<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Protegrity Tokenization on</title><link>https://docs.protegrity.com/protectors/10.1/docs/pmr/pmr_ch_protegrity_tokenization/</link><description>Recent content in Protegrity Tokenization on</description><generator>Hugo</generator><language>en</language><atom:link href="https://docs.protegrity.com/protectors/10.1/docs/pmr/pmr_ch_protegrity_tokenization/index.xml" rel="self" type="application/rss+xml"/><item><title>Tokenization Support by Protegrity Products</title><link>https://docs.protegrity.com/protectors/10.1/docs/pmr/pmr_ch_protegrity_tokenization/pmr_ch_protegrity_tokenization_support_by_protegrity_products/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/protectors/10.1/docs/pmr/pmr_ch_protegrity_tokenization/pmr_ch_protegrity_tokenization_support_by_protegrity_products/</guid><description>&lt;p>Protegrity offers various types of protectors which helps to protect data in different software and platforms.
For example, we can use:&lt;/p>
&lt;ul>
&lt;li>Application Protectors: To protect data in C, C++, Python, Java, .Net, and Go programming languages.&lt;/li>
&lt;li>Big Data Protectors: To protect data in Big Data at various component levels, such as, Hive, Pig, MapReduce, etc.&lt;/li>
&lt;li>Data Warehouse Protectors: To protect data in the Teradata Data Warehouses.&lt;/li>
&lt;li>Gateway Protectors: To protect data in Gateway Protectors like Data Security Gateway (DSG).&lt;/li>
&lt;li>Cloud Protectors: To protect data in Cloud Protectors.&lt;/li>
&lt;/ul>
&lt;p>Each protector has certain tokenization types which are listed in the following sections.&lt;/p></description></item><item><title>Delimiters</title><link>https://docs.protegrity.com/protectors/10.1/docs/pmr/pmr_ch_protegrity_tokenization/pmr_ch_protegrity_tokenization_delimiters/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/protectors/10.1/docs/pmr/pmr_ch_protegrity_tokenization/pmr_ch_protegrity_tokenization_delimiters/</guid><description>&lt;p>Protegrity tokenization can generate the same token regardless of how the data is formatted. Any character in the input that does not comply with the token types in the &lt;a href="https://docs.protegrity.com/protectors/10.1/docs/pmr/pmr_ch_protegrity_tokenization/#:~:text=Table:%20Tokenization%20Types">Tokenization Types&lt;/a> is generally treated as a delimiter and remains unchanged during tokenization.&lt;/p>
&lt;p>The following table shows how the Protegrity Token types handles delimiters and spaces as compared to plain numerical data.&lt;/p>
&lt;p>&lt;em>Table: Tokenization with Delimiters&lt;/em>&lt;/p>
&lt;blockquote>
&lt;p>&lt;strong>Note&lt;/strong>: Some tokenizers can tokenize delimiters. Unicode Gen2, lower ASCII, printable, and binary are examples of tokenizers that can tokenize delimiters.&lt;/p></description></item><item><title/><link>https://docs.protegrity.com/protectors/10.1/docs/pmr/pmr_ch_protegrity_tokenization/support_by_protegrity_products_dwp/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/protectors/10.1/docs/pmr/pmr_ch_protegrity_tokenization/support_by_protegrity_products_dwp/</guid><description>&lt;p>The Protegrity Data Warehouse Protector is an advanced security solution designed to protect sensitive data at the column level. This enables you to secure your data, while still permitting access to authorized users. Additionally, the Data Warehouse Protector integrates seamlessly with existing database systems using the User-Defined Functions for an enhanced security.
Protegrity protects data inside the data warehouses using various tokenization and encryption methods.&lt;/p>
&lt;p>&lt;em>Table: Supported Tokenization Types for Data Warehouse Protector&lt;/em>&lt;/p></description></item><item><title/><link>https://docs.protegrity.com/protectors/10.1/docs/pmr/pmr_ch_protegrity_tokenization/support_by_protegrity_products_sdk/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/protectors/10.1/docs/pmr/pmr_ch_protegrity_tokenization/support_by_protegrity_products_sdk/</guid><description>&lt;p>The Protegrity Application Protector (AP) is a high-performance, versatile solution that provides a packaged interface to integrate comprehensive, granular security and auditing into enterprise applications.&lt;/p>
