1. Latest News
  2. Submit Press Release
  1. PR Home
  2. Latest News
  3. Feeds
  4. Alerts
  5. Submit Free Press Release
  6. Journalist Account
  7. PRNewswire Distribution
Auric Systems International Logo

PaymentVault re-launches as  AuricVault  to Tokenize What Matters

The AuricVault™ tokenization service is an ideal storage solution for any sort of sensitive data.

 
 
603-924-6079
603-924-6079
PRLog - Jul. 9, 2014 - PETERBOROUGH, N.H. -- Auric Systems International, a leader in PCI compliant credit card storage, introduces The AuricVault™, a PCI and HIPAA compliant data storage service that associates tokens with secure encrypted data. Previously branded as PaymentVault™, Auric Systems International has re-launched the tokenization service as The AuricVault™. The AuricVault™ tokenization service is an ideal secure storage solution for many types of sensitive data.

Every day reputations of leading brands are being, tarnished. Sensitive information like Credit card numbers, Social Security numbers, Protected health information, Name & Address and debt information, and passwords are being stolen and exposed. Agencies and organizations responsible for Payment Card Industry (PCI), Health Insurance Portability and Accountability Act (HIPAA),The Personal Information protection and electronics Documents Act (PIPEDA) compliance are levying fines on the corporate victims. Individuals are having to deal with the horrors of Identity theft and  fraudulent credit card activity and the burdens they cause. Hackers, malicious intruders and cyber criminals are responsible for the stealing millions of individuals, personally identifiable information. Criminal factions are even holding stolen data hostage and demanding ransom. No industry, educational institution of government agency, community or individual is immune to the threat of a cyber intrusion or breach.

Compliance itself does not equal security...Separate bulk storage of encrypted tokenized information from the personally identifiable information not only complies with PCI DSS requirements, but more importantly renders the sensitive data useless to hackers. The security layers employed by professionals for data protection have long included a combination of perimeter,  physical, and software-based security. The combination of those measures with tokenization and cryptography (encrypted data where  Public/Private key technology is used) provides a vigorous defense that can provide last-ditch salvation in the event of , what many say, is the inevitable occurrence of a data breach.

"No system is completely safe from malicious intrusion. Regardless of the care taken to secure your systems". stated Auric’s CEO Ray Cote. "you can depend on the fact that at some point in the future you will need to deal with an intruder. Tokenization is a vital factor in preparing for that next break-in. Thieves cannot steal what you do not have."

The AuricVault™ provides flexibility for tokenization and it's integration. The encrypted data can be stored, retrieved, updated, and deleted. A permissions system provides complete and  secure controlled sharing of any sensitive information with third parties, while tracking access to the data by user and date/time. Retention policies allow automatic aging-out of data when it is no longer being accessed. Tokenization segmentation allows for diverse data sets to have different retention policies.

"Changing the name to The AuricVault™ reflects the breadth of data that companies consider sensitive," stated  Auric’s Director of Marketing, John Tourgee. "The origin of our company's name (Auric) is derived from the Latin for gold: arum.  Sensitive data should be secured as it were a vast amount of gold." Tokenization moves vitally important sensitive personal and financial data out of the local business environment and into Auric’s PCI and HIPAA compliant hosting environment. Tokens are randomly-generated strings of numbers and letters that have no relationship to the data being stored. If someone were to steal all your tokens, they still could not obtain any of your stored data.

Auric takes prudent measures to ensure our environment is secure as well as being both PCI and HIPAA compliant. Auric Systems International, as well as our hosting partner iNetU all Level 1 PCI Validated Service Providers and undergo third-party reviews on a regular basis. Auric’s encryption key management system is maintained in a separate facility, and separate service, from where the encrypted tokenized data is stored. The AuricVault™ employes transparent, automatic data replication across geographically distributed servers.

To learn more about the AuricVault™ service or request a copy of the API and sandbox credentials, contact Auric Systems International at Sales@AuricSystems.com or call us at 603-924-6079

About Auric Systems International

Headquartered in New Hampshire, Auric Systems International has been producing secure credit card and payment applications since 1994. Our software and services are deployed in businesses, organizations and nonprofits that scale in size to fortune 50 enterprises. Auric pioneered card-not-present payment software. We deliver robust, adaptable, scalable security and payment processing solutions at reasonable prices. For more information about simplifying your PCI compliance, Auric Systems Is a Level 1 PCI DSS Validated Service Provider.

Media Contact
John Tourgee
603-924-6079
***@auricsystems.com

Photo:
http://www.prlog.org/12346406/1

--- End ---

Click to Share

Contact Email:
***@auricsystems.com Email Verified
Source:Auric Systems International
Location:Peterborough - New Hampshire - United States
Industry:Security, Technology
Tags:credit card storage, pci, hipaa, tokenization, security
Shortcut:prlog.org/12346406
Verified Account Email Address
Verified Account Phone Number

Disclaimer:   Issuers of the press releases are solely responsible for the content of their press releases. PRLog can't be held liable for the content posted by others.   Report Abuse

Latest Press Releases By “

More...

Trending News...



  1. SiteMap
  2. Privacy Policy
  3. Terms of Service
  4. Copyright Notice
  5. About
  6. Advertise
Like PRLog?
9K2K1K
Click to Share