Unlike proprietary vendors, Red Hat develops software in collaboration with customers from a range of industries—including government and financial services, where security demands are among the highest—ensuring that rigorous security protocols are built into our software.
This collaborative innovation helps our software meet some of the highest security certifications available under internationally recognized standards. That’s why 50% of the world's trading volume is powered by Red Hat® products and solutions,6 and all 50 U.S. state governments use Red Hat solutions.7
Red Hat Enterprise Linux® has been certified more than 16 times under Common Criteria. Specific security certifications earned by Red Hat Enterprise Linux include:
In contrast to solution providers where security response is just one of many functions assigned to developers who are also responsible for getting products out the door, Red Hat maintains a dedicated Product Security Team.
In addition to ensuring that high-quality fixes are issued in a timely manner for vulnerabilities in all Red Hat products, the Red Hat Product Security Team also responds to all customer security inquiries, working in partnership with them to keep their systems updated and secure.
Our reputation speaks volumes
6. Red Hat client data, 2013.
7. Red Hat client data, 2014.
8. “Linux Adoption Trends 2012: A Survey of Enterprise End Users,” Linux Foundation, January 2013.