Iscriviti al feed

Are your edge computing systems secure? A simple question with a potentially complicated answer. This is because many engineering teams combine Red Hat Enterprise Linux with decoupled applications thanks to containerization technologies. But with so many changes happening across your organization, it can be hard to scale your infrastructure. Managing the lifecycle of your Red Hat Enterprise Linux with edge management to make it easy to standardize, deploy and enhance security posture throughout the system’s lifecycle.  This post takes an in-depth look at edge management from this perspective.

Standardized images

Creating a standard operating environment is key to scaling—without standardization, it becomes exponentially difficult to understand and manage your security composure. So we enable you to create images that can be customized to include any software you wish, both from Red Hat and third-party vendors, as well as configuration details, like a username and ssh public key. Once built, your image can be automatically deployed to your edge computing systems, which means bit for bit, byte for byte, the operating system is identical across your fleet.

Zero-touch onboarding

As you deploy your standardized image across your environments, from development to production, you’re going to want to register these systems back to the edge management console. Just bake in your activation key and organization ID into the ISO, and every time you deploy a new system it will be registered back, giving you the visibility and lifecycle management capabilities you need to build a stronger security profile and stay more up-to-date. 

Grouping and filtering

We know you don't think about your systems as a single entity—they’re probably part of a larger fleet— so we give you the tools and flexibility to map your systems however you like. This is foundational to any good lifecycle management platform, and core to effecting change across your fleet. More often than not, changes are made across a fleet or group, mitigating risk with progressive changes, or reliable rollback capabilities. So we make it possible for you to group your systems and refine your views in a way that works best for you.

Identifying vulnerability with Red Hat Insights

Systems out in the wild have greater security requirements—gone are the days when you could deploy remote computing systems and forget about them until they break. In today's ever-connected world, system security is a top priority. We use the power of Red Hat Insights to provide vulnerability analysis and system security recommendations, so you’ll have a better real-time understanding of risk. 

Generating and deploying updates

Understanding risk on its own is not enough—you also need to remediate or mitigate known risks by generating and deploying Red Hat Enterprise Linux capabilities for edge updates. New updates can add or remove packages, or update the versions of already installed packages. When you’ve created an update, you can just as easily generate static deltas and push the update to a single system or a group in a way that’s better for intermittently connected or high latency connections. And if there's a problem, updates can be automatically rolled back to a known good state.

Someone said I should stop here!

Seriously, I could carry on until I’m blue in the face. But my favorite thing about all of this; it’s available as-a-service. Easy to use and consume without any prerequisites, just log in and get started. What better way to learn more? Try the demo environment, then login and get started for yourself.


Sull'autore

Sean O'Keeffe is a Principal Product Manager at Red Hat, focusing on the management of Red Hat Enterprise Linux. Having previously worked in small and large technology organizations, he now creates products that solve problems for the technology organizations of today.

Read full bio
UI_Icon-Red_Hat-Close-A-Black-RGB

Ricerca per canale

automation icon

Automazione

Novità sull'automazione IT di tecnologie, team e ambienti

AI icon

Intelligenza artificiale

Aggiornamenti sulle piattaforme che consentono alle aziende di eseguire carichi di lavoro IA ovunque

open hybrid cloud icon

Hybrid cloud open source

Scopri come affrontare il futuro in modo più agile grazie al cloud ibrido

security icon

Sicurezza

Le ultime novità sulle nostre soluzioni per ridurre i rischi nelle tecnologie e negli ambienti

edge icon

Edge computing

Aggiornamenti sulle piattaforme che semplificano l'operatività edge

Infrastructure icon

Infrastruttura

Le ultime novità sulla piattaforma Linux aziendale leader a livello mondiale

application development icon

Applicazioni

Approfondimenti sulle nostre soluzioni alle sfide applicative più difficili

Original series icon

Serie originali

Raccontiamo le interessanti storie di leader e creatori di tecnologie pensate per le aziende