Protegrity Blog

What is the Difference between Tokenization and Encryption?

Author : Charlotte Levan
Comment : 2083
More and more organizations are moving from encryption to tokenization, recognizing that it is a more secure, more flexible and more cost-effective ap ...
Read More

Going Beyond Native Teradata Security Controls

Author : protegrity
Comment : 2083
Teradata Integrated Data Warehouse includes a wealth of built-in data security tools, including authentication, authorization and access controls, aud ...
Read More

De-Identifying Sensitive Data to Enable Analytics

Author : protegrity
Comment : 2083
Compliance issues can often complicate data analytics by introducing levels of complexity in how the data can be accessed, referenced or joined. What ...
Read More

Teradata Partners Conference Q&A

Author : protegrity
Comment : 2083
Teradata Partners Conference Q&A At the Teradata Partners Conference 2015 in Anaheim, Protegrity held multiple open forums to ask questions about data ...
Read More

Protegrity Discusses Big Data Security with MapR at Strata, San Jose

Author : protegrity
Comment : 2083
Protegrity data security experts Venkat Vempati and Marco Carmona recently met up with our partner company MapR to discuss Big Data Security at Strata ...
Read More

Protegrity CTO & PCI Expert Ulf Mattsson Featured in SC Magazine eBook: “PCI 2014”

Author : protegrity
Comment : 2083
SC Magazine seeks advice from PCI experts for latest eBook Stamford, CT (August 21, 2014) - Protegrity, the leading provider of data-centric enterpris ...
Read More

Latest Verizon Data Breach Investigations Report: “The Bad Guys Are Winning”

Author : protegrity
Comment : 2083
[blockquote]"The bad news from this year's report is that the cybercriminals and other attackers are getting better at what they do, while the securit ...
Read More

Controlling the (Heart)Bleeding

Author : protegrity
Comment : 2083
Recently, a bug was discovered in the OpenSSL protocol, now dubbed “Heartbleed”, that leaves much of the internet and many IT systems seriously su ...
Read More

How Data Security Tips the Scales in Privilege vs. Protection

Author : protegrity
Comment : 2083
In his recent blog post on ZDNet, Larry Seltzer exposed the current issues with excess privileges in many organizations. Most importantly, how the pr ...
Read More

Another Look at 5 Myths of Encrypting and Tokenizing Sensitive Data

Author : protegrity
Comment : 2083
In a recent article on CSO Online, Dave Kilgallon reviewed five common myths of encrypting and tokenizing sensitive data, and the misunderstandings th ...
Read More

Subscribe Now

Categories

Archives

Subscribe Now