In last month’s blog post we explained how vaultless tokenization can transform PCI DSS 4.0 compliance from a regulatory burden into a business enabler. Not only does vaultless tokenization reduce the scope and cost of compliance, but it also preserves data utility to support monetization, customer engagement and fraud prevention efforts. Furthermore, vaultless tokenization delivers a secure foundation for building new payment products, enriched GenAI models, and new revenue channels.
Now it’s time to understand how to make these business goals a reality. This is how comforte’s vaultless tokenization operates across a hybrid environment within a payments network:
1- Ingestion and Entry
Cardholder data arrives over TLS (to confirm with PCI DSS 4.0) from web/mobile front-ends (e.g. Apache, Nginx). It then travels via client backend APIs and is stored in various datastores.
2- On-Premises Tokenization & Storage
Comforte’s vaultless SecurDPS cluster integrates directly into the client’s data pipelines. It then issues format-preserving tokens for primary account numbers (PANs) through different transparent integrators such as SDKs (Java/.NET/C++), filesystem filters, REST APIs, Kafka connectors, and Virtual File System—minimizing the number of required code changes and data touchpoints.
Operational & PII databases hold order logs and customer data. Although these are not directly subject to PCI DSS requirements, they would still need to be architected to meet specific compliance and security controls—like encryption at rest, network segmentation, and identity and access management (IAM). The client could consider deploying additional tokenization across these two database environments on a case-by-case basis to further reduce the risk of data exposure.
3- Controlled Detokenization for Gateways
Detokenization calls let the client send cleartext PANs to payment gateways (e.g. ACI Worldwide) while adhering to strict IAM and audit policies. Once the data is received by the payment gateway, the gateway provider (e.g. ACI Worldwide) is responsible for protecting the PAN under PCI DSS 4.0.
4- Protection Cluster Components
The Protection Cluster is the main component of SecurDPS—a centrally managed, scalable, and fault-tolerant cluster of virtual appliances that performs the actual protection operations. It consists of:
5- Enterprise Analytics & ETL (On-Premises)
Enterprise on-premises applications such as SAP ECC, Power BI/Tableau, Salesforce, and Dynamics consume a blend of tokenized and cleartext data. By leveraging comforte’s tokenization and transparent integration capabilities, data protection and deprotection can occur in-flight across all flows—letting business applications run without friction while enforcing strong security where it’s needed most.
6- Cloud Landing & Consumption
Tokenized (and encrypted) cardholder data and PII enter client cloud data stores (e.g. blob/S3/data lakes) via ETL pipelines. Any cloud-side detokenization routes back to on-premises SecurDPS under the same centrally defined IAM/audit guardrails.
Downstream services could include Mailchimp for marketing, Looker/Tableau for BI, Sift/Riskified for anti-fraud, or Snowflake/Databricks/Vertex/SageMaker for AI/ML. They work exclusively on tokens or partially detokenized data, but any cleartext PAN needs to invoke the SecurDPS cluster and strict access controls.
7- Hybrid & Deployment Flexibility
The comforte approach to vaultless tokenization has been designed to work seamlessly across a wide range of enterprise environments. Specifically, it:
PCI DSS 4.0 compliance is often viewed by business leaders as a necessary evil. However, when done right, it can open the door to tremendous new business opportunities and revenue growth while simultaneously mitigating regulatory risk. The comforte approach to vaultless tokenization helps unlock the door to these opportunities, while offering a robust yet flexible architecture designed to work with a range of enterprise payment environments.