Archive for April, 2012

Tokenization: A Powerful Weapon Against Cyber Attack

Posted by on Thursday, 19 April, 2012

Tokenization in the data security world is the process of moving sensitive data from a company network to a separate location or sever, and replacing and referencing that data on the company server with a unique token.

If hackers attempt to access sensitive information like credit card numbers from a server, they’ll instead encounter the token which prevents them from finding the original data without a specific encryption key or knowledge of the tokenization system.

Linoma Software GoAnywhere Managed File Transfer SolutionFor example, say a merchant acquires a credit card number by swiping a customer’s card with a card reader.  If the merchant has implemented tokenization, this card number information is immediately replaced in the merchant’s database by a token number while the actual card number is sent and stored (in encrypted form) at a different location, along with the reference from the token.

Because the actual card number is never stored in the merchant’s front-end system, hackers have a much more difficult time stealing it. Customers can therefore be assured that it is safe to let that merchant use their card information because the actual credit card numbers are not stored in an easily accessible location.

All organizations that capture credit card data are required by the PCI DSS government regulations to secure and protect this data.  Originally, this presented a challenge to the payment industry until Shift4 Corporation presented tokenization solutions at an industry Security Summit in 1995.  The adoption of tokenization became a popular solution to meet the PCI DSS compliance regulations.

>>Check out these white papers discussing PCI DSS compliance issues, and data breach threats

Other industries are beginning to adopt tokenization to protect confidential information such as banking transactions, medical records, criminal records, vehicle driver information, loan applications, stock trading and voter registration.

Finding the most efficient way to implement tokenization is challenging, but the growing threat of cyber attack and the expense of data breach have motivated IT shops to research options in earnest.

A variety of third-party software solutions, such as Linoma Software’s Crypto Complete, deliver tokenization tools as well as additional options for managing encryption keys, audit logs, message alerts; storing tokenized data; automatically assigning token identifiers; and providing a central management platform for the entire tokenization process.

When a greedy hacker in anticipation of scoring a cache of customer credit card data finds instead a series of tokens, companies win another battle in the war against cyber thieves.

Daniel Cheney

Daniel has been the IT Director at a healthcare company for the last 12 years and a longtime beneficiary of GoAnywhere Director and the IBM i platform. He is also a freelance writer for various technical and social media projects.

More Posts - Website

AIX Webinar Next Week To Make File Transfers Easier

Posted by on Wednesday, 4 April, 2012

AIX file transfers, managed file transferAs any AIX administrator or programmer knows, file transfers can be a huge headache.  Writing all of those shell scripts is not only time consuming, but it’s tedious and presents many opportunities for errors.  Then there’s keeping track of which files need to be sent, which need to be placed in the DMZ for trading partners to retrieve, and which ones may be being sent ad-hoc from elsewhere in the company.

Another huge hassle is verifying that every file actually reached its intended recipient intact, which often requires checking multiple times and then tracking down what went wrong.

Finally, don’t forget the pressure to meet compliance regulations such as PCI DSS, HIPAA, SOX, and state privacy laws.  With the Global Systems data breach still fresh in the news, it’s obvious that no AIX administrator wants to have to explain how sensitive data was compromised.

Fortunately, there are tools and processes available that can minimize the time and effort involved with file transfers while increasing efficiency and data security.

We invite you to sit in on this AIX-only webinar on Thursday, April 12, at noon CDT to learn about how a managed file transfer solution can cure the headaches of manual file transfers while preventing future headaches related to the possibility of compromised data.

We hope you’ll join us!

AIX webinar, managed file transfer
REGISTER FOR THE AIX WEBINAR HERE

Susan Baird

Susan is the Marketing Manager at Linoma Software, helping promote our secure file transfer and encryption solutions. Her specialty is content creation and social media marketing, and you can find out more about her by viewing her LinkedIn profile.

More Posts - Website - Twitter - Facebook

1.800.949.4696  |  sales@linomasoftware.com  |  privacy policy
Copyright ©1994 - 2012 Linoma Software  |  All rights reserved