Red Hat Advanced Cluster Security Cloud Service graduates from limited availability to general availability! This release allows customers to access a fully managed software-as-a-service to help protect their containerized applications across the full application lifecycle in any major cloud environment. With this announcement, Red Hat Advanced Cluster Security Cloud Service is now feature-complete and fully tested by Red Hat.
We understand the need to move quickly and at scale in the application development lifecycle. With Advanced Cluster Security Cloud Service, the Red Hat team takes on the responsibility of operational complexities to expedite that journey. As a fully hosted and managed cloud service platform, Advanced Cluster Security Cloud Service enables customers and partners to focus on developing innovative applications that contribute business value by reducing the security operational management burden.
Available where you are
Red Hat Advanced Cluster Security Cloud Service extends beyond Red Hat OpenShift to support Kubernetes services from major cloud providers such as Amazon Elastic Kubernetes Service (EKS), Microsoft Azure Kubernetes Service (AKS), and Google Kubernetes Engine (GKE). Users can protect applications in Red Hat OpenShift environments as well as other major Kubernetes environments. Users have the option to purchase Red Hat Advanced Cluster Security Cloud Service on the AWS Marketplace and take advantage of flexible features to alleviate budgetary constraints like consumption-based pricing and to leverage committed cloud spend. Once purchased, users can use Red Hat Advanced Cluster Security Cloud Service to help protect their applications in public cloud provider Kubernetes, as well as private cloud and on-premises environments, with 24/7 Red Hat support across the application development lifecycle.
Key features
Some key features of Red Hat Advanced Cluster Security Cloud Service include:
- Visibility - see your entire Kubernetes environment and its security posture, including images, deployments and runtime behavior
- Vulnerability management - go beyond vulnerability scoring and implement full lifecycle vulnerability management that’s risk-based and includes mitigating vulnerabilities at runtime
- Compliance — ensure your Kubernetes environment is compliant with industry standards and best practices, such as CIS Benchmarks, NIST and PCI
- Network security - visualize actual and allowed network communications and improve Kubernetes-native network security controls to isolate and segment deployments to minimize the attack surface
- Risk profiling - see a stack-ranked list of all of your deployments with risk factors to identify the highest priority security issues
- Security policy guardrails - enforce security configuration best practices by scanning deployments for common security issues such as excess privileges or insecure RBAC settings.
- Threat detection & response - use behavioral analysis, rules, and AllowList and blocklist to assess runtime behavior and detect and respond to abnormal activity indicative of an attack
Red Hat is committed to accelerating developer productivity with solutions that make it easy to include security guardrails in the developer workflow and software supply chain. By shifting security and compliance checks left towards the beginning of the application development lifecycle, where developers are building their applications, Red Hat Advanced Cluster Security Cloud Service can help reduce likely security vulnerabilities and help accelerate overall deployment.
Want to learn more? Check out our FAQ for commonly asked questions or try it yourself with a no-cost trial today!
Sobre os autores
Carolyn May is a Product Marketing Manager at Red Hat, specializing in OpenShift, the leading hybrid cloud application platform powered by Kubernetes. With a background in sales, Carolyn spearheads initiatives aimed at highlighting the value of OpenShift.
Mais como este
Navegue por canal
Automação
Últimas novidades em automação de TI para empresas de tecnologia, equipes e ambientes
Inteligência artificial
Descubra as atualizações nas plataformas que proporcionam aos clientes executar suas cargas de trabalho de IA em qualquer ambiente
Nuvem híbrida aberta
Veja como construímos um futuro mais flexível com a nuvem híbrida
Segurança
Veja as últimas novidades sobre como reduzimos riscos em ambientes e tecnologias
Edge computing
Saiba quais são as atualizações nas plataformas que simplificam as operações na borda
Infraestrutura
Saiba o que há de mais recente na plataforma Linux empresarial líder mundial
Aplicações
Conheça nossas soluções desenvolvidas para ajudar você a superar os desafios mais complexos de aplicações
Programas originais
Veja as histórias divertidas de criadores e líderes em tecnologia empresarial
Produtos
- Red Hat Enterprise Linux
- Red Hat OpenShift
- Red Hat Ansible Automation Platform
- Red Hat Cloud Services
- Veja todos os produtos
Ferramentas
- Treinamento e certificação
- Minha conta
- Suporte ao cliente
- Recursos para desenvolvedores
- Encontre um parceiro
- Red Hat Ecosystem Catalog
- Calculadora de valor Red Hat
- Documentação
Experimente, compre, venda
Comunicação
- Contate o setor de vendas
- Fale com o Atendimento ao Cliente
- Contate o setor de treinamento
- Redes sociais
Sobre a Red Hat
A Red Hat é a líder mundial em soluções empresariais open source como Linux, nuvem, containers e Kubernetes. Fornecemos soluções robustas que facilitam o trabalho em diversas plataformas e ambientes, do datacenter principal até a borda da rede.
Selecione um idioma
Red Hat legal and privacy links
- Sobre a Red Hat
- Oportunidades de emprego
- Eventos
- Escritórios
- Fale com a Red Hat
- Blog da Red Hat
- Diversidade, equidade e inclusão
- Cool Stuff Store
- Red Hat Summit