• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Liaison Gets MAD About Token Collisions

    September 23, 2014 Alex Woodie

    Liaison Technologies last week announced it’s been granted a US patent for its Multiple Active Domains (MAD) tokenization technology, which eliminates the risk of the same token being generated for different values, or what’s known as a token collision.

    While it may sound somewhat whimsical, a token collision is no laughing matter. Token collisions can occur in large, geographically distributed organizations that have multiple data centers. When the same surrogate value, or token, is generated for different pieces of real data, a token collision has occurred, and the integrity of the data is lost.

    Liaison developed MAD to enable tokens to be generated simultaneously at multiple locations without the possibility for the same tokens to be generated for different values.

    MAD is a part of Liaison Protect, its data security product that includes encryption, tokenization, and encryption key management for a range of platforms, including IBM i, Windows, Linux, and Unix.

    “This patent affirms our ongoing commitment to developing pioneering solutions that safeguard against security threats, while allowing enterprises to effectively manage and protect their data, and that of their customers,” Bruce Chen, chief technology officer at Liaison Technologies, says in a press release.

    Liaison has been successful promoting tokenization for large companies trying to improve data security. Tokenization is particularly well-suited for large, distributed organizations, including those moving to centralized, private-cloud environments. Because sensitive data is no longer stored at remote sites, those remote sites no longer fall under the purview of some security requirements, such as PCI.

    However, few organizations have centralized all of their data storage and processing environments into a single data center. With its MAD technology, Liaison is helping to ensure that tokenization continues to protect the integrity of data among the handful of mega-data centers that big enterprises have left.

    RELATED STORIES

    Liaison Enables More Flexibility in Tokenization Solution

    Liaison Adopts KMIP with Encryption Key Manager

    Liaison Gives Token Manager a Performance Boost

    nuBridges Bought by Liaison Technologies

    nuBridges Eases i/OS Integration for Tokenized Data

    nuBridges Supports i/OS 7.1 with MFT and Security Offerings

    nuBridges Calls for Tokenization Standards



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Raz-Lee Security

    iSecurity Multi Factor Authentication (MFA) helps organizations meet compliance standards and improve the existing security environment on IBM i. It requires a user to verify his identity with two or more credentials.

    Key Features:

    • iSecurity provides Multi Factor Authentication as part of the user’s initial program
    • Works with every Authenticator App available in the Market.

    Contact us at https://www.razlee.com/isecurity-multi-factor-authentication/

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    Profound Logic Software:  October 1 Webinar: "See What i Can Do with Mobile Applications"
    System i Developer:  Upgrade your skills at the RPG & DB2 Summit in Minneapolis, Sept 30 - Oct 2.
    LANSA:  Getting ready to build a mobile app? Webinar: September 24, 12 pm CT/1 pm ET

    More IT Jungle Resources:

    System i PTF Guide: Weekly PTF Updates
    IBM i Events Calendar: National Conferences, Local Events, and Webinars
    Breaking News: News Hot Off The Press
    TPM @ EnterpriseTech: High Performance Computing Industry News From ITJ EIC Timothy Prickett Morgan

    Searching For IBM i Answers Testing The Ruby Waters

    Leave a Reply Cancel reply

Volume 14, Number 17 -- September 23, 2014
THIS ISSUE SPONSORED BY:

ASNA
New Generation Software
Profound Logic Software
inFORM Decisions
MiNET Communications, Inc.

Table of Contents

  • EXTOL Bolsters B2B Tool for Complex Trading Environments
  • MPG Discounts VIOS Tracker for PerfNav Customers
  • Don’t FLRT with Disaster When it Comes to Applying PTFs
  • Bytware’s Messenger Syncs Up Monitoring
  • iSphere: A Free and Functional Plugin for RDi/WDSc
  • Interactive Reporting Gets a Boost at mrc
  • There’s No i in Infor Xi
  • Liaison Gets MAD About Token Collisions
  • Pushed Content Provides Easy Entry to Mobile Development
  • Oracle Teams with Secure-24 for JD Edwards Hosting

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • IBM Tweaks Some Power Systems Prices Down, Others Up
  • Disaster Recovery: From OS/400 V5R3 To IBM i 7.4 In 36 Hours
  • The Disconnect In Modernization Planning And Execution
  • Superior Support: One Of The Reasons You Pay The Power Systems Premium
  • IBM i PTF Guide, Volume 25, Number 13
  • IBM i Has a Future ‘If Kept Up To Date,’ IDC Says
  • When You Need Us, We Are Ready To Do Grunt Work
  • Generative AI: Coming to an ERP Near You
  • Four Hundred Monitor, March 22
  • IBM i PTF Guide, Volume 25, Number 12

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2023 IT Jungle