• HOME
  • CATEGORIES

    • CATEGORIES

    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

    • Loading categories...

      Browse All Categories

      Loading markets...

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
All Categories
/
Tokenization Platform

Tokenization Platform Reviews and Ratings

What is Tokenization Platform?

Tokenization platform turns sensitive data into non-sensitive data called tokens to increase data protection and reduce fraud risks in financial transactions. The original data is then safely stored in a centralized location for subsequent reference while businesses utilize these tokens to carry out their business activities. In addition, the tokenization platform enables merchants to adhere to industry and governmental regulations like GDPR, CCPA, PCI DSS, and HIPAA with minimum liability and security expenses. The typical users of the technology are financial institutions, real estate, banks, retailers, healthcare providers, insurance, and e-commerce companies. These businesses deploy tokenization to protect the personal information of their users, including credit card numbers, PANs, PII, and PHI.

How Categories and Markets Are Defined

Product Listings

Filter by

Products 1 - 20 of 21
Sort by
Logo of Data Security Manager

Data Security Manager

By Fortanix

4.8
(22 Ratings)

Data Security Manager is a software designed to provide centralized management of encryption keys, tokens, and secrets across diverse environments such as cloud, hybrid, and on-premises infrastructures. The software supports data protection with hardware-based security features, access controls, and secure key lifecycle management. It addresses business requirements for regulatory compliance, data privacy, and secure digital transformation by offering integration with a variety of applications and platforms. Data Security Manager helps organizations enforce encryption policies, mitigate risks of unauthorized data access, and streamline cryptographic operations within their IT ecosystems.

Show More Details
Logo of Worldpay OmniToken

Worldpay OmniToken

By FIS

4.2
(11 Ratings)

Worldpay OmniToken is a software solution designed to secure payment data by transforming sensitive card information into tokens, allowing businesses to process and store payment details in a protected format. The software supports tokenization across multiple channels, providing a unified approach to safeguarding cardholder data in both physical and digital transaction environments. It helps reduce the scope of compliance requirements by limiting exposure to sensitive information, and enables businesses to facilitate secure recurring payments, refunds, and chargebacks without retaining payment card details. The software integrates with a variety of payment platforms and supports businesses in adhering to data security standards, aiming to mitigate the risks associated with payment data breaches.

Show More Details
Logo of TAMUNIO

TAMUNIO

By comforte

4.9
(9 Ratings)

You Need an End-to-End Solution

Power through regulatory roadblocks with measurably reduced risk

Protect sensitive data at its earliest point of entry into your systems Reduce the need to expose the data over the entire data lifecycle

Implementing data-centric security requires a platform that not only offers protection methods fitting your specific use cases, but that also allows you to identify and classify data-sets and perform data analytics across all of them. A data-centric solution must enable you to integrate into your enterprise applications and existing cyber security infrastructure.

Comforte data security platform comprises three integrated services to enable a comprehensive end-to-end data security strategy: SecurDPS Discovery & Classification, SecurDPS Enterprise for data protection integration and monitoring, and SecurDPS Connect.

Show More Details
Logo of Ubiq platform

Ubiq platform

By Ubiq Security

4.3
(6 Ratings)

Ubiq platform is a software designed to provide data encryption capabilities for developers and organizations. The software enables integration of encryption functionality directly into applications and workflows by using APIs, allowing users to protect sensitive information without managing complex encryption infrastructure. Ubiq platform supports multiple programming languages and environments, addresses compliance requirements, and reduces the risk of unauthorized data access. The software abstracts encryption processes, allowing teams to implement data security with minimal changes to application code, and offers centralized management of encryption keys. This approach assists businesses in safeguarding confidential data while maintaining operational efficiency in their development projects.

Show More Details
Logo of HashiCorp Vault

HashiCorp Vault

By IBM

4.4
(5 Ratings)

HashiCorp Vault is a software designed to manage secrets and protect sensitive data in distributed systems. It provides centralized storage for encryption keys, passwords, certificates, and other confidential information, allowing organizations to implement access controls and auditing for secret management. The software supports dynamic secret generation, key rotation, and leasing, helping to reduce the risks associated with hard-coded credentials and manual processes. HashiCorp Vault integrates with various authentication systems and infrastructure, enabling automated workflows and secure communication between applications and services. By supporting policy-driven security measures, the software addresses business concerns related to data breaches, regulatory compliance, and secure DevOps practices.

Show More Details
Logo of Rixon Technology Tokenization Platform

Rixon Technology Tokenization Platform

By Rixon Technology

5
(3 Ratings)

Rixon’s Vaultless Tokenization Platform is a data security solution designed to help organizations protect sensitive structured data while meeting privacy and compliance requirements. By replacing sensitive values with format-preserving tokens and eliminating the need for data vaults or encryption keys, Rixon helps reduce breach impact, insider threats, and exposure from misconfigurations. The platform offers cloud-native deployment, API-based integration, policy-based access controls, and AI-powered monitoring to detect anomalies and enforce secure detokenization. Rixon’s vaultless model supports sub-second performance at high transaction volumes and is used by companies in regulated industries to secure PII, payments, and health data while simplifying audits and compliance across global privacy standards. It also addresses gaps left by traditional encryption by protecting data in use and removing key management risks.

Show More Details
Logo of Acra

Acra

By Cossack Labs

5
(2 Ratings)

Acra is a data security toolbox. It provides data security controls, like field level encryption, enabling developers and DBAs to protect sensitive data without interrupting apps and databases.

Acra consists of several modules, easily integrated with low impact on the app design and architecture. Acra provides application level encryption, masking, tokenisation, access control, database leakage prevention, intrusion detection.

Designed for developers, Acra scales and adapts with the system. Acra modules are available in different form-factors, i.g. SQL encryption proxy, encryption-as-a-service API, API proxy, or in-app SDK. Such variety helps seamlessly blend Acra simple and complicated architectures.

Acra enables security, transparency, monitoring of sensitive data.

Acra perfectly suits systems that require protection against attackers, insiders, or misconfiguration. Integrating Acra covers data privacy requirements set by GDPR, CCPA, PCI DSS, HIPAA, etc. conveniently and fast.

Show More Details
Logo of ALTR Data Access Control and Security

ALTR Data Access Control and Security

By ALTR

5
(2 Ratings)

ALTR offers a tokenization solution to keep up with the needs, volume and speeds of modern cloud data warehouses. It delivers a string of characters with no computable relationship between the token and the original value. The token is completely random and can only be de-tokenized via access to the token vault – where both the data and the database itself are heavily encrypted. The use of “deterministic tokens”– where the same random value is delivered for a specific piece of data every time – preserves the connection between data values, allowing for SQL operations such as joins or WHERE clauses across tokenized databases while the data stays obfuscated. ALTR integrates with data catalog solutions to set policy for sensitive data and with ETL providers to embed Snowflake tokenization into the data pipeline. Because it is a SaaS solution, it doesn’t require software to deploy, hardware to manage, or create issues about scaling with cloud warehouse usage.

Show More Details
Logo of CipherTrust Tokenization

CipherTrust Tokenization

By Thales

5
(2 Ratings)

CipherTrust Tokenization is a software developed to enable organizations to protect sensitive data by substituting original data with non-sensitive tokens while preserving data format and length. The software provides dynamic and static tokenization methods, allowing flexible implementation across various fields such as payment processing and compliance with regulatory standards. It integrates with databases and applications and supports policy-based data access controls. The software addresses business needs for reducing risk of data exposure and simplifying compliance processes by minimizing the scope of sensitive data handled in enterprise environments. CipherTrust Tokenization aims to support privacy requirements and facilitates secure data handling without impacting business operations or workflows.

