Best Data Tokenization Software in the UK

Find and compare the best Data Tokenization software in the UK in 2024

Use the comparison tool below to compare the top Data Tokenization software in the UK on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Titaniam Reviews
    Titaniam provides enterprises and SaaS vendors with a full suite of data security controls in one solution. This includes highly advanced options such as encrypted search and analytics, and also traditional controls such as tokenization, masking, various types of encryption, and anonymization. Titaniam also offers BYOK/HYOK (bring/hold your own key) for data owners to control the security of their data. When attacked, Titaniam minimizes regulatory overhead by providing evidence that sensitive data retained encryption. Titaniam’s interoperable modules can be combined to support hundreds of architectures across multiple clouds, on-prem, and hybrid environments. Titaniam provides the equivalent of at 3+ solutions making it the most effective, and economical solution in the market. Titaniam is featured by Gartner across multiple categories in four markets (Data Security, Data Privacy, Enterprise Key Management, and as a Cool Vendor for 2022). Titaniam is also a TAG Cyber Distinguished Vendor, and an Intellyx Digital Innovator for 2022. In 2022 Titaniam won the coveted SINET16 Security Innovator Award and was also a winner in four categories for the Global Infosec Awards at RSAC2022.
  • 2
    EncryptRIGHT Reviews

    EncryptRIGHT

    Prime Factors

    $0
    EncryptRIGHT simplifies the application-level data protection by separating data protection policies and application programming. This allows for a complete separation between information security, application programming, and data security. EncryptRIGHT uses a Data Security Governance approach to define and enforce how data is protected. It also determines who can access the data and what format it will take once access is granted. The unique Data-Centric Security Architecture allows information security professionals to create an EncryptRIGHT Data Protect Policy (DPP) and bind it to data, protecting it no matter where it is stored, used, moved, or stored. Programmers don't need to be experts in cryptography to protect data at the application level. They simply configure authorized applications to call EncryptRIGHT to request that data be appropriately secured or unencrypted according to its policy.
  • 3
    ALTR Reviews

    ALTR

    ALTR

    $10 per user per month
    Snowflake makes it easy to manage sensitive data quickly and easily. This will allow you to get more value in less time than waiting months. ALTR allows you to automatically classify sensitive data by checking a box on import. You can add controls such as data masking using a drop-down menu. From a single screen, you can set alerts and limits for data access by user, amount and IP address. There are no extra costs or hassles on the prem, no proxies that can be broken with platform changes, and no managed services disguised under SaaS. ALTR was created in the cloud and integrates seamlessly with platforms such as Snowflake. ALTR's complete control over data allows you to visualize data usage, detect anomalies, alert on them, block threats, and tokenize important data. All your data is protected. ALTR is cloud-based so there's no upfront cost. You can start ALTR for free and then upgrade as necessary.
  • 4
    Livesight Reviews

    Livesight

    Livesight, a Spring Labs company

    $.10
    BusinessMatch+ offers 40+ additional business attributes, including tax liens, judgments, UCC filings (Uniform Commercial Code), revenue, employee count and normalized company names, as well as layoff notifications. Scores and attributes that can be used to predict macro- and microeconomic disruptions. Reduce the number of verification referrals, by predicting income overstatement probabilities at the time of the application. Livesight's secure network technology allows you to access the verification work that your peers have already completed. Layoffs, upcoming unemployment, macro and microeconomic disruptions by industry and geography. Predict whether an employer will be affected by future disruptions.
  • 5
    Protegrity Reviews
    Our platform allows businesses to use data, including its application in advanced analysis, machine learning and AI, to do great things without worrying that customers, employees or intellectual property are at risk. The Protegrity Data Protection Platform does more than just protect data. It also classifies and discovers data, while protecting it. It is impossible to protect data you don't already know about. Our platform first categorizes data, allowing users the ability to classify the type of data that is most commonly in the public domain. Once those classifications are established, the platform uses machine learning algorithms to find that type of data. The platform uses classification and discovery to find the data that must be protected. The platform protects data behind many operational systems that are essential to business operations. It also provides privacy options such as tokenizing, encryption, and privacy methods.
  • 6
    AuricVault® Tokenization Reviews

    AuricVault® Tokenization

    Auric Systems International

    $300 per year
    The AuricVault®, tokenization service, protects your sensitive financial and personal data. It stores that data safely and replaces it with a token. Tokens are random strings containing numbers and letters that have no relation to the stored data. Even if someone stole all your tokens they would still not have any sensitive data. Data separation is what tokenization does. Data separation ensures that no one entity has all data at once. Auric's tokenization solution allows for fine-grained permissions to allow one or more parties access to sensitive tokenized data. Depending on your business model and other factors, the AuricVault®, tokenization service may exempt your systems or servers from PCI scope. We help businesses secure billions of dollars and millions in transactions safely, securely, and easily.
  • 7
    Acra Reviews

    Acra

    Cossack Labs

    $10000 per year
    It's easy to prevent data leakage in your app. Acra encryption suite offers data protection in distributed apps, web and mobile applications with PostgreSQL MySQL, KV backends. Regulations (GDPR, HIPAA and PCI DSS) require encryption of sensitive and personal data. It can be tedious to integrate cryptography into distributed applications. This has limited security benefits and requires many architectural trade-offs. Acra is here for that. Acra is a tool that covers 9 data security measures. Acra is designed to protect data from leakage and provide protection throughout the entire data lifecycle. Acra is easy-to-integrate, requires no modifications to the existing code, provides reliable security, and reduces MTTD/MTTR. Acra is an integration library that can encrypt all records with AcraServer key.
  • 8
    VGS Platform Reviews

    VGS Platform

    Very Good Security

    The VGS Vault allows users to securely store their tokenized data. This secures your most sensitive data. There is nothing to be stolen in the event of a breach. It's impossible to hack what isn't there. VGS is the modern approach in data security. Our SaaS solution allows you to interact with sensitive and regulated data while avoiding the responsibility of protecting it. You can see the interactive example of how VGS transforms data. You can choose to hide or show data by choosing Reveal or Redact. VGS can help you, whether you're a startup looking for best-in-class security or an established company seeking to eliminate compliance as a barrier to new business. VGS assumes the responsibility of protecting your data, eliminating any risk of data breaches, and reducing compliance overhead. VGS layers protection on the systems for companies that prefer to vault their data. This prevents unauthorized access and leakage.
  • 9
    Rixon Reviews

    Rixon

    Rixon

    $99 per month
    Cloud-native vaultless tokenization platform maximizes data security and solves data privacy concerns. You can focus on your business with peace of mind and time when you know that your business exceeds compliance requirements. Increasing operating costs, ransomware threats, and ongoing audits of compliance are all challenges that organizations face. Rixon gives you the confidence to take your business to the world, while keeping you safe. The Rixon Privacy platform drives business results by giving organizations the tools to deliver Security, Compliance, and Privacy to the business and applications they support. Rixon's patented tokenization technology eliminates sensitive data from being exposed within your applications. Sensitive data is securely ingested, and converted into smart security tokens that protect the data against unauthorized data access.
  • 10
    HashiCorp Vault Reviews
    Securely store, secure, and tightly control access tokens, passwords and certificates to protect secrets and other sensitive data using a UI or CLI or HTTP API.
  • 11
    Sotero Reviews
    Sotero is the first zero trust cloud-native data security platform. It consolidates all your security systems into one simple-to-manage environment. The Sotero data security platform uses an intelligent data security fabric to ensure that your sensitive data is always protected. Sotero automatically protects all data instances and applications regardless of source, location, or lifecycle stage (at rest or in transit or in use). Sotero allows you to move from a fragmented and complex data security system to one unified security fabric that provides 360deg management for your entire data security ecosystem. No longer are you forced to use point solutions to see who has access to your data. A single pane provides 100% control and governance. The Sotero platform protects all data assets, no matter where they are located - on-premise, in the cloud, or as a relational database.
  • 12
    Enigma Vault Reviews
    Enigma Vault is your PCI Level 1 compliant and ISO 27001 certificated payment card, data and file easy button to tokenization and encryption. It is difficult to tokenize and encrypt data at field level. Enigma Vault does all the heavy lifting for you. Your lengthy and expensive PCI audit can be simplified into a simple SAQ. You can greatly reduce your security risk and PCI scope by storing tokens rather than sensitive card data. Modern technologies allow you to search millions of encrypted values in just milliseconds using modern methods. We fully manage the solution and can adapt it to your needs. Enigma Vault tokenizes and encrypts data of any size. Enigma Vault provides true field-level security. Instead of storing sensitive data you store a token. Enigma Vault offers the following services. Enigma Vault makes crypto and PCI compliance easy. You don't have to manage or rotate private keys, nor deal with complicated cryptography.
  • 13
    OmniToken Reviews
    OmniToken uses the exact same cryptographic key management principle as industry standards like PCI DSS and PCI Point-to Point Encryption. Best practices in security standards can help reduce your risk of card data theft. OmniToken is compatible with all payment environments, whether in-store or online. It is used with all Worldpay processing and value-added services, such as account updating, fraud prevention, recurring billing, and back-office software. OmniToken is flexible, interoperable and can be used with other third-party providers to meet your complex enterprise needs.
  • 14
    Ubiq Reviews

