Difference between revisions of "IBM Key Protect"
From OSNEXUS Online Documentation Site
m |
m |
||
Line 1: | Line 1: | ||
[[Category:ibm_guide]] | [[Category:ibm_guide]] | ||
− | + | IBM Key Protect for IBM Cloud helps you provision encrypted keys for apps across IBM Cloud services. ITis a cloud-based security service that provides life cycle management for encryption keys that are used in IBM Cloud services or customer-built applications. Key Protect provides roots of trust (RoT), backed by a hardware security module (HSM). As you manage the lifecycle of your keys, you can benefit from knowing that your keys are secured by FIPS 140-2 Level 3 certified cloud-based hardware security modules (HSMs) that protect against the theft of information. IBM Key Protect is integrated into QuantaStor 5.4 for storage pool encryption. | |
− | + | ||
− | + | ||
== How to Create an Encrypted Storage Pool with IBM Key Protect == | == How to Create an Encrypted Storage Pool with IBM Key Protect == | ||
− | |||
− |
Revision as of 16:02, 13 August 2019
IBM Key Protect for IBM Cloud helps you provision encrypted keys for apps across IBM Cloud services. ITis a cloud-based security service that provides life cycle management for encryption keys that are used in IBM Cloud services or customer-built applications. Key Protect provides roots of trust (RoT), backed by a hardware security module (HSM). As you manage the lifecycle of your keys, you can benefit from knowing that your keys are secured by FIPS 140-2 Level 3 certified cloud-based hardware security modules (HSMs) that protect against the theft of information. IBM Key Protect is integrated into QuantaStor 5.4 for storage pool encryption.