RECURSOS

Continuous monitoring for better security with Red Hat

Descrição

Protect against relentless and adaptive cyber threats with continuous monitoring from Red Hat. Automatically scan Red Hat® technology for security gaps, vulnerabilities, and unauthorized changes in security configurations—and then remediate problems to restore security controls to your established security configuration.

Detalhes

Tipo:
Technology brief
Atualizado: