Red Hat provides open source software solutions using a community-powered approach to deliver reliable and high-performing Cloud, Linux, middleware, storage, and virtualization technologies. Red Hat also offers support, training, and consulting services. As a connective hub in a global network of enterprises, partners, and open source communities, Red Hat helps create relevant, innovative technologies that liberate resources for growth and prepare customers for the future.
Entrust nShield hardware security modules (HSMs), deployed on-premises or as a service, integrate with Red Hat OpenShift, OpenStack, and Certificate System platforms to deliver enhanced security.
OpenShift container platform: nShield offers enhanced key generation, signing, and encryption. For the first time, as part of the DevOps process, developers can use industry-proven nShield HSMs to protect sensitive container data and transactions.
OpenStack cloud platform: nShield HSMs provide enhanced security and compliance, as well as a certified source of entropy for generating keys. nShield protects the master key used to secure the storage, transport, and service keys managed by the Barbican key management system.
Certificate System: nShield HSMs secure the critical private keys that underpin the security that bind people, devices, and services. nShield increase the assurance level of the Certificate System PKI by protecting the private root and signing CA keys.
PAN‑OS®, the software that runs all Palo Alto Networks® next-generation firewalls has integrated IdentityGuard, IntelliTrust and Authority as authentication methods for protecting services and applications.
Administrators or end users can authenticate using Palo Alto's GlobalProtect (VPN) to access various services and applications using Entrust's Multi-Factor Authentication methods. This protects your network and accommodates your existing security infrastructure while ensuring a smooth user experience.
Using Entrust's Authority PKI, you can deploy certificates to enable authentication without users having to manually respond to login challenges. Alternatively, or in addition to certificates, you can implement interactive authentication using IdentityGuard or IntelliTrust, which requires users to authenticate using one or more methods.
Talk to an expert
Our experts will contact you to discuss how our partnerships and solutions can meet your needs.