Rixon Technology gives you a high-speed, fully customizable data security platform that scales with your business.

Author name: Dalton Hirst

Right to Be Forgotten: GDPR vs. CCPA Compliance

Today, organizations are scrambling to meet and maintain a new data security compliance requirement, the ‘Right to Be Forgotten,’ also known as the ‘right to erasure.’ Right to Be forgotten is a part of both the GDPR & CCPA compliance frameworks that require an organization to erase a data owner’s personally identifiable information upon that …

Right to Be Forgotten: GDPR vs. CCPA Compliance Read More »

Rixon Technology Partners with Cloud Comrade to Bring Security Services to APAC

Earlier this month Rixon Technology partners with Singapore-headquartered cloud consulting provider Cloud Comrade. For Cloud Comrade, which already counts cybersecurity vendor Trend Micro among its vendor partners, the partnership sees the cloud consulting provider on-board a relatively unique offering in the security space. Rixon Technology’s security offering provides an enterprise-grade data security-as-a-service solution designed to …

Rixon Technology Partners with Cloud Comrade to Bring Security Services to APAC Read More »

Tokenization vs. Encryption for Data Protection Compliance

Tokenization is a branch of cryptography, but should not be confused with encryption. Encryption is used to hide strings of text based on mathematics. Tokenization replaces individual characters with a different character based on randomness. If you can reverse the encryption mathematics, you get access to the entire string of encrypted text. If you can reverse the token randomness, you get access to a single character.

The Difference Between Tokenization and Encryption

Tokenization vs. Encryption: The Pros and Cons of Each

Ever-rising cyber thefts make it imperative to properly secure any data transmitted over the Internet or stored on digital devices for later use. Recently encryption and tokenization are the most used methods that met all the regulatory requirements accepted by GLBA, PCI DSS, ITAR, HIPAA-HITECH, and the EU GDPR to secure confidential information whenever there’s …

Tokenization vs. Encryption: The Pros and Cons of Each Read More »

Rixon Technology Partners with Cloud Comrade to Bring Security Services to APAC

Earlier this month Rixon Technology partners with Singapore-headquartered cloud consulting provider Cloud Comrade. For Cloud Comrade, which already counts cybersecurity vendor Trend Micro among its vendor partners, the partnership sees the cloud consulting provider on-board a relatively unique offering in the security space. Rixon Technology’s security offering provides an enterprise-grade data security-as-a-service solution designed to …

Rixon Technology Partners with Cloud Comrade to Bring Security Services to APAC Read More »