ARCHIVED CONTENT
You are viewing ARCHIVED CONTENT released online between 1 April 2010 and 24 August 2018 or content that has been selectively archived and is no longer active. Content in this archive is NOT UPDATED, and links may not function.
By Michael Higashi
What is tokenization?
Put simply, tokenization enables enterprises to make use of cloud-based applications without having to transmit sensitive data values to the cloud. Tokenization substitutes randomly generated values in place of the actual data. Those values can then be stored in the cloud while the original data remains housed on a secure appliance behind the enterprise firewall, where it can remain safe in the event of a breach at the CSP. When used as part of a unified and well integrated cloud security platform, tokenization addresses fears of breaches and exposure better than any other cloud data protection technology can.
Read the complete article at: Cloud Best Practices: Tokenization 101