCI DSS scope with minimal investment and effort, leading to significant savings on compliance-related expenses. In today's modern IT frameworks, it is crucial to manage and protect PII securely. With CipherTrust tokenization, organizations can ensure the protection of PII without the complexities of encryption key management that typically burden software developers, thus streamlining data security processes. This innovative approach not only simplifies compliance but also enhances overall data governance strategies.

Description

Randronics DPM easyCipher offers Transparent Data Encryption (TDE) that provides lock-box style protection for files, folders, and databases. This encryption is seamless, as it automatically decrypts the contents for users with proper authorization. Similar to a secure lock-box, TDE-protected items are in a state of either being locked or unlocked. DPM easyCipher operates as a centralized, policy-driven encryption management system, enabling organizations to unify their encryption strategies by establishing and overseeing encryption policies that can be applied to any server or laptop with a DPM easyCipher agent installed. This solution ensures that all files and folders on both servers and laptops are safeguarded. Environments that benefit from DPM easyCipher’s protection include database servers, web/application servers, and file servers. Additionally, DPM easyCipher can either supplement or substitute the TDE solutions offered by database vendors to enhance the security of their database products. Furthermore, easyCipher is capable of securing sensitive information that exists outside of traditional database environments.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

.NET
Apache Cassandra
Azure Marketplace
CipherTrust Data Security Platform
Google Cloud Platform
Java
Microsoft Hyper-V
MySQL
Oracle Database
SQL Server

Integrations

.NET
Apache Cassandra
Azure Marketplace
CipherTrust Data Security Platform
Google Cloud Platform
Java
Microsoft Hyper-V
MySQL
Oracle Database
SQL Server

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Thales Cloud Security

Country

United States

Website

cpl.thalesgroup.com/encryption/tokenization

Vendor Details

Company Name

Randtronics

Country

United States

Website

randtronics.com/products-overview/products-dpm-easycipher/

Product Features

Data Privacy Management

Access Control
CCPA Compliance
Consent Management
Data Mapping
GDPR Compliance
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

Encryption

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

Alternatives

Alternatives

AuricVault® Tokenization Reviews

AuricVault® Tokenization

Auric Systems International
CipherTrust Tokenization Reviews

CipherTrust Tokenization

Thales Cloud Security
ShieldConex Reviews

ShieldConex

Bluefin
CipherBox Reviews

CipherBox

Cipher