IBM Hyper Protect Virtual Servers
Securely build, deploy and manage mission-critical applications for the hybrid multicloud on IBM Z and LinuxONE
Download the Redbook Read the Whitepaper
Long white corridor in an office building

IBM Hyper Protect is a feature of IBM Z and LinuxONE which provides hardware-level security for virtual servers. Hyper Protect is available in on-premises servers and in managed offerings on IBM CloudIBM Cloud Hyper Protect Crypto Services, IBM Cloud Hyper Protect Database as a Service and IBM Cloud Hyper Protect Virtual Servers. Many technologies aim to protect applications in production, but the build phase may expose applications to vulnerabilities. How can mission-critical applications remain protected throughout their lifecycle?

IBM Hyper Protect Virtual Servers protect Linux® workloads on IBM Z® and LinuxONE throughout the application lifecycle – from build through to deploy and manage. Now you can be confident that applications and data are always private and protected from internal and external threats.

Benefits Build with security

Equip your developers with the capability to securely build their applications in a trusted environment with integrity.

Deploy with trust

Enable SysAdmins to validate that applications originate from a trusted source via their own auditing processes.

Manage with simplicity

Give operations the ability to manage without accessing applications or their sensitive data.

Features Protect data and applications throughout the lifecycle Leverage common infrastructure

Support client-provided container registry in addition to others such as IBM Cloud® Container RegistryDocker Hub (link resides outside or Linux Distribution-provided Base Container registry.

Integrate data-at-rest-protection

Use Linux Unified Key Setup (LUKS) encryption passphrase only present within the Trusted Execution Environment and based on a key derivation during deployment, taken from seeds provided by the workload and environment persona.

Multiparty contract and attestation of deployment

Apply Zero Trust principles from workload development through deployment. Based on a newly introduced encrypted contract concept enabling each persona to contribute without risk of exposing this data or intellectual property to others.

Access a Crypto Express adapter in Enterprise PKCS#11 (EP11) mode

Benefit from Hardware Security Module (HSM) to protect keys as a common industry use case. To enable such solutions, directly attach a Crypto Express Network API for Secure Execution Enclaves provided as component of Hyper Protect Virtual Servers.

Protect workloads from internal threats

Adopt Secure Execution for Linux to  deploy isolated workloads protected by Confidential Computing at scale and enable client-defined middleware and hypervisor. With this, Hyper Protect Virtual Servers can be integrated into virtualized Linux environment without any isolated logical partition (LPAR).

Secure execution for Linux
Apply cloud native app development

Empower developers with familiar tools and an automated, continuous software delivery pipeline to develop in a private, public or hybrid cloud. Hyper Protect Services provide secure cloud services for on-prem and off-prem deployments.

Explore cloud native development on Z
Maintain image integrity

Enable developers to securely build source files, starting with the containerized application. Solution developers can keep image integrity, knowing it only contains what’s intended, and maintain confidence in the deployed application’s origin.

Build securely with trusted CI/CD

Encryp images and securely build with a trusted CI/CD flow to validate the origin, preventing backdoor introduction. Signed container images inherit security with no code changes, preventing access to data while it is being processed in the database.

Safeguard sensitive data on IBM DS8000

IBM Safeguarded Copy provides immutable copies of sensitive data recovery that are hidden and protected from being modified or deleted due to user errors, malicious destruction or ransomware attacks.

Visit IBM DS8000
Get it on IBM Z

Grant flexibility across the hybrid cloud ecosystem, with the IBM z15™ and IBM z16™ systems to deploy workloads both on and off-premises while maintaining security, availability and reliability.

Visit IBM z16™
Get it on IBM LinuxONE

By integrating the new IBM LinuxONE III™ and IBM LinuxONE 4 system in your hybrid cloud strategy, you add next-level security and stability to your cloud infrastructure, giving you both agile deployment and ultimate uptime.

Visit IBM LinuxONE 4
Case studies Enabling fast, secure access to digital assets
Read how Digital Asset Custody Services (DACS) gains a secure environment and customer choice to deploy in an on-prem private cloud or as a service.
Watch the video to learn how Phoenix Systems leverages IBM LinuxONE™ to offer rock-solid security for their customers’ big data, while enabling company growth.
This video demonstrates how to protect Personally Identifiable Information and Credit Card information entered into Web Forms using confidential computing on the Hyper Protect Virtual Server.
IBM Hyper Protect Digital Assets Platform
Discover full details of IBM Hyper Protect Virtual Servers and how they can protect your workloads.
Explore the underlying technology of IBM Hyper Protect Virtual Servers.
Secure hybrid cloud for Dummies
Deliver excellent experiences and innovative technologies with ironclad hybrid cloud.
IBM Hyper Protect Virtual Servers
Read about the value of Hyper Protect Virtual Servers and how it can help you protect your mission-critical workloads.
Securing Your Critical Workloads with IBM Hyper Protect Services
Read the Redbook on securing critical workloads with IBM Hyper Protect Services.
IBM Hyper Protect blogs
Check out a variety of helpful blogs from Hyper Protect subject matter experts.
Storage data backup and recovery solutions
Go beyond data backup and recovery to unify workload protection and cyber resilience.
Related products IBM z16™
Discover how the platform can help address the challenges related to privacy, security and resiliency in hybrid cloud environment.
IBM LinuxONE 4
Find out how you can move into the cloud with ultimate uptime, hyper security and agility.
IBM Cloud Hyper Protect Virtual Servers
Explore how you can control workloads with sensitive data or business IP in the IBM Cloud.
IBM Cloud Hyper Protect DBaaS
Learn how fully managed and highly secure databases provide a high level of data confidentiality for your sensitive data in the IBM Cloud.
IBM Cloud Hyper Protect Crypto Services
Get started with cloud data encryption that’s protected in a dedicated cloud hardware security module.
IBM Cloud Container Registry
Find out an easy way to detect vulnerabilities in images, through a private registry.
Next steps

Explore technical resources that help you get started with IBM Hyper Protect Virtual Servers.


Get Started
More ways to explore Documentation Support Support and services Tailored Fit Pricing IBM Global Financing IBM Cloud Hyper Protect Services Community Hybrid Cloud with IBM Z Community IBM LinuxONE Community