    Ubiq

    Ubiq Security

    $0.001 per encrypt
    Encrypt your sensitive data before leaving the application so that the storage layer and adversaries only see ciphertext. Client-side encryption that is native to the application protects data against sophisticated attackers, supply chain attacks, and internal threats. Most at-rest encryption solutions - transparent disk encryption, full disk encryption, etc. They are ineffective for modern threats, because they give admins, key processes and attackers implicit access to plaintext. Ubiq’s developer-first encryption-as code platform eliminates this gap and bridges the divide between engineering and security teams. Lightweight, prepackaged encryption libraries and code that can be easily integrated into any application for native client-side cryptography and set-and forget key management.
  • 15
    Fortanix Data Security Manager Reviews
    A data-first approach in cybersecurity can minimize costly data breaches and speed up regulatory compliance. Fortanix DSM SaaS is designed for modern data security deployments to simplify and scale. It is protected by FIPS 140-2 level 3 confidential computing hardware, and delivers the highest standards of security and performance. The DSM accelerator can be added to achieve the best performance for applications that are latency-sensitive. A scalable SaaS solution that makes data security a breeze, with a single system of record and pane of glass for crypto policy, key lifecycle management, and auditing.
  • 16
    Voltage SecureData Reviews
    Secure sensitive data wherever it flows - on premises, in the cloud and in big data analytics platforms. Voltage encryption provides data privacy protection and neutralizes data breaches. It also drives business value through secure data usage. Data protection builds customer trust, and enables compliance with global regulations such as GDPR, CCPA and HIPAA. Privacy regulations recommend anonymization, pseudonymization and encryption to protect personal data. Voltage SecureData allows enterprises to de-identify structured data and supports the use of data within its protected state to safely drive business value. Secure data flows through your enterprise without gaps, encryption, or overhead. SecureData supports a wide range of platforms and encrypts data using any language. Structured Data Manager integrates SecureData to allow businesses to easily and continuously protect data all through its lifecycle, from discovery through encryption.
  • 17
    Skyflow Reviews
    Skyflow allows you to run workflows, logic, and analytics on encrypted data. Skyflow uses multiple encryption and tokenization methods to ensure maximum security. With auditable logs, provenance, and data residency, you can manage access to your data and policy enforcement. Compliance is possible in minutes, not weeks. It's easy with our trusted infrastructure and simple REST or SQL APIs. Tokenization is required for compliance. An encrypted data store allows you to search, analyze, and make use of secure data. Skyflow can be run in any virtual private cloud you prefer. It can be used as a secure gateway, zero trust storage, and many other purposes. Replace a difficult-to-maintain patchwork of point solutions with a single cost-effective data vault. You can use your sensitive data in any application or workflow without ever having to decrypt it.
  • 18
    Baffle Reviews
    Baffle provides data protection that is universal from any source to any destination. You can control who has access to what data. Enterprises continue to fight cybersecurity threats like ransomware and breaches and losses of data assets in private and public clouds. New data management restrictions and considerations about how it must be protected have altered the way data is stored, retrieved and analyzed. Baffle believes data breaches and data loss will not occur. Our last line of defense is to ensure that attackers cannot access unprotected data. Our data protection solutions protect data from the moment it is created and keep it safe while it is being processed. Baffle's transparent security mesh for cloud and on-premise data offers multiple data protection modes. You can protect data as it moves between a source data store and a cloud database or object storage. This ensures safe consumption of sensitive information.
  • 19
    SecurDPS Enterprise Reviews
    By protecting data transfer and usage from the initial data capture until its final destruction, you limit your exposure to attacks, accidents, oversights or unauthorized access. This is done to ensure that these benefits are available throughout the data lifecycle and to help meet compliance objectives faster. Data-centric security requires that you implement a platform which not only offers protection options that fit your specific use cases but also allows for the identification and classification of datasets, and data analytics across them. The solution should be able exceed minimum viable compliance, minimum viable security and deliver maximum agility. The solution must also allow you to easily integrate these capabilities into your existing cyber security infrastructure and enterprise applications. The ease of integration can often be the deciding factor when it comes to determining the costs and risks associated with any data security project.
