Red Hat Advanced Cluster Security provides a comprehensive and automated Kubernetes-native security solution for Red Hat OpenShift running on IBM Power, IBM zSystems and IBM LinuxONE.

One of the core aims at IBM is to help make security accessible to all customers and provide security-focused solutions that help businesses innovate with confidence. Today we are proud to inform customers that the latest release of Red Hat Advanced Cluster Security for Kubernetes extends protections for Red Hat OpenShift clusters running on IBM Power, IBM zSystems and IBM LinuxONE to address advanced security use cases.

IBM Power, IBM zSystems and IBM LinuxONE are enterprise-grade platforms that offer high performance, reliability and security for mission-critical workloads. These platforms are used by organizations in industries like banking, healthcare and government, where security and compliance are paramount.

Red Hat OpenShift is an enterprise application development platform for building, deploying and running cloud-native applications at scale. Red Hat OpenShift and IBM provide a flexible, open, hybrid and multicloud enterprise platform with security features supporting mission-critical workloads.

What is Red Hat Advanced Cluster Security?

Red Hat Advanced Cluster Security is a platform that provides Kubernetes-native security features for containerized applications and infrastructure across the full application lifecycle: build, deploy and runtime. It is designed to help organizations detect and remediate security risks throughout many stages of the container lifecycle by integrating with the Kubernetes API server, container registries and deployment pipelines. Red Hat Advanced Cluster Security is designed to be flexible and scalable, helping organizations to secure Kubernetes clusters across multiple clouds and on-premises environments.

With this new support, IBM customers can now benefit from a comprehensive and automated Kubernetes-native security solution for Red Hat OpenShift running on the aforementioned IBM platforms. Customers on IBM Power, IBM zSystems and IBM LinuxONE can address advanced Red Hat OpenShift security use cases like shift-left security, full lifecycle vulnerability management, network segmentation and runtime detection and response with Red Hat Advanced Cluster Security for Kubernetes.

Benefits of Red Hat Advanced Cluster Security

Red Hat Advanced Cluster Security for IBM systems positions customers to do the following:

  • Gain visibility into containerized environments: Red Hat Advanced Cluster Security provides a comprehensive view of Red Hat OpenShift security postures running on IBM Power, IBM LinuxONE and IBM zSystems to help customers gain insights, such as the number and severity of vulnerabilities and misconfigurations in their clusters, and whether they adhere to compliance standards.
  • Shift security left with DevSecOps: Red Hat Advanced Cluster Security integrates with existing CI/CD pipelines and provides developer-friendly guardrails to help organizations identify and address security issues (such as a fixable image vulnerability) earlier in the container lifecycle, before they impact production environments at runtime.
  • Identify and remediate security risks in their runtime environments: Red Hat Advanced Cluster Security provides runtime monitoring for threat detection and remediation in Red Hat OpenShift clusters running on IBM Power, IBM zSystems and IBM LinuxONE. This includes scanning running container images for vulnerabilities, detecting anomalous behavior and monitoring network traffic for malicious activity.
  • Support compliance policies: Red Hat Advanced Cluster Security helps organizations address compliance policies for Red Hat OpenShift. This includes detection protocols for potentially non-compliant workloads across several industry standards—such as PCI-DSS, HIPAA, CIS benchmarks and NIST—and providing audit support for compliance reporting.
  • Protect applications across hybrid cloud environments: Red Hat Advanced Cluster Security supports multiple cloud providers and on-premises environments, helping customers to secure their Red Hat OpenShift clusters across hybrid cloud environments. This includes providing centralized management and policy enforcement across multiple Red Hat OpenShift clusters running on different platforms.

Get started

With Red Hat Advanced Cluster Security, IBM customers can now benefit from a comprehensive and automated security solution to help protect their Red Hat OpenShift environments while leveraging the benefits of enterprise-grade platforms like IBM Power, IBM zSystems and IBM LinuxONE.

Learn more about Red Hat Advanced Cluster Security.

Categories

More from Cloud

Kubernetes version 1.28 now available in IBM Cloud Kubernetes Service

2 min read - We are excited to announce the availability of Kubernetes version 1.28 for your clusters that are running in IBM Cloud Kubernetes Service. This is our 23rd release of Kubernetes. With our Kubernetes service, you can easily upgrade your clusters without the need for deep Kubernetes knowledge. When you deploy new clusters, the default Kubernetes version remains 1.27 (soon to be 1.28); you can also choose to immediately deploy version 1.28. Learn more about deploying clusters here. Kubernetes version 1.28 In…

Temenos brings innovative payments capabilities to IBM Cloud to help banks transform

3 min read - The payments ecosystem is at an inflection point for transformation, and we believe now is the time for change. As banks look to modernize their payments journeys, Temenos Payments Hub has become the first dedicated payments solution to deliver innovative payments capabilities on the IBM Cloud for Financial Services®—an industry-specific platform designed to accelerate financial institutions' digital transformations with security at the forefront. This is the latest initiative in our long history together helping clients transform. With the Temenos Payments…

Foundational models at the edge

7 min read - Foundational models (FMs) are marking the beginning of a new era in machine learning (ML) and artificial intelligence (AI), which is leading to faster development of AI that can be adapted to a wide range of downstream tasks and fine-tuned for an array of applications.  With the increasing importance of processing data where work is being performed, serving AI models at the enterprise edge enables near-real-time predictions, while abiding by data sovereignty and privacy requirements. By combining the IBM watsonx data…

The next wave of payments modernization: Minimizing complexity to elevate customer experience

3 min read - The payments ecosystem is at an inflection point for transformation, especially as we see the rise of disruptive digital entrants who are introducing new payment methods, such as cryptocurrency and central bank digital currencies (CDBC). With more choices for customers, capturing share of wallet is becoming more competitive for traditional banks. This is just one of many examples that show how the payments space has evolved. At the same time, we are increasingly seeing regulators more closely monitor the industry’s…