Red Hat VirtualizationRed Hat
|
||||||
Related Products
|
||||||
About
Ensure the security of your workloads, simplify regulatory compliance, and guarantee data sovereignty with IBM Cloud Secure Virtualization. A trusted cloud infrastructure must be able to answer these questions for corporate oversight, security, and compliance. A customer wants to create an environment where administration, workload execution, and data access are constrained to a particular geo-location with full audit capabilities. During deployment, identify the firmware configurations you will allow and the hypervisor configurations you have approved. Accurately identify each physical host and its physical location, creating a snapshot or fingerprint of each trusted host's launch configuration. This is stored in an allowlist. If the measurements of a host's BIOS and hypervisor match the measurements stored in the allowlist, the boot environment is attested. The host launches into a state that is considered trusted.
|
About
Red Hat® Virtualization is an enterprise virtualization platform that supports key virtualization workloads including resource-intensive and critical applications, built on Red Hat Enterprise Linux® and KVM and fully supported by Red Hat. Virtualize your resources, processes, and applications with a stable foundation for a cloud-native and containerized future. Automate, manage, and modernize your virtualization workloads. Whether automating daily operations or managing your VMs in Red Hat OpenShift, Red Hat Virtualization uses the Linux® skills your team knows and will build upon for future business needs. Built on an ecosystem of platform and partner solutions and integrated with Red Hat Enterprise Linux, Red Hat Ansible Automation Platform, Red Hat OpenStack® Platform, and Red Hat OpenShift to improve overall IT productivity and drive a higher return on investment.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Companies seeking a solution to ensure the security of their workloads and simplify regulatory compliance
|
Audience
IT professionals and businesses looking for a complete Server Virtualization solution
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationIBM
Founded: 1911
United States
www.ibm.com/cloud/architecture/architectures/virtualization_security_hytrust/
|
Company InformationRed Hat
Founded: 1993
United States
www.redhat.com
|
|||||
Alternatives |
Alternatives |
|||||
|
|
|
|||||
|
|
||||||
|
|
||||||
|
|
||||||
Categories |
Categories |
|||||
Virtualization Features
Archiving & Retention
Capacity Monitoring
Data Mobility
Desktop Virtualization
Disaster Recovery
Namespace Management
Performance Management
Version Control
Virtual Machine Monitoring
Server Virtualization Features
Audit Management
Health Monitoring
Live Machine Migration
Multi-OS Virtual Machines
Patching / Backup
Performance Log
Performance Optimization
Rapid Provisioning
Security Management
Type 1 / Type 2 Hypervisor
|
||||||
Integrations
Bacula Enterprise
HyTrust
IBM Cloud
KeepItSafe
Maxta
Red Hat CloudForms
Red Hat OpenShift
Storware
TrilioVault
|
Integrations
Bacula Enterprise
HyTrust
IBM Cloud
KeepItSafe
Maxta
Red Hat CloudForms
Red Hat OpenShift
Storware
TrilioVault
|
|||||
|
|
|