Subscribe to our blog

Are your edge computing systems secure? A simple question with a potentially complicated answer. This is because many engineering teams combine Red Hat Enterprise Linux with decoupled applications thanks to containerization technologies. But with so many changes happening across your organization, it can be hard to scale your infrastructure. Managing the lifecycle of your Red Hat Enterprise Linux with edge management to make it easy to standardize, deploy and enhance security posture throughout the system’s lifecycle.  This post takes an in-depth look at edge management from this perspective.

Standardized images

Creating a standard operating environment is key to scaling—without standardization, it becomes exponentially difficult to understand and manage your security composure. So we enable you to create images that can be customized to include any software you wish, both from Red Hat and third-party vendors, as well as configuration details, like a username and ssh public key. Once built, your image can be automatically deployed to your edge computing systems, which means bit for bit, byte for byte, the operating system is identical across your fleet.

Zero-touch onboarding

As you deploy your standardized image across your environments, from development to production, you’re going to want to register these systems back to the edge management console. Just bake in your activation key and organization ID into the ISO, and every time you deploy a new system it will be registered back, giving you the visibility and lifecycle management capabilities you need to build a stronger security profile and stay more up-to-date. 

Grouping and filtering

We know you don't think about your systems as a single entity—they’re probably part of a larger fleet— so we give you the tools and flexibility to map your systems however you like. This is foundational to any good lifecycle management platform, and core to effecting change across your fleet. More often than not, changes are made across a fleet or group, mitigating risk with progressive changes, or reliable rollback capabilities. So we make it possible for you to group your systems and refine your views in a way that works best for you.

Identifying vulnerability with Red Hat Insights

Systems out in the wild have greater security requirements—gone are the days when you could deploy remote computing systems and forget about them until they break. In today's ever-connected world, system security is a top priority. We use the power of Red Hat Insights to provide vulnerability analysis and system security recommendations, so you’ll have a better real-time understanding of risk. 

Generating and deploying updates

Understanding risk on its own is not enough—you also need to remediate or mitigate known risks by generating and deploying Red Hat Enterprise Linux capabilities for edge updates. New updates can add or remove packages, or update the versions of already installed packages. When you’ve created an update, you can just as easily generate static deltas and push the update to a single system or a group in a way that’s better for intermittently connected or high latency connections. And if there's a problem, updates can be automatically rolled back to a known good state.

Someone said I should stop here!

Seriously, I could carry on until I’m blue in the face. But my favorite thing about all of this; it’s available as-a-service. Easy to use and consume without any prerequisites, just log in and get started. What better way to learn more? Try the demo environment, then login and get started for yourself.


저자 소개

Sean O'Keeffe is a Principal Product Manager at Red Hat, focusing on the management of Red Hat Enterprise Linux. Having previously worked in small and large technology organizations, he now creates products that solve problems for the technology organizations of today.

Read full bio

채널별 검색

automation icon

오토메이션

기술, 팀, 환경을 포괄하는 자동화 플랫폼에 대한 최신 정보

AI icon

인공지능

고객이 어디서나 AI 워크로드를 실행할 수 있도록 지원하는 플랫폼 업데이트

cloud services icon

클라우드 서비스

관리형 클라우드 서비스 포트폴리오에 대해 더 보기

security icon

보안

환경과 기술 전반에 걸쳐 리스크를 감소하는 방법에 대한 최신 정보

edge icon

엣지 컴퓨팅

엣지에서의 운영을 단순화하는 플랫폼 업데이트

Infrastructure icon

인프라

세계적으로 인정받은 기업용 Linux 플랫폼에 대한 최신 정보

application development icon

애플리케이션

복잡한 애플리케이션에 대한 솔루션 더 보기

Original series icon

오리지널 쇼

엔터프라이즈 기술 분야의 제작자와 리더가 전하는 흥미로운 스토리