CT-VL Services
CipherTrust Vaultless Tokenization (CT-VL) is a platform-independent appliance (virtual machine or bare-metal) that offers REST-API services to protect sensitive data.
CT-VL Core Services
CT-VL offers the following service category for handling sensitive data:
- Tokenization service: Tokenization is frequently used for sensitive data such as credit card numbers, social security numbers, drivers licenses, or other personally identifiable information (PII). Data masking can be applied to any detokenized data to hide sections of the data from different groups of users.
For example, less-privileged database users might view only the last four digits of a detokenized credit card number, while a more privileged user could view the entire card number.
The CipherTrust Tokenization REST APIs are used to integrate this functionality into a developer’s application.
Components in a CT-VL Deployment
CT-VL deployment consists of the following components:
CipherTrust Vaultless Tokenization Server
CipherTrust Manager
LDAP/Active Directory Server (optional)
Remote Logging Server (optional)
Load Balancer (optional)
SNMP Server (optional)
Tokenization
Replaces sensitive data in databases with tokens. This reduces the number of places in which plain text credit card numbers reside, and thus reduces the scope of complying with the Payment Card Industry Data Security Standard (PCI DSS) and corporate security policies.
Preserves the format of data in a way that reduces the operational impact associated with encryption and other obfuscation techniques. For example, you can tokenize a credit card field in a database, yet keep the tokenized information in a format that is compatible with associated applications.
Enables outsourcing application testing and running analytics without giving access to sensitive assets because the format of the data has been preserved. To outsource, you can create a copy of the production database and give that copy to the outsourced development team.
Creates strong separation of duties between privileged administrators and data owners. In this way, IT administrators, such as hypervisor, cloud, storage, and system administrators can perform their tasks without access to the sensitive data residing on those systems.
Enables dynamic data masking—the ability to establish varying levels of data redaction for different database users. For example, you can enable customer service personnel to access the last four digits of a customer’s credit card number, while an accounts payable representative can access the full credit card number.
Integrates tokenization users with existing LDAP-based identity directories. Security teams can efficiently set granular tokenization policies for specific users and groups.
Provides high-performance cryptographic operations to protect sensitive data: encrypt, decrypt, sign, and verify. CT-VL allows batch encryption and decryption of data in bulk to achieve high performance.
Provides an alternative way of managing keys on the CipherTrust Manager.