.

PII Data Protector

PII Data Protector

Adastra has developed a solution that solves the problem of using customer data in a cloud-based system for marketing automation and adding extra security by tokenizing personally identifiable information (PII) to unreadable form.

The problem of personal data in cloud computing

Cloud computing transforms the way information technology is consumed and managed, promising improved cost efficiencies, accelerated innovation, faster time-to-market, and the ability to scale applications on demand.
It is clear that there is a major shift towards the cloud computing model and that the benefits may be substantial. However, as the shape of the cloud computing is developing rapidly, still many companies hesitate to send sensitive data to the cloud due to privacy concerns and losing control over data.

The Solution for PII data protection

Adastra has developed a solution that solves the problem of using modern cloud architecture when it is necessary to work with PII data. PII data protector provides centralized service for anonymization and de-anonymization of various types of PII data. Customers can choose from encryption and tokenization. Both methods ensure that PII data in the cloud is anonymized while company’s systems and communication channels work with raw data without need for their modifications. A browser plugin provides company’s authorized internal users an automatic translation of encrypted data into a readable form.

Encryption

Data encryption translates data into another form, or code, so that only people with access to a secret key (formally called a decryption key) or password can read it.

Tokenization

Data tokenization is the process of substituting a sensitive data element with a non-sensitive equivalent, referred to as a token, that has no extrinsic or exploitable meaning or value. The token is a reference (i.e. identifier) that maps back to the sensitive data through a tokenization system.

Adastra PII Protector overview

None

PII Data Protector Advantage

✓ It is impossible to obtain original values in case of an external security breach without accessing token tables or cryptographic key

Proven on high volumes in the range of millions of records

✓ Supports both batch and transactional data flows

Minimal impact on users - web browser plugin provided which automatically translates encrypted data to readable form on a client site

No impact on company’s internal systems and communication channels

✓ Compliant with microservices architecture

✓ A graphical user interface for manual data encryption and decryption

Proven solution

Get more info today, start implementing tomorrow.

Danke

Wir werden uns so schnell wie möglich bei Ihnen melden.

Pavel Hodek

Pavel Hodek