Identity Management

The Red Hat Security Portfolio

The most demanding businesses depend on Red Hat security technologies to protect their infrastructure while increasing their efficiency. Red Hat backs Common Criteria certified technologies with constant vigilance for new security risks, which are resolved by timely technology updates and quickly installed by Red Hat management tools. World-class training and an exhaustive library of technical resources round out Red Hat's security portfolio.