Advancing confidential computing and the IBM Confidential Computing product family as a fully integrated part of the Red Hat ecosystem
Meet IBM Confidential Computing Container Runtime for Red Hat® Virtualization Solutions and IBM Confidential Computing Containers for Red Hat® OpenShift Container Platform® for Red Hat® OpenShift®. These two powerful products secure sensitive data from development to deployment and throughout its usage in an application. Together, they form a hardware-based confidential computing foundation to protect your workloads across hybrid environments.
IBM Hyper Protect Red Hat ecosystem is now IBM Confidential Computing for Red Hat ecosystem
IBM Hyper Protect Confidential Containers for Red Hat OpenShift Container Platform is now IBM Confidential Computing Containers for Red Hat OpenShift Container Platform
IBM Hyper Protect Container Runtime for Red Hat Virtualization Solutions is now IBM Confidential Computing Container Runtime for Red Hat Virtualization Solutions
Protect digital assets and signing secrets that use IBM Confidential Computing Container Runtime for Red Hat Virtualization Solutions with Crypto Express. Trusted by blockchain providers like Metaco and Ripple, this combination ensures secure, offline signing and policy protection.
Eliminate risks tied to leaked credentials by securing application identities. Identity-based access control ensures that the secrets remain confidential, reducing human error and insider threat vectors.
Use IBM Confidential Computing Containers for Red Hat OpenShift Container Platform to leverage a confidential computing environment to secure and manage highly sensitive manufacturing data and design artifacts.
Ensure that AI models remain confidential during training and inference. Partners, like Jamworks, use IBM Confidential Computing to integrate AI while protecting proprietary content.
Anchor trust across hybrid environments by protecting cryptographic keys and enforcing attestation policies—even when workloads span x86 and LinuxONE platforms.