October 13, 2020 By Seongwook Park
Alex McMullen
2 min read

You want complete authority over your workloads without sacrificing flexibility when deploying in the public cloud; Bring Your Own Image grants just that.

There are countless ways to use virtual servers. From governmental use cases to the IBM Hyper Protect Digital Assets Platform or any other enterprise workload, clients are finding that IBM Cloud Hyper Protect Virtual Servers provide the infrastructure they need to host highly regulated, mission critical applications.

As you deal with highly confidential and sensitive customer data, you need to ensure its protection by minimizing the threat of attack vectors. At the same time, you want to have the flexibility to deploy what you want and use configurations tailored specifically to your use case. You need an option to deploy a Hyper Protect Virtual Server to your own specifications.

What are IBM Cloud Hyper Protect Virtual Servers?

Designed to address the topmost security concerns, Hyper Protect Virtual Servers provide a confidential computing environment to protect data and applications. Hyper Protect Virtual Servers provide technical assurance that workloads are protected in the cloud, meaning there is technology that prevents access by unauthorized users. Not even IBM Cloud administrators have access, which has been a major selling point for many of our clients. There is more than just an operational assurance, or promise, that IBM will not access the virtual server. All of this comes without sacrificing on performance or scalability.

What is Bring Your Own Image?

Bring Your Own Image (BYOI) allows you to deploy an Open Container Initiative (OCI) Image from a container registry, such as IBM Cloud Container Registry or Docker Hub. You also have the option to build one from scratch. You no longer need to use provided images — you now have flexibility to build your own and incorporate your own software, putting more power in the hands of developers and reducing risk of internal and external threats.

A major advantage to using BYOI is the ability to run on the Operating System of your choice and use it with Hyper Protect Virtual Servers. You can choose from a variety of open Linux distributions and deploy to a Hyper Protect Virtual Server. This opens a world of possibility to have countless options beyond the base image. In addition, BYOI enables you to bundle your own software with the image and build from the ground up to your exact specifications.

There are thousands of compatible preconfigured images on Docker Hub alone, and now you have the option to use any of these with your Hyper Protect Virtual Server.

Easy to deploy

With four easy steps, you can deploy your custom image:

  • Step 1: Create a custom image using a base OCI Image.
  • Step 2: Push image to a container registry (such as IBM Cloud Container Registry or Docker Hub).
  • Step 3: Create a registration definition file and encrypt the file using the Virtual Server public key.
  • Step 4: Deploy the image to a Hyper Protect Virtual Server.

For more details, please visit the BYOI Documentation.

Get started today

All users can get started with a 30-day free trial period to evaluate a Hyper Protect Virtual Servers instance. Try it now!

IBM Cloud Hyper Protect Virtual Servers are available today in Dallas, Washington D.C., Frankfurt, and Sydney multizone regions (MZRs).

Additional resources

More from Cloud

IBM Cloud Virtual Servers and Intel launch new custom cloud sandbox

4 min read - A new sandbox that use IBM Cloud Virtual Servers for VPC invites customers into a nonproduction environment to test the performance of 2nd Gen and 4th Gen Intel® Xeon® processors across various applications. Addressing performance concerns in a test environment Performance testing is crucial to understanding the efficiency of complex applications inside your cloud hosting environment. Yes, even in managed enterprise environments like IBM Cloud®. Although we can deliver the latest hardware and software across global data centers designed for…

10 industries that use distributed computing

6 min read - Distributed computing is a process that uses numerous computing resources in different operating locations to mimic the processes of a single computer. Distributed computing assembles different computers, servers and computer networks to accomplish computing tasks of widely varying sizes and purposes. Distributed computing even works in the cloud. And while it’s true that distributed cloud computing and cloud computing are essentially the same in theory, in practice, they differ in their global reach, with distributed cloud computing able to extend…

How a US bank modernized its mainframe applications with IBM Consulting and Microsoft Azure

9 min read - As organizations strive to stay ahead of the curve in today's fast-paced digital landscape, mainframe application modernization has emerged as a critical component of any digital transformation strategy. In this blog, we'll discuss the example of a US bank which embarked on a journey to modernize its mainframe applications. This strategic project has helped it to transform into a more modern, flexible and agile business. In looking at the ways in which it approached the problem, you’ll gain insights into…

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters