Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


02:19 PM
Dark Reading
Dark Reading
Products and Releases

Protegrity Advances Tokenization Of Sensitive Data With Transparent, On-Site Enterprise-Ready Solution

DPS 5.1 provides strong protection for payment card data, personally identifiable information, and other sensitive data

Stamford, CT, December 17, 2009: Protegrity Corporation, the leading provider of Data Security Management solutions, today announced the release of the Protegrity Data Protection System (DPS) 5.1, the newest version of Protegrity's award-winning comprehensive data protection platform.

The enhanced, integrated tokenization solution included in DPS 5.1 provides strong protection for payment card data, personally identifiable information, and a range of other sensitive data. DPS tokenization is available now, and it can be deployed with minimal changes to the target environment.

This advanced on-site solution gives customers the ability to leverage their current transaction processing services or choose a different transaction processor regardless of that service's tokenization capabilities. It also reduces the inevitable risks resulting from outsourcing critical data security functions such as tokenization. DPS 5.1 was engineered to fully support enterprises in their drive to move forward to proactive risk-adjusted data security strategies. DPS 5.1 tokenization complements the other data protection technologies that comprise the DPS platform, including strong encryption, to deliver an end-to-end data protection solution optimized for demanding enterprise requirements.

"We believe that using risk-adjusted methods to determine which technologies are best suited to particular types of data is the most effective way to enhance an organization's security profile and achieve the right balance between important business, operational, and security requirements," says Paul Giardina, Protegrity CEO. "DPS 5.1 demonstrates our commitment to supporting practical, business-process based data security solutions."

New and enhanced features in DPS 5.1 include:

Transparent tokenization: Eases deployment with database plug-ins and eliminates the need to alter applications for use with tokens. Transparent tokenization generates a token and sends the original sensitive value to the token server automatically, with no need to utilize APIs or perform complex coding. Transparent tokenization also increases data security while reducing data processing time and, depending on the environment, reducing the number of applications within PCI scope.

Bulk tokenization: Enables secure simultaneous batch processing of multiple data values and tokens, resulting in dramatically improved processing speed and enhanced information availability.

Configurable tokens: Protegrity's tokenization technology enables businesses to create custom token values for virtually any data protection need.

Tokenization removes sensitive data from the information flow at the earliest possible point in the process, replacing it with a token that acts as an alias for the protected data. The encrypted original data is stored in a separate location and can be accessed only by authorized applications and users.

DPS 5.1 tokenization further protects data by storing it in a security-hardened, high-availability server cluster that meets data protection security standards. The token servers scale to support very high demand environments. Built-in key rotation for the encrypted data values simplifies data security management chores.

Along with tokenization, DPS 5.1 provides a complete set of data protection technologies including strong encryption, format controlling encryption, hashing, masking, and data monitoring to lock down sensitive data even in the most complex and demanding business environments.

Protegrity's highly flexible DPS platform enables all or any of these technologies to be deployed when and as needed, in accordance with businesses' unique risk profiles, enabling organizations to quickly address changes in data risk levels and new threat vectors.

ABOUT PROTEGRITY Protegrity delivers centralized data security management solutions that protect sensitive information from acquisition to deletion across the enterprise. Protegrity's customers maintain complete protection over their data and business by employing software and solutions specifically designed to secure data, manage the data via a centralized policy, and generate detailed security reports.

The company's singular focus is on developing solutions that protect data. Protegrity employees are security technology specialists with deep expertise in data security techniques, encryption key management, and security policy in distributed environments. Maximize security with minimal business impact with Protegrity Data Protection System, the high performance, transparent solution optimized for the dynamic enterprise.

To learn more, visit www.protegrity.com or call 203.326.7200.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-11-28
In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if an attacker can send a request with a body that is ...
PUBLISHED: 2020-11-27
blosc2.c in Blosc C-Blosc2 through 2.0.0.beta.5 has a heap-based buffer overflow when there is a lack of space to write compressed data.
PUBLISHED: 2020-11-27
npm package systeminformation before version 4.30.5 is vulnerable to Prototype Pollution leading to Command Injection. The issue was fixed with a rewrite of shell sanitations to avoid prototyper pollution problems. The issue is fixed in version 4.30.5. If you cannot upgrade, be sure to check or sani...
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to inject malicious JavaScript code resulting in a stored/blind XSS in the admin panel.
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to create a site with specially crafted XML that allows the retrieval of OS files out-of-band.