October 13, 2020 By jason-mcalpin 2 min read

You want complete authority over your workloads without sacrificing flexibility when deploying in the public cloud; Bring Your Own Image grants just that.

There are countless ways to use virtual servers. From governmental use cases to the IBM Hyper Protect Digital Assets Platform or any other enterprise workload, clients are finding that IBM Cloud Hyper Protect Virtual Servers provide the infrastructure they need to host highly regulated, mission critical applications.

As you deal with highly confidential and sensitive customer data, you need to ensure its protection by minimizing the threat of attack vectors. At the same time, you want to have the flexibility to deploy what you want and use configurations tailored specifically to your use case. You need an option to deploy a Hyper Protect Virtual Server to your own specifications.

What are IBM Cloud Hyper Protect Virtual Servers?

Designed to address the topmost security concerns, Hyper Protect Virtual Servers provide a confidential computing environment to protect data and applications. Hyper Protect Virtual Servers provide technical assurance that workloads are protected in the cloud, meaning there is technology that prevents access by unauthorized users. Not even IBM Cloud administrators have access, which has been a major selling point for many of our clients. There is more than just an operational assurance, or promise, that IBM will not access the virtual server. All of this comes without sacrificing on performance or scalability.

What is Bring Your Own Image?

Bring Your Own Image (BYOI) allows you to deploy an Open Container Initiative (OCI) Image from a container registry, such as IBM Cloud Container Registry or Docker Hub. You also have the option to build one from scratch. You no longer need to use provided images — you now have flexibility to build your own and incorporate your own software, putting more power in the hands of developers and reducing risk of internal and external threats.

A major advantage to using BYOI is the ability to run on the Operating System of your choice and use it with Hyper Protect Virtual Servers. You can choose from a variety of open Linux distributions and deploy to a Hyper Protect Virtual Server. This opens a world of possibility to have countless options beyond the base image. In addition, BYOI enables you to bundle your own software with the image and build from the ground up to your exact specifications.

There are thousands of compatible preconfigured images on Docker Hub alone, and now you have the option to use any of these with your Hyper Protect Virtual Server.

Easy to deploy

With four easy steps, you can deploy your custom image:

  • Step 1: Create a custom image using a base OCI Image.
  • Step 2: Push image to a container registry (such as IBM Cloud Container Registry or Docker Hub).
  • Step 3: Create a registration definition file and encrypt the file using the Virtual Server public key.
  • Step 4: Deploy the image to a Hyper Protect Virtual Server.

For more details, please visit the BYOI Documentation.

Get started today

All users can get started with a 30-day free trial period to evaluate a Hyper Protect Virtual Servers instance. Try it now!

IBM Cloud Hyper Protect Virtual Servers are available today in Dallas, Washington D.C., Frankfurt, and Sydney multizone regions (MZRs).

Additional resources

More from Announcements

IBM Hybrid Cloud Mesh and Red Hat Service Interconnect: A new era of app-centric connectivity 

2 min read - To meet customer demands, applications are expected to be performing at their best at all times. Simultaneously, applications need to be flexible and cost effective, and therefore supported by an underlying infrastructure that is equally reliant, performant and secure as the applications themselves.   Easier said than done. According to EMA's 2024 Network Management Megatrends report only 42% of responding IT professionals would rate their network operations as successful.   In this era of hyper-distributed infrastructure where our users, apps, and data…

IBM named a Leader in Gartner Magic Quadrant for SIEM, for the 14th consecutive time

3 min read - Security operations is getting more complex and inefficient with too many tools, too much data and simply too much to do. According to a study done by IBM, SOC team members are only able to handle half of the alerts that they should be reviewing in a typical workday. This potentially leads to missing the important alerts that are critical to an organization's security. Thus, choosing the right SIEM solution can be transformative for security teams, helping them manage alerts…

IBM and MuleSoft expand global relationship to accelerate modernization on IBM Power 

2 min read - As companies undergo digital transformation, they rely on APIs as the backbone for providing new services and customer experiences. While APIs can simplify application development and deliver integrated solutions, IT shops must have a robust solution to effectively manage and govern them to ensure that response times and costs are kept low for all applications. Many customers use Salesforce’s MuleSoft, named a leader by Gartner® in full lifecycle API management for seven consecutive times, to manage and secure APIs across…

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters