A guide to security technologies in Red Hat Enterprise Linux

Read the original article: A guide to security technologies in Red Hat Enterprise Linux


Red Hat has a long history of adopting and creating security technologies to harden our core platforms, such as Red Hat Enterprise Linux (RHEL). When other platforms or layered products are used with RHEL, they inherit many of these protections due to that foundation. 


Read the original article: A guide to security technologies in Red Hat Enterprise Linux