TokenEx Description

In addition to Payment Card Information (PCI), hackers often seek out Personally Identifiable Information (PII), which is also referred to as personal data, as well as Protected Health Information (PHI).

TokenEx has the capability to tokenize various forms of data, allowing for the secure storage of PII, PHI, PCI, ACH and more by substituting them with tokens that are mathematically disconnected from the original information, rendering them ineffective for malicious actors. This tokenization process provides immense versatility in how organizations manage, retrieve, and protect their sensitive information. Moreover, it enhances compliance with data protection regulations while minimizing the risk of data breaches.

Integrations

API:
Yes, TokenEx has an API
No Integrations at this time

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
TokenEx
Year Founded:
2009
Headquarters:
United States
Website:
tokenex.com

Media

Recommended Products
Passwordless Authentication and Passwordless Security Icon
Passwordless Authentication and Passwordless Security

Identity is everything. Protect it with Duo.

It’s no secret — passwords can be a real headache, both for the people who use them and the people who manage them. Over time, we’ve created hundreds of passwords, it’s easy to lose track of them and they’re easily compromised. Fortunately, passwordless authentication is becoming a feasible reality for many businesses. Duo can help you get there.
Get a Free Trial

Product Details

Platforms
Web-Based
Types of Training
Training Docs
Live Training (Online)
In Person
Customer Support
Live Rep (24/7)

TokenEx Features and Options

Compliance Software

Archiving & Retention
Artificial Intelligence (AI)
Audit Management
Compliance Tracking
Controls Testing
Environmental Compliance
FDA Compliance
HIPAA Compliance
ISO Compliance
Incident Management
OSHA Compliance
Risk Management
Sarbanes-Oxley Compliance
Surveys & Feedback
Version Control
Workflow / Process Automation

Encryption Software

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

IT Security Software

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

GDPR Compliance Software

Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

PCI Compliance Software

Access Control
Compliance Reporting
Exceptions Management
File Integrity Monitoring
Intrusion Detection System
Log Management
PCI Assessment
Patch Management
Policy Management

TokenEx User Reviews

Write a Review
  • Previous
  • Next