IBM Hyper Protect Virtual Servers

Securely build, deploy and manage mission-critical applications for the hybrid multicloud with confidential computing on IBM Z and LinuxONE

Read the solution brief

IBM Hyper Protect Virtual Servers for IBM Z® and LinuxONE is a software solution designed to protect mission-critical Linux® workloads with sensitive data from both internal and external threats. 

IBM Hyper Protect Virtual Servers take advantage of IBM Secure Execution for Linux. It provides a confidential computing environment to protect sensitive data running in virtual servers and container runtimes by performing computation in a hardware-based, trusted execution environment (TEE). It is available on-premise as well as a managed offering in IBM Cloud®: IBM Cloud Hyper Protect Virtual Servers.

Additional products in IBM's confidential computing portfolio include the following:

IBM Hyper Protect Offline Signing Orchestrator: designed to address limitations of current cold storage offerings for digital assets. Available on IBM Z or IBM LinuxONE. Hyper Protect Virtual Servers are a pre-requisite. 

IBM Cloud Hyper Protect Crypto Services: a single-tenant, hybrid cloud key management service. Unified Key Orchestration, a part of Hyper Protect Crypto Services, enables key orchestration across multicloud environments. 

What's new

Release notes for the latest features of IBM Hyper Protect Virtual Servers

Benefits Build with security

Equip your developers with the capability to securely build their applications in a trusted environment with integrity.

Deploy with trust

Enable SysAdmins to validate that applications originate from a trusted source via their own auditing processes.

Manage with simplicity

Give operations the ability to manage without accessing applications or their sensitive data.

Features
Protect your digital assets on a security-rich, tamper-proof Linux-based platform

Provides a secure hosting environment with end-to-end security for digital asset custodies, exchanges, issuance providers and permissioned blockchains that must protect private keys, applications and data.

Explore Digital Assets Infrastructure Read the solution brief

Leverage common infrastructure

Support client-provided container registry in addition to others such as IBM Cloud Container Registry, Docker Hub or Linux Distribution-provided Base Container registry.

Explore IBM Cloud Container Registry Explore Docker Hub

Integrate data-at-rest-protection

Use Linux Unified Key Setup encryption passphrase only present within the TEE and based on a key derivation during deployment, taken from seeds provided by the workload and environment persona.

Verifying disk encryption status

Experience multiparty contract and attestation of deployment

Apply Zero Trust principles from workload development through deployment. Based on a newly introduced encrypted contract concept enabling each persona to contribute without risk of exposing this data or intellectual property to others.

Explore attestation

Access a Crypto Express adapter in Enterprise PKCS#11 (EP11) mode

Benefit from Hardware Security Module to protect keys as a common industry use case. To enable such solutions, directly attach a Crypto Express Network API for Secure Execution Enclaves provided as component of Hyper Protect Virtual Servers.

Crypto Express Network API for Secure Execution Enclaves

Protect workloads from internal threats

Adopt Secure Execution for Linux to deploy isolated workloads protected by Confidential Computing at scale and enable client-defined middleware and hypervisor. With this, Hyper Protect Virtual Servers can be integrated into virtualized Linux environment without any isolated logical partition (LPAR).

Explore IBM Secure Execution for Linux Explore Confidential Computing with LinuxONE

Apply cloud native application development

Empower developers with familiar tools and an automated, continuous software delivery pipeline to develop in a private, public or hybrid cloud. Hyper Protect Services provide secure cloud services for on-prem and off-prem deployments.

Explore cloud native development on IBM Z

Maintain image integrity

Enable developers to securely build source files, starting with the containerized application. Solution developers can keep image integrity, knowing it only contains what’s intended, and maintain confidence in the deployed application’s origin.


Build securely with trusted CI/CD

Encrypt images and securely build with a trusted CI/CD flow to validate the origin, preventing backdoor introduction. Signed container images inherit security with no code changes, preventing access to data while it is being processed in the database.


Safeguard sensitive data on IBM DS8000 storage

IBM Safeguarded Copy provides immutable copies of sensitive data recovery that are hidden and protected from being modified or deleted due to user errors, malicious destruction or ransomware attacks.

Explore IBM DS8000
Systems integration Get it on IBM Z

Grant flexibility across the hybrid cloud ecosystem, with the IBM z15™ and IBM z16™ systems to deploy workloads both on and off-premises while maintaining security, availability and reliability.

Explore IBM z16
Get it on IBM LinuxONE

By integrating IBM LinuxONE III™ and IBM LinuxONE 4 system in your hybrid cloud strategy, you add next-level security and stability to your cloud infrastructure, giving you both agile deployment and ultimate uptime.

Explore IBM LinuxONE 4
Explore the underlying technology

Make certain that data is protected from both internal and external threats on premise and in the cloud. Explore IBM Secure Execution for Linux, which is the underlying technology of IBM Hyper Protect Virtual Servers. 

Read the solution brief
Technical details
Hardware requirements

You can install and configure IBM Hyper Protect Virtual Servers on the following IBM Z and LinuxONE systems:

  • IBM z16 (all models)
  • IBM z15 (all models)
  • IBM LinuxONE Emperor 4
  • IBM LinuxONE III
More hardware requirements
Software requirements
  • Secure execution enabled Kernel-based Virtual Machine (KVM) host
  • The IBM License Metric Tool
  • The Linux LPAR Hypervisor must be deployed and subscription fees to third party apply
More software requirements
Case studies Convenience of public cloud with unprecedented security

Discover how Phoenix Systems combines containerization with the power of LinuxONE to provide a fully automated cloud security solution to the end customers.

Innovative, highly secure and reliable cloud solution

Discover how SEAL Systems is protecting their business data while accelerating critical printing tasks.

Resources Secure hybrid cloud for Dummies

Get an understanding of the importance of security in the hybrid cloud environment and how the IBM Z platform and its services play an important role for enterprises.

Hyper Protect Virtual Server for VPC for financial transactions

This video demonstrates how to protect Personally Identifiable Information and credit card information entered into Web Forms using confidential computing on the Hyper Protect Virtual Server.

Securing your critical workloads with IBM Hyper Protect Services

This IBM Redbook will introduce Hyper Protect Services on IBM LinuxONE, IBM Cloud and on-premises and describe deployment best practices and guides to getting started.

Related products IBM z16

Discover how the platform can help address the challenges related to privacy, security and resiliency in hybrid cloud environment.

IBM LinuxONE 4

Find out how you can move into the cloud with ultimate uptime, hyper security and agility.

IBM Storage data backup and recovery solutions

Get cybersecurity capabilities to help protect your critical data against ransomware and other data security threats.

Next steps

Explore IBM Hyper Protect Virtual Servers. Schedule a no-cost 30-minute meeting with an IBM Z representative.

 

Request a trial
More ways to explore Documentation Support IBM Redbooks® Support and services Global financing Flexible pricing Community Developer community Partners Resources