jessica+Article+Analysis


 * RSA Combines Tokenization and Encryption in End-to-End Data Security Solution **

By: Jessica Quach

Powerpoint:

RSA, the security division of EMC, recently unveiled its RSA Data Protection Manager product. This product combines tokenization and encryption together with token and key management to deliver end-to-end data security. By combining these technologies, data becomes more secured, and operational costs of data protection are lowered, securing data throughout the information cycle.

The problem with online data is that it is breached within the server or application. Encryption and tokenization mitigates such risks, providing a high-level of protection for data throughout its lifecycle.

Combining these technologies together will spur greater end-to-end data security. Encryption is traditionally the preferred method to enforce data protection, since it secures data at the point of capture. Though it is a good method, encryption does not mask data like tokenization does. By combining both methods into one product, data is not only protected through encryption, but also is less impacted in terms of compliance and environmental changes through tokenization. Tokenization broadens the scope for organizations in terms of payment processing, as well as provide protection for financial and healthcare services. This combined security in conjunction with key management into one product provides flexibility, reduce management overhead, and cost reduction, giving customers the best of both worlds.

In general, the RSA Data Protection Manager product solves compliance and key management problems that trouble customers. The product has a robust server to protect data (provided through encryption) and is a cost-effective solution to compliance (provided through tokenization) and key management that customers demand.

Article Link:  []

1. Implementing the RSA Data Protection Manager product is typically cheaper than implementing both encryption and tokenization, but more expensive than implementing each individually. Do you think this product will attract consumers? Why or why not? 2. Encryption and Tokenization is already two methods that are being used by companies in terms of data security. Do you think companies would switch to this product even if they have either data security methods?
 * Discussion Questions: **