Protect your business with integrated security for the operating system and cloud infrastructure
81% of organizations cite security as a top cloud challenge.1 Red Hat and Microsoft use their extensive experience to build advanced security features into Red Hat Enterprise Linux and Azure. This helps you reduce risk, maintain a secure-focused operating environment, and better protect your organization’s most important data.
Red Hat Enterprise Linux provides layered security technologies, certifications, and the ongoing support of the Red Hat Product Security team to combat intrusions, safeguard your data, and comply with regulations. Integrated security features — including centralized identity and credential management and Security-Enhanced Linux (SELinux) mandatory access controls — give you strict control over data and centralize authentication management. Included with Red Hat Enterprise Linux, OpenSCAP is a National Institute of Standards and Technology (NIST)-certified set of specifications for maintaining enterprise system security. OpenSCAP verifies the presence of patches, checks system security configuration settings, and examines systems for signs of compromise based on standards and specifications.
Using industry-standard encryption protocols, Azure secures your data as it travels to, from, and within Microsoft datacenters, as well as at rest in Azure Storage. Within Azure, you can turn on security management and threat protection for Red Hat Enterprise Linux as a default. These settings deliver built-in behavioral analytics and use machine learning to identify attacks and zero-day exploits. Additionally, Azure monitors Red Hat virtual machine-related networks and cloud services for known attack patterns and post-breach activity.
Red Hat and Microsoft security response teams work together and in collaboration with customers, partners, and the global open source community to identify and resolve vulnerabilities. Microsoft’s threat-management approach uses technologies and processes — including intrusion and anomaly detection, distributed denial-of-service (DDoS) attack prevention, and behavioral analytics — to continually reduce security risks.