May 10, 2018 By Dustin McNabb 2 min read

Increased application security & control with IBM Cloud HSM 7.0

It’s here and ready for your use – today, we’re excited to announce the global availability of our next generation Hardware Security Module (HSM) – IBM Cloud HSM 7.0 – providing high-assurance key generation, protection and storage.

Based on the latest Gemalto’™ SafeNet HSM technology, IBM Cloud HSM is a dedicated, single-tenant hardware appliance that safeguards and manages sensitive digital cryptographic key information by storing, protecting and managing cryptographic keys in a hardened FIPS-validated, private-network-attached appliance.

To put it simply, IBM Cloud HSM gives you enterprise-strength access controls for today’s security-critical applications. These critical appliances protect the cryptographic infrastructure of some of the most security-conscious organizations in the world by securely managing processing.

Enterprises today also rely on HSM’s for securing and provisioning encryption, decryption, authentication and digital signing services for a wide range of applications, including Public Key Infrastructure (PKI), database encryption and SSL/TLS for web servers. Your business can solve complex security, compliance and data sovereignty challenges associated with migrating and running workloads on the cloud.

The integration of IBM Cloud HSM 7.0 including SafeNet Luna Network HSM A750 enables superior performance by running over 20,000 ECC and 10,000 RSA operations per second (3X to 5X faster than previous HSM releases)[1]. And with dual, hot-swappable power supplies and clustering for high availability and backup, there’s always consistent performance with no downtime and guaranteed business continuity. In addition, IBM Cloud HSM is FIPS 140-2 Level 3 certified, so you can be assured you’re getting a secure, third-party validated solution.

Finally, this new solution is attached to IBM’s global private network that offers no-cost, secure network access to 60 IBM data centers around the world. All in all, IBM Cloud HSM 7.0 is the perfect general purpose network solution for your enterprise applications.

IBM Cloud HSM 7.0 pricing details

IBM Cloud HSM 7.0 is billed on a monthly basis and there is no setup fee. It’s globally available in IBM Cloud data centers in the United States, United Kingdom, Germany, Netherlands, and Australia – with more data centers being added throughout the coming year.

Get started today!

Whether you need to guard infrastructure secrets, data-at-rest, motion encryption processes and keys, or digitally sign transactions and code for a blockchain, utilizing IBM Cloud HSM 7.0 will help you accelerate your digital transformation.

Order today

For more information about IBM Cloud HSM 7.0 please visit our Hardware Security Module page. Or, click here to contact IBM Sales directly.

[1]Gemalto SafeNet Luna Network HSM – Product Brief, Copyright Gemalto 2017.0

More from Security

Data protection strategy: Key components and best practices

8 min read - Virtually every organization recognizes the power of data to enhance customer and employee experiences and drive better business decisions. Yet, as data becomes more valuable, it's also becoming harder to protect. Companies continue to create more attack surfaces with hybrid models, scattering critical data across cloud, third-party and on-premises locations, while threat actors constantly devise new and creative ways to exploit vulnerabilities. In response, many organizations are focusing more on data protection, only to find a lack of formal guidelines and…

What you need to know about the CCPA draft rules on AI and automated decision-making technology

9 min read - In November 2023, the California Privacy Protection Agency (CPPA) released a set of draft regulations on the use of artificial intelligence (AI) and automated decision-making technology (ADMT). The proposed rules are still in development, but organizations may want to pay close attention to their evolution. Because the state is home to many of the world's biggest technology companies, any AI regulations that California adopts could have an impact far beyond its borders.  Furthermore, a California appeals court recently ruled that…

Enhance your data security posture with a no-code approach to application-level encryption

4 min read - Data is the lifeblood of every organization. As your organization’s data footprint expands across the clouds and between your own business lines to drive value, it is essential to secure data at all stages of the cloud adoption and throughout the data lifecycle. While there are different mechanisms available to encrypt data throughout its lifecycle (in transit, at rest and in use), application-level encryption (ALE) provides an additional layer of protection by encrypting data at its source. ALE can enhance…

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters