Red Hat Enterprise Linux (RHEL) On-Premises - Risk Reduction
What is your assessment of Red Hat Enterprise Linux’s built-in security features when it comes to simplifying A) risk reduction and B) maintaining compliance? Please provide details.
MP
Manuel Paula.
System Admistrator at Lifestyle Services Group (part of Phones4U)
Red Hat Enterprise Linux's built-in security features significantly simplify risk management and compliance maintenance for on-premises deployments. The well-documented and regularly updated features make it easy to find solutions to any issues we might encounter.
View full review »Red Hat Enterprise Linux's built-in security features and mandatory access control help to mitigate and secure the OS from threats.
View full review »Red Hat Enterprise Linux helps reduce our risk.
View full review »It's easy to apply RHEL's built-in security features when it comes to simplifying risk reduction or maintaining compliance.
View full review »Red Hat Enterprise Linux's built-in security features simplify risk reduction and help maintain compliance, which gives us peace of mind.
View full review »Red Hat offers built-in security features that simplify risk management. Unlike Oracle Linux, which overlooks critical security features like C Linux, Red Hat actively develops and maintains robust security measures. As a result, Red Hat prioritizes system security, consistently providing updates to fortify its machines against potential threats.
View full review »Red Hat offers compliance consulting services. If we purchase hardware from companies like HP, Dell, or IBM, which also partner with Red Hat, they often guarantee compliance for their hardware. This compliance can extend to security regulations imposed by certain countries or governments, such as those based on NIST or CSSP standards. Red Hat's focus on compliance seems to center primarily around these hardware-related aspects and associated security requirements.
View full review »Red Hat Enterprise Linux simplifies risk reduction by integrating Red Hat Insights. This provides a comprehensive security posture assessment of our Red Hat systems, offering easy-to-understand best practice recommendations and applicable actionable remediation steps.
View full review »In any Linux operating system, the patches come through, whether it's through long-term support solutions or community support. It's rapid overall. So when it's there, it's immediate and there's option to install and pass those updates.
View full review »The built-in security features are fine, and we don't receive complaints about them.
View full review »Red Hat Enterprise Linux offers robust provisioning and patching management capabilities, ensuring efficient system administration and security.
View full review »Red Hat Enterprise Linux has robust built-in security features.
View full review »Red Hat Enterprise Linux offers robust built-in security features that effectively mitigate risk and help maintain compliance.
View full review »LV
Luis Venegas
Infrastructure engineer at Markel
The security features of Red Hat Enterprise Linux (RHEL), including SELinux and its features, make it easier to be aware of compromises.
View full review »SS
Shelby Stevenson
Platform engineer at a computer software company with 5,001-10,000 employees
Regarding built-in security features for risk reduction and compliance maintenance, some features are straightforward when following standards and installation profiles. However, the development side frequently mentions challenges with SELinux, as it is more difficult to understand and somewhat esoteric. Some features are very well-developed and easily understood, while others are more complex to implement.
View full review »CL
ChristianLopez
Team manager at Evertec
Red Hat Enterprise Linux (RHEL) helps us solve everything, from security compliance to running the core infrastructure of the company. My team works directly with kernel patching on a monthly basis, and it's excellent; we always get the fixes for any vulnerabilities, which we have to keep up with based on the financial transactions. We need to keep up with the security patches. Red Hat Enterprise Linux (RHEL) has helped to mitigate downtime and lower risks.
View full review »I am a big fan of Red Hat Enterprise Linux (RHEL) built-in security features, which simplify risk reduction and maintaining compliance, and I would just say we achieve 99% success.
I am a big fan of Red Hat Enterprise Linux (RHEL) built-in security features, which simplify risk reduction and maintaining compliance, and I would just say we achieve 99% success.
View full review »AA
Abhay Agrawal
Senior Director at a media company with 10,001+ employees
Red Hat Enterprise Linux (RHEL) helps me solve pain points related to reliability, stability, and security, mainly. Feature-wise, what I appreciate the most about Red Hat Enterprise Linux (RHEL) is security; it's much more secure, and I don't have to patch it that much. For us, security is a very key aspect of our operations, especially since we are even more security-conscious due to what happened with us in the past, so having Red Hat Enterprise Linux (RHEL) in our environment makes us much more confident. Security requirements are always a consideration in choosing Red Hat Enterprise Linux (RHEL) for the cloud since it is much more secure than other operating systems and has a proven track record of being compliant and secure for many years.
View full review »SK
Sheldon Kroner
Director, DevOps at Lightedge Solutions
My assessment of Red Hat Enterprise Linux (RHEL)'s built-in security features is that using SC Linux is helpful for us to lock things down, and our security team is pretty happy with it whenever they're doing their vulnerability scans. From a security standpoint, we're happy with it. Red Hat Enterprise Linux (RHEL) has helped to mitigate downtime and lower risk. If there ever is a problem, it's quick to stand up a replacement system.
View full review »RO
Ray Ortega
Server administrator at Northrop Grumman
Red Hat Enterprise Linux (RHEL)'s built-in security features are really well designed for simplifying risk reduction and maintaining compliance. I see many new technologies coming out are geared toward security or enhancing security. It's neat that it's continuing to evolve.
View full review »EW
Einar Wågan
Teamansvarlig Serverdrift at a government with 501-1,000 employees
My assessment of Red Hat Enterprise Linux (RHEL)'s built-in security features shows many cool features in the new version. From what I have used in 8 and 9, there are good features such as built-in firewalls.
View full review »Red Hat Enterprise Linux (RHEL) helps us solve pain points. It keeps us easily compliant from my perspective with security compliance and streamlines everything in a multi-system environment. The OpenSCAP vulnerability scanner is what I appreciate most about RHEL. We benefit from that tool specifically due to the fact that RHEL is under the recommended operating system mandate. Through that, they have their security requirements, and RHEL's OpenSCAP vulnerability scanner is a really good automatic scanner to scan for cybersecurity vulnerabilities in our system. The way it produces reports is really nice and it's better than the old vulnerability scanner that our system used. My assessment of RHEL's built-in security features for simplifying risk reduction and maintaining compliance centers around OpenSCAP. It's better than any other tool I've seen. I've seen two or three other ones. It is really streamlined and nice. It feels professional when using the product.
View full review »JC
Joe Campos
Principle Architect at a logistics company with 10,001+ employees
The feature of Red Hat Enterprise Linux (RHEL) that I appreciate the most is the security features. The security features of RHEL protect our environment. By having strong security hygiene with RHEL, we are able to provide business value back to our stakeholders.
View full review »Security is important, and it performs efficiently and is confident compared with a firewall and WAF, or whatever you use as a firewall to protect our deployments. Red Hat Enterprise Linux (RHEL) helps with uptime and security; with every deployment, we evaluate security and apply vulnerability scanners, covering every vulnerability without any problem.
View full review »SQ
Syed Qidwai
Linux Engineer at Verizon
My assessment of Red Hat Enterprise Linux (RHEL)'s built-in security for simplifying risk reduction and maintaining compliance is that, compared to other vendors such as Ubuntu and Debian, Red Hat is more familiar with these aspects.
View full review »My assessment of Red Hat Enterprise Linux (RHEL)'s built-in security features is that I have had good experiences so far. Red Hat Enterprise Linux (RHEL) has helped me to mitigate downtime and lower risks, though the specific details are confidential at this time.
View full review »In terms of assessing Red Hat Enterprise Linux (RHEL)'s built-in security features, I find that out of the box, we are able to manage golden images and that keeps us in compliance. It is very easy to manage.
View full review »Security requirements were a consideration when choosing the solution. We liked that the patching rules were straightforward. It helps support risk reduction and maintain compliance.
View full review »BP
Bern Pluviose
Devops at Proton Technologies
The main difference between other solutions and RHEL is configuration and security, which helps maintain stability. Since RHEL is used on web servers, both public-facing and internal, security is crucial. While any modern OS can run without crashing, RHEL's advantage is its resilience against external threats and operations that might compromise other systems.
View full review »So far, we are very satisfied with Red Hat Enterprise Linux (RHEL)'s built-in security features when it comes to simplifying risk reduction and maintaining compliance.
View full review »In Societe Generale, Red Hat Enterprise Linux (RHEL) has helped us maintain a secure environment across our container platforms through SELinux and kernel patching, which has directly lowered the risk of downtime and improved trust in the system.
View full review »Security requirements were a key consideration in choosing Red Hat Enterprise Linux (RHEL) in the cloud. We are from the financial industry, so customer data is one of our big responsibilities. When it comes to managing Red Hat Enterprise Linux (RHEL) systems for provisioning and patching, we currently work with our middleware team for upgrades, however, the plan is to work with AWS or the Red Hat team for future upgrades. My assessment of the built-in security features is limited as I'm from the development side.
View full review »