Welcome to Red Hat

See what's happening near you

Learn what's happening for Red Hat customers around the world:

RESOURCES

Continuous monitoring for better security with Red Hat

Description

Protect against relentless and adaptive cyber threats with continuous monitoring from Red Hat. Automatically scan Red Hat® technology for security gaps, vulnerabilities, and unauthorized changes in security configurations—and then remediate problems to restore security controls to your established security configuration.

Details

Type:
Technology brief
Updated: