dcsimg

5 Lessons to Brush Up Your Cloud Security Knowledge

  • 5 Lessons to Brush Up Your Cloud Security Knowledge-

    The Answer: Tokenization

    Tokenization is one of the strategies that organizations consider when they are looking to protect sensitive data at-rest, in the cloud or in-transit. Tokenization is the process of taking a sensitive data field and replacing it with a surrogate value called a token. De-tokenization is the reverse process of replacing a token with its associated clear text value.

    You may be wondering how tokenization differs from encryption. With tokenization, the original data is completely removed, while with encryption, the original data still bears a relationship to its unencrypted form. Tokenization tends to be more flexible in its length and format, compared to traditional encryption techniques. Additionally, tokens cannot be returned to their corresponding clear text values without access to a secured "look-up" table that matches them to their original values. Unlike encrypted values, tokens can be generated so they do not have any relationship to the length of the original value.

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12

5 Lessons to Brush Up Your Cloud Security Knowledge

  • 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
  • 5 Lessons to Brush Up Your Cloud Security Knowledge-3

    The Answer: Tokenization

    Tokenization is one of the strategies that organizations consider when they are looking to protect sensitive data at-rest, in the cloud or in-transit. Tokenization is the process of taking a sensitive data field and replacing it with a surrogate value called a token. De-tokenization is the reverse process of replacing a token with its associated clear text value.

    You may be wondering how tokenization differs from encryption. With tokenization, the original data is completely removed, while with encryption, the original data still bears a relationship to its unencrypted form. Tokenization tends to be more flexible in its length and format, compared to traditional encryption techniques. Additionally, tokens cannot be returned to their corresponding clear text values without access to a secured "look-up" table that matches them to their original values. Unlike encrypted values, tokens can be generated so they do not have any relationship to the length of the original value.

Classes are officially in session. What better time than the start of a new school year to brush up on your cloud security knowledge?

According to the Research and Markets' Global Security Services Market 2015-2019 report, the market for security products and services is growing globally and demand for cloud-based security is leading the charge. With security threats on the rise, cloud security is obviously a top concern for many organizations across a myriad of industries.

As the number of products and services available continue to increase, companies can lose sight of the basic cloud security components that are key to implementing a successful plan. In this slideshow, Perspecsys, a Blue Coat company, offers five lessons to help you touch up on your cloud security facts.