IBM now offers two choices for cloud key management.

Protecting data in the cloud can be a daunting exercise for customers. When moving sensitive and confidential data to the cloud, customers expect to have the ability to use their own data encryption keys. They also want to be sure that no one has access to these keys. This especially applies to highly regulated industries like FSS and Healthcare.

IBM now offers two choices for cloud key management. IBM Key Protect already supports Bring Your Own Key (BYOK) for protecting data at rest. For customers looking for greater control over their data encryption keys and hardware security modules (HSMs), IBM Cloud is proud to announce Beta for IBM Cloud Hyper Protect Crypto Services, a dedicated key management and cloud HSM service.

Hyper Protect Crypto Services supports KYOK (Keep Your Own Key), which allows for the protection of data encryption keys by a dedicated, customer controlled HSM. This HSM is FIPS 140-2 Level 4 certified, the industry’s only Level 4 certified HSM available in the cloud. Hyper Protect Crypto Services is built on LinuxONE technology and is part of the Hyper Protect portfolio of services. This guarantees that no one—including cloud admins—has access to customer keys. Key Protect and Hyper Protect Crypto Services use a common Key Provider API to offer a consistent approach for adopting services.

Additionally, customers can use Hyper Protect Crypto Services as a cloud HSM for hardware-based security for cryptographic operations, including digital signing and SSL offloading. To account for a secure and rapid HSM setup, IBM provides a cloud CLI for the HSM key ceremony. This, again, is the first such service in the industry!

Here’s what you need to know

If you already have an existing instance, we ask you to move to the BETA service (available in the IBM Cloud Catalog) since we are going to sunset the EXPERIMENTAL in the near future.

End of Experimental Date: February 5th, 2019

As of February 5th, 2019, provisioning new Hyper Protect Crypto Services Experimental instances will no longer be possible. Existing instances will have support until the End of Experimental Support Date.

End of Experimental Support Date: March 5th, 2019

  • For a period of 30 days after the End of Experimental Date (through March 5th, 2019), all existing instances will continue to be available on the Services dashboard in the IBM Cloud console. For this period, there will still be support for existing instances.

  • We will delete any still-provisioned instance as of the End of Experimental Support Date.

  • Please delete your Hyper Protect Crypto Services Experimental service instances before the End of Experimental Support Date.

Try the Hyper Protect Crypto Services on the IBM Cloud today

Categories

More from Announcements

IBM TechXchange underscores the importance of AI skilling and partner innovation

3 min read - Generative AI and large language models are poised to impact how we all access and use information. But as organizations race to adopt these new technologies for business, it requires a global ecosystem of partners with industry expertise to identify the right enterprise use-cases for AI and the technical skills to implement the technology. During TechXchange, IBM's premier technical learning event in Las Vegas last week, IBM Partner Plus members including our Strategic Partners, resellers, software vendors, distributors and service…

Introducing Inspiring Voices, a podcast exploring the impactful journeys of great leaders

< 1 min read - Learning about other people's careers, life challenges, and successes is a true source of inspiration that can impact our own ambitions as well as life and business choices in great ways. Brought to you by the Executive Search and Integration team at IBM, the Inspiring Voices podcast will showcase great leaders, taking you inside their personal stories about life, career choices and how to make an impact. In this first episode, host David Jones, Executive Search Lead at IBM, brings…

IBM watsonx Assistant and NICE CXone combine capabilities for a new chapter in CCaaS

5 min read - In an age of instant everything, ensuring a positive customer experience has become a top priority for enterprises. When one third of customers (32%) say they will walk away from a brand they love after just one bad experience (source: PWC), organizations are now applying massive investments to this experience, particularly with their live agents and contact centers.  For many enterprises, that investment includes modernizing their call centers by moving to cloud-based Contact Center as a Service (CCaaS) platforms. CCaaS solutions…

See what’s new in SingleStoreDB with IBM 8.0

3 min read - Despite decades of progress in database systems, builders have compromised on at least one of the following: speed, reliability, or ease. They have two options: one, they could get a document database that is fast and easy, but can’t be relied on for mission-critical transactional applications. Or two, they could rely on a cloud data warehouse that is easy to set up, but only allows lagging analytics. Even then, each solution lacks something, forcing builders to deploy other databases for…