IBM Introduces Intel’s Chip Level Security to SoftLayer Cloud Computing Severs

GREATRESPONDER.COM – This was announced by the SoftLayer Company on Monday, September 08, 2014 that it has implemented the most secure and robust security modules based on the Intel’s chips in its cloud computing services. The chip level security of Intel Corporation is based on the most cutting edge technology of the company called as Trusted Execution Technology (TXT). The TXT is the most powerful monitoring and security tool, which will be used in the cloud computing services for the SoftLayer enterprise customers. It was informed in the statement of the company that many companies that require very high level security will be able to get the level of security they are looking for such as, semi government, government and other organizations.

SoftLayer is the first company in the ‘Cloud Computing Service’ domain to incorporate Intel’s chip based security in its services.

softlayerGREATRESPONDER.COM – This was announced by the SoftLayer Company on Monday, September 08, 2014 that it has implemented the most secure and robust security modules based on the Intel’s chips in its cloud computing services. The chip level security of Intel Corporation is based on the most cutting edge technology of the company called as Trusted Execution Technology (TXT). The TXT is the most powerful monitoring and security tool, which will be used in the cloud computing services for the SoftLayer enterprise customers. It was informed in the statement of the company that many companies that require very high level security will be able to get the level of security they are looking for such as, semi government, government and other organizations.

In his official statement, the chief technology officer at SoftLayer Cloud Computing Company, Mr. Marc Jones said, “TXT can offer a “chain-of-trust” from the SoftLayer servers back to an organization’s internal auditing and compliance monitoring processes. TXT also provides a validation that the device hasn’t been tampered with, and that there isn’t any man-in-the-middle spoofing. We can offer a chain-of-trust from the customer’s on-premise environment to the SoftLayer environment.” While talking about the features and capabilities of the TXT technology, Jones added that, “TXT also offers the ability to identify the exact location of a server through geolocational tracking, so the customer can be assured that its cloud server is located where SoftLayer claims it to be. Many government agencies require that their external cloud operations take place within their own jurisdiction. With TXT, I can know where my servers are in the cloud.”

It was further elaborated in the company statement that, the TXT is proven technology in terms of monitoring and security that will be very beneficial for many kinds of organizations such governmental, financial, and healthcare organizations. The chip is incorporated in Xeon processor; it verifies each and every cloud computing service components such as, hypervisor, operating system, and firmware to make sure that they are authentic and secure to be allowed in the cloud computing platform of SoftLayer. This technology is available in different Soft Layer’s bare metal servers such as, Xeon E-5 4600, Xeon E-5 1200-V3, and Xeon E-5 2600-V2. The more processors would be added with other releases.

IBM Obtains a Cloud Computing Security Contract from a Large Chinese Financial Data Provider

IBM’s security contact from a Chinese financial company in the domain of cloud computing would open up new dimensions for the American technology firms in near future.

IBM’s security contact from a Chinese financial company in the domain of cloud computing would open up new dimensions for the American technology firms in near future.

ibm cloud computingGREATRESPONDER.COM – Normally, Chinese companies are very reluctant to embrace the foreign technologies and equipment in the domain of security, especially in the cloud computing field; but, this new contract achieved by the Big Blue Company would pave the way for other technology companies to strengthen their businesses in this fast expanding economy of the world.

It was announced by the IBM company this week end that, it has acquired a big contract from a security financial data provider company based in Shanghai China in the domain of risk analysis of the data available in the public domain. The statement further elaborated that a large Chinese company named as Shanghai Wind Information would allow its public domain financial information of the company to process for the risk the information faces, with the help of the IBM owned software in the cloud. The financial company would neither install any IBM servers at its premises nor will it disclose the portfolio of the holdings. This entire process of risk analysis would be completed under the cloud computing based software platform of IBM in its data centers.

While talking about the prospects of this futuristic contract, the Director of Risk Analytics at IBM Corporation, Mr. Andrew Aziz, in his official statement said, “This is an innovative deployment model in that IBM never receives client information. IBM will respect Chinese law, and the new business model will continue to comply with the local laws, including data privacy laws in China and in all countries in which it operates”. He further insisted that the company is very committed to the privacy, security, and local laws of the land.

It is very important to note that after Snowden Snoopgate, many countries especially those, which have long history of fluctuating relationship with the USA like China, became so cautious about using the hardware and technology made in USA to avoid any kind of security risk to their public data. The situation even worsened when the USA confirmed that it can spy through the hardware made in USA in any other country and company.

With this new security contract of IBM in cloud computing domain would help other businesses to keep their hopes alive in this big market.