Welcome!

SDN Journal Authors: Liz McMillan, Yeshim Deniz, Elizabeth White, Pat Romanski, TJ Randall

Related Topics: @CloudExpo, Microservices Expo, Agile Computing, Cloud Security, @DXWorldExpo, SDN Journal

@CloudExpo: Article

Tokenization & Encryption – Two Data Security Methods for the Cloud

A company can use encryption, tokenization or a combination of both methods to secure its information

When organizations look to protect sensitive data at rest in the cloud or in transit on the way to it, there are two primary obfuscation strategies most consider - tokenization or encryption. But some enterprises may not know the details of how these methods work or how they differ.

The Tokenization Process
A newer technology, tokenization is the process of taking a sensitive data field and replacing it with a surrogate value called a token. De-tokenization is the reverse process of replacing a token with its associated clear text value.

The Encryption Process
Encryption uses a cipher algorithm to mathematically transform data. Encrypted values can be transformed back to the original value via the use of a key. With encryption, a mathematical link back to its true form still exists.

Encryption vs Tokenization - Key Differences
Depending on specific data protection requirements, a company can use encryption, tokenization or a combination of both methods to secure its information. The key differences between the two approaches may influence which technique an organization chooses.

With tokenization, the original data is completely removed, while with encryption, the original data still bears a relationship to its unencrypted form. Tokenization also tends to be more flexible in its length and format compared to traditional encryption techniques. Unlike encrypted values, tokens cannot be returned to their corresponding clear text values without access to a secured "look-up" table that matches them to their original values.

Unlike encrypted values, which express the relative length of their clear text value, tokens can be generated so that they don't have any relationship to the length of the original value. Tokenization is frequently the de facto approach to addressing data residency because tokenization can be used to keep sensitive data local (resident) while tokens are stored in the cloud.

Other Important Considerations
Whichever approach selected, one key concern for end users is the preservation of usability of an application. The solution chosen should be able to protect sensitive data going into the cloud without adversely impacting the experience of the application users. Preserving the usability of the application, such as maintaining the ability to search, create reports and sort on data, is critical to maximizing the business value of the cloud applications that enterprises are adopting.

Another concern for many organizations is third-party certifications and verifications. Depending on the industry, a solution may need to be evaluated on its ability to comply with standards such as PCI DSS, HITECH & HIPAA, ITAR, and Gramm-Leach-Bliley.

The National Institute of Standards and Technology (NIST) issues Federal Information Processing Standards (FIPS) as guidelines for use across the Federal government. Many other industries also consult these guidelines to help inform their own security and IT policies. For example, NIST guidelines highlight the importance of using FIPS 140-2 validated encryption when securing sensitive information, and many industries have now adopted this validation as the benchmark for the level of encryption strength they require for their own data.

For more specific information on both of these approaches, download one of our knowledge pieces on tokenization or encryption.

Read the original blog entry...


PerspecSys Inc. is a leading provider of cloud protection and cloud encryption solutions that enable mission-critical cloud applications to be adopted throughout the enterprise. Cloud security companies like PerspecSys remove the technical, legal and financial risks of placing sensitive company data in the cloud. PerspecSys accomplishes this for many large, heavily regulated companies across the world by never allowing sensitive data to leave a customer's network, while maintaining the functionality of cloud applications. For more information please visit http://www.perspecsys.com/ or follow on Twitter @perspecsys.

More Stories By David Stott

As Senior Director, Product Management at PerspecSys, David Stott leads efforts to ensure products and services meet market requirements. he works closely with multiple internal teams and client stakeholders to develop excellent customer experiences and advance the strategic product direction. He is an experienced product management and marketing professional with a successful record of aligning market needs and opportunities with product requirements, functionality, and go-to-market strategies. David joined PerspecSys from Covarity and has also held product management and marketing leadership roles with Angoss Software, ADP, and Ironside Technologies.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


CloudEXPO Stories
Automation is turning manual or repetitive IT tasks into a thing of the past-including in the datacenter. Nutanix not only provides a world-class user interface, but also a comprehensive set of APIs to allow the automation of provisioning, data collection, and other tasks. In this session, you'll explore Nutanix APIs-from provisioning to other Day 0, Day 1 operations. Come learn about how you can easily leverage Nutanix APIs for orchestration and automation of infrastructure, VMs, networking, and even backup/DR. We'll review available APIs and conduct live demonstrations of integrations and the automating common IT tasks.
ClaySys Technologies is one of the leading application platform products in the ‘No-code' or ‘Metadata Driven' software business application development space. The company was founded to create a modern technology platform that addressed the core pain points related to the traditional software application development architecture. The founding team of ClaySys Technologies come from a legacy of creating and developing line of business software applications for large enterprise clients around the world.
The dream is universal: heuristic driven, global business operations without interruption so that nobody has to wake up at 4am to solve a problem. Building upon Nutanix Acropolis software defined storage, virtualization, and networking platform, Mark will demonstrate business lifecycle automation with freedom of choice and consumption models. Hybrid cloud applications and operations are controllable by the Nutanix Prism control plane with Calm automation, which can weave together the following: database as a service with Era, micro segmentation with Flow, event driven lifecycle operations with Epoch monitoring, and both financial and cloud governance with Beam. Combined together, the Nutanix Enterprise Cloud OS democratizes and accelerates every aspect of your business with simplicity, security, and scalability.
In today's always-on world, customer expectations have changed. Competitive differentiation is delivered through rapid software innovations, the ability to respond to issues quickly and by releasing high-quality code with minimal interruptions. DevOps isn't some far off goal; it's methodologies and practices are a response to this demand. The demand to go faster. The demand for more uptime. The demand to innovate. In this keynote, we will cover the Nutanix Developer Stack. Built from the foundation of software-defined infrastructure, Nutanix has rapidly expanded into full application lifecycle management across any infrastructure or cloud .Join us as we delve into how the Nutanix Developer Stack makes it easy to build hybrid cloud applications by weaving DBaaS, micro segmentation, event driven lifecycle operations, and both financial and cloud governance together into a single unified st...
To Really Work for Enterprises, MultiCloud Adoption Requires Far Better and Inclusive Cloud Monitoring and Cost Management … But How? Overwhelmingly, even as enterprises have adopted cloud computing and are expanding to multi-cloud computing, IT leaders remain concerned about how to monitor, manage and control costs across hybrid and multi-cloud deployments. It’s clear that traditional IT monitoring and management approaches, designed after all for on-premises data centers, are falling short in this new hybrid and dynamic environment.