What is TokenEx?

Beyond Payment Card Information (PCI), cybercriminals frequently target Personally Identifiable Information (PII), commonly known as personal data, in addition to Protected Health Information (PHI).

TokenEx offers the ability to tokenize diverse types of data, facilitating the secure retention of PII, PHI, PCI, ACH, and other sensitive information by replacing them with tokens that have no mathematical connection to the original data, thereby neutralizing their usefulness to attackers. This tokenization method provides significant flexibility for organizations in managing, accessing, and safeguarding their sensitive information. Furthermore, it bolsters adherence to data protection laws and significantly reduces the likelihood of data breaches, ensuring that organizations maintain a robust security posture. By implementing such advanced security measures, organizations can cultivate greater trust with their clients and stakeholders.

Integrations

Offers API?:
Yes, TokenEx provides an API
No integrations listed.

Screenshots and Video

Company Facts

Company Name:
TokenEx
Date Founded:
2009
Company Location:
United States
Company Website:
tokenex.com

Product Details

Deployment
SaaS
Training Options
Documentation Hub
Online Training
On-Site Training
Support
24 Hour Support

Product Details

Target Company Sizes
Individual
1-10
11-50
51-200
201-500
501-1000
1001-5000
5001-10000
10001+
Target Organization Types
Mid Size Business
Small Business
Enterprise
Freelance
Nonprofit
Government
Startup
Supported Languages
English

TokenEx Categories and Features

PCI Compliance Software

Access Control
Compliance Reporting
Exceptions Management
File Integrity Monitoring
Intrusion Detection System
Log Management
PCI Assessment
Patch Management
Policy Management

IT Security Software

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

GDPR Compliance Software

Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

Encryption Software

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

Compliance Software

Archiving & Retention
Artificial Intelligence (AI)
Audit Management
Compliance Tracking
Controls Testing
Environmental Compliance
FDA Compliance
HIPAA Compliance
ISO Compliance
Incident Management
OSHA Compliance
Risk Management
Sarbanes-Oxley Compliance
Surveys & Feedback
Version Control
Workflow / Process Automation