About TokenEx

Alongside Payment Card Information (PCI), Personally Identifiable Information (PII) also known as personal information and Protected Health Information (PHI) have become a favorite target of hackers.

TokenEx can tokenize any type of data, so PII, PHI, PCI, ACH, etc. can be safely vaulted away from business systems and replaced with tokens that are mathematically unrelated to the original data and, thus, useless to data thieves. Tokenization offers virtually unlimited flexibility in how you store, access, and secure your sensitive data sets.

Integrations

API:
Yes, TokenEx offers API access
No integrations listed.

Ratings/Reviews

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Company Information

TokenEx
Founded: 2009
United States
tokenex.com

Videos and Screen Captures

Other Useful Business Software
MongoDB Atlas runs apps anywhere Icon
MongoDB Atlas runs apps anywhere

Deploy in 115+ regions with the modern database for every enterprise.

MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
Start Free

Product Details

Platforms Supported
Cloud
Training
Documentation
Live Online
In Person
Support
24/7 Live Support

TokenEx Frequently Asked Questions

Q: What kinds of users and organization types does TokenEx work with?
Q: What languages does TokenEx support in their product?
Q: What kind of support options does TokenEx offer?
Q: Does TokenEx have an API?
Q: What type of training does TokenEx provide?

TokenEx Product Features

Compliance

Audit Management
Archiving & Retention
Artificial Intelligence (AI)
Compliance Tracking
Controls Testing
Environmental Compliance
FDA Compliance
HIPAA Compliance
ISO Compliance
Incident Management
OSHA Compliance
Risk Management
Sarbanes-Oxley Compliance
Surveys & Feedback
Version Control
Workflow / Process Automation

Encryption

Encryption Key Management
Public Key Cryptography
Tokenization / Data Masking
Central Policy Enforcement
Drag & Drop UI
Email Encryption
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption

GDPR Compliance

PIA / DPIA
Access Control
Consent Management
Data Mapping
Incident Management
Policy Management
Risk Management
Sensitive Data Identification

IT Security

Event Tracking
Anti Spam
Anti Virus
Email Attachment Protection
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

PCI Compliance

Access Control
Compliance Reporting
Exceptions Management
File Integrity Monitoring
Intrusion Detection System
Log Management
PCI Assessment
Patch Management
Policy Management