SlideShare a Scribd company logo
Learn more at
https://facts.pt/G94Mifm
Securing Red Hat
workloads on Azure
Leveraging the strength of cloud-native security
Run Red Hat workloads with multiple layers of protection on the Azure platform
Infrastructure
Azure Boost, Retina, Azure Monitor, and
other key tools protect the foundational
components of IT environments,
including physical and virtual systems,
networks, and data centers.
Data
Azure uses many approaches to encrypt
data at rest and data in transit. Encryption
approaches for data at rest include server-
side and Azure disk encryption. Encryption
approaches for data in transit include transit
layer support (TLS) encryption and more.
Application
Microsoft Entra ID,
Microsoft Defender for
Cloud, Red Hat®
Insights,
and other tools that
safeguard software can
prevent unauthorized
access, data breaches, and
malicious exploitation.
Code
GitHub Advanced Security
for Azure DevOps protects
code from vulnerabilities,
threats, and malicious
attacks to ensure
integrity, confidentiality,
and availability.
Receive partner
architecture
guidance
Microsoft and Red Hat
have partnered to create a
ready-made starting point
called Landing Zone for Red
Hat Enterprise Linux on Azure.
Get integrated
support for Red Hat
workloads on Azure
Red Hat and Microsoft share
an integrated, co-located
support team that serves as
a unified contact point for
Red Hat ecosystems running
on Azure. This team provides
expertise, knowledge, and
joint support models.
Follow compliance
regulations with
Azure Marketplace
for Red Hat images
Microsoft and Red Hat
engineering teams work closely
to build standard images within
the Azure Marketplace.
Red Hat Enterprise
Linux®
compatibility
with Azure confidential
VMs provides hardware-
based isolation, OS disk
encryption, and more.
How customers win from the
Microsoft and Red Hat partnership
Azure and Red Hat integration
points and compatibilities
Integrating Microsoft
Entra and Red Hat Identity
Management enables
IT teams to centralize
administrative functionality
and user maintenance.
Customers can use Microsoft
Defender for Cloud for system
auditing, security management,
and threat protection. Users
can also connect Red Hat on
Azure VMs to Red Hat Insights
automatically for monitoring.
See more examples in the report.
Security
Copyright 2025 Principled Technologies, Inc. Based on “Securing Red Hat workloads on Azure,”
a Principled Technologies report, February 2025. Principled Technologies®
is a registered trademark
of Principled Technologies, Inc. All other product names are the trademarks of their respective owners.
Principled
Technologies®

More Related Content

Similar to Securing Red Hat workloads on Azure - Infographic (20)

PDF
Microsoft Cloud platform
HarmasQureshi
 
PDF
CSS17: Houston - Azure Shared Security Model Overview
Alert Logic
 
PPTX
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
European Collaboration Summit
 
PDF
An Explanation of the Top 4 Microsoft Azure Service Types
Flexsin
 
PDF
Microsoft Azure Overview
David J Rosenthal
 
PDF
Comprehensive Guide to Azure Cloud Services_ Features, Benefits, and Use Case...
unicloudm
 
PPTX
Azure security
Lalit Rawat
 
PDF
Adopting the Right Architecture for IoT Implementation
RapidValue
 
PDF
AZ-900 Summary with all information that
FadiAlkanani1
 
PPTX
Securing Your CI Pipeline with HashiCorp Vault - P2
Ashnikbiz
 
PPTX
10 reasons to use azure for your cloud apps
Laitkor Infosolutions Pvt. Ltd.
 
PPTX
Introduction-to-Microsoft-AzurePowerShell Module.pptx
MahmoudElmahdy23
 
PPTX
Microsoft Azure Online Training NareshIT 2023.
PrasannaNareshIT
 
PPTX
Microsoft Azure Online Training
PrasannaNareshIT
 
PPTX
Microsoft Azure Online Training.pptx
PrasannaNareshIT
 
PPTX
Microsoft Azure Online Training
PrasannaNareshIT
 
PPTX
Azure security and Compliance
Karina Matos
 
PPTX
Introduction to Cloud Computing.pptx
ojaswiniwagh
 
PDF
How Microsoft Azure is Shaping the Cloud Computing Landscape.pdf
easytech.de
 
PDF
Cloud Computing Interview Questions PDF By ScholarHat
Scholarhat
 
Microsoft Cloud platform
HarmasQureshi
 
CSS17: Houston - Azure Shared Security Model Overview
Alert Logic
 
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
European Collaboration Summit
 
An Explanation of the Top 4 Microsoft Azure Service Types
Flexsin
 
Microsoft Azure Overview
David J Rosenthal
 
Comprehensive Guide to Azure Cloud Services_ Features, Benefits, and Use Case...
unicloudm
 
Azure security
Lalit Rawat
 
Adopting the Right Architecture for IoT Implementation
RapidValue
 
AZ-900 Summary with all information that
FadiAlkanani1
 
Securing Your CI Pipeline with HashiCorp Vault - P2
Ashnikbiz
 
10 reasons to use azure for your cloud apps
Laitkor Infosolutions Pvt. Ltd.
 
Introduction-to-Microsoft-AzurePowerShell Module.pptx
MahmoudElmahdy23
 
Microsoft Azure Online Training NareshIT 2023.
PrasannaNareshIT
 
Microsoft Azure Online Training
PrasannaNareshIT
 
Microsoft Azure Online Training.pptx
PrasannaNareshIT
 
Microsoft Azure Online Training
PrasannaNareshIT
 
Azure security and Compliance
Karina Matos
 
Introduction to Cloud Computing.pptx
ojaswiniwagh
 
How Microsoft Azure is Shaping the Cloud Computing Landscape.pdf
easytech.de
 
Cloud Computing Interview Questions PDF By ScholarHat
Scholarhat
 

More from Principled Technologies (20)

PDF
Dell Pro 14 Plus: Be better prepared for what’s coming
Principled Technologies
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PDF
Make GenAI investments go further with the Dell AI Factory - Infographic
Principled Technologies
 
PDF
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
PDF
Unlock faster insights with Azure Databricks
Principled Technologies
 
PDF
Speed up your transactions and save with new Dell PowerEdge R7725 servers pow...
Principled Technologies
 
PDF
The case for on-premises AI
Principled Technologies
 
PDF
Dell PowerEdge server cooling: Choose the cooling options that match the need...
Principled Technologies
 
PDF
Speed up your transactions and save with new Dell PowerEdge R7725 servers pow...
Principled Technologies
 
PDF
Propel your business into the future by refreshing with new one-socket Dell P...
Principled Technologies
 
PDF
Propel your business into the future by refreshing with new one-socket Dell P...
Principled Technologies
 
PDF
Unlock flexibility, security, and scalability by migrating MySQL databases to...
Principled Technologies
 
PDF
Migrate your PostgreSQL databases to Microsoft Azure for plug‑and‑play simpli...
Principled Technologies
 
PDF
On-premises AI approaches: The advantages of a turnkey solution, HPE Private ...
Principled Technologies
 
PDF
A Dell PowerStore shared storage solution is more cost-effective than an HCI ...
Principled Technologies
 
PDF
Gain the flexibility that diverse modern workloads demand with Dell PowerStore
Principled Technologies
 
PDF
Save up to $2.8M per new server over five years by consolidating with new Sup...
Principled Technologies
 
PDF
Streamline heterogeneous database environment management with Toad Data Studio
Principled Technologies
 
PDF
Run your in-house AI chatbot on an AMD EPYC 9534 processor-powered Dell Power...
Principled Technologies
 
PDF
Boost productivity with an HP ZBook Power G11 A Mobile Workstation PC
Principled Technologies
 
Dell Pro 14 Plus: Be better prepared for what’s coming
Principled Technologies
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
Make GenAI investments go further with the Dell AI Factory - Infographic
Principled Technologies
 
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
Unlock faster insights with Azure Databricks
Principled Technologies
 
Speed up your transactions and save with new Dell PowerEdge R7725 servers pow...
Principled Technologies
 
The case for on-premises AI
Principled Technologies
 
Dell PowerEdge server cooling: Choose the cooling options that match the need...
Principled Technologies
 
Speed up your transactions and save with new Dell PowerEdge R7725 servers pow...
Principled Technologies
 
Propel your business into the future by refreshing with new one-socket Dell P...
Principled Technologies
 
Propel your business into the future by refreshing with new one-socket Dell P...
Principled Technologies
 
Unlock flexibility, security, and scalability by migrating MySQL databases to...
Principled Technologies
 
Migrate your PostgreSQL databases to Microsoft Azure for plug‑and‑play simpli...
Principled Technologies
 
On-premises AI approaches: The advantages of a turnkey solution, HPE Private ...
Principled Technologies
 
A Dell PowerStore shared storage solution is more cost-effective than an HCI ...
Principled Technologies
 
