Customer data or other sensitive information are transformed into an unreadable form
Proven on high volumes of data (millions of records)
Minimal impact on users, no impact on systems
Compliant with microservice architecture
Protection of personally identifiable information in the cloud
Clouds offer cost-efficient, scalable and innovative way to store data. Many companies are still hesitant when it comes to sending sensitive customer data to the cloud, due to privacy concerns. Losing control over personally identifiable information (PII) can be prevented. PII Data Protector can be integrated with Adalytics, the OEM version of Exponea Customer Data & Experience Platform, or used with any public cloud (AWS, Azure, GCP...). The platform offers a centralized service for anonymization and de-anonymization of various types of personally identifiable data. There are two methods: tokenization or encryption.
Tokenization or encryption
Data tokenization is the process of substituting a sensitive data element with a non-sensitive equivalent (token), which has no extrinsic or exploitable meaning or value. The token is a reference that maps back to the sensitive data through a tokenization system. Data encryption translates data into another form, or code so that only people with access to a secret key (formally called a decryption key) or password can read it.
Benefits of PII Data Protector
It is impossible to obtain the original values in case of an external security breach without accessing token tables or cryptographic keys. The solution is proven on high volumes in the range of millions of records, supports both batch and transactional data flows. It has minimal impact on users. The platform includes a web browser plugin developed by Adastra, which automatically translates encrypted data to readable form on the client-side, is provided. No impact on the company’s internal systems and communication channels. It is compliant with microservices architecture. PII Data Protector features a graphical user interface for manual data encryption and decryption.
Try it now
We will contact you as soon as possible.