Account Log in

Trust Red Hat

Open and transparent

At Red Hat, trust is essential to doing business. That’s why we work every day to secure customer data.

Jump to section

Customer data security and privacy—the Red Hat way

Red Hat is committed to securing and protecting customer data. The data security landscape is made up of the following:

People

Employees, vendors, partners, and customers need to understand their role in cybersecurity.

Guidelines

These are designed to secure your organization and investments across people and processes.

Process

Embedding processes into Red Hat’s business helps identify vulnerabilities and fix issues quickly.

Our commitment

Red Hat employs a diverse, collaborative, cross-functional team of experts that focuses on security and privacy. The team includes public policy, legal, information security, product security, customer data security, and regulatory compliance experts.

The team is accountable for all security policies and processes, implementation of these policies and guidelines, and education and engagement with Red Hat® customers.

Have questions or feedback?

Red Hat logo LinkedInYouTubeFacebookTwitter

Products

Tools

Try, buy, & sell

Communicate

About Red Hat

We’re the world’s leading provider of enterprise open source solutions—including Linux, cloud, container, and Kubernetes. We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.

Subscribe to our newsletter, Red Hat Shares

Sign up now

Select a language

© 2022 Red Hat, Inc.