About TokenEx

Alongside Payment Card Information (PCI), Personally Identifiable Information (PII) also known as personal information and Protected Health Information (PHI) have become a favorite target of hackers.

TokenEx can tokenize any type of data, so PII, PHI, PCI, ACH, etc. can be safely vaulted away from business systems and replaced with tokens that are mathematically unrelated to the original data and, thus, useless to data thieves. Tokenization offers virtually unlimited flexibility in how you store, access, and secure your sensitive data sets.

Integrations

API:
Yes, TokenEx offers API access
No integrations listed.

Ratings/Reviews

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Company Information

TokenEx
Founded: 2009
United States
tokenex.com

Videos and Screen Captures

Other Useful Business Software
Auth0 for AI Agents now in GA Icon
Auth0 for AI Agents now in GA

Ready to implement AI with confidence (without sacrificing security)?

Connect your AI agents to apps and data more securely, give users control over the actions AI agents can perform and the data they can access, and enable human confirmation for critical agent actions.
Start building today

Product Details

Platforms Supported
Cloud
Training
Documentation
Live Online
In Person
Support
24/7 Live Support

TokenEx Frequently Asked Questions

Q: What kinds of users and organization types does TokenEx work with?
Q: What languages does TokenEx support in their product?
Q: What kind of support options does TokenEx offer?
Q: Does TokenEx have an API?
Q: What type of training does TokenEx provide?

TokenEx Product Features

Compliance

Audit Management
Archiving & Retention
Artificial Intelligence (AI)
Compliance Tracking
Controls Testing
Environmental Compliance
FDA Compliance
HIPAA Compliance
ISO Compliance
Incident Management
OSHA Compliance
Risk Management
Sarbanes-Oxley Compliance
Surveys & Feedback
Version Control
Workflow / Process Automation

Encryption

Encryption Key Management
Public Key Cryptography
Tokenization / Data Masking
Central Policy Enforcement
Drag & Drop UI
Email Encryption
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption

GDPR Compliance

PIA / DPIA
Access Control
Consent Management
Data Mapping
Incident Management
Policy Management
Risk Management
Sensitive Data Identification

IT Security

Event Tracking
Anti Spam
Anti Virus
Email Attachment Protection
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

PCI Compliance

Access Control
Compliance Reporting
Exceptions Management
File Integrity Monitoring
Intrusion Detection System
Log Management
PCI Assessment
Patch Management
Policy Management