What is IBM Cloud HSM 7.0?

IBM Cloud Hardware Security Module (HSM) 7.0 from Gemalto protects the cryptographic infrastructure of some of the most security-conscious organizations in the world by securely managing, processing and storing cryptographic keys inside a tamper-resistant, tamper-evident device. With IBM Cloud HSM 7.0, you can solve complex security, compliance, data sovereignty and control challenges associated with migrating and running workloads on the cloud.

IBM Cloud HSM 7.0 features

Superior performance

IBM Cloud HSM 7.0 performs over 20,000 ECC and 10,000 RSA operations per second for high-performance use cases. Lower latency also allows for improved efficiency.

Solid security and compliance

Your keys always remain in FIPS 140-2 Level 3-compliant, tamper-evident hardware. That allows for the needs for GDPR, HIPAA, PCI-DSS, and more with high-assurance delivery with secure transport mode.

Reduced cost and time

Remotely manage HSMs, reduce audit and compliance costs and burdens, and efficiently administer resources by sharing HSMs among multiple applications or tenants for only USD 1,250 per month* and no setup fees.

How customers use it

Keys in hardware

Enterprises today rely on HSMs for securing cryptographic keys and provisioning encryption, decryption, authentication and digital signing services for a wide range of applications, including Public Key Infrastructure (PKI), database encryption, and SSL/TLS for web servers.

Image representing use of hardware security modules for securing cryptographic keys

High-volume protection

Faster than other HSMs on the market, IBM Cloud HSM 7.0 is ideally suited for use cases that require high performance such as the protection of SSL/TLS keys and high-volume code signing.

Image representing protection of SSL/TLS keys and high-volume code signing

Compliance

Manage compliance and audit needs for GDPR, eIDAS, FIPS 140, Common Criteria, HIPAA, PCI-DSS, and others, in highly-regulated industries including financial, healthcare and government.

Image representing use of hardware security modules for compliance management

IBM Cloud HSM 7.0 benefits

HSM vs software

Being FIPS 140-2 Level 3 compliant, IBM Cloud HSM 7.0 is a tamper-resistant hardware device. Do not attempt to protect digitized information in software without fully considering the implications.

Centralization of key management

With HSMs, the tendency is to store keys in a single unit. This streamlines administration, reduces the potential for management lapses, and supports a consistent layer of key protection.

Keys in hardware

Unlike methods that move keys outside of the HSM, IBM Cloud HSM 7.0 keys-in-hardware approach ensures that your keys have both physical and logical protections of the SafeNet Luna Network HSM 7.0.

Hardware Security Module versions

IBM Cloud HSM 7.0

IBM Cloud HSM 7.0 from Gemalto is ideally suited for use cases that require high performance that is also FIPS 140-2 Level 3 compliant.

IBM Cloud HSM 6.0

The product for enterprises that require FIPS 140-2 Level 2 certification for PKI, digital signatures and cryptographic key storage.

Get started on IBM Cloud HSM 7.0

Concerned with compliance, data sovereignty, and maintaining control of data? Chat with an expert to add a HSM to your cloud today.

 

* Prices vary by region. The price shown is in USD and for US Region only.