
Red Hat Advanced Cluster Security for Kubernetes


Red Hat Advanced Cluster Security for Kubernetes
By Red Hat
Certified enterprise ready
Red Hat Advanced Cluster Security for Kubernetes provides a Kubernetes-native architecture for container security, enabling DevOps and InfoSec teams to operationalize full life cycle Kubernetes security.
Runs on
OpenShift 4.6 - 4.16
Delivery method
Operator
Advanced Cluster Security Premium
Red Hat Advanced Cluster Security for Kubernetes - Premium Annual Subscription
Visibility, Vulnerability Management, Compliance, Network Segmentation, Risk Profiling
Configuration Management, Runtime detection and response, Integrations
2 Cores or 4 VCPUs per year - Includes Premium Support
Advanced Cluster Security Standard
Red Hat Advanced Cluster Security for Kubernetes - Standard Annual Subscription
Visibility, Vulnerability Management, Compliance, Network Segmentation, Risk Profiling
Configuration Management, Runtime detection and response, Integrations
2 Cores or 4 VCPUs per year - Standard support
Advanced Cluster Security Premium
Red Hat Advanced Cluster Security for Kubernetes - Premium Annual Subscription
Visibility, Vulnerability Management, Compliance, Network Segmentation, Risk Profiling
Configuration Management, Runtime detection and response, Integrations
2 Cores or 4 VCPUs per year - Includes Premium Support
Advanced Cluster Security Standard
Red Hat Advanced Cluster Security for Kubernetes - Standard Annual Subscription
Visibility, Vulnerability Management, Compliance, Network Segmentation, Risk Profiling
Configuration Management, Runtime detection and response, Integrations
2 Cores or 4 VCPUs per year - Standard support