We’re excited to announce a new IBM Cloud hybrid architecture.

For enterprises, we have seen that protecting data from unauthorized access and streamlining their compliance operations is important to ensure the integrity of their business and to maintain customer trust. As businesses work to ensure data has not been compromised or undergone unsanctioned processing and to help them deliver continuous monitoring for compliance audit readiness, we find that enterprises need the correct technology and a trustworthy cloud provider. By working with our security and compliance technology partners, IBM is helping your business stay protected in the cloud. 

The IBM Cloud Secure Virtualization (ICSV) solution

Currently, IBM Cloud, VMware, Intel, and HyTrust offer the IBM Cloud Secure Virtualization (ICSV) solution. The automation-deployed solution leverages Intel’s hardware-enforced security technology and HyTrust workload protection controls for enforcement of data processing geolocation and governance of administrative actions. For example, this innovative data protection technology is designed to help you confirm decryption occurs only at verified geolocations on authorized servers, providing confidence that your workloads boot up on uncompromised and trusted hardware/software.

Announcing a new IBM Cloud hybrid architecture

Building on these capabilities, IBM is excited to announce that it has helped to drive collaboration and development across its Partner ecosystem to deliver further HyTrust integration with Caveonix and the Fortinet Security Fabric in a new validated design for a hybrid cloud that supports your security and your compliance-readiness needs.

Fortinet FortiGate VM provides a consistent security layer designed to protect your IBM Cloud and on-premise workloads with a unified threat mitigation model to provide secured connectivity across your hybrid environment. Caveonix RiskForesight provides the central integration point designed to continuously detect, predict, and act with full-stack visibility into your hybrid cloud infrastructure, platforms, applications, and workloads to help you manage your compliance needs. IBM and its Partners are confident this solution approach will help your business to tackle the toughest risk mitigation and compliance readiness use cases.

HyTrust DataControl and IBM Cloud Hyper Protect Crypto Services

Not stopping there, IBM and HyTrust are working to integrate HyTrust DataControl with IBM Cloud Hyper Protect Crypto Services, a single-tenant key management service built on the industry’s first and only FIPS 140-2 Level 4 certified Hardware Security Module (HSM) available in the public cloud.* The solution is designed to allow your organization flexibility for extending encryption operations to the cloud in a hybrid model. The integration between these technologies designed to help you maintain control over encryption keys, including the master keys, and employ the high level of industry-certified protection over your data. An early access version of this solution is targeted for September 2019.

The solution is designed to provide key benefits, including the following: 

  • IBM Cloud admins never have access to customer keys.
  • The client is the only one to have full control of the encryption keys and entire key hierarchy, including the HSM Master Key.
  • Built-in protection against privileged access threats designed to reduce the risk of data compromise.
  • Data encryption and controls on privileged access intended to reduce your regulatory compliance risk.

Losses due to fraud and data breaches cost organizations millions of dollars per year.** The ability to help address unauthorized access of data and operational risks and assist you with your compliance audit readiness is a key benefit of running your VMware workloads on IBM Cloud.

Come see us at VMworld 2019

Learn more at VMworld 2019 in San Francisco and be sure to stay tuned to our blog for the latest updates.

*The Federal Information Processing Standard (FIPS) Publication 140-2 is a U.S. government computer security standard used to approve cryptographic modules. It is issued by the National Institute of Standards and Technology (NIST). Level 4 is the highest level of security.

**IBM Security: Cost of a Data Breach Report 2019


More from Cloud

Kubernetes version 1.28 now available in IBM Cloud Kubernetes Service

2 min read - We are excited to announce the availability of Kubernetes version 1.28 for your clusters that are running in IBM Cloud Kubernetes Service. This is our 23rd release of Kubernetes. With our Kubernetes service, you can easily upgrade your clusters without the need for deep Kubernetes knowledge. When you deploy new clusters, the default Kubernetes version remains 1.27 (soon to be 1.28); you can also choose to immediately deploy version 1.28. Learn more about deploying clusters here. Kubernetes version 1.28 In…

Temenos brings innovative payments capabilities to IBM Cloud to help banks transform

3 min read - The payments ecosystem is at an inflection point for transformation, and we believe now is the time for change. As banks look to modernize their payments journeys, Temenos Payments Hub has become the first dedicated payments solution to deliver innovative payments capabilities on the IBM Cloud for Financial Services®—an industry-specific platform designed to accelerate financial institutions' digital transformations with security at the forefront. This is the latest initiative in our long history together helping clients transform. With the Temenos Payments…

Foundational models at the edge

7 min read - Foundational models (FMs) are marking the beginning of a new era in machine learning (ML) and artificial intelligence (AI), which is leading to faster development of AI that can be adapted to a wide range of downstream tasks and fine-tuned for an array of applications.  With the increasing importance of processing data where work is being performed, serving AI models at the enterprise edge enables near-real-time predictions, while abiding by data sovereignty and privacy requirements. By combining the IBM watsonx data…

The next wave of payments modernization: Minimizing complexity to elevate customer experience

3 min read - The payments ecosystem is at an inflection point for transformation, especially as we see the rise of disruptive digital entrants who are introducing new payment methods, such as cryptocurrency and central bank digital currencies (CDBC). With more choices for customers, capturing share of wallet is becoming more competitive for traditional banks. This is just one of many examples that show how the payments space has evolved. At the same time, we are increasingly seeing regulators more closely monitor the industry’s…