MEETING DO-278 WITH RED HAT ENTERPRISE LINUX 5 Maã Shepsu Menåb Nuíríãnkh, Red Hat Solutions Architect, RHCE
|
|
|
- Laurel Tucker
- 9 years ago
- Views:
Transcription
1 MEETING DO-278 WITH RED HAT ENTERPRISE LINUX 5 Maã Shepsu Menåb Nuíríãnkh, Red Hat Solutions Architect, RHCE 1 Introduction 2 2 the Open Source 4 SoftwareDevelopment Model 3 Red Hat's Internal Processes 6 4 Summary: COTS Objectives: Commercial Off-The-Shelf (COTS) Software 8 REFERENCES 10
2 1. Introduction As part of services engagement proposals now pending with FAA ASRC-MS, this document discusses relevant issues and outlines how we would go about supporting the DO-278 approval process. 1.1 Purpose This purpose of this document is to highlight the features, functions and capabilities of the Red Hat Enterprise Linux (RHEL) version 5 operating system (OS) that support the CNS/ATM (Communication, Navigation, Surveillance, and Air Traffic Management) system objectives of DO-278 for approval at assurance level 3 (AL3). 1.2 Basic Assumptions and Frame of Reference In some ways, it is difficult to compare the features and functions of a software system to the requirements of DO-278 in isolation from the environment in which the software will be used. This is because DO-278 approval is an administrative process whereby authority is granted to use a software system within its operational environment including all of its non-it (information technology) parts at the FAA. One way to surmount this difficulty is to take a page from the Common Criteria (2) world and separate the evaluation for DO-278 into two parts, a Target of Evaluation (TOE) and the Operational Environment (OE). The TOE in this case would be the RHEL 5 OS. The OE would be the specific application and IT environment within the FAA. For example, in order to apply for DO-278 approval, FAA must first complete a safety assessment (1) to determine the proper Assurance Level (AL) needed for approval. We would of course welcome an opportunity to assist ASRC-MS and/or other groups within FAA in achieving DO-278 approval. The remainder of this document discusses ideas, and information that would be relevant to that process. The safety assessment, and the system aspects relating to CNS/ATM software development, objectives for CNS/ATM systems along with the COTS, Commercial Off-The-Shelf (COTS) Software, sections of DO-278 lay out the foundations and requirements for approval. The idea of software integrity assurance hinges on providing sufficient evidence in the TOE and OE that the requirements for a given AL (AL3 in this case) specified by the safety assessment are met. Two key principles of quality are "fit for purpose" (the product should be suitable for the intended purpose) and "right first time" (mistakes should be eliminated) (10). Therefore a software system that performs the intended functions correctly with acceptable performance levels and zero or near zero defects would be judged as high quality by its users. The better a software system or component does in terms of fit for purpose and minimizing defects, the greater the level of confidence or "assurance" for the end user. The definition of integrity applied to software revolves around the idea that software is unaltered from its intended form and function and it's ability to perform in a consistent, reliable, stable manner in a given environment. Software integrity also includes the idea that software is unaltered during delivery, and its source is known or identifiable. 2
3 1.3 DO-278 Approval Process The DO-278 approval process provides for two avenues to achieve standardized evaluation criteria. DO-278 Section 3: OBJECTIVES FOR CNS/ATM SYSTEMS defines the criteria for software originally designed and developed with DO-278 compliance in mind. The other avenue available is described in DO-278 Section 4.1: Commercial Off-The-Shelf (COTS) Software. The COTS approval route is appropriate for a general purpose OS such as RHEL 5. The COTS approval approach (see Paragraph 4 below) allows for an after the fact or "as-built" examination of a software system and/or its components. Open source software (OSS) such as Red Hat Enterprise Linux is uniquely suited for this approach to DO-278 approval because the source code for the entire system is readily available and/or provided when obtaining the binary executables. 1.4 Certifications and Accreditations Red Hat Enterprise Linux is the most certified operating system available today. RHEL has passed the Common Criteria process 12 times on four different hardware platforms. RHEL 5 has even received Common Criteria certification at Evaluation Assurance Level 4 (EAL 4+) under the Controlled Access Protection Profile (CAPP), Label Security Protection Profile (LSPP), and the Role-Based Access Control Protection Profile (RBACPP). These certifications were at a level previously unheard of from a mainstream operating system. In June 2009, JBoss Enterprise Application Platform 4.3 achieved Common Criteria certification at EAL 2+ (augmented for flaw remediation). This marks the first Common Criteria certification for JBoss Enterprise Middleware, giving Government agencies and other security-conscious organizations a new choice for enterprise Java applications. Customers can now deploy JBoss Enterprise Application Platform 4.3 with the added confidence that it meets the security standards