By Gary Palgon, VP Healthcare Solutions, Liaison Healthcare Informatics
Dickens said it best when he wrote, “It was the best of times. It was the worst of times.” In 2013, if you have a computer and an internet connection, information – and in all essences, the world – is literally at your fingertips. On the flip side, this same equation grants information access to those with bad intentions, who can easily use the information to their advantage. So at a time when technology enables great things, it is also its own worst enemy.
There’s no shortage of IT security services available to companies of all sizes. What’s interesting is that according to Gartner, cloud-based IT security services are expected to see significant growth through 2015. Tokenization as a Service (TaaS) is the cloud-based model for of tokenization, one that many companies are investing in. TaaS allows companies to take advantage of all the benefits of encryption, tokenization and key management without having the burden of regulating the environment for PCI compliance — a win-win for the both the company and its customers.
However, no two TaaS offerings are alike, and you must do your homework to find the solution that will best fit your company’s needs. As the technology has grown, so have a number of myths surrounding tokenization . It can be overwhelming to start this process, but it’s worth taking the time to fully understand what tokenization is and what it can do for you. Only after you’ve done your due diligence to debunk these myths will you be able to fully experience the benefits of tokenization. In the end, when it comes to choosing a TaaS provider remember that it’s not only imperative to protect sensitive information, but it’s equally as important to do so without limiting the value of this information to your business.
Is your company looking at tokenization or tokenization as a service to protect credit card, personally identifiable or protected health information?
Until next time,