IBM Hyper Protect for Red Hat ecosystem

Advancing confidential computing and the IBM Hyper Protect product family as a fully integrated part of the Red Hat ecosystem

Illustration of an encrypted contract

Confidential computing for Red Hat ecosystems

Meet IBM® Hyper Protect Container Runtime (HPCR) for Red Hat® Virtualization Solutions and Hyper Protect Confidential Containers (HPCC) for Red Hat® OpenShift®. These two powerful products secure sensitive data from development to deployment and throughout its usage in an application. Together, they form a hardware-based confidential computing foundation to protect your workloads across hybrid environments.

Enforced isolation for sensitive assets

Protect sensitive data, AI models and IP with infrastructure-enforced, policy-driven isolation across your hybrid environments.

Built-in AI and crypto acceleration

Run confidential workloads seamlessly with integrated AI and cryptographic acceleration in a unified stack.

Hardware-based trust and key control

Maintain full ownership and control of your encryption keys with unique hardware-based trust anchors.

Encrypted multiparty contract

Enable verifiable workload identity at deployment by using zero-knowledge proofs and encrypted, policy-bound contracts for different personas.

Features

Diagram showing data flow between a server, security gateway, cloud network, and user.
Shared capability across HPCR and HPCC Container runtime isolation

Powered by IBM Secure Execution for Linux® (SEL), Hyper Protect delivers container-level isolation on Linux on Z and LinuxONE. This secures workloads from the infrastructure up during development and deployment stages.

Diagram of multiparty contract enforcement
Shared capability across HPCR and HPCC Encrypted multiparty contract enforcement

Leverage encrypted contracts to manage workload identities and enforce zero-trust policies. This feature ensures predefined roles and least-privilege access are upheld, no matter who operates the workload environment.

Diagram of data-at-rest protection
HPCR for Red Hat Virtualization Solutions Embedded data-at-rest protection

With built-in cryptographic support through FIPS 140-2 Level 4 certified HSMs, both Hyper Protect solutions ensure that sensitive data is always encrypted—even in shared or public cloud environments.

Diagram of independent attestation at deployment
Shared capability across HPCR and HPCC Independent attestation at deployment

Hyper Protect offers secure workload verification at deployment time. Only signed, preapproved containers are allowed to run, with tamper-proof attestations and zero reliance on external trust systems.

Diagram showing data flow between a server, security gateway, cloud network, and user.
Shared capability across HPCR and HPCC Container runtime isolation

Powered by IBM Secure Execution for Linux® (SEL), Hyper Protect delivers container-level isolation on Linux on Z and LinuxONE. This secures workloads from the infrastructure up during development and deployment stages.

Diagram of multiparty contract enforcement
Shared capability across HPCR and HPCC Encrypted multiparty contract enforcement

Leverage encrypted contracts to manage workload identities and enforce zero-trust policies. This feature ensures predefined roles and least-privilege access are upheld, no matter who operates the workload environment.

Diagram of data-at-rest protection
HPCR for Red Hat Virtualization Solutions Embedded data-at-rest protection

With built-in cryptographic support through FIPS 140-2 Level 4 certified HSMs, both Hyper Protect solutions ensure that sensitive data is always encrypted—even in shared or public cloud environments.

Diagram of independent attestation at deployment
Shared capability across HPCR and HPCC Independent attestation at deployment

Hyper Protect offers secure workload verification at deployment time. Only signed, preapproved containers are allowed to run, with tamper-proof attestations and zero reliance on external trust systems.

Choose your product

Use cases Digital assets with cold storage security

Protect digital assets and signing secrets that use HPCR with Crypto Express. Trusted by blockchain providers like Metaco and Ripple, this combination ensures secure, offline signing and policy protection.

Discover a solution for digital assets
Identity-based secrets management

Eliminate risks tied to leaked credentials by securing application identities. Identity-based access control ensures that the secrets remain confidential, reducing human error and insider threat vectors.

Confidential cloud for service providers

Enable sovereign data protection in compliance with national and industry mandates. Service providers like Phoenix Systems use Hyper Protect to ensure that sensitive environments remain confidential.

Read the Phoenix Systems case study
Privacy-protected services

Use HPCC to leverage a confidential computing environment to secure and manage highly sensitive manufacturing data and design artifacts.

Read the SEAL Systems case study
Confidential AI in regulated industries

Ensure that AI models remain confidential during training and inference. Partners, like Jamworks, use Hyper Protect to integrate AI while protecting proprietary content.

Read the Jamworks case study
Hybrid confidential cloud deployment

Anchor trust across hybrid environments by protecting cryptographic keys and enforcing attestation policies—even when workloads span x86 and LinuxONE platforms.

Explore deployment considerations
Take the next step

Discover how to advance confidential computing and IBM’s Hyper Protect Services portfolio as a fully integrated part of the Red Hat Ecosystem.

More ways to explore HPCC documentation HPCR documentation Support Lifecycle services and support Blogs