-
Products
JBoss Enterprise Middleware
Red Hat JBoss Fuse Developer Studio Portfolio Edition Web Framework Kit Application Platform Web Server Data Grid Portal Platform Red Hat JBoss A-MQ SOA Platform Business Rules Management System (BRMS) Data Services Platform Messaging JBoss Operations Network JBoss Community or JBoss enterprise -
Solutions
Migration Center
Migrate to Red Hat Enterprise Linux Migration Center Systems management Upgrading to Red Hat Enterprise Linux JBoss Enterprise Middleware IBM AIX to Red Hat Enterprise Linux HP-UX to Red Hat Enterprise Linux Solaris to Red Hat Enterprise Linux UNIX to Red Hat Enterprise Linux Start a conversation with Red Hat Migration services -
Training
Courses and training paths
Popular and new courses JBoss Middleware Administration curriculum Core System Administration curriculum JBoss Middleware Development curriculum Advanced System Administration curriculum Linux Development curriculum Cloud Computing and Virtualization curriculum Cloud Computing, Virtualization, and Storage curriculum
Security: Encryption
Render data unreadable without controlled access
When you can't restrict access to your files, you can still protect their confidentiality by encrypting them. You can use encryption to secure communications paths, such as secure web pages accessed with the https: protocol. VPNs also typically use encrypted communications.
In general, although encryption can prevent a message from being read, it doesn't, by itself, guarantee the authenticity of a message (for example, that it originated from the apparent author).
But by using tools like GNU Privacy Guard (GPG), a digital signature can be used when encrypting an email or file, which will definitively associate the encrypted document with the person who encrypted and signed it (using his or her private key) and the time that it was signed. The public key of the signer can be used to decrypt the information.
Security support and updates
- Get the latest security updates
- Does a specific CVE affect Red Hat?
- Ask a question about a security vulnerability
- Report a security vulnerability
- How we measure security vulnerabilities
- Security Response Team mission and standards of service
Learn more
-
Red Hat® Certificate System: A complete platform for deploying and maintaining a public key infrastructure (PKI) for managing encryption and strong authentication.