Show More Details
Logo of FIS Tokenization

FIS Tokenization

By FIS

5
(2 Ratings)

FIS Tokenization is a software designed to enhance data security for organizations by replacing sensitive information with non-sensitive substitutes known as tokens. The software helps protect payment card data and other confidential information during transmission and storage without the need to expose original data. By supporting integration with payment systems and compliance frameworks, FIS Tokenization addresses business concerns related to regulatory requirements and risk management. It is implemented across various transactional environments to reduce the risk of data breaches and supports the safeguarding of data throughout its lifecycle.

Show More Details
Logo of ACI Omni-Tokens

ACI Omni-Tokens

By ACI Worldwide

4
(1 Rating)

ACI Omni-Tokens is a software developed by ACI Worldwide that facilitates secure digital payment transactions through tokenization technology. The software enables the replacement of sensitive payment data, such as card numbers, with unique tokens, reducing the risk of unauthorized access to financial information during electronic transactions. It supports a variety of payment environments, including online, mobile, and in-store, and helps businesses meet compliance requirements by minimizing the exposure of real transaction data. ACI Omni-Tokens is designed to enhance payment security, streamline transaction processing, and assist organizations in mitigating the impact of data breaches. The software provides interoperability across different payment channels and platforms, offering a unified approach to payment data protection for businesses managing diverse transaction types.

Show More Details
Logo of Baffle Data Protection Services

Baffle Data Protection Services

By Baffle

4
(1 Rating)

Baffle Data Protection Services is a software designed to secure sensitive data through various protection methods, including encryption, data masking, and access controls. The software provides capabilities for encrypting data at rest, in transit, and during processing, enabling organizations to mitigate risks associated with unauthorized access and data breaches. It integrates with databases, cloud environments, and data workflows to ensure continuous data protection without requiring changes to existing applications. The software addresses compliance requirements and helps safeguard information in multi-cloud and hybrid environments by enabling organizations to manage encryption keys and monitor data activities. Baffle Data Protection Services aims to support enterprises in maintaining confidentiality and integrity of data while facilitating compliant usage in analytics and operations.

Show More Details
Logo of Protegrity Data Security Platform

Protegrity Data Security Platform

By Protegrity

5
(1 Rating)

Protegrity Data Security Platform is a software designed to enable organizations to protect sensitive data across cloud, hybrid, and on-premises environments. The software provides data discovery, classification, tokenization, encryption, and access controls to help businesses manage and safeguard data in compliance with regulatory requirements. Its architecture supports integration with various databases, applications, and analytics tools, allowing for protection at rest, in transit, and during processing. The software addresses the business problem of data privacy and risk management by facilitating control over who can access information and by providing methods to reduce exposure in case of a breach. Additionally, it enables enterprises to securely use data for analytics and operational purposes while maintaining data confidentiality.

Show More Details
Logo of ShieldConex

ShieldConex

By Bluefin Payment Systems

4
(1 Rating)

ShieldConex is a data security software that provides tokenization and encryption for sensitive information such as payment card and personal data. The software is designed to protect data during entry, transmission, and storage by replacing confidential elements with tokens or encrypted values. ShieldConex enables organizations to comply with industry regulations by reducing exposure of sensitive information in their systems. The software operates through an interface or via APIs and can be integrated into web forms and applications. It assists businesses in minimizing the risk of data breaches, safeguarding user information, and supporting secure data processing practices without altering existing workflows.

Show More Details
Logo of Sotero Data Security Platform

Sotero Data Security Platform

By Sotero

4
(1 Rating)

Sotero Data Security Platform is a software designed to protect sensitive data across various environments including cloud, on-premises, and hybrid infrastructures. The software enables real-time data encryption, access controls, and monitoring to ensure data privacy and compliance with regulatory standards. Sotero Data Security Platform provides features such as dynamic data protection, threat detection, and secure data sharing by leveraging centralized management and policy enforcement. The software addresses business challenges related to unauthorized access, data breaches, and the need for secure collaboration among users and applications, making it suitable for organizations that require robust security for structured and unstructured data without impacting operational workflows.

Show More Details
Logo of Titanium Vault

Titanium Vault

By Titaniam

4
(1 Rating)

Titanium Vault is a software designed to provide secure storage and management of credentials, secrets, and sensitive data for enterprise applications and workflows. The software offers centralized secret management, enabling organizations to control access to confidential information through defined policies and permissions. Titanium Vault automates the handling of secrets across different environments, helps prevent unauthorized access, and supports auditing capabilities for compliance and monitoring purposes. Its features address the business problem of protecting sensitive digital assets in distributed systems and supporting regulatory requirements around data security and access management.

Show More Details
Logo of Voltage SecureData Payments

Voltage SecureData Payments

By OpenText

5
(1 Rating)

Voltage SecureData Payments is a software designed to protect payment data during transactions by employing point-to-point encryption and tokenization. It enables organizations to secure cardholder information from the point of capture through to the backend systems, reducing the risk of data breaches and exposure of sensitive payment details. The software helps businesses comply with payment industry regulations and data security standards by minimizing the scope of systems that handle unprotected card data. It supports various payment channels including in-store, online, and mobile transactions, and integrates with existing payment processing workflows without requiring major changes to infrastructure. Voltage SecureData Payments aims to address challenges related to payment data protection, helping organizations manage the risks associated with processing and storing sensitive payment information.

Show More Details
Logo of Capital One Databolt

Capital One Databolt

By Capital One

Capital One Databolt is a software designed to support data integration and management for organizations handling large-scale data workloads. The software facilitates the movement, transformation, and orchestration of data across various platforms within a cloud environment. Databolt provides features including data pipeline creation, scalable processing, and automation of complex data workflows, aiming to streamline data handling and improve operational efficiency. By centralizing data operations, the software helps organizations address challenges related to data silos, synchronization, and accessibility. Databolt is structured to function within enterprise environments, supporting various data sources and flexible deployment configurations, thereby assisting users in consolidating and managing disparate data assets within a unified framework.

Be the first to .
Logo of EncryptRIGHT

EncryptRIGHT

By Prime Factors

EncryptRIGHT is a software developed by Prime Factors designed to manage sensitive data by substituting original information with non-sensitive equivalents known as tokens. The software supports a range of tokenization formats and methods, allowing organizations to secure data during storage, processing, and transmission. EncryptRIGHT Tokenization enables data protection across applications and environments, helping address compliance requirements by reducing the exposure of sensitive information such as payment card data, personally identifiable information, and other regulated records. The software integrates with enterprise systems and supports rules-based access controls, enabling organizations to specify which users or applications can access tokenized data and original values. EncryptRIGHT assists organizations in reducing the risk of data breaches and unauthorized disclosures by limiting access to sensitive information while maintaining usability for business processes.

Be the first to .
Logo of eperi Gateway

eperi Gateway

By eperi

eperi Gateway is a software designed to provide data protection for cloud applications by implementing encryption and tokenization methods. The software functions as a proxy between users and cloud services, enabling organizations to secure sensitive information before it is transmitted to cloud environments. It supports data privacy compliance by allowing enterprises to maintain control over encryption keys and access policies, ensuring that data stored or processed in cloud applications remains protected from unauthorized access. eperi Gateway integrates with various cloud platforms and applications, addressing business requirements related to regulatory standards and risk management in cloud adoption.

Be the first to .

Top Trending Products

HashiCorp VaultData Security ManagerUbiq platformFIS TokenizationTitanium Vault

Popular Product Comparisons

FIS Tokenization vs Worldpay OmniTokenCipherTrust Tokenization vs Worldpay OmniTokenCipherTrust Tokenization vs Voltage SecureData PaymentsData Security Manager vs Worldpay OmniToken

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.