February 10, 2016 | Written by: Terry Mosbaugh
Categorized: Security | What's New
Share this post:
Having the ability to protect applications and supporting data in your Cloud is a critical component of all enterprise security governance protocols. Today IBM is adding a new service to help you build security into your cloud.
IBM Key Protect is an encryption key management service that offers a simple and economical key management solution for managing keys that are used to encrypt data at rest in the cloud. IBM Key Protect manages the entire lifecycle of keys from key creation through application use, key archival, and key destruction, while also enforcing separation of duties between data management and key management.
Company policies, industry best practices, and government regulations increasingly require encryption key management in addition to data encryption to be included as fundamental components of overall data storage, data management, and data governance. IBM Key Protect helps clients secure their cloud by encrypting sensitive data from unauthorized access while meeting compliance auditing standards (internal & external) by providing the mandatory control of user access requests to create, open, or delete encryption keys.
Features of IBM Key Protect
- Allows any encryption-capable block storage, object storage, database, or internal application to use REST APIs for integrating encryption capabilities with IBM Key Protect eliminating the need to spend the time or effort building proprietary (and often insecure) solutions to protect encryption keys.
- Provides the ability to delete keys without any residual copies remaining, thereby rendering any data encrypted under those keys cryptographically-erased. Once the encryption keys are deleted, you can be assured your data is no longer retrievable, regardless of the application or cloud that stored it.
- Supports built in security based upon ridged FIPS-140-2 Level 2 certified hardware security modules (HSM) located within secure IBM SoftLayer data centers.
- Gives cloud system administrators the ability to easily manage their encryption keys while creating roll-based employee access to data via a simple graphical user interface.
Start using IBM Key Protect today!
See IBM Key Protect in the Bluemix Dallas Region catalog under the Security section.