Overview

What is IBM Cloud® HSM 7.0?

IBM Cloud Hardware Security Module (HSM) 7.0 from Gemalto protects cryptographic infrastructure by more securely managing, processing and storing cryptographic keys inside a tamper-resistant hardware device. It helps you solve complex security, compliance, data sovereignty and control challenges migrating and running workloads on the cloud.

How clients use it

Keys in hardware

Person wearing glasses sitting in front of laptops

Keys in hardware

Secure cryptographic keys and provision encryption, decryption, authentication and digital signing for apps like public key infrastructure (PKI), database encryption and SSL/TLS for web servers.

High-volume protection

Two security cameras

High-volume protection

Faster than other HSMs on the market, IBM Cloud HSM 7.0 is ideally suited for use cases that require high performance, such as the protection of SSL/TLS keys and high-volume code signing.

Compliance

Woman standing in front of Washington monument

Compliance

Manage compliance and audit needs for GDPR, eIDAS, FIPS 140, Common Criteria, HIPAA, PCI-DSS and others in highly regulated industries like banking and financial markets, healthcare and government.

Benefits

Features

IBM Cloud HSM versions

IBM Cloud HSM 7.0

Ideally suited for use cases that require high performance and that are FIPS 140-2 Level 3 compliant

IBM Cloud HSM 6.0

When FIPS 140-2 Level 2 certification for PKI, digital signatures, cryptographic key storage needed