The most demanding businesses depend on Red Hat® security technologies to protect their infrastructures while increasing efficiency.

Red Hat backs Common Criteria-certified technologies with constant vigilance for new security risks, which are resolved by timely technology updates and quickly installed by Red Hat management tools. World-class training and an exhaustive library of technical resources round out Red Hat's security portfolio.

Learn more

Identity management

Security starts with a definitive source of user identity and business role information.


When you can't restrict access to your files, you can still protect their confidentiality by encrypting them.


Confirm that users are who they claim to be.


Monitor system behavior to verify that your security system is working properly and to meet compliance regulations.

Access control

Control access to systems and data based on a user's authenticated identity and business roles.


Red Hat Consulting

Secure your systems with best practices and the help of an expert in Red Hat technologies.

Learn more

Red Hat security training

Get certified with Red Hat security technologies.

Learn more

Government certifications

Stringent security certifications meet your requirements.

Learn more

Security Response Team

The Red Hat Security Response Team is your contact point for identifying and resolving emerging threats.

Learn more

Red Hat Network

Install and manage up-to-the-minute security updates.

Learn more