11. The solution also includes data encryption , tokenization and fraud protection. 12. PWS aims to increase the use of technologies such as data encryption and anonymity. 13. The response is more pervasive use of data encryption technologies. 14. RhoElements features automatic data encryption for data at rest security, protecting information and mitigating risk. 15. But some experts think that the terrorists would have been foolish to use data encryption . 16. Envault was spun off from VTT to commercialize a novel data encryption method called envaulting. 17. The algorithm was intended as a replacement for the Data Encryption Standard ( DES ). 18. Cipher API also supports the use of a hardware accelerator card for bulk data encryption . 19. The auditor should verify that management has controls in place over the data encryption management process. 20. There are a few ways to tell if a site is using a data encryption scheme.