Securosis Analyst Report on PCI Compliance: Tokenization vs Encryption
sponsored by Intel

Thousands of companies have replaced trusted cryptographic systems with tokenization to secure data. For securing data at rest and in motion, encryption is the backbone technology in an IT arsenal. You simply cannot avoid encrypting to secure archives and network communications.

However there are multiple use cases where tokenization offers better security -- with lower cost and less management complexity. In this research paper, analyst and CTO of Independent research analyst firm, Securosis, Adrian Lane discusses appropriate uses for tokenization, and why companies are looking to this new approach to secure sensitive data.

The key goals of this paper are to provide the reader with a clear understanding of the differences between tokenization and encryption, and the types of security problems tokenization can help solve.

(THIS RESOURCE IS NO LONGER AVAILABLE.)
 
Available Resources from Intel
See what other users are reading via our Daily Top 50 Report
.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement