Best Data Tokenization Software for Apache Cassandra

Compare the Top Data Tokenization Software that integrates with Apache Cassandra as of September 2025

This a list of Data Tokenization software that integrates with Apache Cassandra. Use the filters on the left to add additional filters for products that have integrations with Apache Cassandra. View the products that work with Apache Cassandra in the table below.

What is Data Tokenization Software for Apache Cassandra?

Data tokenization software is a type of software used to protect sensitive information like credit card numbers and customer data. It replaces sensitive information with random alphanumeric values or “tokens” that are impossible to reverse-engineer. By using data tokenization, organizations can reduce the risk of exposing confidential data while still making use of it in their business processes. Data tokenization is becoming an increasingly popular tool for organizations looking to increase security and prevent data breaches. Compare and read user reviews of the best Data Tokenization software for Apache Cassandra currently available using the table below. This list is updated regularly.

  • 1
    HashiCorp Vault
    Secure, store and tightly control access to tokens, passwords, certificates, encryption keys for protecting secrets and other sensitive data using a UI, CLI, or HTTP API. Secure applications and systems with machine identity and automate credential issuance, rotation, and more. Enable attestation of application and workload identity, using Vault as the trusted authority. Many organizations have credentials hard coded in source code, littered throughout configuration files and configuration management tools, and stored in plaintext in version control, wikis, and shared volumes. Safeguarding and ensuring that a credentials isn’t leaked, or in the likelihood it is, that the organization can quickly revoke access and remediate, is a complex problem to solve.
  • 2
    CipherTrust Tokenization

    CipherTrust Tokenization

    Thales Cloud Security

    CipherTrust Tokenization dramatically reduces the cost and effort required to comply with security policies and regulatory mandates like PCI DSS while also making it simple to protect other sensitive data including personally identifiable information (PII). While there are no tokenization standards in the industry, most tokenization solutions fall into one of two architectures: vaultless- or vaulted tokenization Both secure and anonymize sensitive assets. Tokenization software can reside in the data center, big data environments or the cloud. Tokenization can remove card holder data from PCI DSS scope with minimal cost and effort, enabling organizations to save on costs associated with compliance with the industry standard. Modern IT architectures require both use and protection of personally identifiable information (PII). With CipherTrust tokenization, PII protection is gained without encryption key management required by the software developer.
  • Previous
  • You're on page 1
  • Next