VGS replaces routing and account numbers with tokenized account numbers (TANs), non-sensitive tokens your systems use in place of the real data. Initiate ACH payments, run payroll, and fund loans without the compliance burden of holding raw bank credentials.
VGS enables banks and institutions to securely route and transmit data while retaining ownership of the data.
Contact UsView DocsVGS Collect renders a secure input field in your UI. Keystrokes go directly to VGS so your application never sees the raw data.
VGS encrypts and stores the account data in your dedicated vault. A format-preserving token is returned to your system instantly.
Store, route, and use the token freely. Your database, logs, and APIs only ever contain the token, never the real account number.
When initiating ACH or verification, VGS intercepts the outbound call, substitutes the real data, and forwards to your processor in real time.
Bank account tokenization is the process of replacing sensitive bank account details, such as routing numbers and account numbers, with a randomly generated, non-sensitive token. The token can be stored, transmitted, and used in payment flows, while the real data is securely stored by a third-party provider such as VGS. This means sensitive data never touches your servers.
When a customer enters their bank account details, the data is intercepted before it reaches your systems. A token service provider like VGS vaults the real data in an encrypted, access-controlled environment and returns a format-preserving token to your application. Your system stores and uses only the token. When you need to initiate a payment or verification, VGS detokenizes in real time, and your servers are never exposed to the raw data.
Bank account tokenization typically covers routing numbers, account numbers, and bank account type (checking or savings). VGS can also tokenize associated PII, such as account holder name, address, and SSN, allowing you to vault an entire customer financial profile, not just payment credentials.
Tokens generated by VGS cannot be reversed without authenticated access to the VGS vault. Unlike encryption, where the algorithm itself can, in theory, be reversed if a key is compromised, tokenization has no mathematical relationship between the token and the original value. Only authorized, credentialed API calls to VGS can detokenize the data, making a breach of your systems effectively useless to any attack.
VGS uses a proxy-based architecture. Inbound API calls from your customers pass through the VGS inbound route, which intercepts sensitive fields, vaults the data, and substitutes tokens before the payload reaches your servers. Outbound calls to banks, ACH processors, or payment networks pass through the VGS outbound route, which detokenizes in real time. Your application logic, database schema, and downstream integrations require minimal changes.
Most teams complete a working VGS bank account tokenization integration in days to weeks, not months. VGS provides SDKs, pre-built UI components (like VGS Collect for secure form capture), and detailed documentation for the most common use cases, including ACH payments, payroll, lending, and account verification.
You do. VGS acts as a data custodian, not a data owner. Your customer data is stored in a dedicated vault environment controlled by your organization. VGS cannot use, sell, or access your data outside of processing requests you initiate. This is a critical distinction from payment networks or processors, who may have broader data rights.
Encryption transforms data using a key; the original data can be recovered if the key is compromised. Tokenization replaces data with a random token that has no mathematical relationship to the original value and stores it separately in a secure vault. For bank accounts, tokenization is preferred because it removes sensitive data from your environment entirely, whereas encrypted data still resides on your servers and remains a liability if keys are leaked.
Bank account tokenization is not legally mandated in the same way PCI DSS applies to card data, but it is strongly recommended, and in many contexts effectively required, to meet NACHA operating rules, SOC 2 requirements, and state-level data privacy laws like CCPA and NYDFS. Storing raw routing and account numbers creates significant liability; tokenization is the most widely accepted method to eliminate that risk.
A tokenized account number (TAN) is a randomly generated value that replaces a customer's actual bank account number in payment systems. Unlike the real account number, a TAN contains no sensitive financial data and is mathematically unrelated to the original number, meaning that even if intercepted, it cannot be reverse-engineered to reveal the underlying account. TANs are typically issued by a token vault or payment processor and are only valid for specific use cases, merchants, or transaction types.
Using TANs significantly reduces a business's exposure to fraud and data breaches. Because the token holds no intrinsic value outside of the system it was issued for, a compromised TAN cannot be used to access or drain a customer's actual account. This also simplifies compliance with data protection regulations, so businesses avoid storing sensitive account data directly, lowering the scope of security audits and reducing liability in the event of a breach.
This depends on the tokenization scheme. Some TANs are single-use, valid only for one transaction and discarded immediately after, while others are persistent and can be reused across multiple transactions with the same merchant or platform. When a TAN expires or is revoked (for example, if a customer updates their account or suspected fraud is detected), any payment attempt using that token will be declined. A new TAN must be issued through the token vault before further transactions can proceed, without ever exposing the underlying account number.