Trust Red Hat
Open and transparent
At Red Hat, trust is essential to doing business. That’s why we work every day to secure customer data.
Employees, vendors, partners, and customers need to understand their role in cybersecurity.
These are designed to secure your organization and investments across people and processes.
Embedding processes into Red Hat’s business helps identify vulnerabilities and fix issues quickly.
Red Hat employs a diverse, collaborative, cross-functional team of experts that focuses on security and privacy. The team includes public policy, legal, information security, product security, customer data security, and regulatory compliance experts.
The team is accountable for all security policies and processes, implementation of these policies and guidelines, and education and engagement with Red Hat® customers.