Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

As we navigate an era characterized by rapid innovation and transformation, businesses increasingly seek adaptability and portability while updating their application and IT frameworks. The IBM® Z® ecosystem provides an open, cloud-native platform that incorporates essential features such as AI capabilities, resilience, and robust security. This enables the consistent development of AI-driven applications that can be deployed across various environments. Count on IBM Z's purpose-built hardware and software solutions to safeguard your critical data and applications effectively. Additionally, explore customized pricing options that align with your unique business needs and the specifics of your IBM Z setup. This flexibility, combined with cutting-edge technology, empowers organizations to thrive in a dynamic digital landscape.

Description

Thales Data Protection on Demand (DPoD), a renowned cloud-based platform, offers an extensive array of cloud HSM and key management solutions through an intuitive online marketplace. You can easily deploy and oversee both key management and hardware security module services on-demand from the cloud. This streamlining of security processes makes it more affordable and manageable, as there is no need for physical hardware purchases, deployment, or maintenance. With just a few clicks in the Data Protection on Demand marketplace, you can activate the services you require, manage users, connect devices, and generate usage reports within minutes. Moreover, Data Protection on Demand is designed to be cloud agnostic; thus, whether utilizing Microsoft Azure, Google Cloud, IBM, Amazon Web Services, or a mix of cloud and on-premises resources, you maintain complete control over your encryption keys. By eliminating the need for hardware and software purchases, support, and updates, organizations can effectively avoid capital expenditures while ensuring robust data protection. This flexibility empowers businesses to adapt their security measures to their evolving needs without the burden of significant upfront investments.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Amazon Web Services (AWS)
IBM App Discovery Delivery Intelligence
IBM Cloud
IBM DevOps Accelerate
IBM OMEGAMON
IBM Security zSecure
IBM Unified Key Orchestrator
IBM Z Anomaly Analytics
IBM Z Service Management Suite
IBM Z System Automation
IBM watsonx Assistant
IBM z/OS
IBM z/OS Connect
IBM z/VM
OpenLegacy
Rocket Enterprise Suite
Rocket TMON One
Trusted Access Manager for Z
eXplain
ibi FOCUS

Integrations

Amazon Web Services (AWS)
IBM App Discovery Delivery Intelligence
IBM Cloud
IBM DevOps Accelerate
IBM OMEGAMON
IBM Security zSecure
IBM Unified Key Orchestrator
IBM Z Anomaly Analytics
IBM Z Service Management Suite
IBM Z System Automation
IBM watsonx Assistant
IBM z/OS
IBM z/OS Connect
IBM z/VM
OpenLegacy
Rocket Enterprise Suite
Rocket TMON One
Trusted Access Manager for Z
eXplain
ibi FOCUS

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

IBM

Founded

1911

Country

United States

Website

www.ibm.com/it-infrastructure/mainframe-software

Vendor Details

Company Name

Thales Cloud Security

Founded

2001

Country

United States

Website

cpl.thalesgroup.com/encryption/data-protection-on-demand

Product Features

Product Features

Data Security

Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance

Alternatives

IBM i Reviews

IBM i

IBM

Alternatives

qProtect Reviews

qProtect

QuintessenceLabs
Azure Arc Reviews

Azure Arc

Microsoft
Azure Key Vault Reviews

Azure Key Vault

Microsoft
Salesforce Shield Reviews

Salesforce Shield

Salesforce