ciphercloud technology overview: tokenization
TRANSCRIPT
© 2015 CipherCloud | All rights reserved. 1© 2014 CipherCloud | All rights reserved.
© 2015 CipherCloud | All rights reserved
CipherCloud Technology Overview - Tokenization
© 2015 CipherCloud | All rights reserved. 2
Tokenization Overview
For organizations with strict data residency requirements, CipherCloud provides the ability to retain specific sensitive data on-premises while using cloud-based applications.
Tokenization substitutes randomly generated values for the original data, which never leaves the enterprise.
“Keep sensitive information inside your network to assure Data Residency and Sovereignty.”
© 2015 CipherCloud | All rights reserved. 3
Assured Data Sovereignty
Laws in some regions dictate that sensitive data cannot leave an organization, even if it is encrypted.
CipherCloud addresses this with advanced tokenization, replacing sensitive fields with randomly generated tokens that are structurally similar, but have no mathematical correlation to the original data.
The original data and mappings are stored locally in a JDBC-compliant database.
Multiple tokens are generated for repetitive words or strings to prevent frequency analysis.
© 2015 CipherCloud | All rights reserved. 4
CipherCloud Tokenization
© 2015 CipherCloud | All rights reserved. 5
CipherCloud Tokenization Features
Granular Field-Level Control:
CipherCloud lets you control security precisely on a per-field per-word, or partial field basis.
You can easily mix-and-match tokenization with encryption, enforcing data residency where required, while leveraging lower-overhead encryption for other fields.
High Performance:
CipherCloud is deployed in many of the world’s largest enterprises, and is highly scalable, delivering high-throughput with extremely low latency.
A high-performance stateless architecture requires makes it practical to tokenize or encrypt any amount of data.
© 2015 CipherCloud | All rights reserved. 6
CipherCloud Tokenization Features – cont’d
Format And Function Preserving:
Tokenization maintains the format of your data and preserves the functionality of your cloud applications.
CipherCloud maps the protected data to the substitute tokens and uses this mapping to seamlessly support searching, sorting or reporting on protected data.
Tokenization preserves the formatting of fixed-field data such as credit cards, social security numbers, or phone numbers.
© 2015 CipherCloud | All rights reserved. 7
Tokenization Deployments
Deployments of tokenization can be somewhat more complex than encryption because of the requirements to add additional secure, on-premises databases.
CipherCloud’s tokenization methods are highly scalable and support advanced search and sort techniques.
Many customers, such as large enterprises spanning multiple countries, use a mix of tokenization, SSE, and stateless encryption, depending on the type of data, location of users, and local legal requirements.
© 2015 CipherCloud | All rights reserved. 8
Tokenization Deployments – cont’d
For example, a major North American bank uses CipherCloud encryption for sensitive data stored in Salesforce. However, for branches in Singapore, and Luxembourg, with more stringent data residency laws, certain sensitive fields are tokenized.
The CipherCloud Platform supports any combination of these techniques seamlessly. Advanced policy-controls apply the appropriate type of security for each situation.
© 2015 CipherCloud | All rights reserved. 9
CipherCloud Customer Case Studies -Tokenization
Top Australian Bank Tokenizes Sensitive Chatter Posts
Canadian Provincial Government Tokenizes Cloud Data for Residency Requirements
Click on link to read case-study
© 2015 CipherCloud | All rights reserved. 10
FIPS Validation
CipherCloud is the first and only cloud data protection vendor to have achieved FIPS 140-2 validation for its cryptographic module.
CipherCloud was granted certificate #2261 in October 2014 after completing a lengthy and rigorous testing and validation process.
© 2015 CipherCloud | All rights reserved. 11
सঘसळઑগथଏथఒਅਮ ਏইঋ ਏইঋਮદਮ सਅঋ ણयধતટਝઅस ଚଥগਹ ਇय
ਏইঋअਪरਙਮউਮ થઍमণଳअঋଆଡ. सਝयধતଥकઅ ਏইঋसਝఊર ଛઅগ
agencies are want to do, is remaining tight lipped about its efforts, but considering the far flung and CIA and its control operatives
Comprehensive Cloud Information Protection
PROTECT
© 2015 CipherCloud | All rights reserved. 12
500+ Employees
Company
3.0+ MillionActive Users
13 Industries
25 Countries
7 Languages
P 13 Patents
About CipherCloud
Solutions
Cloud Discovery
Cloud DLP
Strong Encryption
Tokenization
Activity Monitoring
Anomaly Detection
Customers
5 out of 10Top US Banks
3 out of 5Top Health Providers
Top 2 GlobalTelecomm Company
40% of GlobalMail Delivery
Largest USMedia Company
3 out of 5Top Pharmaceuticals
© 2015 CipherCloud | All rights reserved. 13© 2015 CipherCloud | All rights reserved. 13
More Information
Complete Technology Overview: http://www.ciphercloud.com/technologies/technology-overview/
WATCH ON-DEMAND WEBINAR
Cloud Encryption & Tokenization 101
For additional information :
• Website: www.ciphercloud.com
• Email: [email protected]
• Phone: +1 855-5CIPHER
Twitter.com/ciphercloud
Youtube.com/user/CipherCloudVideo
Linkedin.com/company/ciphercloud
Facebook.com/ciphercloud
Connect with Us!