Complete data privacy and protection over your containerized workloads that hold sensitive data
Hyper Protect Virtual Servers are fully developer-friendly and able to use industry-standard, Open Container Initiative (OCI) images with a standard user interface to provision, manage, maintain and monitor within the Virtual Private Cloud (VPC) infrastructure of IBM Cloud. By leveraging VPC, this next generation of Hyper Protect Virtual Servers is able to offer additional network security.
To take advantage of these VPC capabilities, you can leverage the IBM Cloud Data Centers in London; Sao Paulo; Tokyo; Toronto; and Washington, D.C. (Additional data centers coming soon.)
For clients in specific countries where VPC is not yet available (or where there are in-country, data-residency requirements in force), the following locations are available as classic IBM Cloud Data Centers: Dallas; Frankfurt; Sydney; and Washington, D.C.
Announcing IBM Hyper Protect Virtual Servers for Virtual Private Cloud
Protect your virtual servers with data encryption and runtime isolation powered by LinuxONE. IBM administrators cannot access your data.
Organizations adopt containers because they’re highly performant, scalable and efficient in DevOps. Plus, they improve developer productivity, offer application portability and enable OCI images.
Satisfy regulations with HIPAA readiness, IRAP, SOC2 Type 1 and ISO certifications.
The protection boundary moves from the logical partition level (including OS and apps) to isolate apps from the OS. Customer code and data are controlled only by administrators, without exception.
Enjoy exclusive access to code and data—no exceptions.
Configure instances for high resiliency, low latency.
Provision, manage, maintain and monitor with a standard UI.
Protect your workloads throughout the entire lifecycle.
Read the announcement about the new on-premises solution that lets you securely build, deploy and manage critical applications for hybrid cloud.
Protect data with a cloud hardware security module (HSM) and keep-your-own-key (KYOK) encryption.
Create an instance of the service and get started.