IBM now offers two choices for cloud key management.

Protecting data in the cloud can be a daunting exercise for customers. When moving sensitive and confidential data to the cloud, customers expect to have the ability to use their own data encryption keys. They also want to be sure that no one has access to these keys. This especially applies to highly regulated industries like FSS and Healthcare.

IBM now offers two choices for cloud key management. IBM Key Protect already supports Bring Your Own Key (BYOK) for protecting data at rest. For customers looking for greater control over their data encryption keys and hardware security modules (HSMs), IBM Cloud is proud to announce Beta for IBM Cloud Hyper Protect Crypto Services, a dedicated key management and cloud HSM service.

Hyper Protect Crypto Services supports KYOK (Keep Your Own Key), which allows for the protection of data encryption keys by a dedicated, customer controlled HSM. This HSM is FIPS 140-2 Level 4 certified, the industry’s only Level 4 certified HSM available in the cloud. Hyper Protect Crypto Services is built on LinuxONE technology and is part of the Hyper Protect portfolio of services. This guarantees that no one—including cloud admins—has access to customer keys. Key Protect and Hyper Protect Crypto Services use a common Key Provider API to offer a consistent approach for adopting services.

Additionally, customers can use Hyper Protect Crypto Services as a cloud HSM for hardware-based security for cryptographic operations, including digital signing and SSL offloading. To account for a secure and rapid HSM setup, IBM provides a cloud CLI for the HSM key ceremony. This, again, is the first such service in the industry!

Here’s what you need to know

If you already have an existing instance, we ask you to move to the BETA service (available in the IBM Cloud Catalog) since we are going to sunset the EXPERIMENTAL in the near future.

End of Experimental Date: February 5th, 2019

As of February 5th, 2019, provisioning new Hyper Protect Crypto Services Experimental instances will no longer be possible. Existing instances will have support until the End of Experimental Support Date.

End of Experimental Support Date: March 5th, 2019

  • For a period of 30 days after the End of Experimental Date (through March 5th, 2019), all existing instances will continue to be available on the Services dashboard in the IBM Cloud console. For this period, there will still be support for existing instances.

  • We will delete any still-provisioned instance as of the End of Experimental Support Date.

  • Please delete your Hyper Protect Crypto Services Experimental service instances before the End of Experimental Support Date.

Try the Hyper Protect Crypto Services on the IBM Cloud today

More from Announcements

Success and recognition of IBM offerings in G2 Summer Reports  

2 min read - IBM offerings were featured in over 1,365 unique G2 reports, earning over 230 Leader badges across various categories.   This recognition is important to showcase our leading products and also to provide the unbiased validation our buyers seek. According to the 2024 G2 Software Buyer Behavior Report, “When researching software, buyers are most likely to trust information from people with similar roles and challenges, and they value transparency above other factors.”  With over 90 million visitors each year and hosting more than 2.6…

Manage the routing of your observability log and event data 

4 min read - Comprehensive environments include many sources of observable data to be aggregated and then analyzed for infrastructure and app performance management. Connecting and aggregating the data sources to observability tools need to be flexible. Some use cases might require all data to be aggregated into one common location while others have narrowed scope. Optimizing where observability data is processed enables businesses to maximize insights while managing to cost, compliance and data residency objectives.  As announced on 29 March 2024, IBM Cloud® released its next-gen observability…

Unify and share data across Netezza and watsonx.data for new generative AI applications

3 min read - In today's data and AI-driven world, organizations are generating vast amounts of data from various sources. The ability to extract value from AI initiatives relies heavily on the availability and quality of an enterprise's underlying data. In order to unlock the full potential of data for AI, organizations must be able to effectively navigate their complex IT landscapes across the hybrid cloud.   At this year’s IBM Think conference in Boston, we announced the new capabilities of IBM watsonx.data, an open…

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters