Technology brief

Continuous monitoring for better security with Red Hat


Protect against relentless and adaptive cyber threats with continuous monitoring from Red Hat. Automatically scan Red Hat® technology for security gaps, vulnerabilities, and unauthorized changes in security configurations—and then remediate problems to restore security controls to your established security configuration.