July 8, 2019 By Felix Ekwueme 3 min read

Now you can bring your own disk encryption key to the IBM Cloud with IBM Cloud Databases and IBM Key Protect.

The internet continues to provide us with many things: social platforms, video streaming, emails (way too many of them, at times), etc.—just to name a few. As the internet uncovers new data sources and evolving technology applies it in innovative ways, businesses now (more than ever) have access to valuable insights that can significantly improve management decision-making and business performance. This has resulted in making data an important natural resource as it continues to grow exponentially. 

A win for the field of data mining of course, but somewhat of a liability for those tasked with data protection.

Every action and event occurring in today’s highly connected world could be represented as valuable data. With this also comes the risk of big security problems. This has been made evident from the growing rise of data breaches and increases in regulation to curtail security and privacy concerns. 

At IBM Cloud, we strongly believe that organizations that collect, store, manage, or process data have an obligation to handle it responsibly. We take that trust seriously. As a global leader in enterprise security, IBM has a unique perspective on these rapidly growing threats and is devoting time to innovation in ensuring the security, privacy, and freedom of what matters most to you—your data.

Regulate key management with IBM Cloud Databases and IBM Key Protect

By managing your own keys, you can better protect your data and improve compliance. We understand that customers in regulated industries, such as financial services and healthcare, value peace of mind. That’s why we’re committed to providing you with more control over how you manage your data and security on IBM Cloud Databases through integrations with the IBM Key Protect.

Simply bring your own disk encryption key to the IBM Cloud—AKA Bring Your Own Key (BYOK)

Encryption with Bring Your Own Key (BYOK) enables businesses to retain control over access to their encrypted data at rest. When companies have concerns about how their data is shared, encryption with BYOK is one way to mitigate the risk of unintentional or unknown exposure.

Organizations subject to industry and government regulations or with particularly stringent data access requirements may want to retain more control over their data and encryption. In such cases, these businesses may not want a storage provider holding the key that could unlock their data.

BYOK also provides the ability to do the following:

  • Manage transparency and access to your organization’s encryption keys.
  • Give the right users and services access to the right data while ensuring the protection of individual rights and privacy.
  • Reduce set-up and maintenance costs of additional security infrastructure with easy integration.

IBM Cloud Databases: Built for enterprise

We know stability and security are paramount for enterprise applications. That’s why we (in order to protect your application against single data center outages) always deploy in a Multi-AZ architecture in IBM Cloud public regions, with a 99.95% SLA.

We provide data-in-motion encryption through TLS and at-rest encryption for data on disk and backups. For data at rest, you can bring your own key using IBM Key Protect and manage its lifecycle.

More benefits of using IBM Cloud Databases:

  • Lower prices and serverless scaling of Disk and RAM.
  • Integration with IBM Cloud through Identity and Access Management, Resource Groups, Activity Tracker, and Monitoring
  • HIPAA-ready for Healthcare workloads

Try it out

So do you want the power and flexibility of the public cloud but are concerned about losing control over data security? We have just the solution in mind and it has a little (or A LOT ) to do with IBM Key Protect!  

Get started today by checking out the IBM Cloud Catalog and Explore How to Use Key Protect.

We can’t wait to see what you get started on next. 

Was this article helpful?
YesNo

More from Cloud

Enhance your data security posture with a no-code approach to application-level encryption

4 min read - Data is the lifeblood of every organization. As your organization’s data footprint expands across the clouds and between your own business lines to drive value, it is essential to secure data at all stages of the cloud adoption and throughout the data lifecycle. While there are different mechanisms available to encrypt data throughout its lifecycle (in transit, at rest and in use), application-level encryption (ALE) provides an additional layer of protection by encrypting data at its source. ALE can enhance…

Attention new clients: exciting financial incentives for VMware Cloud Foundation on IBM Cloud

4 min read - New client specials: Get up to 50% off when you commit to a 1- or 3-year term contract on new VCF-as-a-Service offerings, plus an additional value of up to USD 200K in credits through 30 June 2025 when you migrate your VMware workloads to IBM Cloud®.1 Low starting prices: On-demand VCF-as-a-Service deployments begin under USD 200 per month.2 The IBM Cloud benefit: See the potential for a 201%3 return on investment (ROI) over 3 years with reduced downtime, cost and…

The history of the central processing unit (CPU)

10 min read - The central processing unit (CPU) is the computer’s brain. It handles the assignment and processing of tasks, in addition to functions that make a computer run. There’s no way to overstate the importance of the CPU to computing. Virtually all computer systems contain, at the least, some type of basic CPU. Regardless of whether they’re used in personal computers (PCs), laptops, tablets, smartphones or even in supercomputers whose output is so strong it must be measured in floating-point operations per…

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters