Randtronics Logo


Patented next generation tokenization

For many enterprises, sensitive data is located on multiple servers across production, disaster recovery and development systems. The standard ways to secure and restrict the sensitive data can be an involved and expensive exercise, often having real time operational impact on the business. Conventional methods require security around access control and connectivity to be implemented across all servers that may handle the sensitive data. Additionally, precautions are taken to address physical security where the servers are located.

Randtronics is able to offer an alternate strategy, known as Tokenization.

This method reduces the number of places where data is stored within an enterprise, eliminating points of risk and reducing audit scope. Randtronics Tokenization solutions generate “format-preserving” tokens that mimic the original data.

Randtronics DPM offers patented next generation encryption innovation where compliance data can be encrypted and de-identified without any code or business process changes. DPM implements the best practice guidelines for enforcing the security principles of policy-based key management, data encryption and spoofing, as well as access control, separation of duties and auditing.

For businesses, the days of encryption intimidation, the burden of encryption implementation and the absence of needed technical skills are over. Randtronics DPM runs on standard Windows/Linux/Backend database platforms on-premise or within containers and multi-vendor clouds using methods of backup which provides high availability, load balancing and performance scaling for decades.

The Tokenization approach, requires minimum effort in identifying parts of the data structure that is deemed sensitive, and replacing with a “non-critical” token. The real data is encrypted and stored on a separate token server system. It is only this system now that will contain sensitive data and needs to be highly secured. Users and applications that require access to the sensitive data are transparently allowed access to the tokens.

Randtronics provides a methodology of combining both Encryption and Tokenization technologies to offer organisations options for better security, compliance and data privacy beyond traditional approaches. Tokenization builds upon encryption by replacing sensitive data with tokens.

Latest news and articles

Goodbye, Tina Turner

Sad news this week that the Queen of Rock ‘n’ Roll has exited the stage. Many of us at the Randtronics team grew up hearing

Read More

Our Customers

Letter from the CEO

Rantronics Logo

Thank you for visiting the Randtronics website.

We make enterprise encryption easy.

Smart businesses already know that only encryption can reduce the attack surface and stop the hackers from stealing their sensitive data. A company that only uses encryption is more secure than a company with all other cyber security measures. Privacy standards such as PCI DSS, HIPAA, and GDPR are all mandating in law the protection of the citizen’s personal data. Fines for breaches are huge. You won’t get fined if your firewall is hacked. You won’t get fined if you suffer a virus or ransomware attack. You WILL get fined if you lose ANY personal data pertaining to ANY citizen. The lowest common denominator is the DATA. Data that is “Encrypted” is out of the scope of the Law.

Whilst all understand the need to protect sensitive data holistically (such as NIST Cyber Security Framework or 12 prescriptive PCI DSS guidelines) their cyber security priorities are misguided to say easy aspects and not addressing “what happens” when these fail? Encryption of data is the only direct protection measure that renders data unreadable compared to upgrading firewalls or virus and malware, IPS, log monitoring, etc. I am saying you need all methods but unless you have implemented enterprise grade encryption you are still unprotected like driving a car without “seatbelts”. “Enterprise grade encryption” as a cyber measure is the “seat belt” that saves lives in car accidents. Industry experts predict a relentless continuation of data breaches this year and penetration testing have proven perimeter defense is easily penetrable.

Randtronics has taken the challenge to make encryption easy and is innovating in many areas. We have already reduced deployment effort to days, use familiar standard components so that less skilled people can deploy and maintain systems.
I welcome discussions via email or phone as through your feedback we will be challenged to continue to innovate to the point where businesses and users do not need to be intimidated when using encryption as the worlds most powerful tool to protect their sensitive data.

Experts predict data breaches will continue at relentless pace, let Randtronics secure your business with “Enterprise grade ubiquitous encryption technology”. Time is of the essence. Why not be pro-active? I invite you to let Randtronics and its global distributors and resellers assess and assist your business directly.

Yours sincerely,
Bob K Adhar, BE, MBA, CISSP
Founder and CEO