aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • Hybrid Cloud
  • Multi-Cloud

IBM Gives Control To Businesses For Securing Data In Hybrid, Multicloud Environments

  • aster.cloud
  • March 23, 2022
  • 3 minute read

Today, IBM (NYSE:IBM) launched the industry’s first cloud service to perform key management across hybrid, multicloud environments, helping enterprises mitigate risk to critical data from cyberattacks and insider threats. Built for today’s hybrid cloud world, the new service empowers businesses to take advantage of IBM’s cloud security capabilities – no matter where their data resides – including on other clouds and on-premises.

Securing hybrid cloud environments against data breaches

As enterprises modernize, they’re increasingly adopting a hybrid, multicloud approach to host workloads where they need to be – in the cloud or on-premises – to reduce risk and demonstrate compliance. Considering the average company is using more than 8-9 cloud environments at any given time, they risk greater exposure to threats from malicious actors that can compromise data. Now is the time to mitigate complexity – especially as cloud environments become a growing target for cybercriminals looking to access and capitalize on sensitive data residing across complex multicloud environments. But reducing complexity is no easy task. The more clouds that businesses use, the more diverse skills their IT teams need to secure and manage the keys that protect their critical enterprise data.


Partner with aster.cloud
for your next big idea.
Let us know here.



From our partners:

CITI.IO :: Business. Institutions. Society. Global Political Economy.
CYBERPOGO.COM :: For the Arts, Sciences, and Technology.
DADAHACKS.COM :: Parenting For The Rest Of Us.
ZEDISTA.COM :: Entertainment. Sports. Culture. Escape.
TAKUMAKU.COM :: For The Hearth And Home.
ASTER.CLOUD :: From The Cloud And Beyond.
LIWAIWAI.COM :: Intelligence, Inside and Outside.
GLOBALCLOUDPLATFORMS.COM :: For The World's Computing Needs.
FIREGULAMAN.COM :: For The Fire In The Belly Of The Coder.
ASTERCASTER.COM :: Supra Astra. Beyond The Stars.
BARTDAY.COM :: Prosperity For Everyone.

“Protecting critical data across multiple platforms can be incredibly complex — but all it takes is one weak link to put a company’s entire security strategy at risk. That’s why we’re giving clients one single point of control – allowing them to know who has access to their critical data at all times – even on other clouds,” said Hillery Hunter, General Manager, Industry Clouds & Solutions, CTO, IBM Cloud. “Trust and choice have always been at the heart of our work with clients. Now as businesses modernize, we’re making it easier for them to manage their encryption keys and protect data across any environment they choose.” 

Read More  Cloud-Based Quantum Computing Lets Startups Compete With Goliaths

Enabling data governance to help organizations demonstrate their compliance

According to a recent global study conducted by IBM Institute for Business Value (IBV) in cooperation with Oxford Economics, 80% of C-Suite respondents said the ability to have governance and compliance tools run across multiple cloud estates is important or extremely important. Especially with crypto keys that safeguard critical data distributed across many platforms, organizations can suffer from operational complexity, or worse – non-compliance – if they don’t have a holistic view of their data security posture. With a single, secured and cloud-based view of who has access to critical data, businesses can demonstrate their compliance with greater ease and speed in near real-time.

“IBM has chosen a rather unique approach to zero trust security architectures, focusing on addressing real customer driven use cases rather than simply offering yet another product. Similarly, this new service demonstrates IBM’s commitment to solving a critical pain point made increasingly difficult by COVID accelerated digital transformation initiatives, protecting critical data. By making it possible to securely manage encryption keys with a single point of control – including across other public clouds – IBM is proving that what it cares most about is clients and what truly keeps them up at night, not where their data is stored. Unified Key Orchestrator also eases the management burden which is aggravated by the security talent shortage by making  it possible for businesses to demonstrate compliance across multiple cloud platforms – which can be incredibly complex – faster and easier,” said Frank Dickson, VP of Security & Trust at IDC.

Read More  IBM And The Climate Service To Work Together With Financial Institutions And Corporations To Assess The Cost Of Climate Risk

IBM is the only provider delivering a service in the cloud to help organizations manage encryption keys across multiple cloud environments with a unified view, helping demonstrate their  compliance and strengthen security. Available on IBM Cloud, Unified Key Orchestrator leverages IBM’s encryption capabilities, hybrid cloud expertise and automation and is designed to give clients a clear understanding of their data security posture. With the service, organizations maintain full visibility and control over who has access to their critical data, while running workloads across hybrid cloud environments and in the location where it needs to ensure data sovereignty. At the same time, companies no longer need to rely on security experts with specialized knowledge of each individual cloud and can spend more time and resources driving innovation for their clients.

To learn more about how we’re enabling multicloud key management with IBM Cloud Hyper Protect Crypto Services, go here.

To learn more about how IBM is protecting critical data on IBM Cloud Satellite with IBM Key Protect for IBM Cloud Satellite, read the blog.

To learn more about Unified Key Orchestrator and how IBM is leveraging Keep Your Own Key technology to deliver innovative security capabilities, go here.

Contact
IBM Communications
Kate Gazzillo
[email protected]

 

SOURCE IBM


For enquiries, product placements, sponsorships, and collaborations, connect with us at [email protected]. We'd love to hear from you!

Our humans need coffee too! Your support is highly appreciated, thank you!

aster.cloud

Related Topics
  • IBM
  • IBM Cloud
  • IBV
You May Also Like
View Post
  • Computing
  • Multi-Cloud
  • Technology

How to create an AWS free tier account

  • July 10, 2025
View Post
  • Computing
  • Multi-Cloud
  • Technology

How to configure multiple AWS CLI authentication credentials

  • July 10, 2025
View Post
  • Computing
  • Multi-Cloud
  • Technology

What is database as a service (DBaaS)?

  • July 7, 2025
View Post
  • Computing
  • Multi-Cloud
  • Technology

The cloud’s role in PQC migration

  • July 7, 2025
View Post
  • Computing
  • Multi-Cloud
  • Technology

Hybrid cloud has hit the mainstream – but firms are still confused about costs

  • July 7, 2025
View Post
  • Computing
  • Multi-Cloud
  • Technology

Turns out OpenAI is the customer behind Oracle’s mysterious $30 billion cloud deal

  • July 3, 2025
View Post
  • Computing
  • Multi-Cloud
  • Technology

A looming hyperscaler exodus? UK IT leaders are thinking of ditching US cloud providers – here’s why

  • June 26, 2025
View Post
  • Computing
  • Multi-Cloud
  • Technology

Prioritize security from the edge to the cloud

  • June 25, 2025

Stay Connected!
LATEST
  • How to create an AWS free tier account
    • July 10, 2025
  • How to configure multiple AWS CLI authentication credentials
    • July 10, 2025
  • 3
    Formula E accelerates its work with Google Cloud Storage and Google Workspace
    • July 9, 2025
  • What is database as a service (DBaaS)?
    • July 7, 2025
  • The cloud’s role in PQC migration
    • July 7, 2025
  • 6
    Hybrid cloud has hit the mainstream – but firms are still confused about costs
    • July 7, 2025
  • 7
    Building secure, scalable AI in the cloud with Microsoft Azure
    • July 5, 2025
  • 8
    Turns out OpenAI is the customer behind Oracle’s mysterious $30 billion cloud deal
    • July 3, 2025
  • aster-cloud-erp-bill_of_materials_2 9
    What is an SBOM (software bill of materials)?
    • July 2, 2025
  • aster-cloud-sms-pexels-tim-samuel-6697306 10
    Send SMS texts with Amazon’s SNS simple notification service
    • July 1, 2025
about
Hello World!

We are aster.cloud. We’re created by programmers for programmers.

Our site aims to provide guides, programming tips, reviews, and interesting materials for tech people and those who want to learn in general.

We would like to hear from you.

If you have any feedback, enquiries, or sponsorship request, kindly reach out to us at:

[email protected]
Most Popular
  • 1
    A looming hyperscaler exodus? UK IT leaders are thinking of ditching US cloud providers – here’s why
    • June 26, 2025
  • Genome 2
    AlphaGenome: AI for better understanding the genome
    • June 25, 2025
  • aster-cloud-website-pexels-goumbik-574069 3
    Host a static website on AWS with Amazon S3 and Route 53
    • June 27, 2025
  • Camping 4
    The Summer Adventures : Camping Essentials
    • June 27, 2025
  • 6 edge monitoring best practices in the cloud
    • June 25, 2025
  • /
  • Technology
  • Tools
  • About
  • Contact Us

Input your search keywords and press Enter.