Secure App Transactions and Sensitive Data with Cryptographic Key Encryption Protection


Learn more about Confidential Computing → http://ibm.biz/explore-confidential-computing-guide
Check out IBM Cloud Hyper Protect Crypto Services → http://ibm.biz/hyper-protect-crypto-services
Check out IBM Cloud Hyper Protect Virtual Server → http://ibm.biz/hp-virtual-servers
Check out IBM Cloud Hyper Protect DBaaS → http://ibm.biz/hyper-protect-dbaas

In this video, Chris Poole with IBM, demonstrates how to deploy a secured virtual server, create a lockdown database, create an instance of IBM Cloud Hyper Protect Crypto Service and initialize its Hardware Security Module (HSM) using IBM Cloud Hyper Protect Services to ensure your data stay confidential.

Chapters
0:00 – Intro to Confidential Computing
0:50 – Secure your keys with HSM
1:20 – IBM Cloud Hyper Protect Crypto Services
1:40 – Keep Your Own Key (KYOK) & Key Ceremony
2:19 – Key Ceremony with a Smart Card
2:44 – Using Smart Cards to initialize HSM
3:42 – Create a lockdown database with IBM Cloud Hyper Protect DBaaS
4:31 – Deploy a secure virtual server with IBM Cloud Hyper Protect Virtual Servers
5:01 – Create an instance of the IBM Cloud Hyper Protect Crypto Service and initialize its HSM
6:00 – Summary

Get started on IBM Cloud at no cost → http://ibm.biz/BdftQi
Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now​​

#ConfidentialComputing #Crypto #IBMCloudHyperProtectServices


Duration: 00:06:52
Publisher: IBMcloud
You can watch this video also at the source.