  • 20
    CipherTrust Tokenization Reviews
    CipherTrust Tokenization reduces the cost and effort needed to comply with security policies, regulatory mandates such as PCI DSS and also makes it easy to protect sensitive data including personally identifiable Information (PII). There are no industry standards for tokenization, but most solutions fall into two categories: vaultless or vaulted. Both secure and anonymousize sensitive assets. Tokenization software is available in the datacenter, big data environments, or the cloud. Tokenization can remove cardholder data from PCI DSS with minimal effort and cost, allowing organizations to save costs associated with compliance. Modern IT architectures demand both the use and protection of personally identifiable data (PII). CipherTrust tokenization provides PII security without the need for encryption key management by software developers.
  • 21
    FIS Tokenization Reviews
    The solution protects card payments by hiding sensitive cardholder data everywhere. FIS®, Tokenization™, dynamically encrypts card payments to ensure ultimate security whether customers pay online, via their phone or at a store. Our payment tokenization solutions help you to comply with the Payment Card Industry Data Security Standard, protect your cardholders, and manage risk by replacing sensitive cardholder information with unique tokens. Reduce fraud risk by replacing sensitive cardholder data with a unique token. Cardholders can load their card credentials into different payment apps securely and quickly. Reduce the scope of PCI DSS-compliant systems to simplify compliance.
  • 22
    ACI Omni-Tokens Reviews
    ACI's single- and multiple-use tokens will help you to secure your customers, reduce compliance burden and maintain flexibility and independence in managing your business. ACI's omni tokens can be used with cards and alternative payment methods. Our omni tokens allow customers to easily link their tokenized payment methods, while protecting their sensitive personal data. Tokenization is a key component of data security. Point-to-point (P2PE) encryption, which encrypts card information and customer information on the terminal, is the perfect partner. Hackers are targeting the data that merchants use to process payments as it moves from the terminal to the processor. To ensure that your customer data is protected, combine tokenization with P2PE capabilities.
  • 23
    ShieldConex Reviews
    Tokenize the PAN (primary customer number) and any associated PII/PHI so that you can maintain compliance with regulations governing sensitive data handling. PCI DSS scope is reduced across all channels and trusted tiers. Tokenization helps your organization comply with evolving security standards by masking data at the point of input. ShieldConex tokenizes every data element vaultlessly, while preserving the format. Payment data including credit or debit cards primary account number (PAN), date, expiration, CVV, name of cardholder, and more. Standardize payment experiences across businesses, locations, and channels, including mobile, online, in-store, and more.
  • 24
    Visa Token Service Reviews
    Visa Token Service helps you to build and maintain digital payment experiences, while protecting sensitive consumer information from fraud. Visa Token Service offers three essential tools that will help you meet consumer demand for mobile payment solutions. Visa offers partners standards, specifications and development tools as well as turnkey mobile solutions that help them build and deploy tokenized apps for cardholders. Visa Token Service SDK allows you to create your own mobile payments application. Payment solutions can be developed that integrate directly with the token management tools. Visa Token Service makes it easy and secure to make contactless mobile payments. Visa PayWave and Near Field Communication (NFC), which uses NFC technology, make it easy to make secure purchases. With compatible iOS devices, you can make convenient purchases on the go.
  • 25
    TrueZero Tokenization Reviews
    TrueZero’s vaultless API for data privacy replaces sensitive PII (personally identifiable information) with tokens, allowing you reduce the impact of breaches, share data more securely and freely, and minimize compliance overhead. Leading financial institutions use our tokenization solutions. TrueZero Tokenization protects and replaces your data, no matter where it is stored or how it is used. Securely authenticate users, validate information and enrich profiles without revealing sensitive data. SSN) with partners, internal teams, and third-party services. TrueZero reduces your in scope environments, accelerating your time to compliance by months and potentially saving you millions in build/partner cost. Data breaches cost $164 for each breached record. Tokenize PII & safeguard your business against data loss penalties and brand reputation. Store tokens, and run analytics the same way as you would raw data.
  • Previous
  • You're on page 1
  • 2
  • Next