ZenithSecure

ZenithVault SaaS

ORDER NOW

How does it work?

Using a public cloud would clearly be an invitation to security risk. Using private clouds is not necessary and would create useless complexity which could possibly result in greater security risks.

Your ZenithVault SaaS will be EXCLUSIVELY hosted on dedicated machines. No clouds, no cloud encryption, no virtualization security policies, just minimal, hardened operating systems running on geographically scattered servers.

The infrastructure will run on ZenithVault Enterprise software, with the nodes scattered on different continents. ZenithSecure guarantees data safety, redundancy and uptime.

These exact same results can be achieved with the ZenithVault Enterprise solution; however we will manage and maintain the server infrastructure while offering clients data safety guarantees with the implementation of our managed service.

The great advantage of this system is data tokenization. All sensitive information is stored in our PCI DSS compliant storage location. Our servers create and then return a unique reference pointer (token) to the software application. Tokenization protects all sensitive information during transmission and in storage at the client.

ZenithSecure’s credit card tokenization solution is unique in its implementation; a token is produced per transaction or secret. Clients then work with the token of the secret, not with the secret itself. This important specialization enables simpler and safer secret management.

Every secret entry you send to the database will be associated with a unique token which will be used to manipulate the stored data so that you will never have to acquire back the stored data, thus increasing security.

Depending on your requirements and on the data you store inside the cluster; we will be able to custom implement payment gateways or 3rd party data processors in order to achieve a secure data manipulation architecture based on data tokenization as described below.

Case Study: Data Tokenization

A primary cause for exposures of customer cardholder data has been the inability of those companies which have been breached to secure properly their customer's credit and debit card information.

The industry standards of PCI DSS and PA-DSS have created the requirements regarding the storage of all customer credit and debit card information within software applications. ZenithSecure clients will protect their customers by deploying this secure offsite data storage solution that employs our technology for data tokenization.

ZenithVault SaaS works by storing the cardholder information offsite in our PCI DSS compliant storage location. ZenithSecure servers create and then return a unique reference pointer (a token) to the software application. Encryption is used to protect cardholder data while in transit. Using the token (which contains no actual cardholder data); companies can bill an existing card which is on file as well as to schedule automatic and recurring payments. Tokenization protects cardholder data during transmission and in storage at the client.

ZenithSecure’s credit card tokenization solution is unique in its implementation; a token is produced per transaction or secret. Clients then work with the token of the secret, not with the secret itself. This important specialization enables simpler and safer secret management in a location which is PCI DSS Level 1 compliant as well as secure.

While the information is securely stored away from their computer, clients always have access through their tokens which designate the location of their data in our storage environment. Using these tokens clients access any information which they need.

This makes it easier for them and their customers as they do not have to re-enter information which has already been stored. The company receives approval response information exactly as if they had processed the credit card themselves, however without the valuable cardholder information. Plus attackers and unauthorized users do not have access to their confidential information even if they breach the company’s security system.

Risk Mitigation


How Does Tokenization Work for Credit and Debit Card Transactions?
  • Clients accept credit and debit cards using their normal procedures.
  • Clients securely transmit cardholder information to ZenithSecure’s PCI DSS compliant storage location.
  • A unique reference pointer, known as a token, is generated by the storage location for each record transmitted by a client.
  • The token is then stored by the client in place of cardholder information.
  • For payment transactions in the future the client transmits the token in place of cardholder information.

Key Benefits of ZenithVault SaaS Data Tokenization
  • Protects clients from data theft and security breaches.
  • Drastically reduces potential financial consequences and business liabilities for clients.
  • Enables clients to transact all of their credit and debit card procedures securely.
  • Assures clients are in compliance with PCI DSS and PA-DSS (PABP) requirements now as well as when those requirements change.
TO TOP