IBM Cloud Docs
Hyper Protect Virtual Servers overview

Hyper Protect Virtual Servers overview

Hyper Protect Virtual Servers is deprecated. As of 18 August 2024, you can’t create new instances, and access to free instances will be removed. Existing premium plan instances are supported until 31 January 2025. Any instances that still exist on that date will be deleted.

Hyper Protect Virtual Servers is an IBM Cloud® service that provides highly secure virtual servers that can run Linux applications and containerized workloads. It offers a flexible and scalable framework that you can use to quickly and easily provision and manage the created virtual servers.

For more information about how to get started, take a look at the tutorial.

Why IBM Cloud Hyper Protect Virtual Servers?

Hyper Protect Virtual Servers offers the following benefits:

  • Security -

Using Hyper Protect Virtual Servers, you can deploy a virtual server in a Secure Service Container, which ensures confidentiality of your data and code that you run within the virtual server. No external access to your data is allowed, including privileged users such as cloud administrators.

  • IBM Z capabilities on the cloud -

Hyper Protect Virtual Servers brings IBM Z capabilities into the cloud, from where you can use them to deploy workload into the most secure, highly performant Linux virtual server.

  • No IBM Z hardware and skills required -

By deploying Hyper Protect Virtual Servers, you can access IBM Z technology without having to purchase, install, and maintain the required hardware.

  • Easy to use, open, and flexible -

Embracing the openness and flexibility of a public cloud, Hyper Protect Virtual Servers offers user experience at parity with market leaders who apply IBM Z capabilities in an enterprise environment.

Key features

Hyper Protect Virtual Servers makes it possible to bring IBM Z into IBM’s global public cloud data centers. Through the IBM Cloud catalog, you can gain access to industry-leading security capabilities to modernize your applications in the IBM Cloud.

  • You can run both core and non-core workloads in a public cloud, observing all security and compliance policies of your enterprise.
  • You can protect the assets of business while you simultaneously maintain enhanced business service levels.
  • You can instantiate Linux virtual servers with your own public SSH key. Thus, only you can access your code and data. Not even an IBM Cloud administrator has access to your data.
  • You can deploy any supported workload into the most secure, highly performant Linux system, taking advantage of strengths of the LinuxONE system.