IBM Key Protect: Difference between revisions
Jump to navigation
Jump to search
mNo edit summary |
mNo edit summary |
||
Line 1: | Line 1: | ||
[[Category:ibm_guide]] | [[Category:ibm_guide]] | ||
IBM Key Protect for IBM Cloud helps you provision encrypted keys for apps across IBM Cloud services. ITis a cloud-based security service that provides life cycle management for encryption keys that are used in IBM Cloud services or customer-built applications. Key Protect provides roots of trust (RoT), backed by a hardware security module (HSM). As you manage the lifecycle of your keys, you can benefit from knowing that your keys are secured by FIPS 140-2 Level 3 certified cloud-based hardware security modules (HSMs) that protect against the theft of information. IBM Key Protect is integrated into QuantaStor 5.4 for storage pool encryption. | |||
== How to Create an Encrypted Storage Pool with IBM Key Protect == | == How to Create an Encrypted Storage Pool with IBM Key Protect == | ||
Revision as of 23:02, 13 August 2019
IBM Key Protect for IBM Cloud helps you provision encrypted keys for apps across IBM Cloud services. ITis a cloud-based security service that provides life cycle management for encryption keys that are used in IBM Cloud services or customer-built applications. Key Protect provides roots of trust (RoT), backed by a hardware security module (HSM). As you manage the lifecycle of your keys, you can benefit from knowing that your keys are secured by FIPS 140-2 Level 3 certified cloud-based hardware security modules (HSMs) that protect against the theft of information. IBM Key Protect is integrated into QuantaStor 5.4 for storage pool encryption.