Red hat at RSA
Visit the Red Hat booth at RSA Conference 2024
Connect with Red Hat at RSA 2024. Red Hat is the leader in open source infrastructure and application development solutions for enterprise organizations. We provide a broad portfolio of trusted open source software and content that helps organizations implement security, in a layered approach, across the infrastructure and application stack and life cycle to help secure workloads on-premise, in the cloud, or at the edge. Join the conference to see the latest cutting-edge research, developments and trends across the security industry.
Mini Labs
Try one of our hands-on security exercises when you visit our booth for your chance to win a Mini Drone Quadcopter.
Red Hat Enterprise Linux Security
In these series of mini-exercises, you will learn about key Red Hat Enterprise Linux security technologies that can help monitor and remediate vulnterabilities, protect data and file privacy, meet compliance, and more.
Automating Security with Red Hat Ansible Automation Platform
In these series of mini-exercises, you will learn about how Red Hat Ansible Automation Platform can help with key security automation use cases such as Palo Alto Networks firewall automation and more.
Locating and stopping workloads with log4shell vulnerabilities with Red Hat Advanced Cluster Security for Kubernetes
In this exercise, you will apply DevSecOps principles to identify and prevent the deployment of the Log4Shell exploit in a Kubernetes environment.
Securing the Software Supply Chain: Image Signing and Policy Enforcement with Red Hat OpenShift and Red Hat Advanced Cluster Security for Kubernetes
In this exercise, you will learn how to secure and strengthen your software supply chain with image signing and policy enforcement. We will first use Tekton Chains, an open-source tool for managing your software supply chain security, to sign container images, store attestations, and audit pipelines. Container image signing allows users to add a digital “fingerprint” to an image. This fingerprint can later be cryptographically tested to verify trust. This allows users of container images to verify origin and trust the content included in container images.
Next, we will introduce Red Hat Advanced Cluster Security for Kubernetes (ACS), illustrating its application in achieving security and compliance for your containerized applications in Kubernetes. By the end of this exercise , you will have a better understanding of how to improve the security of your software supply chain using DevSecOps practices.
Solutions
See below to learn more about Red Hat solutions
Red Hat Enterprise Linux
The leading enterprise Linux operating system, certified on hundreds of clouds and with thousands of vendors. Built-in tools help you with compliance and increase security.
Red Hat OpenShift
Red Hat OpenShift is the leading modern application platform that provides a trusted, comprehensive, and consistent experience, fostering organizational and IT growth and innovation through its security-first, scalable application development and delivery capabilities.
Red Hat Advanced Cluster Security for Kubernetes
Powered by StackRox technology to protect your vital containerized Kubernetes applications across build, deploy, and runtime. Red Hat Advanced Cluster Security deploys in your Kubernetes infrastructure as a self-managed security solution or you can consume it as a fully managed Software-as-a-Service (SaaS).
Red Hat Ansible Automation Platform
A platform for implementing consistent enterprise-wide automation, no matter where you are in your automation journey. Reduce the risks caused by misconfigurations and manual errors with automation, and streamline your security operations with automation while integrating security into the process, with access control, logging and auditing capabilities.
Red Hat Trusted Software Supply Chain
To help customers use open source components safely, Red Hat has developed a solution that enhances resilience to software supply chain vulnerabilities. With Red Hat Trusted Software Supply Chain, customers can code, build, deploy and monitor their software using proven platforms, trusted content, and real-time security scanning and remediation.
Show Details
Getting to the event
Show Location: Moscone Center
747 Howard Street San Francisco, CA 94103
Show Dates: May 6-9, 2024
Show Hours: Monday, 5:30 PM-7 PM PT
Tuesday - Wednesday, 10 AM-6 PM PT
Thursday, 10 AM-2 PM PT
Red Hat Booth: #5273 North Expo
Resources
Check out these resources before RSA Conference or share them with your team after the event
Red Hat Ansible Automation Platform
Red Hat Enterprise Linux
Red Hat OpenShift and Red Hat Advanced Cluster Security for Kubernetes
Red Hat Trusted Software Supply Chain
Open unlocks the world's potential
At Red Hat, our commitment to open source extends beyond technology into virtually everything we do. We collaborate and share ideas, create inclusive communities, and welcome diverse perspectives from all Red Hatters, no matter their role. It’s what makes us who we are. Join us.