Skip to Content
Securing Your Critical Workloads with IBM Hyper Protect Services
book

Securing Your Critical Workloads with IBM Hyper Protect Services

by Barry Silliman, Diana Henderson, Elton de Souza, Jin VanStee, Jordan Cartwright, Madhuri Gangireddy, Matt Mondics, Matthew Arnold, Ravi Kumar Gullapalli, Sandeep Ambekar, Sandeep Sarkar, Sarath Chandra Mekala, Vasfi Gucer, Qi Ye
March 2021
Intermediate to advanced
234 pages
6h 24m
English
IBM Redbooks

Overview

Many organizations must protect their mission-critical applications in production, but security threats can also surface during the development and pre-production phases. Also, during deployment and production, insiders who manage the infrastructure that hosts critical applications can pose a threat given their super-user credentials and level of access to secrets or encryption keys.
Organizations must incorporate secure design practices in their development operations and embrace DevSecOps to protect their applications from the vulnerabilities and threat vectors that can compromise their data and potentially threaten their business.

IBM® Cloud Hyper Protect Services provide built-in data-at-rest and data-in-flight protection to help developers easily build secure cloud applications by using a portfolio of cloud services that are powered by IBM LinuxONE.

The LinuxONE platform ensures that client data is always encrypted, whether at rest or in transit. This feature gives customers complete authority over sensitive data and associated workloads (which restricts access, even for cloud admins) and helps them meet regulatory compliance requirements. LinuxONE also allows customers to build mission-critical applications that require quick time to market and dependable rapid expansion.

The purpose of this IBM Redbooks® publication is to:


  • Introduce the IBM Hyper Protect Services that are running on IBM LinuxONE on the IBM Cloud™ and on-premises
  • Provide high-level design architectures
  • Describe deployment best practices
  • Provide guides to getting started and examples of the use of the Hyper Protect Services

The target audience for this book is IBM Hyper Protect Virtual Services technical specialists, IT architects, and system administrators.
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.

Read now

Unlock full access

More than 5,000 organizations count on O’Reilly

AirBnbBlueOriginElectronic ArtsHomeDepotNasdaqRakutenTata Consultancy Services

QuotationMarkO’Reilly covers everything we've got, with content to help us build a world-class technology community, upgrade the capabilities and competencies of our teams, and improve overall team performance as well as their engagement.
Julian F.
Head of Cybersecurity
QuotationMarkI wanted to learn C and C++, but it didn't click for me until I picked up an O'Reilly book. When I went on the O’Reilly platform, I was astonished to find all the books there, plus live events and sandboxes so you could play around with the technology.
Addison B.
Field Engineer
QuotationMarkI’ve been on the O’Reilly platform for more than eight years. I use a couple of learning platforms, but I'm on O'Reilly more than anybody else. When you're there, you start learning. I'm never disappointed.
Amir M.
Data Platform Tech Lead
QuotationMarkI'm always learning. So when I got on to O'Reilly, I was like a kid in a candy store. There are playlists. There are answers. There's on-demand training. It's worth its weight in gold, in terms of what it allows me to do.
Mark W.
Embedded Software Engineer

You might also like

Enhanced Cyber Resilience Threat Detection with IBM FlashSystem Safeguarded Copy and IBM QRadar

Enhanced Cyber Resilience Threat Detection with IBM FlashSystem Safeguarded Copy and IBM QRadar

IBM Storage
Getting Started with IBM Hyper Protect Data Controller

Getting Started with IBM Hyper Protect Data Controller

Bill White, Andy Coulson, Guillaume Hoareau, Jason Katonica, Roy Panting, Philippe Richard, Maxwell Weiss, Eva Yan
IBM z16 Technical Introduction

IBM z16 Technical Introduction

Bill White, Octavian Lascu, Ewerson Palacio, Makus Ertl, Jannie Houlbjerg, Hervey Kamga, Gerard Laumay, Slav Martinksi, Kazuhiro Nakajima, Martijn Raave, Paul Schouten, Anna Shugol, Andre Spahni, John Troy, Roman Vogt, Bo Xu
IBM Cloud Private System Administrator's Guide

IBM Cloud Private System Administrator's Guide

Ahmed Azraq, Wlodek Dymaczewski, Fernando Ewald, Luca Floris, Rahul Gupta, Vasfi Gucer, Anil Patil, Sanjay Singh, Sundaragopal Venkatraman, Dominique Vernier, Zhi Min Wen

Publisher Resources

ISBN: 9780738458618Other