Secure App Transactions and Sensitive Data with Cryptographic Key Encryption Protection

Subscribers:
1,190,000
Published on ● Video Link: https://www.youtube.com/watch?v=RIcnXFZWrSI



Duration: 6:52
2,224 views
56


Learn more about Confidential Computing → http://ibm.biz/explore-confidential-computing-guide
Check out IBM Cloud Hyper Protect Crypto Services → http://ibm.biz/hyper-protect-crypto-services
Check out IBM Cloud Hyper Protect Virtual Server → http://ibm.biz/hp-virtual-servers
Check out IBM Cloud Hyper Protect DBaaS → http://ibm.biz/hyper-protect-dbaas

In this video, Chris Poole with IBM, demonstrates how to deploy a secured virtual server, create a lockdown database, create an instance of IBM Cloud Hyper Protect Crypto Service and initialize its Hardware Security Module (HSM) using IBM Cloud Hyper Protect Services to ensure your data stay confidential.

Chapters
0:00 - Intro to Confidential Computing
0:50 - Secure your keys with HSM
1:20 - IBM Cloud Hyper Protect Crypto Services
1:40 - Keep Your Own Key (KYOK) & Key Ceremony
2:19 - Key Ceremony with a Smart Card
2:44 - Using Smart Cards to initialize HSM
3:42 - Create a lockdown database with IBM Cloud Hyper Protect DBaaS
4:31 - Deploy a secure virtual server with IBM Cloud Hyper Protect Virtual Servers
5:01 - Create an instance of the IBM Cloud Hyper Protect Crypto Service and initialize its HSM
6:00 - Summary

Get started on IBM Cloud at no cost → http://ibm.biz/BdftQi
Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now​​

#ConfidentialComputing #Crypto #IBMCloudHyperProtectServices







Tags:
Confidential Computing
Crypto
Hardware Secure Model
HSM
Cloud Security
Security
IBM
IBM Cloud
IBM Cloud Hyper Protect Services