Gain the flexibility that diverse modern workloads demand with Dell PowerStore
Principled Technologies
 
Save up to $2.8M per new server over five years by consolidating with new Sup...
Principled Technologies
 
Streamline heterogeneous database environment management with Toad Data Studio
Principled Technologies
 
Run your in-house AI chatbot on an AMD EPYC 9534 processor-powered Dell Power...
Principled Technologies
 
Boost productivity with an HP ZBook Power G11 A Mobile Workstation PC
Principled Technologies
 
Ad

Recently uploaded (20)

PDF
TrustArc Webinar - Navigating Data Privacy in LATAM: Laws, Trends, and Compli...
TrustArc
 
PPTX
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
PPTX
Simple and concise overview about Quantum computing..pptx
mughal641
 
PDF
introduction to computer hardware and sofeware
chauhanshraddha2007
 
PDF
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PPTX
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
PPTX
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PPTX
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PDF
Per Axbom: The spectacular lies of maps
Nexer Digital
 
PDF
Build with AI and GDG Cloud Bydgoszcz- ADK .pdf
jaroslawgajewski1
 
PDF
RAT Builders - How to Catch Them All [DeepSec 2024]
malmoeb
 
PPTX
Agile Chennai 18-19 July 2025 | Workshop - Enhancing Agile Collaboration with...
AgileNetwork
 
PPTX
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
Priyanka Aash
 
PDF
The Future of Artificial Intelligence (AI)
Mukul
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
TrustArc Webinar - Navigating Data Privacy in LATAM: Laws, Trends, and Compli...
TrustArc
 
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
Simple and concise overview about Quantum computing..pptx
mughal641
 
introduction to computer hardware and sofeware
chauhanshraddha2007
 
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
Per Axbom: The spectacular lies of maps
Nexer Digital
 
Build with AI and GDG Cloud Bydgoszcz- ADK .pdf
jaroslawgajewski1
 
RAT Builders - How to Catch Them All [DeepSec 2024]
malmoeb
 
Agile Chennai 18-19 July 2025 | Workshop - Enhancing Agile Collaboration with...
AgileNetwork
 
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
Priyanka Aash
 
The Future of Artificial Intelligence (AI)
Mukul
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
Ad

Securing Red Hat workloads on Azure - Infographic

  • 1. Learn more at https://facts.pt/G94Mifm Securing Red Hat workloads on Azure Leveraging the strength of cloud-native security Run Red Hat workloads with multiple layers of protection on the Azure platform Infrastructure Azure Boost, Retina, Azure Monitor, and other key tools protect the foundational components of IT environments, including physical and virtual systems, networks, and data centers. Data Azure uses many approaches to encrypt data at rest and data in transit. Encryption approaches for data at rest include server- side and Azure disk encryption. Encryption approaches for data in transit include transit layer support (TLS) encryption and more. Application Microsoft Entra ID, Microsoft Defender for Cloud, Red Hat® Insights, and other tools that safeguard software can prevent unauthorized access, data breaches, and malicious exploitation. Code GitHub Advanced Security for Azure DevOps protects code from vulnerabilities, threats, and malicious attacks to ensure integrity, confidentiality, and availability. Receive partner architecture guidance Microsoft and Red Hat have partnered to create a ready-made starting point called Landing Zone for Red Hat Enterprise Linux on Azure. Get integrated support for Red Hat workloads on Azure Red Hat and Microsoft share an integrated, co-located support team that serves as a unified contact point for Red Hat ecosystems running on Azure. This team provides expertise, knowledge, and joint support models. Follow compliance regulations with Azure Marketplace for Red Hat images Microsoft and Red Hat engineering teams work closely to build standard images within the Azure Marketplace. Red Hat Enterprise Linux® compatibility with Azure confidential VMs provides hardware- based isolation, OS disk encryption, and more. How customers win from the Microsoft and Red Hat partnership Azure and Red Hat integration points and compatibilities Integrating Microsoft Entra and Red Hat Identity Management enables IT teams to centralize administrative functionality and user maintenance. Customers can use Microsoft Defender for Cloud for system auditing, security management, and threat protection. Users can also connect Red Hat on Azure VMs to Red Hat Insights automatically for monitoring. See more examples in the report. Security Copyright 2025 Principled Technologies, Inc. Based on “Securing Red Hat workloads on Azure,” a Principled Technologies report, February 2025. Principled Technologies® is a registered trademark of Principled Technologies, Inc. All other product names are the trademarks of their respective owners. Principled Technologies®