Subscribe
About
  • Home
  • /
  • Fintech
  • /
  • Tokenisation set to reduce operational costs for credit card merchants

Tokenisation set to reduce operational costs for credit card merchants

A new method of enforcing data protection in applications promises to reduce both operational costs and security threats for credit card merchants.

Known as tokenisation, the method can be applied across a broad range of industries and applications, such as sensitive financial services information, personally identifiable information for healthcare, and transformation of production data as it moves into development and test environments. To date, however, the most widely adopted use has been to protect payment card information.

Karel Rode, Principal Consultant of RSA, the Security Division of EMC Southern Africa, explains that organisations interested in preventing data breaches or meeting compliance requirements must seek to protect sensitive data in the application layer, where the majority of threats reside.

“Until now, encryption has been the de facto standard for data protection, but the changes required within applications can drive costs up and timelines out, jeopardising efforts to meet regulatory deadlines and capitalise on business opportunities. Lately, tokenisation has gained a lot of traction as an application control, thanks to the benefits it delivers,” Rode says.

Tokenisation works by substituting an arbitrary value of equivalent type and character for an element of sensitive information. In complying with Payment Card Industry (PCI) Data Security Standards (DSS), for example, eliminating the exposure of a credit card number both within and outside the enterprise is of paramount importance. Tokenisation substitutes a different, randomly associated 16-digit number for the credit card number as soon as that credit card number is captured, such as at a point-of-sale device in the retail environment. This is done in such a way that the token cannot be linked back to the original data.

The advantages of tokenisation over traditional encryption include reducing the operational costs and overhead associated with encryption. Tokenised values maintain their original format, reducing or eliminating the amount of database schema or application changes that need to be made before implementation.

In addition, other applications can potentially make use of that data without ever having access to the real information. For example, when an identity number is tokenised, the last four digits of the original number can be preserved in the token. If a call centre needs to verify the user's identity, using the last four digits of the ID number could be sufficient, and it is not necessary to de-tokenise or gain access to the original information.

According to Rode, another business benefit is the ability to reduce the scope of audits.

“If a call centre application needed to get the last four digits of an ID number using an encrypted value, it would need to have access to the key management system and also decrypt the information. This puts the application in the scope of audits for compliance,” he explains.

“If a tokenenised value is used, and the data is never de-tokenised, that application is out of audit scope. This can significantly reduce the amount of effort an organisation devotes to compliance and save a considerable amount of money over encryption solutions. Also, using a token allows applications to remain unchanged. Combine this with the same level of protection as application encryption, and you get a very compelling solution for data security.”

Share

RSA

RSA, The Security Division of EMC, is the premier provider of security solutions for business acceleration, helping the world's leading organisations succeed by solving their most complex and sensitive security challenges. RSA's information-centric approach to security guards the integrity and confidentiality of information throughout its life cycle - no matter where it moves, who accesses it or how it is used.

RSA offers industry-leading solutions in identity assurance & access control, data loss prevention, encryption & key management, compliance & security information management and fraud protection. These solutions bring trust to millions of user identities, the transactions that they perform, and the data that is generated. For more information, please visit http://www.RSA.com and http://www.EMC.com .

RSA is a registered trademark or trademark of RSA Security, Inc. in the U.S. and/or other countries. EMC is a registered trademark of EMC Corporation. All other company and product names may be trademarks of their respective owners.

EMC

EMC Corporation (NYSE: EMC) is the world's leading developer and provider of information infrastructure technology and solutions that enable organisations of all sizes to transform the way they compete and create value from their information. Information about EMC's products and services can be found at http://www.EMC.com.

Editorial contacts

Debra de Wet
Redline, a division of DRAFTFCB
(011) 566 6000
Sonelia du Preez
EMC Southern Africa
(011) 581 0033