Thursday, 13 August 2020 11:19

Confidential computing is part of IBM's cloud vision

IBM Z Hybrid Cloud vice president Rohit Badlaney IBM Z Hybrid Cloud vice president Rohit Badlaney

IBM has been working on confidential computing technologies for more than a decade, IBM Z Hybrid Cloud vice president Rohit Badlaney told iTWire.

These technologies have been made available in the IBM public cloud for several years, he said. Trusted execution showed up as part of IBM's blockchain platform as a service in 2016, and two years later the Hyper Protect family of cloud services applied confidential computing more broadly.

Hyper Protect includes a cryptographic service, integrity services, database as a service (Postgres and Mongo), and virtual machines as a service.

IBM's approach means that the company is unable to access clients' data in these environments as a matter of technology, whereas competing cloud providers rely on operational protections.

These protections aren't just available to applications running entirely in the IBM public cloud. For example, the IBM Hyper Protect Software Development Kit for iOS allows developers to create iPad and iPhone apps to access data that's protected by the IBM cloud, and the Temenos banking software has a hybrid model allowing it to run on traditional systems while using the IBM cloud as its data protection layer.

"We've got the whole family [of trusted services] now generally available," said Badlaney, and the company intends to make them available in all zones by 2021.

IBM is also launching a set of fully homomorphic encryption toolkits, initially for macOS and iOS, and more recently for Linux. An Android version is said to be coming soon.

Homomorphic encryption allows data to be analysed or manipulated without being decrypted. "we've been focused on this space for a while," he said.

"This is meant for the most regulated industries," but greater adoption is occurring.

It can be hard to encrypt all data using conventional methods, as that requires complicated configurations, explained IBM distinguished engineer Rebecca Gott. But fully homomorphic encryption keeps everything encrypted. This is "the highest level of security by default, which is unchangeable," she said, so security settings are "baked in."

Read 4113 times

Please join our community here and become a VIP.

Subscribe to ITWIRE UPDATE Newsletter here
JOIN our iTWireTV our YouTube Community here


Hybrid cloud promises to bring together the best of both worlds enabling businesses to combine the scalability and cost-effectiveness of the cloud with the performance and control that you can get from your on-premise infrastructure.

Reducing WAN latency is one of the biggest issues with hybrid cloud performance. Taking advantage of compression and data deduplication can reduce your network latency.

Research firm, Markets and Markets, predicted that the hybrid cloud market size is expected to grow from US$38.27 billion in 2017 to US$97.64 billion by 2023.

Colocation facilities provide many of the benefits of having your servers in the cloud while still maintaining physical control of your systems.

Cloud adjacency provided by colocation facilities can enable you to leverage their low latency high bandwidth connections to the cloud as well as providing a solid connection back to your on-premises corporate network.

Download this white paper to find out what you need to know about enabling the hybrid cloud in your organisation.



It's all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site and prominent Newsletter promotion and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.


Stephen Withers

Stephen Withers is one of Australia¹s most experienced IT journalists, having begun his career in the days of 8-bit 'microcomputers'. He covers the gamut from gadgets to enterprise systems. In previous lives he has been an academic, a systems programmer, an IT support manager, and an online services manager. Stephen holds an honours degree in Management Sciences and a PhD in Industrial and Business Studies.

Share News tips for the iTWire Journalists? Your tip will be anonymous




Guest Opinion

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News