This paper includes descriptions of major database encryption and tokenization technologies, a decision tree to help determine which type of encryption is best for you, and example use cases drawn from real world deployments.

If you are considering any database encryption or tokenization project, this paper should save you hours of research and architecture development time.

Understanding and Selecting a Database Encryption or Tokenization Solution Version 1.0 (PDF, 516KB)


You can see the history in the original blog posts, starting with Introduction To Database Encryption – The Reboot! and ending with Database Encryption, Part 7: Wrapping Up.

Share: