Because prevention is the best protection, Power10 processor-based servers provide
industry-leading isolation, and integrity that help prevent ransomware from being installed
The following features and implementation help IBM Power customers to protect their
Host and firmware secure and trusted boot.
Guest operating system secure boot (AIX now, Linux upcoming).
Built-in operating system runtime integrity: AIX Trusted Execution and Linux IMA.
Most secure multi-tenant environment with orders of magnitude lower Common
Vulnerabilities and Exposures (CVE) versus x86 hypervisors.