July 8, 2019 By Felix Ekwueme 3 min read

Now you can bring your own disk encryption key to the IBM Cloud with IBM Cloud Databases and IBM Key Protect.

The internet continues to provide us with many things: social platforms, video streaming, emails (way too many of them, at times), etc.—just to name a few. As the internet uncovers new data sources and evolving technology applies it in innovative ways, businesses now (more than ever) have access to valuable insights that can significantly improve management decision-making and business performance. This has resulted in making data an important natural resource as it continues to grow exponentially. 

A win for the field of data mining of course, but somewhat of a liability for those tasked with data protection.

Every action and event occurring in today’s highly connected world could be represented as valuable data. With this also comes the risk of big security problems. This has been made evident from the growing rise of data breaches and increases in regulation to curtail security and privacy concerns. 

At IBM Cloud, we strongly believe that organizations that collect, store, manage, or process data have an obligation to handle it responsibly. We take that trust seriously. As a global leader in enterprise security, IBM has a unique perspective on these rapidly growing threats and is devoting time to innovation in ensuring the security, privacy, and freedom of what matters most to you—your data.

Regulate key management with IBM Cloud Databases and IBM Key Protect

By managing your own keys, you can better protect your data and improve compliance. We understand that customers in regulated industries, such as financial services and healthcare, value peace of mind. That’s why we’re committed to providing you with more control over how you manage your data and security on IBM Cloud Databases through integrations with the IBM Key Protect.

Simply bring your own disk encryption key to the IBM Cloud—AKA Bring Your Own Key (BYOK)

Encryption with Bring Your Own Key (BYOK) enables businesses to retain control over access to their encrypted data at rest. When companies have concerns about how their data is shared, encryption with BYOK is one way to mitigate the risk of unintentional or unknown exposure.

Organizations subject to industry and government regulations or with particularly stringent data access requirements may want to retain more control over their data and encryption. In such cases, these businesses may not want a storage provider holding the key that could unlock their data.

BYOK also provides the ability to do the following:

  • Manage transparency and access to your organization’s encryption keys.
  • Give the right users and services access to the right data while ensuring the protection of individual rights and privacy.
  • Reduce set-up and maintenance costs of additional security infrastructure with easy integration.

IBM Cloud Databases: Built for enterprise

We know stability and security are paramount for enterprise applications. That’s why we (in order to protect your application against single data center outages) always deploy in a Multi-AZ architecture in IBM Cloud public regions, with a 99.95% SLA.

We provide data-in-motion encryption through TLS and at-rest encryption for data on disk and backups. For data at rest, you can bring your own key using IBM Key Protect and manage its lifecycle.

More benefits of using IBM Cloud Databases:

  • Lower prices and serverless scaling of Disk and RAM.
  • Integration with IBM Cloud through Identity and Access Management, Resource Groups, Activity Tracker, and Monitoring
  • HIPAA-ready for Healthcare workloads

Try it out

So do you want the power and flexibility of the public cloud but are concerned about losing control over data security? We have just the solution in mind and it has a little (or A LOT ) to do with IBM Key Protect!  

Get started today by checking out the IBM Cloud Catalog and Explore How to Use Key Protect.

We can’t wait to see what you get started on next. 

Was this article helpful?
YesNo

More from Cloud

IBM Cloud Virtual Servers and Intel launch new custom cloud sandbox

4 min read - A new sandbox that use IBM Cloud Virtual Servers for VPC invites customers into a nonproduction environment to test the performance of 2nd Gen and 4th Gen Intel® Xeon® processors across various applications. Addressing performance concerns in a test environment Performance testing is crucial to understanding the efficiency of complex applications inside your cloud hosting environment. Yes, even in managed enterprise environments like IBM Cloud®. Although we can deliver the latest hardware and software across global data centers designed for…

10 industries that use distributed computing

6 min read - Distributed computing is a process that uses numerous computing resources in different operating locations to mimic the processes of a single computer. Distributed computing assembles different computers, servers and computer networks to accomplish computing tasks of widely varying sizes and purposes. Distributed computing even works in the cloud. And while it’s true that distributed cloud computing and cloud computing are essentially the same in theory, in practice, they differ in their global reach, with distributed cloud computing able to extend…

How a US bank modernized its mainframe applications with IBM Consulting and Microsoft Azure

9 min read - As organizations strive to stay ahead of the curve in today's fast-paced digital landscape, mainframe application modernization has emerged as a critical component of any digital transformation strategy. In this blog, we'll discuss the example of a US bank which embarked on a journey to modernize its mainframe applications. This strategic project has helped it to transform into a more modern, flexible and agile business. In looking at the ways in which it approached the problem, you’ll gain insights into…

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters