ProductsServer Desktop & Workstation Developer Subscriptions Satellite OpenStack Platform For IBM POWER For SAP Business Applications Management For Scientific ComputingExtended Update Support High Availability High Performance Network Load Balancer Resilient Storage Scalable File System Smart Management Extended Lifecycle SupportA-MQ Accelerate Automate Integrate Application Platform BPM Suite BRMS JBoss community or Red Hat JBoss Middleware Data Grid Data Virtualization Developer Studio Portfolio Edition Fuse Fuse Service Works Operations Network Portal Web Framework Kit Web Server
SolutionsWhy Red Hat Why open hybrid cloud? The new IT Public cloud Cloud resource library Private cloud Infrastructure-as-a-Service (IaaS) Platform-as-a-Service (PaaS) Cloud applications and workloadsSolaris to Red Hat Enterprise Linux Migration overview Migrate from your UNIX platform How to migrate to Red Hat Enterprise Linux Upgrade to the latest Red Hat Enterprise Linux release Red Hat JBoss Middleware Benefits of migrating to Red Hat Enterprise Linux Migration services Start a conversation with Red Hat
TrainingPopular and new courses Red Hat JBoss Administration curriculum Core System Administration curriculum Red Hat JBoss Middleware development curriculum Advanced System Administration curriculum Linux Development curriculum Cloud Computing, Virtualization, and Storage curriculum
ConsultingSOA and integration Business process management Custom Software Development Enterprise Data and Storage Systems management Migrations
Render data unreadable without controlled access
When you can't restrict access to your files, you can still protect their confidentiality by encrypting them. You can use encryption to secure communications paths, such as secure web pages accessed with the https: protocol. VPNs also typically use encrypted communications.
In general, although encryption can prevent a message from being read, it doesn't, by itself, guarantee the authenticity of a message (for example, that it originated from the apparent author).
But by using tools like GNU Privacy Guard (GPG), a digital signature can be used when encrypting an email or file, which will definitively associate the encrypted document with the person who encrypted and signed it (using his or her private key) and the time that it was signed. The public key of the signer can be used to decrypt the information.
Security support and updates
- Get the latest security updates
- Does a specific CVE affect Red Hat?
- Ask a question about a security vulnerability
- Report a security vulnerability
- How we measure security vulnerabilities
- Security Response Team mission and standards of service
Red Hat® Certificate System: A complete platform for deploying and maintaining a public key infrastructure (PKI) for managing encryption and strong authentication.