IBM and Red Hat — the next chapter of open innovation. Learn more ›
by Elizabeth K. Joseph, Melissa Sassi Published June 13, 2019
As a developer, you probably understand how important data security is — and this holds true whether you are a founder of the next great tech startup or part of a large enterprise team. Barely a month goes by without a high-profile story in the news about a data breach at a major company, and those are just the ones that were discovered and worth reporting on. Regardless of company size, data protection is as relevant now as it’s ever been. More recently, we’ve even heard of creative compromises where organizations believed their sensitive data was secure, but since they didn’t secure data they didn’t believe was sensitive, they found themselves vulnerable to attack. Even beyond specific incidents, many organizations are bound by compliance requirements (such as PCI DSS, GDPR, and HIPAA). As more and more countries evaluate and implement their own requirements, conversations around keeping sensitive data secure continue to evolve. Why rely on policy when you can rely on technology?
This is where a solution that provides data-at-rest and data-in-flight protection can help developers easily build applications with highly sensitive data. To meet this need, IBM Cloud offers a suite of services collectively known as IBM Cloud Hyper Protect Services, which are powered by LinuxONE. These services give users complete authority over sensitive data and associated workloads (even cloud admins have no access!) while providing unmatched scale and performance; this allows customers to build mission-critical applications that require a quick time to market and rapid expansion.
IBM Cloud Hyper Protect Services consists of four services, a combination of PaaS and SaaS, which are covered briefly in this video. The services are:
Hardware-driven cryptography allows you to manage and keep your own keys for cloud data encryption, protected by a dedicated hardware security module (HSM) that meets FIPS 140-2 Level 4 certification — the only one in the industry that meets such standards! This means that even if an attacker has physical access to the data center where your cloud service resides, tamper-resistant hardware keeps your data protected.
Learn more about Hyper Protect Crypto Services by visiting the IBM Cloud documentation.
Taking Database as a Service (DBaaS) one step further to add encryption, we offer two solutions: Hyper Protect DBaaS for PostgreSQL and Hyper Protect DBaaS for MongoDB EA.
Learn more about Hyper Protect DBaaS by visiting the IBM Cloud documentation.
You can also check out the IBM Developer tutorial Protect cloud-based data with an encrypted database.
Provide your SSH key and you’re up and running with a secured Virtual Server, backed by isolation powered by the IBM LinuxONE Enterprise Server.
Learn more about Hyper Protect Virtual Servers by visiting the IBM Cloud documentation.
Containers are incredibly popular today, and Hyper Protect Containers can help you build, test, and deploy a secure microservices-driven environment.
Looking for more technical details on how Hyper Protect works under the hood? Visit this tech talk by Chris Poole to learn precisely how the infrastructure is configured to provide maximum security, including how encryption and isolation are used to secure your data.
With more and more data being collected, stored, and shared, it is incumbent upon developers and data scientists to create technical solutions that automate data protection and security, especially individual-level, personally identifiable information. When your data is collected, stored, and shared, how would you like it to be managed? We assume you want the highest standards possible. That is how we want our data managed! Managing data security by policy alone is no longer good enough. As the world continues to become even more data driven, the future is all about data, innovation, and technical solutions like IBM Cloud Hyper Protect Services.
If you don’t have an IBM Cloud account yet, you can get started with these services today by visiting the IBM Cloud registration page.
Find out what to do when your DBaaS must be secure, scalable, and fast.
Find out how you can easily infuse security into your application with Hyper Protect Crypto Services and key management services…
Back to top