January 16, 2019 By IBM Cloud Team < 1 min read

You can now opt-in to EU support for the Key Protect service in Frankfurt, Germany.

You can now choose European Union (EU) support for the Key Protect service hosted in Frankfurt, Germany. This gives you additional control over where your data lives and who can access it. Client support tickets will also be routed to our client success team in Europe (available 24 hours a day, 7 days a week). Visit IBM Cloud Docs to learn how to enable EU supported settings and find out the EU-supported plans for a platform service.

Learn more:

More from Security

Defending sensitive personal data with granular access controls

3 min read - Cybersecurity is a 24/7 focus of 2Bsecure, an IBM Business Partner that empowers mid-sized and large organizations across all sectors to protect their systems and data against a rising tide of attacks and exploits. As a result, 2Bsecure has helped Bituach Haklai, a leading insurer in Israel, harden its databases with granular access controls backed by intelligent monitoring. Addressing growing cybersecurity challenges Our client, Bituach Haklai, originally offered insurance services to the farming industry. For years, they had no real…

How a US bank modernized its mainframe applications with IBM Consulting and Microsoft Azure

9 min read - As organizations strive to stay ahead of the curve in today's fast-paced digital landscape, mainframe application modernization has emerged as a critical component of any digital transformation strategy. In this blog, we'll discuss the example of a fictional US bank which embarked on a journey to modernize its mainframe applications. This strategic project has helped it to transform into a more modern, flexible and agile business. In looking at the ways in which it approached the problem, you’ll gain insights…

Authentication vs. authorization: What’s the difference?

6 min read - Authentication and authorization are related but distinct processes in an organization’s identity and access management (IAM) system. Authentication verifies a user’s identity. Authorization gives the user the right level of access to system resources.  The authentication process relies on credentials, such as passwords or fingerprint scans, that users present to prove they are who they claim to be.  The authorization process relies on user permissions that outline what each user can do within a particular resource or network. For example,…

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters