Connect with us

Hi, what are you looking for?

BUSINESS

IBM gives control to businesses for securing data in hybrid, multicloud environments

Built for today’s hybrid cloud world, the new service empowers businesses to take advantage of IBM’s cloud security capabilities – no matter where their data resides – including on other clouds and on-premises.

IBM launched the industry’s first cloud service to perform key management across hybrid, multicloud environments, helping enterprises mitigate risk to critical data from cyberattacks and insider threats. Built for today’s hybrid cloud world, the new service empowers businesses to take advantage of IBM’s cloud security capabilities – no matter where their data resides – including on other clouds and on-premises.

Securing hybrid cloud environments against data breaches

As enterprises modernize, they’re increasingly adopting a hybrid, multicloud approach to host workloads where they need to be – in the cloud or on-premises – to reduce risk and demonstrate compliance. Considering the average company is using more than 8-9 cloud environments at any given time, they risk greater exposure to threats from malicious actors that can compromise data. Now is the time to mitigate complexity – especially as cloud environments become a growing target for cybercriminals looking to access and capitalize on sensitive data residing across complex multicloud environments. But reducing complexity is no easy task. The more clouds that businesses use, the more diverse skills their IT teams need to secure and manage the keys that protect their critical enterprise data.  

“Protecting critical data across multiple platforms can be incredibly complex — but all it takes is one weak link to put a company’s entire security strategy at risk. That’s why we’re giving clients one single point of control – allowing them to know who has access to their critical data at all times – even on other clouds,” said Hillery Hunter, General Manager, Industry Clouds & Solutions, CTO, IBM Cloud. “Trust and choice have always been at the heart of our work with clients. Now as businesses modernize, we’re making it easier for them to manage their encryption keys and protect data across any environment they choose.” 

Advertisement. Scroll to continue reading.

Enabling data governance to help organizations demonstrate their compliance

According to a recent global study conducted by IBM Institute for Business Value (IBV) in cooperation with Oxford Economics, 80% of C-Suite respondents said the ability to have governance and compliance tools runacross multiple cloud estates is important or extremely important. Especially with crypto keys that safeguard critical data distributed across many platforms, organizations can suffer from operational complexity, or worse – non-compliance – if they don’t have a holistic view of their data security posture. With a single, secured and cloud-based view of who has access to critical data, businesses can demonstrate their compliance with greater ease and speed in near real-time. 

“IBM has chosen a rather unique approach to zero trust security architectures, focusing on addressing real customer driven use cases rather than simply offering yet another product. Similarly, this new service demonstrates IBM’s commitment to solving a critical pain point made increasingly difficult by COVID accelerated digital transformation initiatives, protecting critical data. By making it possible to securely manage encryption keys with a single point of control – including across other public clouds – IBM is proving that what it cares most about is clients and what truly keeps them up at night, not where their data is stored. Unified Key Orchestrator also eases the management burden which is aggravated by the security talent shortage by making  it possible for businesses to demonstrate compliance across multiple cloud platforms – which can be incredibly complex – faster and easier,” said Frank Dickson, VP of Security & Trust at IDC.

IBM is the only provider delivering a service in the cloud to help organizations manage encryption keys across multiple cloud environments with a unified view, helping demonstrate their  compliance and strengthen security. Available on IBM Cloud, Unified Key Orchestrator leverages IBM’s encryption capabilities, hybrid cloud expertise and automation and is designed to give clients a clear understanding of their data security posture. With the service, organizations maintain full visibility and control over who has access to their critical data, while running workloads across hybrid cloud environments and in the location where it needs to ensure data sovereignty. At the same time, companies no longer need to rely on security experts with specialized knowledge of each individual cloud and can spend more time and resources driving innovation for their clients.

To learn more about how IBM is protecting critical data on IBM Cloud Satellite with IBM Key Protect for IBM Cloud Satellite, read the blog.

Advertisement. Scroll to continue reading.

To learn more about Unified Key Orchestrator and how IBM is leveraging Keep Your Own Key technology to deliver innovative security capabilities, go here.

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

Ultra is built using Apple’s innovative UltraFusion packaging architecture, which links two M3 Max dies over 10,000 high-speed connections that offer low latency and...

HEADLINES

Since its launch in 2018, Call for Code has rallied developers globally to come together and create innovative solutions to help solve the world's...

HEADLINES

Catch j-hope’s electrifying performance and share your real-time experience of the ‘HOPE ON THE STAGE’ in MANILA for two straight nights, powered by Smart...

HEADLINES

With petabytes of data at its disposal, Smart aims to enhance customer experiences through A.I.-powered applications. Smart will use AWS’s services to unify Smart’s...

HEADLINES

As one of Coursera for Campus’ top three customers globally, iPeople is advancing its mission to equip students and faculty across its six universities...

HEADLINES

Converge SVP and Corporate Information Security Officer Andrew T. Malijan said that misinformation and politically-motivated content may likely increase during this campaign season, and...

HEADLINES

This collaboration will develop and deploy solar photovoltaic, battery storage, and hybrid energy solutions to support the growing demand for sustainable power in industrial,...

HEADLINES

The Dimensity 7400 and 7400X are geared to deliver advanced gaming and AI camera technology to consumers, and the Dimensity 6400 provides fantastic performance...

Advertisement