Making the infrastructure secure
The previous chapters described the deficiencies of traditional infrastructures in the context of increased cyberthreats that are posed by malicious actors, whether internal or external. The chapters included strategies to mitigate risks by using infrastructures built on the Hyper Protect Platform and described the relevant qualities of the components and services that comprise the solution.
There are several distinct steps that are involved in configuring Hyper Protect Virtual Server (HPVS) instances, which can ...

Get IBM Hyper Protect Platform: Applying Data Protection and Confidentiality in a Hybrid Cloud Environment now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.