Tokenization

Protect Personally Identifiable Information (PII) and Avoid Regulatory Penalties with Tokenization

What you get:

  • Cloud-based integrated solution for Tokenization, Key Management and Encryption
  • Rest API driven Tokenization to substitute sensitive data, tokenize any data or custom object
  • Tokenize data on the fly with Format Preserving Tokenization (FPE) and role-based access control (RBAC)
Tokenization Image
2545
2392
0792
1074
Dotted icon Dotted icon
Tokenization can replace sensitive personally identifiable information (PII) such as credit card account numbers with non-sensitive and random string of characters, known as a ‘Token’. A token has no meaningful value if breached and therefore, can be handled and used by applications without violating privacy regulations.

Why is Tokenization Important?

Tokenization helps achieve higher overall security standards. Tokenization is also required to meet standards set by Payment Card Industry Council and compliance requirements like HIPAA and GDPR.

Technical Benefits

Implementation Icon

Ease of Implementation

Preserves data format and compatibility with existing applications and database schemas.

Reduce Costs Icon

Reduce Compliance Costs

Reduces audit scope, assessment and costs by replacing sensitive values with tokens.

Data masking Icon

Data Masking

Tokenization functions
effectively as a data mask.

Rest API driven Tokenization Solution

The Fortanix Tokenization solution substitutes tokens for sensitive data using REST APIs to achieve privacy compliance. This helps eliminate the link to sensitive data and protect against data breaches and avoid regulatory penalties from data privacy regulations such as General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA). Tokenization can also prevent insiders from accidentally or intentionally exposing customer data.

What Fortanix Tokenization Does

what we do
Vaultless Tokenization
Vaultless Tokenization is more secure. Fortanix Vaultless Tokenization uses a FIPS 140-2 Level 3 compliant HSM to tokenize data. There is no centralized token database required.
what we do
Advanced data masking
A user can choose to dynamically mask an entire field of tokenized data or part of the field based on user or group.
what we do
Add encryption to secure data
Tokenization can also be combined with data encryption at rest to provide an additional layer of security that protects against insiders having access to decrypted sensitive data.
what we do
Tokenize any custom object or data type
User can tokenize any custom objects to protect any kind of data other than a credit card or SSN. Depending on the type of data the users want to protect, they can create security objects belonging to the tokenized data types.
what we do
Format Preserving Encryption with Granular Access Controls
The combination of Format Preserving Tokenization and role-based access control (RBAC) for applications helps in protecting sensitive data. With Fortanix, authorized users can get authenticated through RBAC, query the data, and tokenize data on the fly.
Dotted icon Dotted icon
Tokenization Image

Benefits

product-benefit-image
Integrated data security
platform
Fortanix includes Hardware Security Module, Key Management, Encryption and Tokenization for your hybrid and cloud native apps, all from a single integrated solution. Cloud providers do not get access to the tokens or keys allowing for a secure migration to cloud. 
product-benefit-image
Reduce the cost and effort for
PCI-DSS compliance
In the payment world, the customer’s 16-digit Primary Credit Card Account Number is replaced with a custom, randomly generated alphanumeric number, and stored securely to enable online transmission of this data.
product-benefit-image
Secure inside FIPS 140-2
level 3 certified HSM
The entire tokenization runs inside HSM, always within the trust zone.
product-benefit-image
Privacy Compliance for Personally
Identifiable Information (GDRP, CCPA)
Sensitive data such as credit card, social security numbers can be masked to achieve compliance with a variety of privacy regulations like GDPR and CCPA. Comply with HIPAA regulations by substituting electronically protected health information (ePHI) and non-public personal information (NPPI) using a tokenized value.
product-benefit-image
Flexible Consumption
The solution is available as an appliance, software and Cloud SaaS.
product-benefit-image
Ease of implementation, flexible
and extensible with plugins
GUI-driven offers easy configuration. The solution can utilize plugins allowing for greater flexibility and extensibility.