As enterprises look to move to the cloud, especially those in highly regulated industries, there are concerns of security. 

Enterprises, especially those in heavily regulated industries, want to take advantage of the cloud but have a lot of concerns with security and data privacy. As they deal with highly confidential and sensitive customer data, they need to ensure its protection by minimizing the threat of attack vectors. It has become increasingly common to hear news of data breaches by way of vulnerabilities being exploited by both internal and external threats, such as cloud providers, system administrators, or even exposure of data by their own employees. Enterprises need a Virtual Server option that offers a high level of security and authority over workloads, without sacrificing on performance or scalability.

IBM offers a range of Virtual Server options based on various IaaS use-cases and OS platforms. Today, IBM Cloud is announcing the general availability of IBM Cloud Hyper Protect Virtual Servers out of the Dallas and Sydney Data Centers. 

What are IBM Cloud Hyper Protect Virtual Servers?

IBM Cloud Hyper Protect Virtual Servers address the listed security concerns of regulated enterprises. First, in order to provision one of these Linux Virtual Servers in the public cloud, it requires the user to provide a public SSH key—this means that only the user has access. Second, these Virtual Servers are built on IBM LinuxONE technology, which provides built-in workload isolation, tamper protection from privileged user access, and encryption of all data at-rest and in-flight. IBM Cloud Hyper Protect Virtual Servers provide data protection and security in the cloud without sacrificing vertical scalability or performance.

Try IBM Cloud Hyper Protect Virtual Server free today!

Designed for solutions architects and developers, and managed by IBM, this offer provides a secure Virtual Server that does the following:
Runs high-performance workloads and deploys sensitive data and business IP with complete authority. Utilizes pervasive encryption—100% encryption of data at-rest and data in-flight. Security is driven by the technology down to the hardware layer, not just by software rules and policies. Supports industry certifications and client regulatory compliance requirements (ISO 27K, HIPAA-ready).   Provides an intuitive UI dashboard to monitor the status of your Virtual Server instances. Supports the development of mission critical applications within a runtime environment built on the most secure Linux-based platform, IBM LinuxONE. Offers a simple, three-tiered monthly pricing model that includes the cost for vCPU, RAM, and storage.

Hyper Protect Virtual Servers operational model

Because the offering gives complete authority of the Virtual Server to the customer, the operational model for the IBM Cloud Hyper Protect Virtual Servers offers is as shown below: 

IBM responsibilities

  • Networking
  • Infrastructure upgrades
  • Disk encryption
  • Infrastructure
  • Infrastructure security and vulnerability management
  • Instance uptime

Customer responsibilities (inside the Virtual Server)

  • Vulnerability management and security scans 
  • Backup and restore of data inside Virtual Server
  • Maintain OS patches, version, and security updates
  • Use security groups and network ACLs to secure your Virtual Server instances 
  • Choose how workload connect to the public internet
  • Protect the private keys that authenticate access to the Virtual Server.

See more details on IBM and client responsibilities.

Beta and new clients receive a 30-day free trial

All our new and existing beta users will get a 30-day free trial period to evaluate their Hyper Protect Virtual Servers instance. Beta users with existing instances will automatically be updated to the GA service with support for 30 days from the GA date (today).

Check out the Getting Started video:

 

More from Announcements

Success and recognition of IBM offerings in G2 Summer Reports  

2 min read - IBM offerings were featured in over 1,365 unique G2 reports, earning over 230 Leader badges across various categories.   This recognition is important to showcase our leading products and also to provide the unbiased validation our buyers seek. According to the 2024 G2 Software Buyer Behavior Report, “When researching software, buyers are most likely to trust information from people with similar roles and challenges, and they value transparency above other factors.”  With over 90 million visitors each year and hosting more than 2.6…

Manage the routing of your observability log and event data 

4 min read - Comprehensive environments include many sources of observable data to be aggregated and then analyzed for infrastructure and app performance management. Connecting and aggregating the data sources to observability tools need to be flexible. Some use cases might require all data to be aggregated into one common location while others have narrowed scope. Optimizing where observability data is processed enables businesses to maximize insights while managing to cost, compliance and data residency objectives.  As announced on 29 March 2024, IBM Cloud® released its next-gen observability…

Unify and share data across Netezza and watsonx.data for new generative AI applications

3 min read - In today's data and AI-driven world, organizations are generating vast amounts of data from various sources. The ability to extract value from AI initiatives relies heavily on the availability and quality of an enterprise's underlying data. In order to unlock the full potential of data for AI, organizations must be able to effectively navigate their complex IT landscapes across the hybrid cloud.   At this year’s IBM Think conference in Boston, we announced the new capabilities of IBM watsonx.data, an open…

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters