Cybersecurity Architect/System Security Engineer at General Dynamics Mission Systems–Canada
MSP
Top 20
2023-08-21T20:20:36Z
Aug 21, 2023
Make sure your security folks are getting the support and investment in it, depending on how you want to use it. It's unfortunate that in some environments, everything seems golden, but just in case you have a tool, if your staff does not, it's pretty much worthless. Overall, I would rate the solution a seven out of ten.
Principal Infrastructure Engineer at a logistics company with 10,001+ employees
Real User
Top 5
2023-06-27T10:02:59Z
Jun 27, 2023
Actually, I'm not using the Red Hat Kubernetes service. I'm just using the integrated Kubernetes, which comes with OpenShift. I rate the overall solution a nine out of ten.
I would highly recommend it to our customers. Red Hat OpenShift is one of the most promising platforms and has a lot of installed briefs. Considering the security controls and features of this solution, it is mandatory nowadays. It comes highly recommended and is supported by our technical solutions. Overall, it is an eight out of ten because it covers all the security features, and is reliable and scalable. Also, it is cost-efficient. However, some features are still not ready yet. In this case, you need to add some complementary solutions to provide the full picture of the security controls. On a scale of one to ten, if ten security controls are required to be covered, then Red Hat can provide six or seven out of ten. The remaining three to four out of ten are out of scope or not covered yet by the platform itself. So, it's necessary to consider some security controls out of the box, such as vulnerability scanner, static code analysis, dynamic code analysis, etc., to ensure that this platform can provide security controls across these containers.
Container Security solutions safeguard containerized applications from threats throughout their lifecycle, covering image scanning, runtime protection, compliance assurance, access control, and integration with CI/CD pipelines.
I rate Red Hat Advanced Cluster Security for Kubernetes nine out of 10.
Make sure your security folks are getting the support and investment in it, depending on how you want to use it. It's unfortunate that in some environments, everything seems golden, but just in case you have a tool, if your staff does not, it's pretty much worthless. Overall, I would rate the solution a seven out of ten.
Actually, I'm not using the Red Hat Kubernetes service. I'm just using the integrated Kubernetes, which comes with OpenShift. I rate the overall solution a nine out of ten.
I recommend the solution to others and rate it an eight out of ten.
I would highly recommend it to our customers. Red Hat OpenShift is one of the most promising platforms and has a lot of installed briefs. Considering the security controls and features of this solution, it is mandatory nowadays. It comes highly recommended and is supported by our technical solutions. Overall, it is an eight out of ten because it covers all the security features, and is reliable and scalable. Also, it is cost-efficient. However, some features are still not ready yet. In this case, you need to add some complementary solutions to provide the full picture of the security controls. On a scale of one to ten, if ten security controls are required to be covered, then Red Hat can provide six or seven out of ten. The remaining three to four out of ten are out of scope or not covered yet by the platform itself. So, it's necessary to consider some security controls out of the box, such as vulnerability scanner, static code analysis, dynamic code analysis, etc., to ensure that this platform can provide security controls across these containers.
I would rate this solution 9 out of 10.