IBM Security Join our 16,000+ members as we work together to overcome the toughest challenges of cybersecurity. Join the Community
Data at rest encryption uses an algorithm to transform data, while tokenization substitutes surrogate data (the token) and replaces the sensitive data that requires protection. This webinar will cover how tokenization works, and how to set up a token server to perform basic tokenization techniques, which will preserve data format.