Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

EncryptRIGHT simplifies the application-level data protection by separating data protection policies and application programming. This allows for a complete separation between information security, application programming, and data security. EncryptRIGHT uses a Data Security Governance approach to define and enforce how data is protected. It also determines who can access the data and what format it will take once access is granted. The unique Data-Centric Security Architecture allows information security professionals to create an EncryptRIGHT Data Protect Policy (DPP) and bind it to data, protecting it no matter where it is stored, used, moved, or stored. Programmers don't need to be experts in cryptography to protect data at the application level. They simply configure authorized applications to call EncryptRIGHT to request that data be appropriately secured or unencrypted according to its policy.

Description

Implement tokenization for primary account numbers (PAN) and related personally identifiable information (PII) or protected health information (PHI) to ensure adherence to regulations that govern the management of sensitive data. This strategy allows for a reduction in PCI DSS scope across various channels and with trusted third-party partners. By employing tokenization at the point of data entry, your organization can adapt to the ever-changing landscape of security requirements. The ShieldConex platform offers a vaultless and format-preserving tokenization solution for each data component, including critical payment information such as credit or debit card PAN, expiration date, CVV, and cardholder name. This approach helps to unify the payment experience not only across different businesses but also across various locations and channels, encompassing mobile, online, and in-store transactions. Embracing such a comprehensive strategy enhances both security and customer trust in your services.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Active Directory
IBM Cloud
LDAP Administrator
Syslog-ng

Integrations

Active Directory
IBM Cloud
LDAP Administrator
Syslog-ng

Pricing Details

$0
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Prime Factors

Founded

1981

Country

United States

Website

www.primefactors.com/data-protection/why-encryptright/

Vendor Details

Company Name

Bluefin

Founded

2007

Country

United States

Website

www.bluefin.com/products/shieldconex/

Product Features

Encryption

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

GDPR Compliance

Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

PCI Compliance

Access Control
Compliance Reporting
Exceptions Management
File Integrity Monitoring
Intrusion Detection System
Log Management
PCI Assessment
Patch Management
Policy Management

Alternatives

NetLib Encryptionizer Reviews

NetLib Encryptionizer

NetLib Security

Alternatives

AuricVault® Tokenization Reviews

AuricVault® Tokenization

Auric Systems International
CipherTrust Tokenization Reviews

CipherTrust Tokenization

Thales Cloud Security
Ubiq Reviews

Ubiq

Ubiq Security