Security and privacy
With LinuxONE, encrypt pervasively rather than selectively — it’s built into every processor chip. The IBM Crypto Express adapter enables industry-leading protection of encryption keys. On-chip acceleration of compression speeds processing and makes data storage more efficient.
Protect your assets from security breaches with the EAL5++ workload isolation provided by logical partitions (LPARs). IBM Secure Execution for Linux isolates workloads at the virtual machine level and protects you from insider and outsider threats.
Protect Linux® workloads throughout the lifecycle with IBM Hyper Protect Virtual Servers, a software solution built on the IBM Secure Service Container framework. Application developers can build in a trusted, encrypted environment. Operations personnel manages applications without access to sensitive data.
Protect eligible data even as it travels, with Hyper Protect Data Controller. Data owners identify sensitive fields to be packaged into trusted data objects (TDOs) that can move within the enterprise and into distributed and hybrid cloud environments. Access to TDOs is under the central control of a policy defined by security administrators.
Resiliency and availability
LinuxONE is designed to deliver 99.999% availability and beyond, with redundancy in internal components, including Redundant Array of Independent Memory (RAIM), which detects and recovers from memory failures.