October 13, 2020 By Seongwook Park
Alex McMullen
2 min read

You want complete authority over your workloads without sacrificing flexibility when deploying in the public cloud; Bring Your Own Image grants just that.

There are countless ways to use virtual servers. From governmental use cases to the IBM Hyper Protect Digital Assets Platform or any other enterprise workload, clients are finding that IBM Cloud Hyper Protect Virtual Servers provide the infrastructure they need to host highly regulated, mission critical applications.

As you deal with highly confidential and sensitive customer data, you need to ensure its protection by minimizing the threat of attack vectors. At the same time, you want to have the flexibility to deploy what you want and use configurations tailored specifically to your use case. You need an option to deploy a Hyper Protect Virtual Server to your own specifications.

What are IBM Cloud Hyper Protect Virtual Servers?

Designed to address the topmost security concerns, Hyper Protect Virtual Servers provide a confidential computing environment to protect data and applications. Hyper Protect Virtual Servers provide technical assurance that workloads are protected in the cloud, meaning there is technology that prevents access by unauthorized users. Not even IBM Cloud administrators have access, which has been a major selling point for many of our clients. There is more than just an operational assurance, or promise, that IBM will not access the virtual server. All of this comes without sacrificing on performance or scalability.

What is Bring Your Own Image?

Bring Your Own Image (BYOI) allows you to deploy an Open Container Initiative (OCI) Image from a container registry, such as IBM Cloud Container Registry or Docker Hub. You also have the option to build one from scratch. You no longer need to use provided images — you now have flexibility to build your own and incorporate your own software, putting more power in the hands of developers and reducing risk of internal and external threats.

A major advantage to using BYOI is the ability to run on the Operating System of your choice and use it with Hyper Protect Virtual Servers. You can choose from a variety of open Linux distributions and deploy to a Hyper Protect Virtual Server. This opens a world of possibility to have countless options beyond the base image. In addition, BYOI enables you to bundle your own software with the image and build from the ground up to your exact specifications.

There are thousands of compatible preconfigured images on Docker Hub alone, and now you have the option to use any of these with your Hyper Protect Virtual Server.

Easy to deploy

With four easy steps, you can deploy your custom image:

  • Step 1: Create a custom image using a base OCI Image.
  • Step 2: Push image to a container registry (such as IBM Cloud Container Registry or Docker Hub).
  • Step 3: Create a registration definition file and encrypt the file using the Virtual Server public key.
  • Step 4: Deploy the image to a Hyper Protect Virtual Server.

For more details, please visit the BYOI Documentation.

Get started today

All users can get started with a 30-day free trial period to evaluate a Hyper Protect Virtual Servers instance. Try it now!

IBM Cloud Hyper Protect Virtual Servers are available today in Dallas, Washington D.C., Frankfurt, and Sydney multizone regions (MZRs).

Additional resources

More from Cloud

A major upgrade to Db2® Warehouse on IBM Cloud®

2 min read - We’re thrilled to announce a major upgrade to Db2® Warehouse on IBM Cloud®, which introduces several new capabilities that make Db2 Warehouse even more performant, capable, and cost-effective. Here's what's new Up to 34 times cheaper storage costs The next generation of Db2 Warehouse introduces support for Db2 column-organized tables in Cloud Object Storage. Db2 Warehouse on IBM Cloud customers can now store massive datasets on a resilient, highly scalable storage tier, costing up to 34x less. Up to 4 times…

Manage the routing of your observability log and event data 

4 min read - Comprehensive environments include many sources of observable data to be aggregated and then analyzed for infrastructure and app performance management. Connecting and aggregating the data sources to observability tools need to be flexible. Some use cases might require all data to be aggregated into one common location while others have narrowed scope. Optimizing where observability data is processed enables businesses to maximize insights while managing to cost, compliance and data residency objectives.  As announced on 29 March 2024, IBM Cloud® released its next-gen observability…

The recipe for RAG: How cloud services enable generative AI outcomes across industries

4 min read - According to research from IBM®, about 42% of enterprises surveyed have AI in use in their businesses. Of all the use cases, many of us are now extremely familiar with natural language processing AI chatbots that can answer our questions and assist with tasks such as composing emails or essays. Yet even with widespread adoption of these chatbots, enterprises are still occasionally experiencing some challenges. For example, these chatbots can produce inconsistent results as they’re pulling from large data stores…

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters