Blog

Category: Tokenization

Data Encryption Checklist for Enterprises

Enterprise considerations for implementing data encryption

Organizations are accelerating plans for data encryption, driven by increased security, privacy, and cloud workload protection requirements. However, there are a few different approaches to…

tokenization

Is Tokenization a Good Way to Protect Your Data?

This blog looks at the functionality of vault-based data tokenization methods and some key data protection challenges in using such approaches in cloud security and modern compute…

speed

Risk Acceptance and Security Trade-offs: Managing Performance vs. Security

I recently read a note by someone discussing the futility of having engineers focus on performance cycles in order to optimize data encryption operations, and…

why data tokenization is insecure

Why data tokenization is insecure

(Why you can’t stop data breaches – Part II) This blog, the second in a series on “Why you can’t stop data breaches,” details various…