Protect data and applications throughout the lifecycle
Protect workloads from internal threats
Hyper Protect Virtual Servers is the evolution of the IBM Secure Service Container for IBM Cloud Private. Like Secure Service Container technology, Hyper Protect Virtual Servers protect your workloads from both internal and external threats. On prem, the enhanced capabilities provide developers with security throughout the entire development lifecycle.
Apply cloud native app development
Empower developers with familiar tools and an automated, continuous software delivery pipeline to develop in a private, public or hybrid cloud. Hyper Protect Services provide secure cloud services for on-prem and off-prem deployments.
Fully integrate IBM Z and LinuxONE into a hybrid multicloud environment and manage everything from behind the firewall. Hyper Protect Virtual Servers reduce end user management of low-level execution environment and uses EAL5+ certified LPARs for peer isolation. And while cloud and infrastructure providers will not have access to your sensitive data, they can still manage images through APIs.
Across the hybrid cloud ecosystem, the new IBM z15™ system provides the flexibility to deploy workloads both on- and off-prem, giving cloud native applications the same trusted security, availability, and reliability expected from these enterprise platforms.
Extend encryption everywhere
Advanced data encryption, key management and tamper-resistance incorporates security and compliance as a part of DevSecOps, rather than adding in security measures after the fact. Application secrets are encrypted, ensuring that the confidentiality of the application is protected. Cloud providers and system administrators do not have access to data, protecting against insider threats and malicious attacks.
Maintain image integrity
With IBM Hyper Protect Virtual Servers, developers can securely build source files, starting with the containerized application. Solution developers can keep image integrity, knowing it only contains what’s intended, and maintain confidence in the deployed application’s origin.
Build securely with trusted CI/CD
Now, all images can be encrypted and securely built with a trusted CI/CD flow. Developers can build images and ensure that end users can validate their origin, removing the possibility of a backdoor introduction during the build process. Signed container images inherit security without any code changes, preventing access to data while it is being processed in the database.
By integrating the new IBM LinuxONE III™ system in your hybrid cloud strategy, you add next-level security and stability to your cloud infrastructure, giving you both agile deployment and ultimate uptime.
Digital Asset Custody Services (DACS)
Gains a secure deployment platform for on-prem private cloud or as a service.