Confidential computing for total privacy assurance

Overview

How customers use it

Build and deploy a disaster donations website with end-to-end encryption

Graph of a user and IBM Cloud back end

Build and deploy a disaster donations website with end-to-end encryption

This code pattern shows you how to build and deploy a Node.js front end and a Python backend to present a disaster donations website that stores data in a MongoDB database.

Create secure microservices

Graph of information encryption flow

Create secure microservices

This code pattern shows you how to use an IBM Cloud IAM API key to authenticate and drive a Key Protect REST API to generate the keys used to encrypt information before storing it in a database.

Benefits

Available options

IBM Cloud Hyper Protect DBaaS demos

IBM Cloud Hyper Protect DBaaS

See how to protect cloud databases for workloads with sensitive data and built-in encryption.

Protect your highly sensitive data

See how to use Bring Your Own Key and Keep Your Own Key abilities without sacrificing performance.

Related products

IBM Cloud® Databases for PostgreSQL

Take advantage of enhancements such as indexable JSON, publish and subscribe functions, and more.

IBM Cloud® Databases for MongoDB

Take advantage of MongoDB powerful indexing and querying, aggregation and wide driver support.

IBM Cloud® Hyper Protect Crypto Services

Help protect your key for cloud data encryption with a dedicated cloud hardware security module.

Get started with IBM Cloud Hyper Protect DBaaS