Learn more about security features available with LinuxONE and Ubuntu External Link We’re excited to see how much more we can help change the world with IBM behind us.”Įxplore how LinuxONE and Ubuntu enable confidential computing External Link Already, the systems running on our platform touch thousands of people’s lives. Moreover, the size of our team has remained constant even though we’re supporting more clients. Taroni explains, “We went from reserving an entire floor of a data center to requiring just a few racks, and still gaining much greater capacity. The easy management and low power consumption of IBM LinuxONE technology is a key contributing factor to the company’s lean operations. Phoenix Systems can keep prices low, while keeping efficiency high. “We can provide an exceptionally high level of security at competitive fees for even extremely large data sets.” “Our new confidential computing capabilities, enabled by IBM and Ubuntu, help us ensure that data is protected from both external attack and bad actors within an organization,” says Taroni. Phoenix Systems helped the company develop an Internet of Things (IoT) solution capable of receiving thousands of data points each day. The organization offers specialized containers for pharmaceuticals. On IBM LinuxONE, it takes just 12 hours.”Ī cold-chain logistics company also opted to work with Phoenix Systems. “Two years ago, it took two and a half weeks to reindex their database. “Swissdox updates their archive with every newspaper in Switzerland on an ongoing basis,” comments Taroni. With help from Phoenix Systems, Swissdox developed a powerful context-based search engine, so that users can quickly find what they are looking for. Each year, the organization adds 1.7 million documents to the archive. ![]() Similarly, companies getting into the digital asset space can make use of a platform that’s ready-made for protecting their wallets.”įor example, Swissdox External Link hosts an online media database for 220,000 Swiss students and citizens on the Phoenix Systems platform. “Using IBM technology, we’re offering a real alternative that’s within the same price range as public cloud. “Until now, banks have stuck to dedicated hardware since that was the only way they could guarantee data security,” says Taroni. For organizations operating in regulated sectors, working with Phoenix Systems provides the flexibility and efficiency benefits of public cloud solutions, while also facilitating compliance with strict data governance and security directives. Today, Phoenix Systems is seeing companies from many industries take up its new high-security, high-convenience cloud services. Payments are transparent and making changes such as switching to a data center in an extra-security region can be completed with a few clicks of a mouse.” They can access everything through a web page. “It’s easy for clients to get started and keep going with Phoenix Systems. “Using IBM technology, we have created a platform that allows us to manage super-secure containers in the same way as other containers,” says Taroni. The company has fully automated the onboarding and customization processes. Clients have total control over their own environment - they get their own smart card and cryptographic keys.”įrom end to end, the new platform provides advanced security, from the cryptographic co-processors in the IBM LinuxONE server, to the Ubuntu Linux kernel and operating system, to the support for confidential computing with Secure Execution and Secure Boot.Įven though client environments are completely isolated on Phoenix Systems’ new platform, they are straightforward to manage. “Rather than assuring companies that their data is protected through policies, we can prove that it simply isn’t possible for us to access it. “Unparalleled security is built into every layer of our IBM and Ubuntu stack,” explains Taroni. ![]() Application and database data is encrypted end to end, both in use and at rest, so that clients benefit from a high level of security. By taking advantage of confidential computing technology from IBM, the company provides clients with a Trusted Execution Environment, which cannot be accessed by unauthorized users or even by Phoenix Systems administrators themselves.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |