Hyper-v

Secure App Transactions and Sensitive Data with Cryptographic Key Encryption Protection



Learn more about Confidential Computing →
Check out IBM Cloud Hyper Protect Crypto Services →
Check out IBM Cloud Hyper Protect Virtual Server →
Check out IBM Cloud Hyper Protect DBaaS →

In this video, Chris Poole with IBM, demonstrates how to deploy a secured virtual server, create a lockdown database, create an instance of IBM Cloud Hyper Protect Crypto Service and initialize its Hardware Security Module (HSM) using IBM Cloud Hyper Protect Services to ensure your data stay confidential.

Chapters
0:00 – Intro to Confidential Computing
0:50 – Secure your keys with HSM
1:20 – IBM Cloud Hyper Protect Crypto Services
1:40 – Keep Your Own Key (KYOK) & Key Ceremony
2:19 – Key Ceremony with a Smart Card
2:44 – Using Smart Cards to initialize HSM
3:42 – Create a lockdown database with IBM Cloud Hyper Protect DBaaS
4:31 – Deploy a secure virtual server with IBM Cloud Hyper Protect Virtual Servers
5:01 – Create an instance of the IBM Cloud Hyper Protect Crypto Service and initialize its HSM
6:00 – Summary

Get started on IBM Cloud at no cost →
Subscribe to see more videos like this in the future →

#ConfidentialComputing #Crypto #IBMCloudHyperProtectServices

source

 

To see the full content, share this page by clicking one of the buttons below

Related Articles

Leave a Reply