&lt;p>Application Protectors support all types of tokens.&lt;/p>
&lt;p>&lt;em>Table: Supported Tokenization Types by Application Protector&lt;/em>&lt;/p>
&lt;table>
 &lt;thead>
 &lt;tr>
 &lt;th>Tokenization Type&lt;/th>
 &lt;th>AP Java&lt;sup>*1&lt;/sup>&lt;/th>
 &lt;th>AP Python&lt;/th>
 &lt;th>AP C&lt;/th>
 &lt;/tr>
 &lt;/thead>
 &lt;tbody>
 &lt;tr>
 &lt;td>&lt;a href="https://docs.protegrity.com/protectors/10.1/docs/pmr/pmr_ch_protegrity_tokenization/pmr_ch_tokenization_types/pmr_credit_card/">Credit Card&lt;/a>&lt;br>&lt;br>&lt;a href="https://docs.protegrity.com/protectors/10.1/docs/pmr/pmr_ch_protegrity_tokenization/pmr_ch_tokenization_types/pmr_ch_numeric0-9/">Numeric&lt;/a>&lt;br>&lt;br>&lt;a href="https://docs.protegrity.com/protectors/10.1/docs/pmr/pmr_ch_protegrity_tokenization/pmr_ch_tokenization_types/pmr_ch_alpha/">Alpha&lt;/a>&lt;br>&lt;br>&lt;a href="https://docs.protegrity.com/protectors/10.1/docs/pmr/pmr_ch_protegrity_tokenization/pmr_ch_tokenization_types/pmr_ch_upper_case_alpha/">Upper-case Alpha&lt;/a>&lt;br>&lt;br>&lt;a href="https://docs.protegrity.com/protectors/10.1/docs/pmr/pmr_ch_protegrity_tokenization/pmr_ch_tokenization_types/pmr_ch_alpha_numeric/">Alpha-Numeric&lt;/a>&lt;br>&lt;br>&lt;a href="https://docs.protegrity.com/protectors/10.1/docs/pmr/pmr_ch_protegrity_tokenization/pmr_ch_tokenization_types/pmr_ch_upper_case_alpha_numeric/">Upper Alpha-Numeric&lt;/a>&lt;br>&lt;br>&lt;a href="https://docs.protegrity.com/protectors/10.1/docs/pmr/pmr_ch_protegrity_tokenization/pmr_ch_tokenization_types/pmr_ch_lower_ascii/">Lower ASCII&lt;/a>&lt;br>&lt;br>&lt;a href="https://docs.protegrity.com/protectors/10.1/docs/pmr/pmr_ch_protegrity_tokenization/pmr_ch_tokenization_types/pmr_ch_email/">Email&lt;/a>&lt;/td>
 &lt;td>STRING&lt;br>&lt;br>CHAR[]&lt;br>&lt;br>BYTE[]&lt;/td>
 &lt;td>STRING&lt;br>&lt;br> BYTES&lt;/td>
 &lt;td>STRING&lt;br>&lt;br>CHAR[]&lt;br>&lt;br>BYTE[]&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>&lt;a href="https://docs.protegrity.com/protectors/10.1/docs/pmr/pmr_ch_protegrity_tokenization/pmr_ch_tokenization_types/pmr_ch_integer0-9/">Integer&lt;/a>&lt;/td>
 &lt;td>SHORT: 2 bytes&lt;br>&lt;br>INT: 4 bytes&lt;br>&lt;br>LONG: 8 bytes&lt;/td>
 &lt;td>INT: 4 bytes and 8 bytes&lt;/td>
 &lt;td>SHORT: 2 bytes&lt;br>&lt;br>INT: 4 bytes&lt;br>&lt;br>LONG: 8 bytes&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>&lt;a href="https://docs.protegrity.com/protectors/10.1/docs/pmr/pmr_ch_protegrity_tokenization/pmr_ch_tokenization_types/pmr_ch_datetime/">Datetime&lt;/a>&lt;/td>
 &lt;td>DATE&lt;br>&lt;br>STRING&lt;br>&lt;br>CHAR[]&lt;br>&lt;br>BYTE[]&lt;/td>
 &lt;td>DATE&lt;br>&lt;br>STRING&lt;br>&lt;br>BYTES&lt;/td>
 &lt;td>DATE&lt;br>&lt;br>STRING&lt;br>&lt;br>CHAR[]&lt;br>&lt;br>BYTE[]&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>&lt;a href="https://docs.protegrity.com/protectors/10.1/docs/pmr/pmr_ch_protegrity_tokenization/pmr_ch_tokenization_types/pmr_ch_decimal/">Decimal&lt;/a>&lt;/td>
 &lt;td>STRING&lt;br>&lt;br>CHAR[]&lt;br>&lt;br>BYTE[]&lt;/td>
 &lt;td>STRING&lt;br>&lt;br>BYTES&lt;/td>
 &lt;td>STRING&lt;br>&lt;br>CHAR[]&lt;br>&lt;br>BYTE[]&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>&lt;a href="https://docs.protegrity.com/protectors/10.1/docs/pmr/pmr_ch_protegrity_tokenization/pmr_ch_tokenization_types/pmr_ch_unicode_gen2/">Unicode Gen2&lt;/a>&lt;/td>
 &lt;td>STRING&lt;br>&lt;br>CHAR[]&lt;br>&lt;br>BYTE[]&lt;/td>
 &lt;td>STRING&lt;br>&lt;br>BYTES&lt;/td>
 &lt;td>STRING&lt;br>&lt;br>CHAR[]&lt;br>&lt;br>BYTE[]&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>&lt;a href="https://docs.protegrity.com/protectors/10.1/docs/pmr/pmr_ch_protegrity_tokenization/pmr_ch_tokenization_types/pmr_ch_binary/">Binary&lt;/a>&lt;/td>
 &lt;td>BYTE[]&lt;/td>
 &lt;td>BYTES&lt;/td>
 &lt;td>BYTE[]&lt;/td>
 &lt;/tr>
 &lt;/tbody>
&lt;/table>
&lt;p>&lt;sup>*1&lt;/sup> - If the input and output types of the API are BYTE[], then the customer application should convert the input to and output from the byte array, before calling the API.&lt;/p></description></item></channel></rss>