Data security

Hyper Protect DBaaS: the evolution of cloud databases

Share this post:

How important is security for your enterprise data?

While today’s business leaders want to automate tasks to eliminate human errors and security breaches, they don’t want to spend time on technical details. Managing databases in the traditional way requires a lot of highly-specialized technical knowledge, and the DB admins must know and handle nearly all aspects of the database system. This is why DBaaS has become popular.

A database as a service (DBaaS) offering provides businesses with professional databases that can be up and running in a matter of minutes without a lot of staff training, and software developers can administer their own databases using DBaaS.

What’s often not addressed in DBaaS offerings is the security perspective of the data. Examples of unauthorized user access, encryption of selected data only, or revelation by internal users have become public in the media, and the consciousness of eliminating these risks has strongly increased.

What is Hyper Protect DBaaS?

A hyper-protect DBaaS is the next evolution of data storage in a security-rich database environment. It allows you to retain your data in a fully-encrypted database without the need for specialized skills.

A hyper-secure DBaaS provides significant additional protection against security breaches by delivering pervasive encryption capability plus the additional benefits of secure service container technology.

Pervasive encryption is a consumable approach to enable extensive encryption of data in flight and at rest to substantially simplify and speed encryption while achieving compliance mandates. Pervasive encryption is available with IBM Cloud Hyper Protect DBaaS.

The IBM Secure Service Container delivers a hyper-secure environment, containing its own embedded security mechanisms for securely hosting the DBaaS as well as pervasive encryption. It prevents the threat of rogue insiders and snooping by privileged users, allowing only the data owner (client) to control the access to the data (no sysadmin access).

The IBM Cloud Hyper Protect DBaaS is based on LinuxONE hardware architecture known for its quality of service (reliability/resilience), and its capability for handling very large amounts of information with high performance.

IBM Cloud Hyper Protect DBaaS experimental service on the IBM Cloud

Starting today, the fully-managed IBM Cloud Hyper Protect DBaaS is up and operational as an experimental service with MongoDB Enterprise Edition in the IBM Cloud. It allows you to get familiar with Hyper Protect DBaaS technology, providing a single set of tools for various databases in the future – such as PostgreSQL in addition to MongoDB Enterprise Edition.

How to move forward

More Data security stories

Digital Asset Custody Services (DACS) aims to disrupt the digital assets market with a secured custody platform

Blockchain, Encryption, LinuxONE solutions

From time to time, we invite industry thought leaders to share their opinions and insights on current technology trends to the IT Infrastructure blog. The opinions in these posts are their own, and do not necessarily reflect the views of IBM.   A revolution in how consumers and businesses exchange value is underway right now. more

Announcing our direction for Red Hat OpenShift for IBM Z and LinuxONE

LinuxONE solutions, Mainframes, Multicloud

In early July, IBM and Red Hat officially closed their most significant acquisition of 2019–an important milestone combining the power and flexibility of Red Hat’s open hybrid portfolio and IBM’s technology and deep industry expertise. The feedback from our clients and partners is clear. A recent IBM report found that 80 percent want solutions that more

Protection against malware: IBM AIX has your back

IBM Systems Lab Services, Power Systems, Security

“How can we protect our IBM AIX systems from malware attacks?” As a cyber security consultant, I come across this question more than any other when it comes to securing servers running IBM AIX. Most security breaches today are based on malware attacks, especially in banking sector. The infamous FASTCash malware has infected many banks’ more