Sydney, Australia – November 8, 2018 – Red Hat, Inc. (NYSE: RHT), the world's leading provider of open source solutions today announced the general availability of Red Hat Enterprise Linux 7.6, a consistent hybrid cloud foundation for enterprise IT built on open source innovation. Red Hat Enterprise Linux 7.6 is designed to enable organisations to better keep pace with emerging cloud-native technologies while still supporting stable IT operations across enterprise IT’s four footprints.
According to Gartner, “the landscape of cloud adoption is one of hybrid clouds and multiclouds. By 2020, 75% of organisations will have deployed a multicloud or hybrid cloud model.” Red Hat believes that this indicates that a common foundation, one that can handle workloads in a consistent fashion regardless of whether they are running on bare metal or on a public cloud instance, is a key need for enterprises as they embrace a variety of cloud computing models.
Red Hat Enterprise Linux 7 helps to provide this foundation, enabling organisations to deploy applications on a footprint that can best fit their unique needs, with the knowledge that the underlying operating system remains the same consistent and mission-critical-ready platform. The latest version of Red Hat Enterprise Linux 7 brings enhancements designed to address a range of IT challenges, emphasising security and compliance, management and automation, and Linux container innovations.
Security and compliance
IT security remains a constant, key challenge for many IT departments, and one that does not get easier in complex hybrid and multicloud environments. To better answer these IT security needs, Red Hat Enterprise Linux 7.6 introduces Trusted Platform Module (TPM) 2.0 hardware modules as part of Network Bound Disk Encryption (NBDE). This provides two layers of security for hybrid cloud operations to help keep information on disks physically more secure: The network-based mechanism (NBDE) provides security across networked environments, while TPM works on-premise to add an additional layer, tying disks to specific physical systems.
Red Hat Enterprise Linux 7.6 also makes it easier to manage firewalls with enhancements to nftables, simplifying the configuration of counterintrusion measures and giving operations teams more visibility into these mechanisms. Additionally, updated cryptographic algorithms delivered for RSA and elliptic-curve cryptography (ECC) are enabled by default, helping organisations handling sensitive information to better keep pace with Federal Information Processing Standards (FIPS) compliance and requirements from standards bodies like the National Institute of Standards and Technology (NIST).
Management and automation
As Linux becomes a default choice in many datacentres, Linux operating systems need to become more accessible to new administrators, both those new to the role and sysadmins that have previously managed other operating systems like Windows. Red Hat Enterprise Linux 7.6 is designed to help make Linux adoption easier for these users with enhancements to the Red Hat Enterprise Linux Web Console, which provides graphical overview of Red Hat system health and status. These enhancements include easier to find updates, automated configuration of single sign-on for identity management and a firewall control interface.
Red Hat Enterprise Linux 7.6 also provides support for Red Hat Enterprise Linux System Roles, a collection of Ansible modules that are designed to provide a stable and consistent way to automate and remotely manage Red Hat Enterprise Linux deployments. Each module provides a ready-made automated workflow for handling common, complex tasks that arise as part of the day-to-day management of Linux environments. This automation helps to remove the human element of error from these tasks and free up IT teams to focus on adding business value instead of “keeping the lights on.”
Linux container innovations
The rise of cloud-native technologies as a component of enterprise digital transformation remains a key focus area for Red Hat, with Red Hat Enterprise Linux 7.6 addressing this through Red Hat’s lightweight container toolkit. Built with enterprise-grade security in mind, the toolkit is comprised of Buildah, Skopeo, CRI-O and now Podman. Each of these tools are built on fully open source, community-backed technologies and based on open standards like the Open Container Initiative (OCI) format.
Complementing Buildah and Skopeo and sharing the same foundations as CRI-O, the introduction of Podman enables users to run containers and groups of containers (pods) from a familiar command-line interface without requiring a daemon to do so. This helps to reduce the complexity around container creation and makes it easier for developers to build containers on workstations, in continuous integration/continuous development (CI/CD) systems and even within high-performance computing (HPC) or big data scheduling systems.
Red Hat Enterprise Linux 7.6 is available today to Red Hat Enterprise Linux customers with active subscriptions.
Stefanie Chiras, vice president and general manager, Red Hat Enterprise Linux, Red Hat “Increasingly, hybrid cloud has been adopted as a flexible means to deliver digital transformation and IT modernisation, but enterprises should have a stable and more secure foundation to provide this innovation with consistency. Red Hat Enterprise Linux 7.6 is designed to be the trusted bedrock for hybrid cloud deployments, enabling IT organisations to deliver applications and services with more confidence and without compromising the flexibility to embrace emerging computing concepts, like cloud-native workloads and automation"
• Read the release notes for Red Hat Enterprise Linux 7.6
• Learn more about Red Hat Enterprise Linux
• Find out more about the open hybrid cloud
• Discover more about how Red Hat helps organisations use container innovations
Connect with Red Hat
• Learn more about Red Hat
• Get more news in the Red Hat newsroom
• Read the Red Hat blog
• Follow Red Hat on Twitter
• Join Red Hat on Facebook
• Watch Red Hat videos on YouTube
• Join Red Hat on Google+
• Follow Red Hat on LinkedIn
About Red Hat, Inc.
Red Hat is the world’s leading provider of enterprise open source software solutions, using a community-powered approach to deliver reliable and high-performing Linux, hybrid cloud, container, and Kubernetes technologies. Red Hat helps customers integrate new and existing IT applications, develop cloud-native applications, standardise on our industry-leading operating system, and automate, secure, and manage complex environments. Award-winning support, training, and consulting services make Red Hat a trusted adviser to the Fortune 500. As a strategic partner to cloud providers, system integrators, application vendors, customers, and open source communities, Red Hat can help organisations prepare for the digital future.
Certain statements contained in this press release may constitute "forward-looking statements" within the meaning of the Private Securities Litigation Reform Act of 1995. Forward-looking statements provide current expectations of future events based on certain assumptions and include any statement that does not directly relate to any historical or current fact. Actual results may differ materially from those indicated by such forward-looking statements as a result of various important factors, including: risks related to the ability of the Company to compete effectively; the ability to deliver and stimulate demand for new products and technological innovations on a timely basis; delays or reductions in information technology spending; the integration of acquisitions and the ability to market successfully acquired technologies and products; risks related to errors or defects in our offerings and third-party products upon which our offerings depend; risks related to the security of our offerings and other data security vulnerabilities; fluctuations in exchange rates; changes in and a dependence on key personnel; the effects of industry consolidation; uncertainty and adverse results in litigation and related settlements; the inability to adequately protect Company intellectual property and the potential for infringement or breach of license claims of or relating to third party intellectual property; the ability to meet financial and operational challenges encountered in our international operations; and ineffective management of, and control over, the Company's growth and international operations, as well as other factors contained in our most recent Quarterly Report on Form 10-Q (copies of which may be accessed through the Securities and Exchange Commission's website at http://www.sec.gov), including those found therein under the captions "Risk Factors" and "Management's Discussion and Analysis of Financial Condition and Results of Operations". In addition to these factors, actual future performance, outcomes, and results may differ materially because of more general factors including (without limitation) general industry and market conditions and growth rates, economic and political conditions, governmental and public policy changes and the impact of natural disasters such as earthquakes and floods. The forward-looking statements included in this press release represent the Company's views as of the date of this press release and these views could change. However, while the Company may elect to update these forward-looking statements at some point in the future, the Company specifically disclaims any obligation to do so. These forward-looking statements should not be relied upon as representing the Company's views as of any date subsequent to the date of this press release.
Red Hat, Red Hat Enterprise Linux, the Shadowman logo and Ansible are trademarks or registered trademarks of Red Hat, Inc. or its subsidiaries in the U.S. and other countries. Linux® is the registered trademark of Linus Torvalds in the U.S. and other countries.
Tamara Baker was awarded the CSO Special Recognition award at the 2019 CSO Inaugural Women in Security Awards in September.
Increasing mandates around the security of personal data have made encryption for every business. Australian businesses are leading the world in the use of encryption to protect backups, payment-related data, and laptops – and yet they still have a long way to go before encryption is both ubiquitous and manageable.
If your last access-control update was even a few years ago, you’re probably more exposed to fraud and exploitation than you’d like to be.
It’s not hard to understand why bot management is critical to maintaining business availability and customer satisfaction – but do you know how to properly deal with bots?
Increasing use of encryption has created new challenges for enterprise security managers. Ever more-sophisticated encryption such as Perfect Forward Secrecy (PFS) protects data and may even boost your Google ranking – but it also provides a haven for malicious code that may use encryption to bypass enterprise security controls.