In-person event

Red Hat at RSA 2024

May 6, 2024 - May 9, 2024 San Francisco, CAMoscone Center
Event menu

Red hat at RSA

Visit the Red Hat booth at RSA Conference 2024

Connect with Red Hat at RSA 2024. Red Hat is the leader in open source infrastructure and application development solutions for enterprise organizations. We provide a broad portfolio of trusted open source software and content that helps organizations implement security, in a layered approach, across the infrastructure and application stack and life cycle to help secure workloads on-premise, in the cloud, or at the edge. Join the conference to see the latest cutting-edge research, developments and trends across the security industry. 

Add event to calendar

AppleGoogleOffice 365OutlookOutlook.comYahoo

Mini Labs

Try one of our hands-on security exercises when you visit our booth for your chance to win a Mini Drone Quadcopter.

Red Hat Enterprise Linux Security

In these series of mini-exercises, you will learn about key Red Hat Enterprise Linux security technologies that can help monitor and remediate vulnterabilities, protect data and file privacy, meet compliance, and more.

Automating Security with Red Hat Ansible Automation Platform

In these series of mini-exercises, you will learn about how Red Hat Ansible Automation Platform can help with key security automation use cases such as Palo Alto Networks firewall automation and more.

Locating and stopping workloads with log4shell vulnerabilities with Red Hat Advanced Cluster Security for Kubernetes

In this exercise, you will apply DevSecOps principles to identify and prevent the deployment of the Log4Shell exploit in a Kubernetes environment.

Securing the Software Supply Chain: Image Signing and Policy Enforcement with Red Hat OpenShift and Red Hat Advanced Cluster Security for Kubernetes

In this exercise, you will learn how to secure and strengthen your software supply chain with image signing and policy enforcement. We will first use Tekton Chains, an open-source tool for managing your software supply chain security, to sign container images, store attestations, and audit pipelines. Container image signing allows users to add a digital “fingerprint” to an image. This fingerprint can later be cryptographically tested to verify trust. This allows users of container images to verify origin and trust the content included in container images.

Next, we will introduce Red Hat Advanced Cluster Security for Kubernetes (ACS), illustrating its application in achieving security and compliance for your containerized applications in Kubernetes. By the end of this exercise , you will have a better understanding of how to improve the security of your software supply chain using DevSecOps practices.

Solutions

See below to learn more about Red Hat solutions

Red Hat Enterprise Linux

The leading enterprise Linux operating system, certified on hundreds of clouds and with thousands of vendors. Built-in tools help you with compliance and increase security.

Learn more

Red Hat OpenShift

Red Hat OpenShift is the leading modern application platform that provides a trusted, comprehensive, and consistent experience, fostering organizational and IT growth and innovation through its security-first, scalable application development and delivery capabilities.

Learn more

Red Hat Advanced Cluster Security for Kubernetes

Powered by StackRox technology to protect your vital containerized Kubernetes applications across build, deploy, and runtime. Red Hat Advanced Cluster Security deploys in your Kubernetes infrastructure as a self-managed security solution or you can consume it as a fully managed Software-as-a-Service (SaaS). 

Learn more

Red Hat Ansible Automation Platform

A platform for implementing consistent enterprise-wide automation, no matter where you are in your automation journey. Reduce the risks caused by misconfigurations and manual errors with automation, and streamline your security operations with automation while integrating security into the process, with access control, logging and auditing capabilities.

Learn more

Red Hat Trusted Software Supply Chain

To help customers use open source components safely, Red Hat has developed a solution that enhances resilience to software supply chain vulnerabilities. With Red Hat Trusted Software Supply Chain, customers can code, build, deploy and monitor their software using proven platforms, trusted content, and real-time security scanning and remediation.

Learn more

Show Details

Getting to the event

Show Location: Moscone Center

747 Howard Street San Francisco, CA 94103

Show Dates: May 6-9, 2024

Show Hours: Monday, 5:30 PM-7 PM PT

Tuesday - Wednesday, 10 AM-6 PM PT

Thursday, 10 AM-2 PM PT

Red Hat Booth: #5273 North Expo

Resources

Check out these resources before RSA Conference or share them with your team after the event

Open unlocks the world's potential

At Red Hat, our commitment to open source extends beyond technology into virtually everything we do. We collaborate and share ideas, create inclusive communities, and welcome diverse perspectives from all Red Hatters, no matter their role. It’s what makes us who we are. Join us.