Hyper protect your sensitive data and workloads in the cloud
As business leaders in regulated industries look to leverage the cloud for innovation, one of the biggest challenges they face is the protection of sensitive customer data. To address this challenge, IBM recently announced new IBM Cloud Hyper Protect Services?capabilities built on IBM LinuxONE. These capabilities are designed to give you authority over sensitive data, associated workloads and encryption keys in the public cloud.
Now we are enhancing our capabilities and extending our ecosystem by integrating the IBM Cloud Hyper Protect Services portfolio into more applications in order to make it easier to access the services.
Extending data protection in the cloud to a broader ecosystem
Financial institutions around the world are rapidly accelerating digital transformation to keep up with customer demands. To help these organizations protect sensitive workloads as they innovate, Temenos, a leading banking software company, will be publishing its first stack for IBM Cloud in May, leveraging IBM Cloud Hyper Protect Services.
“Banks are required to meet stringent regulatory requirements, which drives the need for complete data confidentiality and exclusive control over encryption keys,” says Tony Coleman, Product Director, Technology at Temenos. “Temenos’ cloud-native digital banking platform on IBM Cloud combined with IBM Cloud Hyper Protect Services can help meet those requirements and help banks digitally transform.”
Within the healthcare industry, health tracking devices provide consumers with potentially valuable insights that have encouraged many to change their habits and improve their health. In order to maintain consumer trust, developers building applications that leverage personal health data shared in the cloud must ensure that the data is protected. Now, with the IBM Hyper Protect Software Development Kit (SDK) for iOS available in the Apple CareKit open source community, developers can build healthcare apps running on Apple devices with features that address unauthorized party access to their data in the IBM Cloud.
Many financial and healthcare technology startups face the challenge of scaling solutions while keeping highly sensitive data secured. Over the last year, through the IBM Hyper Protect Accelerator Program, IBM has provided 15 companies with resources to build scalable solutions on a highly secured platform. In April, IBM announced the expansion of this program and we are excited to add 30 new startups to the program by year’s end.
Expanding service availability and security
To help companies protect their sensitive data and mission-critical workloads in the cloud, IBM continues to enhance the IBM Cloud Hyper Protect portfolio of services. The services are now available in Dallas, Frankfurt and Sydney, and will also soon be available in Washington, D.C. The services are ready for use with ISO 27001, 27017, and 27018 certifications. We are also expanding certifications—now the services are IRAP Assessed and we expect to receive a SOC 2 Type 1 report in 2Q 2020.
We are also strengthening the security and usability of our portfolio with new capabilities. To allow clients exclusive control of their encryption keys to safeguard data, IBM Cloud Hyper Protect Crypto Services provides an industry-leading ‘Keep Your Own Key’ capability. The key management service is backed by FIPS 140-2 level 4 certified Hardware Security Modules (HSM), the highest level of security certification commercially available. This unique capability is now included in a number of IBM Cloud data and storage offerings, including IBM Cloud Hyper Protect DBaaS. For crypto officers to be able to more securely take control of and administer the cloud HSMs, we recently announced smart card support. For workloads with sensitive data or business IP, we launched the IBM Cloud Hyper Protect Virtual Servers with Ubuntu Linux, and we look forward to expanding support soon for Red Hat Enterprise Linux and SUSE.
Learn more at the IBM Think 2020 Digital Event Experience
Register today for no charge and join me at the IBM Think 2020 Digital Event Experience to learn more. Live sessions will be broadcast May 5-6 but you can access the following on-demand sessions starting today:
Hyper Protect Your Sensitive Data and Workloads in the IBM Cloud [Session 1964]
Speakers: Rohit Badlaney, Director IBM Z as a Service, Nataraj Nagaratnam, CTO IBM Cloud Security, Len Santalucia, CTO, Vicom Infinity, and Alexandre Kech, CEO, OnChain Custodian
The Cloud You Want, With the Privacy and Security You Need [Session 6909]
Speakers: Ross Mauri, General Manager IBM Z and LinuxONE, and Ray Wang, principal analyst, founder and chairman of Constellation Research
 FIPS 140-2 Security Level 4 provides the highest level of security defined in this standard. At this security level, the physical security mechanisms provide a comprehensive envelope of protection around the cryptographic module with the intent of detecting and responding to all unauthorized attempts at physical access. See?https://csrc.nist.gov/projects/cryptographic-module-validation-program/standards and?https://csrc.nist.gov/Projects/cryptographic-module-validation-program/Certificate/3410.?