Red Hat Advanced Cluster Security for Kubernetes - Standard subscription (1 year) - 2 cores / 4 vCPUs

Code: MW01660
Brand: Red Hat
Warranty: Unknown
For illustrative purpose only

Prices indicated are without delivery costs and VAT

Read more

Stock Qty Est. Delivery Price
VAT
NO724 500 7-14 days unknown 486.30

Marketing description

Red Hat Advanced Cluster Security for Kubernetes is an enterprise-ready, Kubernetes-native container security solution that enables you to more securely build, deploy, and run cloud-native applications.
Red Hat Advanced Cluster Security includes Kubernetes-native security features that provide insights into critical vulnerabilities and threat vectors for your Red Hat OpenShift environment. Red Hat Advanced Cluster Security integrates with DevOps and security tools to help you mitigate threats and enforce security policies that minimize operational risk to your applications.
It also enables you to provide developers with actionable, context-rich guidelines integrated into existing workflows, along with tooling to support developer productivity.
Red Hat Advanced Cluster Security reduces the time and effort needed to implement security by acting as a common source of truth, so you can streamline security analysis, investigation, and remediation.

Key selling points

  • Improve security for the software supply chain
  • Protect your Kubernetes infrastructure
  • Defend your workloads

Product features

  • Improve security for the software supply chain
    Simplify DevSecOps by providing developers automated guardrails within their existing workflows. Red Hat Advanced Cluster Security integrates with your CI/CD pipelines and image registries to provide continuous image scanning and assurance. By shifting security left, vulnerable and misconfigured images can be remediated within the same developer environment with real-time feedback and alerts.
  • Protect your Kubernetes infrastructure
    Whether deployed on-premise or in the cloud, Red Hat Advanced Cluster Security delivers advanced security capabilities to ensure the underlying Kubernetes infrastructure remains protected. Red Hat Advanced Cluster Security continuously scans your environment against CIS benchmarks and other security best practices and prevents misconfigurations and threats to deliver comprehensive Kubernetes-native protection.
  • Defend your workloads
    Hundreds of deploy-time and runtime policies come standard with Red Hat Advanced Cluster Security to prevent risky workloads from being deployed or run. Red Hat Advanced Cluster Security monitors, collects, and evaluates system-level events such as process execution, network connections and flows, and privilege escalation within each container in your Kubernetes environment.
  • Vulnerability management
    Identify and fix vulnerabilities in both container images and Kubernetes across the entire software development life cycle.
  • Compliance
    Audit your systems against CIS Benchmarks, NIST, PCI, and HIPAA, with interactive dashboards and one-click audit reports.
  • Network segmentation
    Visualize existing vs. allowed network traffic and enforce network policies and tighter segmentation using Kubernetes-native controls.
  • Risk profiling
    See all your deployments ranked by risk level, using context from Kubernetes' declarative data, to prioritize remediation.
  • Configuration management
    Apply best practices to hardening your Kubernetes environments and workloads for a more secure and stable application.

Product Description
Red Hat Advanced Cluster Security for Kubernetes - standard subscription (1 year) - 2 cores / 4 vCPUs
Product Type
Standard subscription - 1 year
Category
Networking applications - clustering / high-availability software, monitoring & performance management
Licence Qty
2 cores / 4 vCPUs
Service & Support
Technical support
Category
Networking applications - clustering / high-availability software, monitoring & performance management
Product Type
Standard subscription - 1 year
Licence Qty
2 cores / 4 vCPUs
Type
Phone consulting - 1 year - response time: 1 business hour - availability: business hours - severity level 1 ¦ Phone consulting - 1 year - response time: 4 business hours - availability: business hours - severity level 2 ¦ Phone consulting - 1 year - response time: 1 business day - availability: business hours - severity level 3 ¦ Phone consulting - 1 year - response time: 2 business days - availability: business hours - severity level 4 ¦ Web support - 1 year - response time: 1 business hour - availability: business hours - severity level 1 ¦ Web support - 1 year - response time: 4 business hours - availability: business hours - severity level 2 ¦ Web support - 1 year - response time: 1 business day - availability: business hours - severity level 3 ¦ Web support - 1 year - response time: 2 business days - availability: business hours - severity level 4 ¦ New releases update - 1 year