• Data Capture Cloaking

    Data Capture Cloaking is the technique by which DataDivider can capture numeric privacy data without exposing that data to the local device. Through this technique it is possible to reduce the scope of privacy data compliance by excluding the local device (and by extension the local network) from the compliance program. DataDivider warrants its controls…

    Read More

  • DTMF Tone Muting

    Where businesses are looking to exclude their telephony environment from exposure to privacy numeric data then they can deploy DataDivider’s DTMF Tone Muting solution. Rather than have customers verbalize sensitive numeric data to contact centre agents or back office staff they can be invited to enter these digits into their telephone keypads. These…

    Read More

  • Secure Browser

    DataDivider’s Secure Browser provides a fully protected data entry and presentation environment. The Secure Browser isolates this environment from the local device providing remotely all the security measures necessary to protect privacy data. The architecture of the solution is such that should the local device be compromised this would not result in any…

    Read More

  • Secure Cloud

    The DataDivider Secure Cloud is an audited secure environment meeting all privacy data compliance standards. Access through the Secure Browser to this hosted environment ensures that these compliance standards are maintained to the end point where privacy data is created and maintained within the business. Furthermore, access from the Secure Browser is…

    Read More

  • Tokenization

    DataDivider fully supports the concepts of de-valuing privacy data. This is the notion of transforming privacy data into valueless substitutes at the point of data capture and only reconstituting privacy data at necessary times where the privacy data is actually required. This ensures that when privacy data is at rest or in transmission is it rendered useless to any…

    Read More

  • Interceptor

    Many businesses have struggled to remove privacy data from their applications thereby leaving these applications servers and databases exposed to privacy data. As such they still require all necessary security controls in these environments to meet data privacy compliance regulations. By replacing privacy data with tokens it is possible to remove…

    Read More