Tagged as: cloud tokenization as a service

15 Feb
2017

Breach Liability- 3rd Party Vendor Guarantees

Breach Liability- 3rd Party Vendor Guarantees Who is liable in the case of a data breach for your organization? Is it your internal IT team? The 3rd party vendor you chose for fraud prevention, encryption, or tokenization? Enterprise organizations worldwide are looking for their 3rd party vendors to accept full

01 Dec
2016

Managing Integration – Not All Tokenization Solutions Are Equal Part 2 of 3

Managing Integration – Not All Tokenization Solutions Are Equal Part 2 of 3 Integration is the ultimate litmus test to see if a product works or not. Integrations, by nature, cause IT departments to lose sleep at night. Introducing new technology into legacy systems, connecting multiple ERP’s, and avoiding latency

02 Nov
2016

Securing and Tokenizing Sensitive Data with Browser Based Encryption

Securing and Tokenizing Sensitive Data with Browser Based Encryption Your e-commerce and mobile payment channels are probably the most important ways your organization takes payments.  Countless hours are invested in these technologies to ensure your customers have the best buying experience possible while interacting with your digital assets.  Because of

22 Aug
2016

When Malware Threatens Access: Mitigating Risk in a World of Open Doors

When Malware Threatens Access: Mitigating Risk in a World of Open Doors When even software giant Oracle confirms that its Micros POS systems have been infected with malware, it’s time to admit the obvious — no organization or software is invulnerable to data theft. With pervasive web-based platforms, file sharing,

08 Aug
2016

It’s Not Worth the Risk. Remove Toxic PII with Tokenization

It’s Not Worth the Risk. Remove Toxic PII with Tokenization Sometimes the struggle with data security seems like a game of whack-a-mole. Just as you start to get a handle on preventing payment card data breaches, new worries pop up: malware injections, spear phishing schemes, ransomware and other nefarious hacks

16 Jun
2016

Browser Based Encryption vs. Hosted Tokenization Page – An Issue of Control

Browser Based Encryption vs. Hosted Tokenization Page – An Issue of Control While E-Commerce tokenization solutions reduce the cost and scope of PCI compliance, a more important benefit is they remove toxic data from your environment, so that when a breach does occur, the result is simply: No Data, No

28 Apr
2016

Were the Panama Papers Revealed by A Whistleblower, Hacktivist, or Thief? Should it Matter to Security Professionals?

Were the Panama Papers Revealed by A Whistleblower, Hacktivist, or Thief? Should it Matter to Security Professionals? The Panama Papers have the world’s full attention. The pundits conjecture that the Prime Minister of Iceland stepping down from power due to revealed financial improprieties is just the tip of the proverbial

12