As enterprises look to move to the cloud, especially those in highly regulated industries, there are concerns of security. 

Enterprises, especially those in heavily regulated industries, want to take advantage of the cloud but have a lot of concerns with security and data privacy. As they deal with highly confidential and sensitive customer data, they need to ensure its protection by minimizing the threat of attack vectors. It has become increasingly common to hear news of data breaches by way of vulnerabilities being exploited by both internal and external threats, such as cloud providers, system administrators, or even exposure of data by their own employees. Enterprises need a Virtual Server option that offers a high level of security and authority over workloads, without sacrificing on performance or scalability.

IBM offers a range of Virtual Server options based on various IaaS use-cases and OS platforms. Today, IBM Cloud is announcing the general availability of IBM Cloud Hyper Protect Virtual Servers out of the Dallas and Sydney Data Centers. 

What are IBM Cloud Hyper Protect Virtual Servers?

IBM Cloud Hyper Protect Virtual Servers address the listed security concerns of regulated enterprises. First, in order to provision one of these Linux Virtual Servers in the public cloud, it requires the user to provide a public SSH key—this means that only the user has access. Second, these Virtual Servers are built on IBM LinuxONE technology, which provides built-in workload isolation, tamper protection from privileged user access, and encryption of all data at-rest and in-flight. IBM Cloud Hyper Protect Virtual Servers provide data protection and security in the cloud without sacrificing vertical scalability or performance.

Try IBM Cloud Hyper Protect Virtual Server free today!

Designed for solutions architects and developers, and managed by IBM, this offer provides a secure Virtual Server that does the following:
Runs high-performance workloads and deploys sensitive data and business IP with complete authority. Utilizes pervasive encryption—100% encryption of data at-rest and data in-flight. Security is driven by the technology down to the hardware layer, not just by software rules and policies. Supports industry certifications and client regulatory compliance requirements (ISO 27K, HIPAA-ready).   Provides an intuitive UI dashboard to monitor the status of your Virtual Server instances. Supports the development of mission critical applications within a runtime environment built on the most secure Linux-based platform, IBM LinuxONE. Offers a simple, three-tiered monthly pricing model that includes the cost for vCPU, RAM, and storage.

Hyper Protect Virtual Servers operational model

Because the offering gives complete authority of the Virtual Server to the customer, the operational model for the IBM Cloud Hyper Protect Virtual Servers offers is as shown below: 

IBM responsibilities

  • Networking
  • Infrastructure upgrades
  • Disk encryption
  • Infrastructure
  • Infrastructure security and vulnerability management
  • Instance uptime

Customer responsibilities (inside the Virtual Server)

  • Vulnerability management and security scans 
  • Backup and restore of data inside Virtual Server
  • Maintain OS patches, version, and security updates
  • Use security groups and network ACLs to secure your Virtual Server instances 
  • Choose how workload connect to the public internet
  • Protect the private keys that authenticate access to the Virtual Server.

See more details on IBM and client responsibilities.

Beta and new clients receive a 30-day free trial

All our new and existing beta users will get a 30-day free trial period to evaluate their Hyper Protect Virtual Servers instance. Beta users with existing instances will automatically be updated to the GA service with support for 30 days from the GA date (today).

Check out the Getting Started video:

 

More from Announcements

IBM and SAP unlock business and industry value with new generative AI solutions 

3 min read - IBM Consulting is delivering on our commitment to co-innovate with SAP and collaborate with our clients. As part of our Value Generation Partnership initiative announced earlier this month with SAP, we are releasing the first 10 of 100 planned AI solutions to help clients transform their industries, optimize their business processes and successfully deliver their SAP programs.  Delivering AI business and industry innovation at scale  With the recently announced Value Generation Partnership initiative, IBM and SAP are co-innovating intelligent industry…

IBM SevOne 7.0: Reaching application-centric multicloud network observability  

2 min read - As enterprises increasingly rely on network connectivity to support cloud-based applications and remote workers, network managers require new methods to monitor and safeguard connectivity across diverse environments, including corporate networks, software-defined WANs and multiple public cloud providers.   According to the recent EMA Network Megatrends Report, responding network professionals believe that 53% of network outages and performance issues could be prevented with improved network management tools, yet only 9% find it very easy to hire skilled networking personnel. This is why…

IBM Hybrid Cloud Mesh and Red Hat Service Interconnect: A new era of app-centric connectivity 

2 min read - To meet customer demands, applications are expected to be performing at their best at all times. Simultaneously, applications need to be flexible and cost effective, and therefore supported by an underlying infrastructure that is equally reliant, performant and secure as the applications themselves.   Easier said than done. According to EMA's 2024 Network Management Megatrends report only 42% of responding IT professionals would rate their network operations as successful.   In this era of hyper-distributed infrastructure where our users, apps, and data…

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters