IBM Cloud Hyper Protect Virtual Servers for VPC
IBM Cloud Hyper Protect Virtual Servers for VPC delivers secure, isolated virtual servers with strong data protection for cloud workloads.
Our Price: Request a Quote
Click here to jump to more pricing!
Please Note: All Prices are Inclusive of GST
Overview:
Auditable deployment of trustworthy container images in a tamper-proof environment
Hyper Protect Virtual Servers for Virtual Private Cloud (VPC) is a fully managed confidential compute container runtime that enables the deployment of sensitive containerized workloads in a highly isolated environment with technical assurance.
With cloud migration and virtualization, cloud native applications benefit from scalability, flexibility and resiliency. However, security still remains a top concern. Cyber attacks and data breaches are becoming increasingly more sophisticated, all while regulations and policies are constantly changing, enforcing data protection within the full lifecycle.
Isolate and make private sensitive code and confidential AI
Be ready to respond to new demands on data led by the growing adoption of AI. Ensure that any data, AI models and insights are protected with confidential computing and technical assurance, from creation to customization, even when the operation is outside your direct control.
Protect sensitive data in highly regulated industries
Ensure data and access protection through encrypted contracts and attestation. Secure sensitive data and digital assets to help companies in highly regulated industries achieve compliance and end-users trust.
Operate with the scale and speed of containerization on the cloud
Operate containerized applications with the certainty that the application is always secured, with workload integrity and data confidentiality. With the Hyper Protect layer you will be secured against attacks on all levels of the stack.
Features:
Multi-party contract and attestation of deployment
Through encrypted contract, different personas can provide their contribution while ensuring no access to the data, integrity of workloads and environments. The deployment can be human audited through a signed and encrypted attestation record to certify integrity
Confidential computing technologies for strong separation of processes and data access
The Hyper Protect platform provides a secure application workload runtime with technical isolation. It leverages IBM® Secure Execution for Linux to provide scalable isolation for individual workloads and protect from external attacks and insider threats.
Technical assurance
Workloads are locked down by individual, instance level secure boundaries. Technical assurance that unauthorized users - including IBM Cloud admin - will not be able to access the environment and the data.
Bring your own key for data encryption
By integrating with IBM Hyper Protect Crypto Services’ key management service (KMS), encryption protection and data control are enhanced with the option to bring your own key.
Malware protection
Hyper Protect Secure Build is designed to allow developers to securely build and sign containerized workload images in a trusted environment and deploy into an HPVS secure enclave, preventing malicious code from entering production environments.
Flexible deployment
Choose from a variety of profile sizes and scale as needed to protect containerized applications and pay- as-you-go on an hourly basis.
Compliance and audit support
Enhance data security posture to comply to regulations such as GDPR, DORA and HIPPA; IRAP, SOC2 Type 1 and ISO certifications.
Base container images for confidential computing
Access the SLE BCI registry (SUSE Linux Enterprise Base Container Images) which provides a large set of security-hardened and certified base container images.
Deploy multiple Open Container Initiatives (OCI) containers in one enclave
Deploy multiple microservices within a single secure enclave.
Deploy in IBM Cloud Data Centers worldwide
Leverage the IBM Cloud Data Centers in London, Sao Paulo, Tokyo, Toronto and Washington, D.C.
Benefits:
Run containerized workloads with full control
Protection in all stages of the data lifecycle
Protect sensitive data when in-use; achieve data confidentiality and workload integrity by ensuring that no unauthorized access to your data is possible - not even by the IBM Cloud admin.
Bring your own OCI image
Use any open-container initiative (OCI) image and gain all the benefits of a confidential computing solution for an additional level of protection. One application, no code change.
Full control over your data and code
Apply Zero Trust principles from workload development to deployment through an encrypted contract concept. Rigorous authentication and authorization process for complete control of data and environment.
Specifications:
Pricing Notes:
- All Prices are Inclusive of GST
- Pricing and product availability subject to change without notice.
Our Price: Request a Quote
