February 25, 2020 By Horst Hummel
Traci Parker
2 min read

Now integrated with Bring-Your-Own-Key (BYOK) and Keep-Your-Own-Key (KYOK).

Moving confidential and mission critical data to the cloud presents data confidentiality, security, and reliability concerns. IBM Cloud Hyper Protect DBaaS allows you to provision and manage highly secure database environments for enterprise workloads with highly sensitive data, all without sacrificing performance.

You can choose from PostgreSQL and MongoDB EE enjoy the following:

  • Industry-leading security (tamper-protected)
  • Developer friendly
  • High availability and reliability
  • Industry and compliance certification readiness

What’s new?

IBM Cloud Hyper Protect DBaaS is now integrated with both standard IBM Cloud key management services: IBM Cloud Key Protect (BYOK) and IBM Cloud Hyper Protect Crypto Services (KYOK). Only Hyper Protect Crypto and KYOK gives the customer full control on the keys used to encrypt its data.

IBM Cloud Hyper Protect Crypto Services acts as an extension to IBM Cloud Key Protect’s Bring-Your-Own-Key (BYOK) functionality, adding a powerful concept of Keep-Your-Own-Key (KYOK). With KYOK, you stay in control of your essential secure key infrastructure at any time, while benefiting from a seamless integration into IBM Cloud services.

In the case of suspicious behavior, keys can be erased, keeping the data from being decrypted. Customers can also roll their keys to allow for re-organization of the key owners or removal of access as needed. With IBM Cloud Hyper Protect Services, you fully leverage the proven technology that is co-developed and operated by large enterprises for managing and securing their most sensitive data. 

What is BYOK with Key Protect?

IBM Cloud Key Protect is a multi-tenant Key Management Service (KMS) with key vaulting provided by IBM-controlled FIPS 140-2 Level 3 Hardware Security Modules. With Key Protect, customers bring their keys to the Cloud and manage them, and IBM provides operational assurance that IBM will not access the keys.

What is KYOK with Hyper Protect Crypto Services?

KYOK with Hyper Protect Crypto Services offers two-in-one (i.e., a KMS with built-in Hardware Security Module (HSM)). The offer is a single-tenant Key Management Service with key vaulting provided by customer-controlled FIPS 140-2 Level 4 (the highest available certification) HSMs. With Hyper Protect Crypto Services, customers keep their keys protected by the HSMs they control and manage; the implementation provides technical assurance that IBM cannot access the keys.

Customers looking to safeguard highly sensitive data want to use their own keys for encryption and require complete control of their encryption keys. For these customers, using Hyper Protect DBaaS integrated with Hyper Protect Crypto Services provides exclusive control over the entire key hierarchy, including the master key of the HSM that protects the secrets. The Level-4 certification assures that the HSM is tamper-proof—it can sense any attempt to compromise the HSM via physical, chemical, or environmental changes and immediately respond by auto-erasing the keys stored, which then invalidates the data that the keys protect.

Free trial period available

Available in Dallas, Frankfurt, and Sydney, order Hyper Protect DBaaS Services now, and you can benefit from a free, 30-day trial for Hyper Protect DBaaS for MongoDB or Hyper Protect DBaaS for PostgreSQL

Learn more about IBM Cloud Hyper Protect DBaaS and check out our newest demos on the IBM Demos website.

More from Cloud

Enhance your data security posture with a no-code approach to application-level encryption

4 min read - Data is the lifeblood of every organization. As your organization’s data footprint expands across the clouds and between your own business lines to drive value, it is essential to secure data at all stages of the cloud adoption and throughout the data lifecycle. While there are different mechanisms available to encrypt data throughout its lifecycle (in transit, at rest and in use), application-level encryption (ALE) provides an additional layer of protection by encrypting data at its source. ALE can enhance…

Attention new clients: exciting financial incentives for VMware Cloud Foundation on IBM Cloud

4 min read - New client specials: Get up to 50% off when you commit to a 1- or 3-year term contract on new VCF-as-a-Service offerings, plus an additional value of up to USD 200K in credits through 30 June 2025 when you migrate your VMware workloads to IBM Cloud®.1 Low starting prices: On-demand VCF-as-a-Service deployments begin under USD 200 per month.2 The IBM Cloud benefit: See the potential for a 201%3 return on investment (ROI) over 3 years with reduced downtime, cost and…

The history of the central processing unit (CPU)

10 min read - The central processing unit (CPU) is the computer’s brain. It handles the assignment and processing of tasks, in addition to functions that make a computer run. There’s no way to overstate the importance of the CPU to computing. Virtually all computer systems contain, at the least, some type of basic CPU. Regardless of whether they’re used in personal computers (PCs), laptops, tablets, smartphones or even in supercomputers whose output is so strong it must be measured in floating-point operations per…

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters