We’re excited to announce a new IBM Cloud hybrid architecture.

For enterprises, we have seen that protecting data from unauthorized access and streamlining their compliance operations is important to ensure the integrity of their business and to maintain customer trust. As businesses work to ensure data has not been compromised or undergone unsanctioned processing and to help them deliver continuous monitoring for compliance audit readiness, we find that enterprises need the correct technology and a trustworthy cloud provider. By working with our security and compliance technology partners, IBM is helping your business stay protected in the cloud. 

The IBM Cloud Secure Virtualization (ICSV) solution

Currently, IBM Cloud, VMware, Intel, and HyTrust offer the IBM Cloud Secure Virtualization (ICSV) solution. The automation-deployed solution leverages Intel’s hardware-enforced security technology and HyTrust workload protection controls for enforcement of data processing geolocation and governance of administrative actions. For example, this innovative data protection technology is designed to help you confirm decryption occurs only at verified geolocations on authorized servers, providing confidence that your workloads boot up on uncompromised and trusted hardware/software.

Announcing a new IBM Cloud hybrid architecture

Building on these capabilities, IBM is excited to announce that it has helped to drive collaboration and development across its Partner ecosystem to deliver further HyTrust integration with Caveonix and the Fortinet Security Fabric in a new validated design for a hybrid cloud that supports your security and your compliance-readiness needs.

Fortinet FortiGate VM provides a consistent security layer designed to protect your IBM Cloud and on-premise workloads with a unified threat mitigation model to provide secured connectivity across your hybrid environment. Caveonix RiskForesight provides the central integration point designed to continuously detect, predict, and act with full-stack visibility into your hybrid cloud infrastructure, platforms, applications, and workloads to help you manage your compliance needs. IBM and its Partners are confident this solution approach will help your business to tackle the toughest risk mitigation and compliance readiness use cases.

HyTrust DataControl and IBM Cloud Hyper Protect Crypto Services

Not stopping there, IBM and HyTrust are working to integrate HyTrust DataControl with IBM Cloud Hyper Protect Crypto Services, a single-tenant key management service built on the industry’s first and only FIPS 140-2 Level 4 certified Hardware Security Module (HSM) available in the public cloud.* The solution is designed to allow your organization flexibility for extending encryption operations to the cloud in a hybrid model. The integration between these technologies designed to help you maintain control over encryption keys, including the master keys, and employ the high level of industry-certified protection over your data. An early access version of this solution is targeted for September 2019.

The solution is designed to provide key benefits, including the following: 

  • IBM Cloud admins never have access to customer keys.
  • The client is the only one to have full control of the encryption keys and entire key hierarchy, including the HSM Master Key.
  • Built-in protection against privileged access threats designed to reduce the risk of data compromise.
  • Data encryption and controls on privileged access intended to reduce your regulatory compliance risk.

Losses due to fraud and data breaches cost organizations millions of dollars per year.** The ability to help address unauthorized access of data and operational risks and assist you with your compliance audit readiness is a key benefit of running your VMware workloads on IBM Cloud.

Come see us at VMworld 2019

Learn more at VMworld 2019 in San Francisco and be sure to stay tuned to our blog for the latest updates.

*The Federal Information Processing Standard (FIPS) Publication 140-2 is a U.S. government computer security standard used to approve cryptographic modules. It is issued by the National Institute of Standards and Technology (NIST). Level 4 is the highest level of security.

**IBM Security: Cost of a Data Breach Report 2019

More from Cloud

Enhance your data security posture with a no-code approach to application-level encryption

4 min read - Data is the lifeblood of every organization. As your organization’s data footprint expands across the clouds and between your own business lines to drive value, it is essential to secure data at all stages of the cloud adoption and throughout the data lifecycle. While there are different mechanisms available to encrypt data throughout its lifecycle (in transit, at rest and in use), application-level encryption (ALE) provides an additional layer of protection by encrypting data at its source. ALE can enhance…

Attention new clients: exciting financial incentives for VMware Cloud Foundation on IBM Cloud

4 min read - New client specials: Get up to 50% off when you commit to a 1- or 3-year term contract on new VCF-as-a-Service offerings, plus an additional value of up to USD 200K in credits through 30 June 2025 when you migrate your VMware workloads to IBM Cloud®.1 Low starting prices: On-demand VCF-as-a-Service deployments begin under USD 200 per month.2 The IBM Cloud benefit: See the potential for a 201%3 return on investment (ROI) over 3 years with reduced downtime, cost and…

The history of the central processing unit (CPU)

10 min read - The central processing unit (CPU) is the computer’s brain. It handles the assignment and processing of tasks, in addition to functions that make a computer run. There’s no way to overstate the importance of the CPU to computing. Virtually all computer systems contain, at the least, some type of basic CPU. Regardless of whether they’re used in personal computers (PCs), laptops, tablets, smartphones or even in supercomputers whose output is so strong it must be measured in floating-point operations per…

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters