Hyper Protect Virtual Servers for Virtual Private Cloud (VPC) is a fully managed confidential compute container runtime that enables the deployment of sensitive containerized workloads in a highly isolated environment with technical assurance.
With cloud migration and virtualization, cloud native applications benefit from scalability, flexibility and resiliency. However, security still remains a top concern. Cyber attacks and data breaches are becoming increasingly more sophisticated, all while regulations and policies are constantly changing, enforcing data protection within the full lifecycle.
IBM Cloud Hyper Protect Virtual Servers for VPC protects instances in all states within the data lifecycle: at-rest, in-transit, and now in use, with confidential computing. Unique to the market, it utilizes IBM Secure Execution for Linux to enhance data protection to achieve data privacy and protection over containerized workloads with sensitive data or business intellectual property (IP).
Protect sensitive data when in-use; achieve data confidentiality and workload integrity by ensuring that no unauthorized access to your data is possible - not even by the IBM Cloud admin.
Use any open-container initiative (OCI) image and gain all the benefits of a confidential computing solution for an additional level of protection. One application, no code change.
Apply Zero Trust principles from workload development to deployment through an encrypted contract concept. Rigorous authentication and authorization process for complete control of data and environment.
Through encrypted contract, different personas can provide their contribution while ensuring no access to the data, integrity of workloads and environments. The deployment can be human audited through a signed and encrypted attestation record to certify integrity
The Hyper Protect platform provides a secure application workload runtime with technical isolation. It leverages IBM® Secure Execution for Linux to provide scalable isolation for individual workloads and protect from external attacks and insider threats.
Workloads are locked down by individual, instance level secure boundaries. Technical assurance that unauthorized users - including IBM Cloud admin - will not be able to access the environment and the data.
By integrating with IBM Hyper Protect Crypto Services’ key management service (KMS), encryption protection and data control are enhanced with the option to bring your own key.
Hyper Protect Secure Build is designed to allow developers to securely build and sign containerized workload images in a trusted environment and deploy into an HPVS secure enclave, preventing malicious code from entering production environments.
Choose from a variety of profile sizes and scale as needed to protect containerized applications and pay- as-you-go on an hourly basis.
Enhance data security posture to comply to regulations such as GDPR, DORA and HIPPA; IRAP, SOC2 Type 1 and ISO certifications.
Access the SLE BCI registry (SUSE Linux Enterprise Base Container Images) which provides a large set of security-hardened and certified base container images.
Deploy multiple microservices within a single secure enclave.
Leverage the IBM Cloud Data Centers in London, Sao Paulo, Tokyo, Toronto and Washington, D.C.
Be ready to respond to new demands on data led by the growing adoption of AI. Ensure that any data, AI models and insights are protected with confidential computing and technical assurance, from creation to customization, even when the operation is outside your direct control.
Ensure data and access protection through encrypted contracts and attestation. Secure sensitive data and digital assets to help companies in highly regulated industries achieve compliance and end-users trust.
Operate containerized applications with the certainty that the application is always secured, with workload integrity and data confidentiality. With the Hyper Protect layer you will be secured against attacks on all levels of the stack.