Author: Protegrity
-
PROTEGRITY WINS 2021 DATA BREAKTHROUGH AWARDS: “DATA SECURITY SOLUTION OF THE YEAR”
The results are in, and Protegrity has officially been named the “Data Security Solution of the Year” by the 2021 Data Breakthrough Awards. Data Breakthrough is an independent market intelligence organization that recognizes the top companies, technologies, and products in the global data technology market today. The Data Breakthrough Awards program provides a forum for…
-
THE EXPLAINER: DYNAMIC DATA MASKING AND MONITORING
1. Dynamic Data Masking Cloaks Data As the name implies, dynamic data masking actually masks data. Just as protective masks have obscured people’s smiles (and frowns) during the pandemic, this data-protection method covers sensitive data. People who shouldn’t see the data won’t see it. 2. It Doesn’t Alter Data; It Simply Protects it Also known…
-
DATA TOKENIZATION EXPLAINED: 5 BASIC PRINCIPLES OF TOKENIZATION
WHAT IS DATA TOKENIZATION? Data tokenization protects sensitive data by substituting it with a randomly generated surrogate value known as a token. There are two types of data tokenization: vault and vaultless. Vault data tokenization stores information about tokenized data in a database, while vaultless generates tokens with algorithms to prevent easy access. Learn more…
-
2 DATA PROTECTION METHODS YOU NEED TO KNOW: ANONYMIZATION AND PSEUDONYMIZATION
WHAT IS ANONYMIZATION AND PSEUDONYMIZATION? ANONYMIZATION \ Ə-ˌNÄ-NƏ-MƏ-ˈZĀ-SHƏN PSEUDONYMIZATION \ SO͞ODƏNIMƏ-ˈZĀ-SHƏN Spelling, let alone pronouncing, “anonymization” and “pseudonymization” is just the beginning. Vocabulary, however, will be the least of the challenges for organizations that ignore the business value created through the use of these data protection methods. The amount of data keeps increasing, exponentially, and it moves quickly…
-
ACH vs. Nacha: What You Need to Know
If you work in a financial organization that operates in the US, you’ll have heard the phrases Nacha and ACH. Together, these entities affect many of the transactions you’re responsible for — and dictate how, why, and when your business accesses sensitive data. But, what exactly are they? And, what’s the difference between the two?…