September 17, 2020 By Rohit Badlaney
Bob Blessing-Hartley
2 min read

In the era of hybrid cloud, much of the discussion has focused on the challenges of maintaining data security and privacy driven by the movement of data between partners and third parties. There is, however, a piece to the security puzzle that requires attention: compliance.

To help clients accelerate their compliance journey, we’re announcing IBM Hyper Protect Services are now HIPAA-ready[1]. Building on our announcement to bring Hyper Protect Services to Apple CareKit with the IBM Hyper Protect Software Development Kit (SDK) for iOS, this is an exciting step for developers as they meet the security characteristics required to be HIPAA-ready while building healthcare applications running on Apple devices.

For IT leaders, the shift to hybrid cloud introduces new complexity associated with managing multiple clouds and on-premises environments. This complexity can quickly increase the time and effort required to meet compliance requirements. By choosing the right platform for your highly secure workloads, IT leaders can establish a strong foundation to address compliance requirements.

Enter IBM LinuxONE, the platform working behind the scenes to power IBM Cloud Hyper Protect Services. For clients big and small, we’re seeing increased interest from the world’s largest banks, ISVs, and even startups in emerging spaces like digital asset custody. They are choosing IBM Cloud Hyper Protect Services and IBM LinuxONE as they seek to simplify their compliance audits by taking advantage of encryption everywhere to address the risk of internal and external threats.

At the heart of the strength of LinuxONE is pervasive encryption — a consumable approach to allow extensive encryption of data in-flight and at-rest designed to substantially simplify encryption and reduce costs associated with protecting data and achieving compliance mandates. With pervasive encryption, IT leaders can:

  • Encrypt everything and eliminate data scope from consideration
  • Provide cost-effective compliance while balancing performance workloads in the IBM Cloud by leveraging LinuxONE hardware-accelerated cryptography capabilities
  • Focus on business value by protected critical data without costly application changes. With the industry’s first and only FIPS 140-2 Level 4 certified[2] cloud hardware security module (HSM), production, developers and test can all work together and share resources, while being separated by cryptographic isolation capabilities to address audit requirements.

With time and resources at a premium, investing in the right platform for compliance support can help significantly reduce the time and effort required to meet your compliance requirements, freeing up your employees to get back to work impacting the bottom line.

For more details, please visit us.

Was this article helpful?
YesNo

More from Cloud

IBM Cloud expands its VPC operations in Dallas, Texas

3 min read - Everything is bigger in Texas—including the IBM Cloud® Network footprint. Today, IBM Cloud opened its 10th data center in Dallas, Texas, in support of their virtual private cloud (VPC) operations. DAL14, the new addition, is the fourth availability zone in the IBM Cloud area of Dallas, Texas. It complements the existing setup, which includes two network points of presence (PoPs), one federal data center, and one single-zone region (SZR). The facility is designed to help customers use technology such as…

Apache Kafka use cases: Driving innovation across diverse industries

6 min read - Apache Kafka is an open-source, distributed streaming platform that allows developers to build real-time, event-driven applications. With Apache Kafka, developers can build applications that continuously use streaming data records and deliver real-time experiences to users. Whether checking an account balance, streaming Netflix or browsing LinkedIn, today’s users expect near real-time experiences from apps. Apache Kafka’s event-driven architecture was designed to store data and broadcast events in real-time, making it both a message broker and a storage unit that enables real-time…

Primary storage vs. secondary storage: What’s the difference?

6 min read - What is primary storage? Computer memory is prioritized according to how often that memory is required for use in carrying out operating functions. Primary storage is the means of containing primary memory (or main memory), which is the computer’s working memory and major operational component. The main or primary memory is also called “main storage” or “internal memory.” It holds relatively concise amounts of data, which the computer can access as it functions. Because primary memory is so frequently accessed,…

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters