Difference between revisions of "IBM Key Protect"

From OSNEXUS Online Documentation Site
Jump to: navigation, search
m
m
Line 1: Line 1:
 
[[Category:ibm_guide]]
 
[[Category:ibm_guide]]
 
IBM® Key Protect for IBM Cloud helps you provision encrypted keys for apps across IBM Cloud services. As you manage the lifecycle of your keys, you can benefit from knowing that your keys are secured by FIPS 140-2 Level 3 certified cloud-based hardware security modules (HSMs) that protect against the theft of information. IBM® Key Protect is integrated into QuantaStor 5.4 for storage pool encryption.   
 
IBM® Key Protect for IBM Cloud helps you provision encrypted keys for apps across IBM Cloud services. As you manage the lifecycle of your keys, you can benefit from knowing that your keys are secured by FIPS 140-2 Level 3 certified cloud-based hardware security modules (HSMs) that protect against the theft of information. IBM® Key Protect is integrated into QuantaStor 5.4 for storage pool encryption.   
 +
 +
IBM Key Protect is a cloud-based security service that provides life cycle management for encryption keys that are used in IBM Cloud services or customer-built applications. Key Protect provides roots of trust (RoT), backed by a hardware security module (HSM).
  
 
== How to Create an Encrypted Storage Pool with IBM Key Protect ==
 
== How to Create an Encrypted Storage Pool with IBM Key Protect ==
 +
 +
The first step in

Revision as of 16:00, 13 August 2019

IBM® Key Protect for IBM Cloud helps you provision encrypted keys for apps across IBM Cloud services. As you manage the lifecycle of your keys, you can benefit from knowing that your keys are secured by FIPS 140-2 Level 3 certified cloud-based hardware security modules (HSMs) that protect against the theft of information. IBM® Key Protect is integrated into QuantaStor 5.4 for storage pool encryption.

IBM Key Protect is a cloud-based security service that provides life cycle management for encryption keys that are used in IBM Cloud services or customer-built applications. Key Protect provides roots of trust (RoT), backed by a hardware security module (HSM).

How to Create an Encrypted Storage Pool with IBM Key Protect

The first step in