• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Liaison Enables More Flexibility in Tokenization Solution

    September 24, 2013 Alex Woodie

    Customers who adopt the latest format-preserving tokenization software from Liaison Technologies will have more flexibility to adapt tokens to different types of data they want to encrypt, the company announced this month.

    Liaison sells an all-inclusive data security product called Liaison Protect that includes encryption, tokenization, and encryption key management for a range of platforms, including IBM i, Windows, Linux, and Unix.

    Most organizations are probably familiar with the types of encryption solutions that are available on the market. What makes Liaison Protect unique is that it also includes tokenization, which refers to the process of replacing sensitive data in databases with meaningless surrogate values, or tokens. When the real data value is required, the application submits the token, and retrieves the encrypted value from a central database.

    While this approach is good for reducing the risks associated with storing sensitive data and minimizing the scope of audits for PCI and other regulations, it does introduce another level of complexity into the enterprise, in particular around the tokenization formats used. With Liaison Protect version 2.4, the company hopes to give customers more flexibility in how their tokenized data is stored.

    According to Liaison, the new extensibility option allows custom protection strategies to be created and quickly plugged into Liaison Token Manager to support new token formats for a variety of data, such as personally identifiable information (PII), protected health information (PHI), and payment card industry (PCI) data. This approach reduces redundancy and bolsters efficiency, the company says.

    The new extensibility features enables Liaison Protect customers to “both prevent security breaches of sensitive information, and support many new regulations worldwide aimed at reducing identity theft and consumer fraud,” says Robert Fox, vice president of application development at Liaion Technologies.

    The core Liaison Protect product runs on multiple platforms, including IBM i, Unix, Windows, and Linux. In IBM i environments, customers have two options for running the Token Manager component, including as a Java program running in PASE for IBM i-only environments, or, if multiple platforms are being protected (as is often the case), Liaison supports running Token Manager on an open platform and using a special connector to handle integration with Protect running on IBM i.

    RELATED STORIES

    Liaison Adopts KMIP with Encryption Key Manager

    Liaison Gives Token Manager a Performance Boost

    nuBridges Bought by Liaison Technologies

    nuBridges Eases i/OS Integration for Tokenized Data

    nuBridges Supports i/OS 7.1 with MFT and Security Offerings

    nuBridges Calls for Tokenization Standards



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Rocket Software

    Unlock the full potential of your data with Rocket Software. Our scalable solutions deliver AI-driven insights, seamless integration, and advanced compliance tools to transform your business. Discover how you can simplify data management, boost efficiency, and drive informed decisions.

    Learn more today.

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    RJS Software Systems:  DeliverNow automates report distribution across your organization.
    Shield Advanced Solutions:  HA4i ~ High Availablity for the IBM i. FREE 30-day trial
    System i Developer:  Upgrade your skills at the RPG & DB2 Summit in Minneapolis, Oct 15-17.

    More IT Jungle Resources:

    System i PTF Guide: Weekly PTF Updates
    IBM i Events Calendar: National Conferences, Local Events, and Webinars
    Breaking News: News Hot Off The Press
    TPM @ The Reg: More News From ITJ EIC Timothy Prickett Morgan

    Age Does Not Divide Social Media Users Create A Generic Auditing Trigger With SQL

    Leave a Reply Cancel reply

Volume 13, Number 26 -- September 24, 2013
THIS ISSUE SPONSORED BY:

Profound Logic Software
Help/Systems
SEA - Software Engineering of America
Shield Advanced Solutions
New Generation Software

Table of Contents

  • Raz-Lee Delivers New IFS Object Security for IBM i
  • UNIT4 CODA Delivers a ‘Superior’ Solution for Bulk Carrier
  • Ipswitch Adds iOS and Android Clients to MFT Suite
  • Avalara Debuts Sales Tax Cloud Connectors for IBM i
  • Robot Gives Worm-Drive Manufacturer a Leg Up on Lights Out
  • UCG Signs California Water District to Vault400
  • TMW Systems Taps Profound Logic for Web Expertise
  • L.K. Bennett Ditches Tape for Asigra’s Online Backup
  • Attunity Looks to Bolster Replication Speed Over Slow Lines
  • Liaison Enables More Flexibility in Tokenization Solution

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Meet The Next Gen Of IBMers Helping To Build IBM i
  • Looks Like IBM Is Building A Linux-Like PASE For IBM i After All
  • Will Independent IBM i Clouds Survive PowerVS?
  • Now, IBM Is Jacking Up Hardware Maintenance Prices
  • IBM i PTF Guide, Volume 27, Number 24
  • Big Blue Raises IBM i License Transfer Fees, Other Prices
  • Keep The IBM i Youth Movement Going With More Training, Better Tools
  • Remain Begins Migrating DevOps Tools To VS Code
  • IBM Readies LTO-10 Tape Drives And Libraries
  • IBM i PTF Guide, Volume 27, Number 23

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle