Overview

What is IBM Cloud® HSM 7.0?

IBM Cloud Hardware Security Module (HSM) 7.0 from Gemalto protects cryptographic infrastructure by more securely managing, processing and storing cryptographic keys inside a tamper-resistant hardware device. It helps you solve complex security, compliance, data sovereignty and control challenges migrating and running workloads on the cloud.

How clients use it

Keys in hardware

Secure cryptographic keys and provision encryption, decryption, authentication and digital signing for apps like public key infrastructure (PKI), database encryption and SSL/TLS for web servers.

Person wearing glasses sitting in front of laptops

High-volume protection

Faster than other HSMs on the market, IBM Cloud HSM 7.0 is ideally suited for use cases that require high performance, such as the protection of SSL/TLS keys and high-volume code signing.

Two security cameras

Compliance

Manage compliance and audit needs for GDPR, eIDAS, FIPS 140, Common Criteria, HIPAA, PCI-DSS, and others, in highly-regulated industries including financial, healthcare and government.

Woman standing in front of Washington monument

Benefits

HSM versus software

FIPS 140-2 Level 3 compliant, IBM Cloud HSM 7.0 is a tamper-resistant device.

Centralized key management

Single-unit key storage streamlines administration, reduces potential for lapses.

Keys in hardware

Keys-in-hardware approach ensures your keys have physical and logical protections.

IBM Cloud HSM versions

IBM Cloud HSM 7.0

Ideally suited for use cases that require high performance and that are FIPS 140-2 Level 3 compliant

IBM Cloud HSM 6.0

When FIPS 140-2 Level 2 certification for PKI, digital signatures, cryptographic key storage needed