Try our new research platform with insights from 80,000+ expert users

Red Hat Enterprise Linux (RHEL) EVENT - Summit24 - Security Features

What is your assessment of RHEL’s built-in security features when it comes to: A) Risk reduction B) Business continuity C) Maintaining compliance?

reviewer2399145 - PeerSpot reviewer
Ansible Specialist at a energy/utilities company with 5,001-10,000 employees
Red Hat Enterprise Linux's built-in security features are good when it comes to risk reduction, business continuity, and maintaining compliance. We use Red Hat Satellite to manage our Linux. That makes it all very simple. There is a feature called OpenSCAP. We use it for security scanning. All the features that they provide on top of the base OS make it very easy to manage.
View full review »
reviewer2399202 - PeerSpot reviewer
Providers coordination at a financial services firm with 1,001-5,000 employees
I feel the built-in features of Red Hat Enterprise Linux (RHEL) for risk reduction, business continuity, and maintaining compliance are very important because our company is always aware of all these security issues that constantly happen.
View full review »
reviewer2399238 - PeerSpot reviewer
Network Engineer, Team Lead at a manufacturing company with 10,001+ employees
I would say that we use VMware for risk reduction so that we have a high availability...For business continuity, my company uses VMware, considering the ease of making snapshots of our environments, but I believe we could probably do the same with different operating systems.
View full review »
reviewer2398773 - PeerSpot reviewer
Team lead cloud infrastructure at a renewables & environment company with 1,001-5,000 employees
My company prefers Red Hat Enterprise Linux (RHEL) because of its stability, patch management, and other features that make us feel more secure.
View full review »
FB
Server Automation Administrator at a financial services firm with 10,001+ employees
Considering the built-in security features offered by the tool for risk reduction, business continuity, and maintaining compliance, I prefer Red Hat Enterprise Linux (RHEL) over a lot of other products.
View full review »
DavidPerez5 - PeerSpot reviewer
Application Support Analyst at a tech vendor with 1,001-5,000 employees
I would say it is very easy to patch, which helps our company to keep it up to date and avoid all downfalls.
View full review »
Tyler Rohren - PeerSpot reviewer
Full Stack Engineer & Lm Space Automation Engineer at a manufacturing company with 10,001+ employees
Red Hat Enterprise Linux's built-in security features do a really good job of risk reduction, business continuity, and maintaining compliance.
View full review »
reviewer2399283 - PeerSpot reviewer
Software Engineer at a comms service provider with 5,001-10,000 employees
Based on my assessment of the tool's built-in security features when it comes to areas like risk reduction, business continuity, and compliance, I would say that I am a big fan of the tool.
View full review »
reviewer2398752 - PeerSpot reviewer
Research Cloud Tech Lead for HPC at a university with 10,001+ employees
For security, SELinux is built in. It is out of the box. It is built towards building a secure system. We are in the process of working on compliance and getting this 800-171 certified. That is in process. They have regular security updates and lots of tools for rolling out updates. In that sense, there is a continuous upgrade path that is well-worn and fairly easy to maintain.
View full review »
reviewer2399127 - PeerSpot reviewer
Platform Engineer at a hospitality company with 10,001+ employees
It inherently has a lot of things built in for risk reduction, business continuity, and maintaining compliance. For example, it has SELinux, certain firewalls, logging, and all those things. It has all the built-in features required to meet the needs. We can plug in other third-party tools to have it gather information, or we can send logs to centralized locations to track activity and do audits and things like that.
View full review »
reviewer2399220 - PeerSpot reviewer
Manager Infrastructure Engineer at Cox Automotive Inc.
We had a situation where we had to create an image for Red Hat Enterprise Linux 9, and there were built-in playbooks for hardening the system. We were able to run that and create the image. It made the work much easier than it used to be in the past.
View full review »
MV
Support Engineer at Alcadis
We are satisfied with Red Hat's built-in security features, which effectively reduce risk, ensure business continuity, and maintain compliance. Red Hat Enterprise Linux provides a more secure operating system than other Linux solutions due to its robust security features and a supported kernel that receives regular security updates.
View full review »
Guideon Inocente - PeerSpot reviewer
Devops engineer at ICU IT Services
Red Hat Enterprise Linux's support and broad community assistance minimize the effort required to reduce risk, maintain business continuity, and ensure compliance.
View full review »
Arvind Chaturvedi - PeerSpot reviewer
Technical Landscape Iaas & Compute Owner at a manufacturing company with 10,001+ employees
Red Hat Enterprise Linux has robust built-in security features that effectively contribute to risk reduction, business continuity, and compliance maintenance. Red Hat demonstrates a solid commitment to security by providing timely updates and fixes to its customers. While the operating system itself is secure, it's important to note that Red Hat Enterprise Linux provides a foundational image that requires further hardening through the implementation of security controls. Red Hat empowers users with a platform and a range of hardening options, enabling them to tailor security measures to their specific application needs. Furthermore, Red Hat's rapid release of fixes and updates, often within a day or two of a vulnerability discovery, ensures that customers have access to the latest security enhancements.
View full review »
MC
Consultant automation engineer at a computer software company with 501-1,000 employees
Red Hat Enterprise Linux is lauded for its robust security, though its strictness can tempt automation engineers to temporarily disable certain measures for specific tasks, potentially leading to oversights in reactivating them. While these stringent security protocols can pose challenges for some users, they ultimately enhance the overall reliability and stability of Red Hat Enterprise Linux systems and their applications, making them a worthwhile trade-off.
View full review »
reviewer2585547 - PeerSpot reviewer
Senior Systems Reliability Engineer at a tech vendor with 1,001-5,000 employees
We chose Red Hat Enterprise Linux for our environment due to its robust built-in security features, including proactive security fixes and an enterprise-class operating system with reliable support services that enhance security and reduce risk. Furthermore, the secure base OS Docker image strengthens our environment's overall security posture.
View full review »
Sudharson An - PeerSpot reviewer
Architect at a tech vendor with 10,001+ employees
Red Hat Enterprise Linux offers robust built-in security features.
View full review »
reviewer2585583 - PeerSpot reviewer
Senior Manager, Credit Settlement Risk at a financial services firm with 10,001+ employees
Red Hat Enterprise Linux has robust built-in security features that effectively reduce risk in our environment.
View full review »
reviewer2585646 - PeerSpot reviewer
Product Owner at a financial services firm with 10,001+ employees
Red Hat Enterprise Linux provides a stable and secure platform, which helps reduce risk in our environment.
View full review »
reviewer2585667 - PeerSpot reviewer
Department Lead at a educational organization with 1,001-5,000 employees
Red Hat Enterprise Linux's built-in security features are great. We have never had a security breach in our Red Hat environment and receive monthly updates.
View full review »
AH
Senior Solution Designer at a comms service provider with 1,001-5,000 employees
Red Hat Enterprise Linux's built-in security features satisfy our security requirements.
View full review »
RB
System Engineer at Xifeo ICT
Red Hat Enterprise Linux helps us reduce risks in our environment through operating system patches. In my previous job, we ran baselines through Ansible to ensure every server was compliant with the company's standards based on CIS standards.
View full review »
reviewer1006923 - PeerSpot reviewer
Systems Architect at a university with 1,001-5,000 employees
We use the Linux security heavily. I'm unfamiliar with the new security stuff incorporated in RHEL, but SELinux and all the security features are good. It doesn't particularly reduce risks, but there are some added layers of security for internet-facing applications we like.
View full review »
Mikko Hopeakivi - PeerSpot reviewer
IT Architect at a tech vendor with 10,001+ employees
Red Hat Enterprise Linux has built-in security features that can be automated. We must gather all the relevant policies and incorporate them into our automation scripts to apply them to the operating system.
View full review »
TP
App group manager at a comms service provider with 201-500 employees
Red Hat Enterprise Linux has robust built-in security features.
View full review »
reviewer2587197 - PeerSpot reviewer
Senior Site Reliability Engineer at a computer software company with 1,001-5,000 employees
We extensively use Red Hat Enterprise Linux's built-in security features because they are excellent.
View full review »
reviewer2587206 - PeerSpot reviewer
Consultant at a consultancy with 10,001+ employees
I appreciate the robust security features in Red Hat Enterprise Linux, such as including security benchmarks like CIS security hardenings. These benchmarks offer a significant improvement over previous Red Hat Enterprise Linux versions and provide numerous valuable security enhancements.
View full review »
reviewer2587212 - PeerSpot reviewer
Senior System Infrastructure Manager, Information Technology at a energy/utilities company with 5,001-10,000 employees
Red Hat Enterprise Linux offers robust built-in security features that surpass those found in Windows. Its highly customizable environment allows for easy system hardening, eliminating the need for additional purchases as all necessary security components are integrated within the operating system.
View full review »
Vicente-Perez - PeerSpot reviewer
Senior Systems Specialist at a tech vendor with 51-200 employees
We rely on Red Hat Enterprise Linux for its built-in security features, timely support, and rapid release of the latest patches and updates.
View full review »
reviewer2587248 - PeerSpot reviewer
Technology Specialist at a comms service provider with 5,001-10,000 employees
Red Hat Enterprise Linux's built-in security features enhance some of our existing functionalities.
View full review »
TL
Datacenter System specialist at a manufacturing company with 201-500 employees
Red Hat Enterprise Linux's built-in security features work well.
View full review »
reviewer2587302 - PeerSpot reviewer
Administrator consultation at a computer software company with 201-500 employees
Red Hat Enterprise Linux's built-in security features are great.
View full review »
JD
Senior System Engineer at a comms service provider with 1,001-5,000 employees
While RHEL's built-in security features are excellent, we don't use all of them. It has many available capabilities, but it's not always up to the infrastructure people to decide what to use for security.
View full review »
Aubert Kouahou - PeerSpot reviewer
Technology Architect at ETNIC
Red Hat is based on Linux, so the security is more stable than in other systems. For instance, we cannot reuse machine credentials. We use key certificates to connect to the machine. It's not like a user password. Without a key to access the machine, you cannot do anything. There are specific controls on user access, and you can limit the privileges.
View full review »
Alexander Muylalert - PeerSpot reviewer
Linux system administrator at a tech services company with 10,001+ employees
I have mixed feelings about the built-in security features. SELinux must be configured correctly for the port and directory, or applications won't run, so we primarily disable it. Sometimes, we enable it and tinker with legacy systems deployed long before I joined the company. However, chances are it will break something if you enable it.
View full review »
Vincent Ceulemans - PeerSpot reviewer
Database administrator at a tech services company with 1-10 employees
It has some of the best out-of-the-box security features of any Linux distributor. RHEL has more built-in security features than most standard flavors, or it has implemented them better.
View full review »
BM
Technical Consultant at a manufacturing company with 10,001+ employees
RHEL's security features have room for improvement, especially for highly regulated industries like health care. That's why it isn't the primary OS in health care. It would be great if they added some features to address the specific challenges health care providers face.
View full review »
SC
Cloud Infrastructure Architect at a healthcare company with 10,001+ employees
In addition to Linux's built-in security tools, it has RHEL configuration features that provide robust security controls. We also have third-party solutions that provide more in-depth solutions for our cloud and on-premises infrastructure. We have to provide security at each layer of the OSI models. For example, on the application layer, we have to provide web solutions or application gateways, but it provides good security features for the OS layer.
View full review »
Syed Azhar - PeerSpot reviewer
Cloud engineer at a tech services company with 11-50 employees
RHEL has good security features, so it's harder to breach than Windows. There's also a large RHEL user community, so when I get stuck, I can go to Stack Overflow or other user forums and get help. I typically get a solution within a few hours when I post a question.
View full review »