IBM Hyper protect platform: applying data protection and confidentiality in a hybrid cloud environment
Protecting workloads and sensitive data throughout their lifecycle is a great concern across all industries and organizations. Increasing demands to accelerate hybrid cloud adoption and integration are changing the way data is securely stored, processed, and accessed. In addition, regulatory guideli...
Gespeichert in:
Beteiligte Personen: | , , , , , , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
[Poughkeepsie, New York]
IBM Redbooks
2022
|
Ausgabe: | [First edition]. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9780738461496/?ar |
Zusammenfassung: | Protecting workloads and sensitive data throughout their lifecycle is a great concern across all industries and organizations. Increasing demands to accelerate hybrid cloud adoption and integration are changing the way data is securely stored, processed, and accessed. In addition, regulatory guidelines and standards are causing many businesses and organizations to implement zero trust policies and privacy enhancing techniques to restrict access to workloads as state of least privilege is established. A state of least privilege ensures that no user or workload has any more access to data than is necessary. Confidentiality and integrity assurance for data at rest and data in transit is typically provided through cryptography. Nevertheless, data in use is generally unencrypted while it is processed by the system, which can make data in use accessible to privileged users or workloads. In the past, data owners relied upon operational assurance to control access to workloads and data. An operational assurance approach ensures that a service provider will not access customer workloads or data through specific operational procedures and measures. However, with today's constant, unpredictable, and always changing cyberthreats, operational assurance is not enough. A more robust technical assurance approach that is hardware-based is needed. A Trusted Execution Environment (TEE) or confidential computing platform does just that. A TEE ensures that no one can access sensitive workloads and data while in use, not even the service provider. A TEE can also protect the CI/CD pipeline from bad actors, enforce supply chain protection, and provide code integrity through cryptographic proofs and encryption. This IBM® Redbooks® publication outlines how to apply common concepts of data protection and confidentiality and make use of a privacy-enhancing technology-based solution that can be implemented in a hybrid cloud environment. It describes the TEE technologies that are offered with IBM Z® and IBM LinuxONE (such as IBM Secure Execution for Linux), and how the IBM Hyper Protect Platform uses them. This publication discusses how the various IBM Hyper Protect services ensure zero trust data-centric security and data privacy end-to-end. It also illustrates the business value through specific use case scenarios, covering relevant aspects of workload creation and evidence collection for regulatory compliance of software supply chains. This IBM Redbooks publication is for Chief Information Security Officers (CISOs), IT managers, security architects, security administrators, cloud application developers, and anyone who needs to plan, deploy, and manage data security and confidentiality in a hybrid cloud environment. The reader is expected to have a basic understanding of IT security and hybrid cloud concepts. |
Beschreibung: | Includes bibliographical references |
Umfang: | 1 Online-Ressource (144 Seiten) illustrations |
ISBN: | 9780738461496 0738461490 |
Internformat
MARC
LEADER | 00000nam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-102205493 | ||
003 | DE-627-1 | ||
005 | 20240404083420.0 | ||
007 | cr uuu---uuuuu | ||
008 | 240404s2024 xx |||||o 00| ||eng c | ||
020 | |a 9780738461496 |c electronic bk. |9 978-0-7384-6149-6 | ||
020 | |a 0738461490 |c electronic bk. |9 0-7384-6149-0 | ||
035 | |a (DE-627-1)102205493 | ||
035 | |a (DE-599)KEP102205493 | ||
035 | |a (ORHE)9780738461496 | ||
035 | |a (DE-627-1)102205493 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23/eng/20240227 | |
100 | 1 | |a White, Bill |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a IBM Hyper protect platform |b applying data protection and confidentiality in a hybrid cloud environment |c Bill White, Robbie Avill, Sandeep Batta, Abhiram Kulkarni, Timo Kußmaul, Stefan Liesche, Nicolas Mäding, Christoph Schlameuß, Peter Szmrecsányi |
250 | |a [First edition]. | ||
264 | 1 | |a [Poughkeepsie, New York] |b IBM Redbooks |c 2022 | |
300 | |a 1 Online-Ressource (144 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references | ||
520 | |a Protecting workloads and sensitive data throughout their lifecycle is a great concern across all industries and organizations. Increasing demands to accelerate hybrid cloud adoption and integration are changing the way data is securely stored, processed, and accessed. In addition, regulatory guidelines and standards are causing many businesses and organizations to implement zero trust policies and privacy enhancing techniques to restrict access to workloads as state of least privilege is established. A state of least privilege ensures that no user or workload has any more access to data than is necessary. Confidentiality and integrity assurance for data at rest and data in transit is typically provided through cryptography. Nevertheless, data in use is generally unencrypted while it is processed by the system, which can make data in use accessible to privileged users or workloads. In the past, data owners relied upon operational assurance to control access to workloads and data. An operational assurance approach ensures that a service provider will not access customer workloads or data through specific operational procedures and measures. However, with today's constant, unpredictable, and always changing cyberthreats, operational assurance is not enough. A more robust technical assurance approach that is hardware-based is needed. A Trusted Execution Environment (TEE) or confidential computing platform does just that. A TEE ensures that no one can access sensitive workloads and data while in use, not even the service provider. A TEE can also protect the CI/CD pipeline from bad actors, enforce supply chain protection, and provide code integrity through cryptographic proofs and encryption. This IBM® Redbooks® publication outlines how to apply common concepts of data protection and confidentiality and make use of a privacy-enhancing technology-based solution that can be implemented in a hybrid cloud environment. It describes the TEE technologies that are offered with IBM Z® and IBM LinuxONE (such as IBM Secure Execution for Linux), and how the IBM Hyper Protect Platform uses them. This publication discusses how the various IBM Hyper Protect services ensure zero trust data-centric security and data privacy end-to-end. It also illustrates the business value through specific use case scenarios, covering relevant aspects of workload creation and evidence collection for regulatory compliance of software supply chains. This IBM Redbooks publication is for Chief Information Security Officers (CISOs), IT managers, security architects, security administrators, cloud application developers, and anyone who needs to plan, deploy, and manage data security and confidentiality in a hybrid cloud environment. The reader is expected to have a basic understanding of IT security and hybrid cloud concepts. | ||
650 | 0 | |a Computer security | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Cloud computing |x Security measures | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Infonuagique ; Sécurité ; Mesures | |
700 | 1 | |a Avill, Robbie |e VerfasserIn |4 aut | |
700 | 1 | |a Batta, Sandeep |e VerfasserIn |4 aut | |
700 | 1 | |a Kulkarni, Abhiram |e VerfasserIn |4 aut | |
700 | 1 | |a Kußmaul, Timo |e VerfasserIn |4 aut | |
700 | 1 | |a Liesche, Stefan |e VerfasserIn |4 aut | |
700 | 1 | |a Mäding, Nicolas |e VerfasserIn |4 aut | |
700 | 1 | |a Schlameuß, Christoph |e VerfasserIn |4 aut | |
700 | 1 | |a Szmrecsányi, Peter |e VerfasserIn |4 aut | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780738461496/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-102205493 |
---|---|
_version_ | 1821494934253862912 |
adam_text | |
any_adam_object | |
author | White, Bill Avill, Robbie Batta, Sandeep Kulkarni, Abhiram Kußmaul, Timo Liesche, Stefan Mäding, Nicolas Schlameuß, Christoph Szmrecsányi, Peter |
author_facet | White, Bill Avill, Robbie Batta, Sandeep Kulkarni, Abhiram Kußmaul, Timo Liesche, Stefan Mäding, Nicolas Schlameuß, Christoph Szmrecsányi, Peter |
author_role | aut aut aut aut aut aut aut aut aut |
author_sort | White, Bill |
author_variant | b w bw r a ra s b sb a k ak t k tk s l sl n m nm c s cs p s ps |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)102205493 (DE-599)KEP102205493 (ORHE)9780738461496 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | [First edition]. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04925nam a22005172 4500</leader><controlfield tag="001">ZDB-30-ORH-102205493</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240404083420.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240404s2024 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780738461496</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-7384-6149-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0738461490</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-7384-6149-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)102205493</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP102205493</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780738461496</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)102205493</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20240227</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">White, Bill</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">IBM Hyper protect platform</subfield><subfield code="b">applying data protection and confidentiality in a hybrid cloud environment</subfield><subfield code="c">Bill White, Robbie Avill, Sandeep Batta, Abhiram Kulkarni, Timo Kußmaul, Stefan Liesche, Nicolas Mäding, Christoph Schlameuß, Peter Szmrecsányi</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">[First edition].</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Poughkeepsie, New York]</subfield><subfield code="b">IBM Redbooks</subfield><subfield code="c">2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (144 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Protecting workloads and sensitive data throughout their lifecycle is a great concern across all industries and organizations. Increasing demands to accelerate hybrid cloud adoption and integration are changing the way data is securely stored, processed, and accessed. In addition, regulatory guidelines and standards are causing many businesses and organizations to implement zero trust policies and privacy enhancing techniques to restrict access to workloads as state of least privilege is established. A state of least privilege ensures that no user or workload has any more access to data than is necessary. Confidentiality and integrity assurance for data at rest and data in transit is typically provided through cryptography. Nevertheless, data in use is generally unencrypted while it is processed by the system, which can make data in use accessible to privileged users or workloads. In the past, data owners relied upon operational assurance to control access to workloads and data. An operational assurance approach ensures that a service provider will not access customer workloads or data through specific operational procedures and measures. However, with today's constant, unpredictable, and always changing cyberthreats, operational assurance is not enough. A more robust technical assurance approach that is hardware-based is needed. A Trusted Execution Environment (TEE) or confidential computing platform does just that. A TEE ensures that no one can access sensitive workloads and data while in use, not even the service provider. A TEE can also protect the CI/CD pipeline from bad actors, enforce supply chain protection, and provide code integrity through cryptographic proofs and encryption. This IBM® Redbooks® publication outlines how to apply common concepts of data protection and confidentiality and make use of a privacy-enhancing technology-based solution that can be implemented in a hybrid cloud environment. It describes the TEE technologies that are offered with IBM Z® and IBM LinuxONE (such as IBM Secure Execution for Linux), and how the IBM Hyper Protect Platform uses them. This publication discusses how the various IBM Hyper Protect services ensure zero trust data-centric security and data privacy end-to-end. It also illustrates the business value through specific use case scenarios, covering relevant aspects of workload creation and evidence collection for regulatory compliance of software supply chains. This IBM Redbooks publication is for Chief Information Security Officers (CISOs), IT managers, security architects, security administrators, cloud application developers, and anyone who needs to plan, deploy, and manage data security and confidentiality in a hybrid cloud environment. The reader is expected to have a basic understanding of IT security and hybrid cloud concepts.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cloud computing</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Infonuagique ; Sécurité ; Mesures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Avill, Robbie</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Batta, Sandeep</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kulkarni, Abhiram</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kußmaul, Timo</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Liesche, Stefan</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mäding, Nicolas</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Schlameuß, Christoph</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Szmrecsányi, Peter</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780738461496/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-102205493 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:22:16Z |
institution | BVB |
isbn | 9780738461496 0738461490 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (144 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2022 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | IBM Redbooks |
record_format | marc |
spelling | White, Bill VerfasserIn aut IBM Hyper protect platform applying data protection and confidentiality in a hybrid cloud environment Bill White, Robbie Avill, Sandeep Batta, Abhiram Kulkarni, Timo Kußmaul, Stefan Liesche, Nicolas Mäding, Christoph Schlameuß, Peter Szmrecsányi [First edition]. [Poughkeepsie, New York] IBM Redbooks 2022 1 Online-Ressource (144 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references Protecting workloads and sensitive data throughout their lifecycle is a great concern across all industries and organizations. Increasing demands to accelerate hybrid cloud adoption and integration are changing the way data is securely stored, processed, and accessed. In addition, regulatory guidelines and standards are causing many businesses and organizations to implement zero trust policies and privacy enhancing techniques to restrict access to workloads as state of least privilege is established. A state of least privilege ensures that no user or workload has any more access to data than is necessary. Confidentiality and integrity assurance for data at rest and data in transit is typically provided through cryptography. Nevertheless, data in use is generally unencrypted while it is processed by the system, which can make data in use accessible to privileged users or workloads. In the past, data owners relied upon operational assurance to control access to workloads and data. An operational assurance approach ensures that a service provider will not access customer workloads or data through specific operational procedures and measures. However, with today's constant, unpredictable, and always changing cyberthreats, operational assurance is not enough. A more robust technical assurance approach that is hardware-based is needed. A Trusted Execution Environment (TEE) or confidential computing platform does just that. A TEE ensures that no one can access sensitive workloads and data while in use, not even the service provider. A TEE can also protect the CI/CD pipeline from bad actors, enforce supply chain protection, and provide code integrity through cryptographic proofs and encryption. This IBM® Redbooks® publication outlines how to apply common concepts of data protection and confidentiality and make use of a privacy-enhancing technology-based solution that can be implemented in a hybrid cloud environment. It describes the TEE technologies that are offered with IBM Z® and IBM LinuxONE (such as IBM Secure Execution for Linux), and how the IBM Hyper Protect Platform uses them. This publication discusses how the various IBM Hyper Protect services ensure zero trust data-centric security and data privacy end-to-end. It also illustrates the business value through specific use case scenarios, covering relevant aspects of workload creation and evidence collection for regulatory compliance of software supply chains. This IBM Redbooks publication is for Chief Information Security Officers (CISOs), IT managers, security architects, security administrators, cloud application developers, and anyone who needs to plan, deploy, and manage data security and confidentiality in a hybrid cloud environment. The reader is expected to have a basic understanding of IT security and hybrid cloud concepts. Computer security Computer networks Security measures Cloud computing Security measures Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Infonuagique ; Sécurité ; Mesures Avill, Robbie VerfasserIn aut Batta, Sandeep VerfasserIn aut Kulkarni, Abhiram VerfasserIn aut Kußmaul, Timo VerfasserIn aut Liesche, Stefan VerfasserIn aut Mäding, Nicolas VerfasserIn aut Schlameuß, Christoph VerfasserIn aut Szmrecsányi, Peter VerfasserIn aut |
spellingShingle | White, Bill Avill, Robbie Batta, Sandeep Kulkarni, Abhiram Kußmaul, Timo Liesche, Stefan Mäding, Nicolas Schlameuß, Christoph Szmrecsányi, Peter IBM Hyper protect platform applying data protection and confidentiality in a hybrid cloud environment Computer security Computer networks Security measures Cloud computing Security measures Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Infonuagique ; Sécurité ; Mesures |
title | IBM Hyper protect platform applying data protection and confidentiality in a hybrid cloud environment |
title_auth | IBM Hyper protect platform applying data protection and confidentiality in a hybrid cloud environment |
title_exact_search | IBM Hyper protect platform applying data protection and confidentiality in a hybrid cloud environment |
title_full | IBM Hyper protect platform applying data protection and confidentiality in a hybrid cloud environment Bill White, Robbie Avill, Sandeep Batta, Abhiram Kulkarni, Timo Kußmaul, Stefan Liesche, Nicolas Mäding, Christoph Schlameuß, Peter Szmrecsányi |
title_fullStr | IBM Hyper protect platform applying data protection and confidentiality in a hybrid cloud environment Bill White, Robbie Avill, Sandeep Batta, Abhiram Kulkarni, Timo Kußmaul, Stefan Liesche, Nicolas Mäding, Christoph Schlameuß, Peter Szmrecsányi |
title_full_unstemmed | IBM Hyper protect platform applying data protection and confidentiality in a hybrid cloud environment Bill White, Robbie Avill, Sandeep Batta, Abhiram Kulkarni, Timo Kußmaul, Stefan Liesche, Nicolas Mäding, Christoph Schlameuß, Peter Szmrecsányi |
title_short | IBM Hyper protect platform |
title_sort | ibm hyper protect platform applying data protection and confidentiality in a hybrid cloud environment |
title_sub | applying data protection and confidentiality in a hybrid cloud environment |
topic | Computer security Computer networks Security measures Cloud computing Security measures Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Infonuagique ; Sécurité ; Mesures |
topic_facet | Computer security Computer networks Security measures Cloud computing Security measures Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Infonuagique ; Sécurité ; Mesures |
work_keys_str_mv | AT whitebill ibmhyperprotectplatformapplyingdataprotectionandconfidentialityinahybridcloudenvironment AT avillrobbie ibmhyperprotectplatformapplyingdataprotectionandconfidentialityinahybridcloudenvironment AT battasandeep ibmhyperprotectplatformapplyingdataprotectionandconfidentialityinahybridcloudenvironment AT kulkarniabhiram ibmhyperprotectplatformapplyingdataprotectionandconfidentialityinahybridcloudenvironment AT kußmaultimo ibmhyperprotectplatformapplyingdataprotectionandconfidentialityinahybridcloudenvironment AT lieschestefan ibmhyperprotectplatformapplyingdataprotectionandconfidentialityinahybridcloudenvironment AT madingnicolas ibmhyperprotectplatformapplyingdataprotectionandconfidentialityinahybridcloudenvironment AT schlameußchristoph ibmhyperprotectplatformapplyingdataprotectionandconfidentialityinahybridcloudenvironment AT szmrecsanyipeter ibmhyperprotectplatformapplyingdataprotectionandconfidentialityinahybridcloudenvironment |