IBM® Corporation is the world’s largest information technology company. A leader in the creation, development and manufacture of information technologies, including computer systems, software, networking systems, storage devices and microelectronics. IBM Corporation has licensed SafeNet’s Chrystoki software, in order to help its customers become “e-businesses”. IBM will use Chrystoki software to add digital signature, encrypted smart card, and high-security PC Card support into its SecureWay line of electronic commerce software. This will give IBM customers a variety of secure methods to access their Internet electronic commerce business applications. Further information on IBM’s implementation of Chrystoki software can be found on the IBM I/T Security home page at www.ibm.com/security. 1 New Orchard RoadArmonkNY United StatesNorth Americas10504-1722914-499-1900
IBM WebSphere Application Server is a software platform for deploying enterprise Java based applications utilizing IBM HTTP Server. Websphere allows organizations to extend packaged and legacy programs – including applications from non-IBM servers such as Tomcat, JBoss and Oracle – to the web.
Thales HSMs provides key management security for certificates and certificate-based authentication (including import of trusted CA certificates from software based keystore to hardware based keystores), self-signed certificate generation, and personal certificate requests via the IBM Key Management Utility. In addition, Thales HSMs offloads cryptographic operations such as signing for associated private keys, and accelerates SSL operations to free valuable compute resources on the server.
Thales Authentication Client (SAC) is a public key infrastructure (PKI) middleware that provides a secure method for exchanging information based on public key cryptography, enabling trusted third-party verification of user identities. Thales certificate-based tokens provide secure remote access, as well as other advanced functions, in a single token, including digital signing, password management, network logon, and combined physical/logical access.
IBM Websphere MQ is a messaging middleware that simplifies the integration of diverse applications and business data across disparate platforms. IBM MQ sends and receives message data through messaging queues to facilitate secure, reliable and assured information exchange between applications, systems, services and file. These queues simplify: business application creation and maintenance, deployment of enterprise-wide messaging, and connectivity for the internet of things and mobile devices.
IBM Websphere MQ integrates with Thales Luna HSM to securely store keys used in SSL transactions.
IBM Websphere MQ and Thales Luna HSM Integration Guide
Thales ProtectV virtual disk encryption offers security for virtual machines, storage volumes, and encryption keys residing in the IBM SoftLayer cloud. By encrypting the entire virtual machine instance and attached storage volumes, Thales ProtectV completely isolates data to allow for well-tailored separation of duties amongst IT administrators. Thales ProtectV’s StartGuard pre-boot authentication prevents any secured virtual machine instance from launching without proper authorization. Thales ProtectV encryption, and the data control it offers, allows organizations to migrate their sensitive workloads to the IBM SoftLayer cloud—no matter what level of security is needed. Thales ProtectV is available for sale on the IBM Cloud Marketplace.
Thales Virtual KeySecure centralizes key management for Thales ProtectV-secured virtual instances, as well as other applications and devices in a hardened software appliance that runs in the IBM SoftLayer cloud. Thales Virtual KeySecure and the encryption it manages enables organizations to prove ownership of their sensitive data in IBM SoftLayer Cloud environments, increasing security and compliance. Thales Virtual KeySecure allows organizations to quickly deploy centralized key management in high-availability, clustered configurations. Additionally, Thales Virtual KeySecure ensures that organizations maintain ownership of their encryption keys at all times by hardening the appliance OS and encrypting the entire virtual appliance.
IBM DB2 is the database of choice for enterprise-wide solutions Optimized to deliver industry-leading performance while lowering costs, IBM DB2 offers extreme performance, flexibility, scalability and reliability for any size organization.
IBM and Thales, via IBM Security Access Manager and Thales Luna HSM, deliver integrated capabilities that enable customers to optimize the security and performance of online communications and transactions. Together, enterprises can harness secure key and certificate storage and robust SSL acceleration to protect their online presence and business applications, along with transactions.
IBM Security Access Manager includes a high-performance web server that allows customers to apply fine-grained security policies to their web-based Security Access Manager environments. ISAM provides single sign-on capabilities and enables customers to apply policies to back-end web application server resources. Using IBM Global Security Kit (GSKit) libraries, ISAM WebSEAL uses encryption to secure network communications. To maintain the integrity of SSL operations, ISAM stores encryption keys at the root of the SSL handshake in Thales Luna HSMs.
Thales Luna HSM and IBM Security Access Manager Integration Guide
DB2 for IBM i is an advanced relational database management system (RDBMS) that is pre-installed on the IBM i operating system. It supports applications and development environments running on the IBM i platform and uses several IBM Power System features, such as Dynamic Logical Partitioning, cost-based query optimizer, Capacity Upgrade on Demand, and PowerVM virtualization. The new FIELDPROC exit point in DB2 for IBM i allows users to secure sensitive application data with transparent encryption using third-party encryption APIs.
Thales ProtectApp is an application encryption solution that integrates with DB2 for IBM i to encrypt data at the field and column level without requiring changes to the database or the format of the fields it secures. With Thales KeySecure, Thales ProtectApp also centralizes application encryption policy and key management to increase the level of control that administrators have over their data. Thales ProtectApp uses a comprehensive set of encryption and decryption APIs to secure data from applications written in COBOL, RPG, and Java, among other languages. Because encryption and decryption is transparent, end-users will not see any change to their experience and the data is secured in the database. In addition to the encryption solution for DB2 for IBM i, Thales ProtectApp offers APIs for digital signing and verification, secure hash algorithms (SHA), and hash-based message authentication code (HMAC), making it a versatile and important component of any organization’s security infrastructure.
Encrypting Sensitive Data in DB2 for IBM i (AS400) solution brief
IBM DataPower Gateway is a security and integration platform for mobile, cloud, application programming interface (API), web, service-oriented architecture (SOA), B2B and cloud workloads. It enables you to rapidly expand the scope of valuable IT assets to new channels—giving customers, employees and partners access to critical resources. It helps you quickly secure, integrate, control and optimize access to a range of workloads through a single, extensible gateway platform available in both physical and virtual form factors.
Thales Luna Enterprise HSM provides key management security for certificates and certificate-based authentication (including import of trusted CA certificates from software based keystore to hardware based keystores), self-signed certificate generation, and personal certificate requests via the IBM Key Management Utility. In addition, Luna Enterprise HSM offloads cryptographic operations such as signing for associated private keys, and accelerates SSL operations to free valuable compute resources on the server.
DataPower Gateway Virtual Appliance and Thales Luna Network HSM Integration Guide
ISAM eSSO and Thales authentication solutions provides strong authentication for eSSO users for both personal and shared workstation configurations. Thales eTokens are USB-based authenticators that provide strong user authentication and cost-effective password management
Thales Authentication Service and its Thales certificate based authentication solutions integrate with ISAM to safeguard online applications with an extra layer of identity protection that protects against advanced web threats and reduces the risk of unauthorized access from identity theft. SAS and Thales certificate based authentication solutions are certified with ISAM under the Ready for IBM Security Intelligence program.
ISAM for Web/Thales Authentication Solution Brief
IBM Security Access Manager and Thales Authentication Client Integration Guide
EAI Agent for IBM Security Access Manager for Web 7.0 Integration Guide
Thales Authentication Client using CBA for IBM Security Access Manager 9.0
Thales provides advanced encryption services based on high-speed, 256-bit AES encryption for IBM NAS-based storage solutions, featuring redundant components and clustered failover for high reliability. Strengthen existing LDAP, MS AD & NIS controls by adding an additional layer of access controls, secure data for compliance mandates, and protect offline data in archives from unauthorized access or theft.
CipherTrust Manager and IBM N Series - Solution Brief |
Securing IBM's XIV and A9000/A9000R Storage: Enterprise Key Management with Thales KeySecure
IBM MFA for z/OS provides a way to raise the assurance level of user authentication to z/OS applications and hosting environments by allowing the use of multiple authentication factors.
Building on Thales’s award winning authentication service, ThalesTrusted Access combines authentication and access management in a fully integrated cloud service. Our service lets you transform your business and operate securely in the cloud by preventing data breaches, simplifying access for users, and enabling compliance.
Our customers include over 25,000 organizations and 30 million users worldwide across all industries. Partnering with Thales for the long term, they trust our innovative access management and authentication services to help them securely adopt new ways of doing business on mobile, and in the cloud.
Resources and Additional Information
Thales Authentication Service (SAS) is now Thales Trusted Access (STA).
For STA SAML integrations, please refer to STA Application Catalog. For STA RADIUS integrations, please refer to STA RADIUS Integration guides page on Thales Customer Portal.
IBM Notes and IBM Domino are the client and server, respectively, of a collaborative client-server software platform marketed by IBM. The IBM Notes software client simplifies today’s complex world by integrating messaging, business applications, and social collaboration into one easy-to-use workspace.
Building on Thales’s award winning authentication service, Thales Trusted Access combines authentication and access management in a fully integrated cloud service. Our service lets you transform your business and operate securely in the cloud by preventing data breaches, simplifying access for users, and enabling compliance.
Our customers include over 25,000 organizations and 30 million users worldwide across all industries. Partnering with Thales for the long term, they trust our innovative access management and authentication services to help them securely adopt new ways of doing business on mobile, and in the cloud.
Thales Authentication Client (SAC) is a PKI middleware application that provides a secure method for exchanging information based on public-key cryptography, enabling trusted third-party verification of user identities.
Resources and Additional Information
Thales Authentication Service (SAS) is now ThalesTrusted Access (STA).
For STA SAML integrations, please refer to STA Application Catalog. For STA RADIUS integrations, please refer to STA RADIUS Integration guides page on Thales Customer Portal.
IBM® Security Access Manager (ISAM) helps you simplify your users' access while more securely adopting web, mobile and cloud technologies. This solution helps you strike a balance between usability and security through the use of risk-based access, single sign-on, integrated access management control, identity federation and its mobile multi-factor authentication capability, IBM Verify.
Building on Thales’s award winning authentication service, Thales Trusted Access combines authentication and access management in a fully integrated cloud service. Our service lets you transform your business and operate securely in the cloud by preventing data breaches, simplifying access for users, and enabling compliance.
Our customers include over 25,000 organizations and 30 million users worldwide across all industries. Partnering with Thales for the long term, they trust our innovative access management and authentication services to help them securely adopt new ways of doing business on mobile, and in the cloud.
Thales Authentication Service (SAS) is now Thales Trusted Access (STA).
For STA SAML integrations, please refer to STA Application Catalog. For STA RADIUS integrations, please refer to STA RADIUS Integration guides page on Thales Customer Portal.
Deploying and Configuring the IBM HSM with Citrix NetscalerVPX
Configuring and Tuning SSL Offload with Citrix Netscaler VPX
IBM’s security portfolio provides the security intelligence needed to help organizations holistically protect their people, infrastructure, data and applications. IBM offers solutions for identity and access management, data security, application development, risk management, endpoint management, network security, and more. IBM Security's Guardium Data Encryption protects critical data with file- and volume-level protection. IBM Security's Guardium Data Encryption complements Guardium Data Activity Monitoring capabilities with file-level encryption and key management for critical data containers, policy-based access controls that decrypt information only for authorized processes and users, and file-level data access logging and alerting. Read more about our IBM eSecurity Partner's comprehensive solution using IBM InfoSphere Guardium Data Activity Monitoring and InfoSphere Guardium Data Encryption to provide layered protection for sensitive data assets by downloading the solution brief below.