Overview

Build cloud-native apps

IBM Cloud Object Storage elastic scale infrastructure is ideal for storing large amounts of unstructured data. It offers a distributed, API-accessible storage with simple integration in the IBM Cloud® to make it easy for developers to quickly integrate cloud-native application to flow and efficiently update application components.

Scalable cloud storage

Performance, portability and speed

Bare metal

Maximum performance and control

Virtual server

Leverage existing languages and tools

Containers

Maximum portability

Platform as a service

Extensive runtime options

Severless

Maximum speed with serverless apps

Common use cases

Build cloud applications

Build cloud applications

Build integrated applications using compute runtimes microservices and use IBM Cloud Object Storage services for data storage.

Modernize applications

Modernize applications

Transform legacy applications to run in the cloud. Fear of data loss can be virtually eliminated due to resiliency and encryption options that help ensure data protection.

Build smart applications

Build smart applications

Use IBM Cloud Object Storage for cloud data storage for data-centric mobile applications and to collect and store large amounts of unstructured IoT data for your smart device applications.

Features

Key capabilities that enable this use case

Limitless scale

Store your content data including media files, images, videos, documents and data sets in native format and without limits.

Storage-bucket connections

Provision an IBM Cloud Object Storage account and bucket to create credentials and bind the Kubernetes service to the storage bucket.

Microservices on the IBM Cloud

Leverage microservices using cloud workload patterns such as Docker, Cloud Foundry and IBM Cloud Functions, based on Apache OpenWhisk®.

API-accessible storage

The IBM Cloud Object Storage API is a REST-based API that supports a common set of S3 API functions for programmatic access.

Security and encryption

IBM Cloud Object Storage is secured using IBM Identity and Access Management and offers integrated support for policies and permissions.

Resiliency options

Information is encrypted and dispersed across multiple locations. Applications can be deployed with data automatically following.