The Internet has enabled communication and collaboration across the world and brought with it a new computing model premised on continuous global connection. In that landscape, companies can distribute work and technology anywhere in the world. Given these opportunities, IBM is working with its clients to develop new business designs and technical architectures that allow their businesses the flexibility required to compete in this new landscape. As a longstanding technology partner, IBM integrates many of its products with the Entrust family of data protection, credential and certificate management solutions to extend performance, enhance security, and facilitate regulatory compliance.
The IBM Global Security Kit (GSK) and the Java Security software development tools, as well as the Security Verify Access web management solution and the Guardium Key Lifecycle Manager (GKLM) integrates with Entrust nShield® hardware security modules (HSMs) to safeguard and manage underpinning master keys with a FIPS 140-2 Level 3 and Common Criteria EAL4+ root of trust. nShield HSMs can be deployed on-premises or as a service. The IBM Blockchain platform and the HTTP Server, also integrates with Entrust nShield HSMs to generate and store critical private signing keys underpinning security.
IBM DB2 integrates with Entrust KeyControl (formerly HyTrust) and the Entrust nShield HSMs to manage keys using the Key Management Interoperability Protocol (KMIP).
IBM Cloud Hyper Protect Crypto Services are being integrated with Entrust DataControl to provide a single-tenant FIPS certified key management service for VMware Regulated Workload, extending encryption to hybrid architectures.
The IBM Management as a Service (MaaS360) enterprise mobility management system integrates with Entrust mobile smart credential and certificate solutions to strengthen security with enhanced visibility and control over personal devices brought into enterprise environments.
- nFinity Partner Program
- Encryption, Database Security, Tokenization
- Network Security, Application Delivery Controllers (ADCs)
- Key Management