set forth through Common Criteria. In early October 2009, Red Hat s Data Services Platform, specifically MetaMatrix 5.5.3, achieved Common Criteria certification at Evaluation Assurance Level (EAL) 2. Red Hat Enterprise Linux is on the DISA Approved Products Lists for IPv6. The Department of Defense has mandated that IT systems move toward IPv6 while maintaining IPv4 (the currently more common network). Only four operating systems, including RHEL have gone through the certification process ( disa.mil/apl/ipv6.html). RHEL was recently awarded the COE certification by the US Defense Information Systems Agency (DISA). RHEL is now approved for Department of Defense deployment. This certification further validates Red Hat Enterprise Linux as a mission-critical enterprise platform. COE (Common Operating Environment) certification assures that Red Hat Enterprise Linux meets DISA's stringent requirements for interoperability, performance, and standards compliance ( Red Hat Enterprise Linux provides out-of-the-box compliance with the NISPOM Chapter 8 audit requirements. A sample implementation can be found in /usr/doc/audit-1.5.2/nispom.rules in RHEL 5. RHEL has been used in systems from DCID-6 (DIRECTOR OF CENTRAL INTELLIGENCE DIRECTIVE 6/3) Protection Level 3 (PL3) up to PL5. Additional information and the list of certifications for RHEL can be found at: < solutions/government/certifications/#tab3>. 3
4 2. The Open Source Software Development Model The open source software development model consists of a world wide "ecosystem" of independent developers collaborating, competing and providing peer review for software projects. The OSS development model is inherently transparent (source code readily available for review and modification), standards based, and typically relies upon the Internet as the means of collaboration and communication. The peer review and end-user feedback (most code is free to download and try out) underpins the process of innovation, continuous improvement and refinement that has come to characterize OSS. Because open source gained hold with the rise of a public, worldwide, computer-network system called the Internet, and the attendant need for massive retooling of the computing source code, the code was often written to generally accepted software, communication, and technology standards in order to provide for interoperability (11). RHEL is based upon the Linux kernel developed over the Internet as OSS, and many other software programs and components, such as Apache, OpenOffice, Samba, and SELinux. Fedora is a free, community supported Linux distribution sponsored by Red Hat (13), which provides the so-called "upstream" for what eventually become RHEL releases (12). upstream (noun) - In free and open source projects, the upstream of a program or set of programs is the project that develops those programs. Fedora is downstream of those projects. This term comes from the idea that water and the goods it carries float downstream and benefit those who are there to receive it (12). As the upstream for RHEL releases, Fedora provides what could be the largest "beta software" test environment in the world. Consider that there are literally millions of unique users of Fedora (14) as shown in Table 1 below. Also, RHEL 5 is based on Fedora 7 which was released May 31, 2007, and which has been in continuous use by almost 4 million users since it was released. This constitutes a large amount of product service experience to be applied to the requirements of the DO-278 COTS approval process. Although, Fedora is community supported, users are still free to use the Red Hat Bugzilla (see Paragraph 3 below) bug reporting tool for problem reports and requests for enhancement or RFEs. Finally, only a limited subset of Fedora software packages actually make it into a RHEL release. Fedora has about 15,000 unique binary software packages in the repository, and only about 2500 binary packages are selected for inclusion in a RHEL release. These are the ones enterprise customers demand and which are supported by Red Hat (15). 4
5 Fedora 12 (Constantine unified starting on ) Yum Data: Current release connections (connections to yum) WeeK Dates NEw Unique IPS Total Unique IPS Total compared to leonidas Week ,620 91,620 87% Week , ,858 92% Week , ,052 97% Week , ,674 97% Week , ,889 99% Week , ,586 98% Week , ,682 97% Week , ,313 97% Week , ,736 97% Week , ,470 96% Week ,173 1,030,643 96% Week ,659 1,144,302 97% Week ,893 1,258,195 97% Week ,088 1,375,283 97% Total repository connections (as of ) Method Fedora 7 Fedora 8 Fedora 9 Fedora 10 Fedora 11 Fedora 12 Rawhide Total Mixed 3,974,281 5,957,677 3,351,302 3,860,133 3,349,836 1,375, ,616 22,834,128 New 3,995,628 6,039,010 3,506,940 3,860,133 3,349,836 1,375, ,616 23,092,446 Total unique IPs: 19,637,402 Initially there were two significant barriers to adoption of OSS for use in mission-critical applications among enterprise class customers, such as Government, banking, aviation, technology industries, and large retail establishments. The two big concerns were around software quality and integrity and paid support attached to service level agreements (SLAs). These questions have been repeatedly addressed through numerous studies and examination of actual source code from open source projects attesting to the high quality of OSS. For, example an OSS quality study by Coverity done for the Department of Homeland Security showed an average defect density of less than for the 32 OSS packages examined. The average defect density for the 32 open source packages analyzed was defects per thousand lines of code with a standard deviation of (8, pg. 4). Red Hat has played a pivotal role in OSS by working to enhance the quality of OSS projects, and providing the crucial paid support with attached SLA and the many other products and services which go into making RHEL consumable within the mission-critical portions of the enterprise. 5
6 3. Red Hat's Internal Processes Red Hat uses a company-wide approach emphasizing engineering, customer support, professional consulting services, and people programs, among others, to foster a corporate culture that nurtures an awareness of how quality and integrity affect our results and empowering employees to "stop the assembly line" if needed. 3.1 Engineering Red Hat is in a unique position in that we benefit from the best of both worlds as an OSS company. We have the support and trust of the open source community with its ability to rapidly innovate using standards based tools, and the aforementioned peer review process. At the same time, internally, we are able to apply a disciplined engineering process in order to provide the stability and support required for mission-critical enterprise operations. This includes version/release configuration management, testing and regression testing including quality control measures, bug and RFE tracking using Bugzilla ( and Issue Tracker both internally and externally. Our RHN (Red Hat Network) and Satellite solutions are best of breed in the industry delivering on-going support, bugfixes, updates, security patches, monitoring, automated installation, provisioning, re-provisioning, system configuration management and customization as part of centralized system life-cycle management. To enhance the integrity of our software distribution system, each RPM or software package is cryptographically signed using Red Hat's private key to allow easy identification of the source of the package, and to prove the package has not been altered. One interesting feature of RHEL, is that the change log for each RPM on the system can be printed out easily with one simple command. Red Hat supplies documentation in the form of release notes, installation, user, and administrative guides as well as system documentation such as man pages and example configuration file templates. We also furnish, deployment instructions to give our customers the information, tools, and confidence to apply our solutions in the field. In addition, we have a software certification test suite and a hardware certification test suite to allow independent software vendors (ISV) and independent hardware vendors (IHV) to self-certify. Those that pass are listed in a public-facing web site ( which includes search tools. 3.2 GSS (Customer Support) Global Support Services (GSS) is responsible for customer technical support. Three support level agreements (SLAs) are available through GSS at the L1 support level. We have basic, standard, and premium SLAs which are chosen by a customer at the time of subscription purchase. Basic support provides web only support (where customers submit tickets through Issue Tracker) with unlimited incidents during normal business hours for no additional cost. Standard support provides web and telephone support with unlimited incidents during normal business hours. Premium support gives a customer web and phone support during normal business hours with unlimited incidents and 24x7 support for Severity 1 issues. More information on the support SLAs is available here: < production>. Because the OSS used in RHEL is free of charge, and because of our subscription based business model, success with GSS and our other services offerings is crucial. In this regard, Red Hat has been ranked the #1 software vendor in the CIO Insight Vendor Value Study for the fifth time in six years (17)(18). GSS also provides the Technical Account Management service or TAM. The TAM is intended for customers who desire the highest level of support from Red Hat. The TAM is the primary technical contact at Red Hat working 6
7 with a customer to understand ongoing technology requirements and provide advice about critical bugs and fixes. The TAM acts as a single point of accountability for mission critical issues affecting production systems. GSS creates and maintains the Red Hat Knowledgebase articles and makes them available for public perusal. All GSS support engineers are highly qualified and experienced and have at least an RHCE (Red Hat Certified Engineer, see Paragraph 3.3 below) in order to work in GSS. 3.3 GLS Training and Certification Programs and Red Hat University Red Hat GLS (Global Learning Systems) is responsible creating and delivering training and certification programs to Red Hat customers and the general public. GLS set the standard in the industry more than 10 years ago by establishing performance based exams and the Red Hat Certified Engineer credential which is one of the most highly regarded and sought after certifications available. The RHCE was recently named the hottest certification in all of IT by CertCities.com (20). Red Hat was ranked as the leader for IT education in a recent IDC MarketScape study of the industry (19). Red Hat engineers attend the same GLS courses as everyone else, and GPS, GSS, as well as Solutions Architects are required to attain and maintain at least the RHCE certification. Here is a list of the certifications offered by Red Hat: Red Hat Certified Virtualization Administrator (RHCVA) Red Hat Certified Technician (RHCT) Red Hat Certified Engineer (RHCE) Red Hat Certificates of Expertise Red Hat Certified Datacenter Specialist (RHCDS) Red Hat Certified Security Specialist (RHCSS) Red Hat Certified Architect (RHCA) JBoss Certified Applications Administrator (JBCAA) In addition to the GLS training, Red Hat University (RHU) provides a wide range of courses internally for Red Hat employees. The RHU courses and other training available to Red Hat personnel help insure our people are highly competent, having the knowledge, skills, and resources to be effective and efficient in their jobs. 3.4 GPS (Consultants) Red Hat Global Professional Services (GPS) provides consulting services and dedicated on-site resources for end-to-end solutions, assessments, architectural designs, and implementations. GPS consultants offer deep subject matter expertise combined with years of industry experience. This is crucial when considering that expert, correct installations and implementations that fit the desired purpose and function in a given situation will be instrumental in providing the system quality needed to achieve DO-278 approval. Along these same lines, Red Hat maintains a database of reference architecture implementations to promote and document industry best practices and standard operating environments. 7
8 4. Summary: COTS Objectives: Commercial Off-The-Shelf (COTS) Software "The use of COTS may mean that alternate methods are used to gain assurance that the appropriate objectives are satisfied. These methods include, but are not limited to, product service experience, prior assurance, process recognition, reverse engineering, restriction of functionality, formal methods, and audits and inspections. Software conformity review may need to be tailored with respect to the approach used for COTS approval. Assurance data may also be combined from more than one method to satisfy the objectives in Section 3." (1, pg. 27) 4.1 Product Service Experience Product service experience is one of the factors that can be considered by the DO-278 approving authority to gain assurance that COTS, such as an OS, satisfies CNS/ATM objectives. Fedora, the Linux distribution upon which RHEL is based, has been in use by millions of users over a period of years. As part of the its modernization program implemented during 2004 and 2005, the FAA began running the highly complex Traffic Flow Management (TFM) infrastructure and its real-time Enhanced Traffic Management System (ETMS) on RHEL. 4.2 Prior Assurance Since the latest version of DO-278 available is dated March 2002, it seems likely that RHEL has already been approved as satisfying CNS/ATM objectives based upon its use in the FAA's TFM and ETMS systems. Also as shown in Paragraph 1.4 above, RHEL is the most certified OS available today. Many of these certifications such as the Common Criteria, DCID-6/3 PL3 and PL5 and the DISA Common Operating Environment are based on requirements and objectives which are compatible with DO-278. In addition, these accreditations and certifications are the result of examinations and reviews conducted and administered by highly regarded international and Government organizations. 4.3 Process Recognition The development and long term support and maintenance processes that are applied to RHEL are discussed above in Paragraphs 2 and
9 4.4 Reverse Engineering Reverse engineering of the RHEL OS is not necessary since the source code itself and other sources of documentation are available for review and study. 4.5 Restriction of Functionality If restriction of functionality is required by the DO-278 approving authority, RHEL already includes sufficient features and controls to allow the end user of the OS to pick and choose which packages to install, and which services to activate, and filter. RHEL also provides several layers and means of access control to restrict and limit services. 4.6 Formal methods Formal methods such as code reviews, and analysis can be used to gain assurance since the source code is readily available for review (which is encouraged by open source philosophy). Something like the Coverity static analysis tool can be used as well. Coverity has even published a report covering this topic: Coverity- Meeting-DO-178B-Requirements.pdf < Requirements.pdf>. 4.7 Audits and Inspections These are already being conducted by DoD and others for the Common Criteria and other certifications held by RHEL. The DO-278 approving authority would be able to perform similar types of audits and inspections in order to gain assurance that approval of the RHEL OS at least at the DO-278 AL3 is warranted. 9
10 REFERENCES 1. RTCA/DO-278, GUIDELINES FOR COMMUNICATION, NAVIGATION, SURVEILLANCE, AND AIR TRAFFIC MANAGEMENT (CNS/ATM) SYSTEMS SOFTWARE INTEGRITY ASSURANCE, March 5, RTCA, Inc., Retrieved January 13, 2010 from: 2. Common Criteria for Information Technology Security Evaluation Part 1: Introduction and general model, July 2009, Version 3.1 Revision 3 Final, Common Criteria Recognition Arrangement (CCRA), Retrieved January 13, 2010 from: 3. Common Criteria for Information Technology Security Evaluation Part 2: Security functional components, July 2009, Version 3.1 Revision 3 Final, Common Criteria Recognition Arrangement (CCRA), Retrieved January 13, 2010 from: marked%20changes.pdf 4. Common Criteria for Information Technology Security Evaluation Part 3: Security assurance components, July 2009, Version 3.1 Revision 3 Final, Common Criteria Recognition Arrangement (CCRA), Retrieved January 13, 2010 from: marked%20changes.pdf 5. Common Methodology for Information Technology Security Evaluation, Evaluation methodology, July 2009, Version 3.1 Revision 3 Final, Common Criteria Recognition Arrangement (CCRA), Retrieved January 13, 2010 from: changes.pdf 6. DCID 6/3 - Manual, DIRECTOR OF CENTRAL INTELLIGENCE DIRECTIVE 6/3 PROTECTING SENSITIVE COMPARTMENTED INFORMATION WITHIN INFORMATION SYSTEMS, Retrieved December 2, 2009 from: 7. Special Publication Revision 3, Recommended Security Controls for Federal Information Systems and Organizations, August 2009 (INCLUDES UPDATES AS OF ), Information Technology Laboratory National Institute of Standards and Technology (NIST), Gaithersburg, MD, Retrieved December 2, 2009 from: 8. Measuring software quality A Study of Open Source Software, March 6, 2006, Coverity Inc., 185 Berry St. Suite 3600, San Francisco, Retrieved February 22, 2010 from: docs/ /measuring-software-quality-a-study-of-open-source-software 9. Coverity_White_Paper-Scan_Open_Source_Report_2009, Date Unknown, Coverity Inc., 185 Berry St. Suite 3600, San Francisco, Retrieved February 26, 2010 from: White_Paper-Scan_Open_Source_Report_2009.pdf 10. Quality assurance From Wikipedia, the free encyclopedia, Wikimedia Foundation, Inc., San Francisco, California, Date Unknown, Retrieved February 24, 2010 from: Open source From Wikipedia, the free encyclopedia, Wikimedia Foundation, Inc., San Francisco, California, Date Unknown, Retrieved February 26, 2010 from: Staying close to upstream projects, 2010 Red Hat, Inc. and others, January 18, 2010, Retrieved February 26, 2010 from:
11 13. Red Hat contributions, 2010 Red Hat, Inc. and others, January 19, 2010, Retrieved February 26, 2010 from: Fedora Statistics, 2010 Red Hat, Inc. and others, February 25, 2010, Retrieved February 26, 2010 from: RHEL, 2010 Red Hat, Inc. and others, February 16, 2010, Retrieved February 26, 2010 from: Community: Open Scrutiny of Open Source Code, linux today, March 18, 2006, Retrieved February 26, 2010 from: , 2008, 2007, 2006, 2005 Vendor Value Study, CIO Insight Magazine, , Retrieved February 26, 2010 from: pdf/cioi_0811_researchpdfs.pdf; sec/cio_research5_1205.pdf 18. CIO Insight Vendor Value Ranking, Copyright 2010 Red Hat, Inc., Retrieved February 26, 2010 from: Worldwide IT Education and Training 2009 Vendor Analysis, IDC MarketScape, (excerpt of work by Cushing Anderson), Date Unknown, Retrieved March 9, 2010 from: CertCities.com s 10 Hottest Certifications for 2006, Becky Nagel, Date Unknown, Retrieved March 9, 2010 from:
12 Red Hat Sales and Inquiries NORTH AMERICA REDHAT1 EUROPE, MIDDLE EAST AND AFRICA [email protected] ASIA PACIFIC [email protected] LATIN AMERICA [email protected] Copyright 2010 Red Hat, Inc. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, and RHCE are trademarks of Red Hat, Inc., registered in the U.S. and other countries. Linux is the registered trademark of Linus Torvalds in the U.S. and other countries. # _0410
JBoss Enterprise MIDDLEWARE
JBoss Enterprise MIDDLEWARE WHAT IS IT? JBoss Enterprise Middleware integrates and hardens the latest enterprise-ready features from JBoss community projects into supported, stable, enterprise-class middleware
Making software from the open source community ready for the enterprise
JBoss Enterprise Middleware Making software from the open source community ready for the enterprise 2 Executive summary 2 JBoss Community projects 3 JBoss Enterprise Middleware Recommended for production
Red Hat Enterprise Linux: The ideal platform for running your Oracle database
Red Hat Enterprise Linux: The ideal platform for running your Oracle database 2 Introduction 2 Scalability 2 Availability 3 Reliability 4 Manageability 5 Red Hat subscriptions 6 Conclusion www.redhat.com
Open Source Business Rules Management System Enables Active Decisions
JBoss Enterprise BRMS Open Source Business Rules Management System Enables Active Decisions What is it? JBoss Enterprise BRMS provides an open source business rules management system that enables active
RED HAT ISV PARTNER PROGRAM GUIDE EMEA
RED HAT ISV PARTNER PROGRAM GUIDE EMEA the RED HAT ISV Partner program Welcome to the ISV Partner Program. As market demand for open source solutions increases, Red Hat looks forward to partnering with
The red hat enterprise linux developer program
Program Guide The red hat enterprise linux developer program access essential resources and an ecosystem of experts to develop great applications Key benefits Collaborate with a passionate developer community
JBoss Enterprise MIDDLEWARE
JBoss Enterprise MIDDLEWARE WHAT IS IT? JBoss Enterprise Middleware integrates and hardens the latest enterprise-ready features from JBoss community projects into supported, stable, enterprise-class middleware
Organizations that are standardizing today are enjoying lower management costs, better uptime. INTRODUCTION
WHITEPAPER STANDARDIZED OPERATING ENVIRONMENTS FOR I.T. EFFICIENCY Boost productivity, increase uptime, and enhance business agility by standardizing your IT environment INTRODUCTION Organizations that
Red Hat ISV Program Guide
Red Hat ISV Program Guide Accelerate Your Success! APJ ISV program Guide 1 of 17 WELCOME TO THE ISV PARTNER PROGRAM RED HAT PARTNER PROGRAM ISV PARTNER TRACK Welcome to the Red Hat Partner Program ISV
RED HAT NORTH AMERICA PARTNER PROGRAM GUIDE Version 2.0
RED HAT NORTH AMERICA PARTNER PROGRAM GUIDE Version 2.0 2 INTRODUCTION 2 PARTNER PROGRAM OVERVIEW 5 PARTNER PROGRAM STRUCTURE 6 Partnership levels 6 Accreditations 8 Online Partner Enablement Network (OPEN)
HOW RED HAT BRINGS OPENSTACK INTO THE ENTERPRISE by Bryan Che and Gordon Haff
HOW RED HAT BRINGS OPENSTACK INTO THE ENTERPRISE by Bryan Che and Gordon Haff TECHNOLOGY OVERVIEW Open source software is widely deployed, but many customers will want a supported enterprise version. Red
Red Hat The Importance of the ISV Partner Ecosystem
Red Hat The Importance of the ISV Partner Ecosystem Vito Asta, Senior ISV Business Development Manager, SW-Europe + MEA [email protected] Roma, 6th October 2011 1 Agenda Red Hat: The Company The Production
RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE PRICING GUIDE
WHITEPAPER RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE PRICING GUIDE AT A GLANCE Buy RHEV for Servers on a per managed-socket per year subscription No costly Editions that force you into
FOR SERVERS 2.2: FEATURE matrix
RED hat ENTERPRISE VIRTUALIZATION FOR SERVERS 2.2: FEATURE matrix Red hat enterprise virtualization for servers Server virtualization offers tremendous benefits for enterprise IT organizations server consolidation,
Achieving HIPAA Compliance with Red Hat
Achieving HIPAA Compliance with Red Hat Enterprise Virtualization for Desktops The Health Insurance Portability and Accountability Act (HIPAA) of 1996 introduced a sweeping set of regulations that have
Achieving HIPAA Compliance with Red Hat
Achieving HIPAA Compliance with Red Hat Enterprise Virtualization for Desktops The Health Insurance Portability and Accountability Act (HIPAA) of 1996 introduced a sweeping set of regulations that have
Open Source Software Project Management A Case Study Red Hat Enterprise Linux. Bob Johnson, Red Hat
Open Source Software Project Management A Case Study Red Hat Enterprise Linux Bob Johnson, Red Hat Goals for this talk Red Hat Enterprise Development Model From the community perspective Red Hat Process
Red Hat. www.redhat.com. By Karl Wirth
Red Hat Enterprise Linux 5 Security By Karl Wirth Abstract Red Hat Enterprise Linux has been designed by, and for, the most security-conscious organizations in the world. Accordingly, security has always
RED HAT ONLINE PARTNER ENABLEMENT NETWORK (OPEN)
RED HAT ONLINE PARTNER ENABLEMENT NETWORK (OPEN) FREQUENTLY ASKED QUESTIONS RED HAT HELPS PARTNERS INCREASE SALES In a rapidly changing landscape, Red Hat partners play a key role in developing customer
cloud functionality: advantages and Disadvantages
Whitepaper RED HAT JOINS THE OPENSTACK COMMUNITY IN DEVELOPING AN OPEN SOURCE, PRIVATE CLOUD PLATFORM Introduction: CLOUD COMPUTING AND The Private Cloud cloud functionality: advantages and Disadvantages
Build A private PaaS. www.redhat.com
Build A private PaaS WITH Red Hat CloudForms and JBoss Enterprise Middleware www.redhat.com Introduction Platform-as-a-service (PaaS) is a cloud service model that provides consumers 1 with services for
Red Hat Cloud, HP Edition:
Red Hat Cloud, HP Edition: Private IaaS Clouds 2 Red Hat Cloud 2 Red Hat Enterprise Virtualization 3 Red Hat Enterprise Linux 3 Red Hat Network Satellite 3 HP CloudSystem Matrix and HP Converged Infrastructure
JBOSS ENTERPRISE SOA PLATFORM AND JBOSS ENTERPRISE DATA SERVICES PLATFORM VALUE PROPOSITION AND DIFFERENTIATION
JBOSS ENTERPRISE SOA PLATFORM AND JBOSS ENTERPRISE DATA SERVICES PLATFORM VALUE PROPOSITION AND DIFFERENTIATION Service-oriented architecture (SOA) gives enterprises the ability to identify and respond
OPENSTACK IN THE ENTERPRISE Best practices for deploying enterprise-grade OpenStack implementations
WHITEPAPER OPENSTACK IN THE ENTERPRISE Best practices for deploying enterprise-grade OpenStack implementations Vinny Valdez INTRODUCTION 64% of IT managers have OpenStack on their technology roadmaps.
IS AN OPEN SOURCE BUSINESS PROCESS MANAGEMENT SOLUTION RIGHT FOR YOU?
Whitepaper IS AN OPEN SOURCE BUSINESS PROCESS MANAGEMENT SOLUTION RIGHT FOR YOU? Executive summary Companies around the world trust open source 90% of Fortune 500 companies use Red Hat products and solutions
From Private to Hybrid Clouds through Consistency and Portability
Extending IT Governance From Private to Hybrid Clouds through Consistency and Portability Gordon Haff 2 Executive summary 3 beyond information security 3 from private to public and back again 4 consistency
RED HAT NORTH AMERICA PARTNER PROGRAM GUIDE
RED HAT NORTH AMERICA PARTNER PROGRAM GUIDE www.redhat.com 2 Introduction 2 Partner Program overview 3 Partner Program structure 3 Partnership Levels 3 Specializations 5 Partner Program benefits 7 Benefits
RED HAT CLOUD SUITE FOR APPLICATIONS
RED HAT CLOUD SUITE FOR APPLICATIONS DATASHEET AT A GLANCE Red Hat Cloud Suite: Provides a single platform to deploy and manage applications. Offers choice and interoperability without vendor lock-in.
To find a more cost-effective virtualization technology with better support and reliability
Red Hat provides Leading healthcare Institution with a more cost-effective, dependable, and secure virtualization solution Fast facts Customer Industry Geography Business challenge Solution Migration path
Open source business rules management system
JBoss Enterprise BRMS Open source business rules management system What is it? JBoss Enterprise BRMS is an open source business rules management system that enables easy business policy and rules development,
Red Hat CloudForms: Open Clouds Under
CloudForms Whitepaper Red Hat CloudForms: Open Clouds Under your Control TABLE OF CONTENTS 2 Introduction 2 Open Clouds 3 Under your control 3 What is Cloudforms? 4 Build and Manage Clouds 5 Build and
The Red Hat Enterprise Linux advantages over Oracle Linux
The Red Hat Enterprise Linux advantages over Oracle Linux 1 RED HAT CONTINUES TO LEAD THE LINUX MARKET WORLDWIDE LINUX SERVER OPERATING ENVIRONMENT NEW LICENSE PAID SHIPMENTS/SUBSCRIPTIONS AND NONPAID
Red Hat enterprise virtualization 3.0 feature comparison
Red Hat enterprise virtualization 3.0 feature comparison at a glance Red Hat Enterprise is the first fully open source, enterprise ready virtualization platform Compare the functionality of RHEV to VMware
Qualcomm Achieves Significant Cost Savings and Improved Performance with Red Hat Enterprise Virtualization
Qualcomm Achieves Significant Cost Savings and Improved Performance with Red Hat Enterprise Virtualization Fast facts Customer Industry Geography Business challenge Solution Qualcomm Telecommunications
RED HAT ISV PROGRAM GUIDE NORTH AMERICA
RED HAT ISV PROGRAM GUIDE NORTH AMERICA BROCHURE TABLE OF CONTENTS 1 INTRODUCTION 2 WHY JOIN? 3 EVERYTHING YOU NEED TO SUCCEED 3 GROW YOUR BENEFITS AS YOU GROW YOUR BUSINESS 3 PROGRAM MEMBERSHIP LEVELS
RED HAT ENTERPRISE LINUX: A HIGHER VALUE AND LOWER COST ALTERNATIVE TO
RED HAT ENTERPRISE LINUX: A HIGHER VALUE AND LOWER COST ALTERNATIVE TO Microsoft WINDOWS SERVER 2008 2 Executive summary 2 Value is about cost-effective choices 3 comparing the costs associated with deploying
RHEL source and binary code Software documentation Major Releases - Minor Releases Errata Access to the Red Hat Network
HRG Insight: Subscription Services - The concept of Subscription Services in software is not new but has become a front-and-center topic recently. Microsoft s recent announcement that it will bundle the
Red Hat Update at IBM LSU 2011. Sebastian Siegert Alliance Manager EMEA for IBM Red Hat
Red Hat Update at IBM LSU 2011 Sebastian Siegert Alliance Manager EMEA for IBM Red Hat AGENDA Red Hat and IBM Why Red Hat Red Hat Offerings Red Hat and System z Recommendations for Satellite 2 Open, Industry
OPEN MODERN DATA ARCHITECTURE FOR FINANCIAL SERVICES RISK MANAGEMENT
WHITEPAPER OPEN MODERN DATA ARCHITECTURE FOR FINANCIAL SERVICES RISK MANAGEMENT A top-tier global bank s end-of-day risk analysis jobs didn t complete in time for the next start of trading day. To solve
Create a single 360 view of data Red Hat JBoss Data Virtualization consolidates master and transactional data
Whitepaper Create a single 360 view of Red Hat JBoss Data Virtualization consolidates master and transactional Red Hat JBoss Data Virtualization can play diverse roles in a master management initiative,
identity management in Linux and UNIX environments
Whitepaper identity management in Linux and UNIX environments EXECUTIVE SUMMARY In today s IT environments everything is growing, especially the number of users, systems, services, applications, and virtual
Red Hat Partner Programs for Independent Software Vendors (ISVs)
Red Hat Partner Programs for Independent Software Vendors (ISVs) Abstract This white paper provides an overview of the Software Partner programs available from Red Hat, and the guidelines for certifying
Building and Managing a Standard Operating Environment
Building and Managing a Standard Operating Environment Dirk Herrmann Head of Strategic Consulting Central Europe, Red Hat Todd Warner Satellite Product Manager, Red Hat Milan Zázrivec Satellite Software
RED HAT SOFTWARE COLLECTIONS BRIDGING DEVELOPMENT AGILITY AND PRODUCTION STABILITY
RED HAT S BRIDGING DEVELOPMENT AGILITY AND PRODUCTION STABILITY TECHNOLOGY BRIEF INTRODUCTION BENEFITS Choose the right runtimes for your project with access to the latest stable versions. Preserve application
Maximize strategic flexibility by building an open hybrid cloud Gordon Haff
red hat open hybrid cloud Whitepaper Maximize strategic flexibility by building an open hybrid cloud Gordon Haff EXECUTIVE SUMMARY Choosing how to build a cloud is perhaps the biggest strategic decision
How to Build an RPM OVERVIEW UNDERSTANDING THE PROCESS OF BUILDING RPMS. Author: Chris Negus Editor: Allison Pranger 09/16/2011
How to Build an RPM Author: Chris Negus Editor: Allison Pranger 09/16/2011 OVERVIEW You have created some software that you want to install on Red Hat Enterprise Linux systems. Now that it is done, the
PLATFORM-AS-A-SERVICE, DEVOPS, AND APPLICATION INTEGRATION. An introduction to delivering applications faster
PLATFORM-AS-A-SERVICE, DEVOPS, AND APPLICATION INTEGRATION An introduction to delivering applications faster CONTENTS 2 Introduction to PaaS 4 Private, public, and hybrid PaaS 6 Who uses PaaS? 8 DevOps
OpenShift. OpenShift platform features. Benefits Document. openshift. Feature Benefit OpenShift. Enterprise
openshift Benefits Document platform features Feature Benefit FOR APPLICATIO DEVELOPMET Self-Service and On-Demand Application Stacks By enabling Developers with the ability to quickly and easily deploy
Build Clouds Without Limits Gordon Haff
Red Hat CloudForms Infrastructure-as-a-Service: Build Clouds Without Limits Gordon Haff Is your IT ready for IT-as-a-Service? Is it... Portable across hybrid environments? Does it let you... Manage image
How To Migrate To Redhat Enterprise Linux 4
Migrating to Red Hat Enterprise Linux 4: Upgrading to the latest Red Hat release By Donald Fischer Abstract Red Hat Enterprise Linux subscribers may choose to deploy any of the supported versions of the
Oracle Linux Strategy and Roadmap
Oracle Linux Strategy and Roadmap Michele Resta, Director Alliances, Oracle 1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from
RHEL to SLES Migration Overview
Migration Program Overview Best Practice www.novell.com RHEL to SLES Migration Overview Published: Feb, 2009 Version # 1.3 Disclaimer Novell, Inc. makes no representations or warranties with respect to
SUBSCRIPTION GUIDE FOR RED HAT JBOSS MIDDLEWARE
TECHNOLOGY DETAIL SUBSCRIPTION GUIDE FOR RED HAT JBOSS MIDDLEWARE RED HAT JBOSS MIDDLEWARE SUBSCRIPTIONS Software subscriptions for Red Hat JBoss Middleware products deliver value throughout subscription
Dell and JBoss just work Inventory Management Clustering System on JBoss Enterprise Middleware
Dell and JBoss just work Inventory Management Clustering System on JBoss Enterprise Middleware 2 Executive Summary 2 JBoss Enterprise Middleware 5 JBoss/Dell Inventory Management 5 Architecture 6 Benefits
34% DOING MORE WITH LESS How Red Hat Enterprise Linux shrinks total cost of ownership (TCO) compared to Windows. I n a study measuring
WHITEPAPER DOING MORE WITH LESS How shrinks total cost of ownership (TCO) compared to Windows I n a study measuring the TCO of Windows and servers, Red Hat Enterprise platforms exhibited 34% lower annual
APPENDIX 1 SUBSCRIPTION SERVICES
APPENDIX 1 SUBSCRIPTION SERVICES Red Hat sells subscriptions that entitle you to receive Red Hat services and/or Software during the period of the subscription (generally, one or three years). This Appendix
Red Hat s Subscription Guide
Red Hat s Subscription Guide for JBoss Enterprise Middleware A guide to understanding Red Hat s flexible consumption model for JBoss Enterprise Middleware November 2010 1. JBoss Enterprise Middleware Subscriptions
White Paper Levels of Linux Operating System Security
White Paper Levels of Linux Operating System Security Owl Approach to the Hardening of Linux Abstract Cross Domain Solutions produced by Owl Computing Technologies, Inc., running on Security Enhanced (SE)
IBM Endpoint Manager Version 9.1. Patch Management for Red Hat Enterprise Linux User's Guide
IBM Endpoint Manager Version 9.1 Patch Management for Red Hat Enterprise Linux User's Guide IBM Endpoint Manager Version 9.1 Patch Management for Red Hat Enterprise Linux User's Guide Note Before using
RED HAT OPENSTACK PLATFORM A COST-EFFECTIVE PRIVATE CLOUD FOR YOUR BUSINESS
WHITEPAPER RED HAT OPENSTACK PLATFORM A COST-EFFECTIVE PRIVATE CLOUD FOR YOUR BUSINESS INTRODUCTION The cloud is more than a marketing concept. Cloud computing is an intentional, integrated architecture
JBoss. choice without compromise
JBoss Enterprise Middleware choice without compromise JBOSS ENTERPRISE APPLICATION PLATFORMS: CHOICE WITHOUT COMPROMISE The JBoss open choice strategy In today s dynamic business world, the need to quickly
Common Criteria Evaluation Challenges for SELinux. Doc Shankar IBM Linux Technology Center [email protected]
Common Criteria Evaluation Challenges for SELinux Doc Shankar IBM Linux Technology Center [email protected] Agenda Common Criteria Roadmap/Achievements CAPP/LSPP Overview EAL4 Overview Open Sourcing
How To Build An Open Cloud
Why the future of the cloud is open Gordon Haff EXECUTIVE SUMMARY Choosing how to build a hybrid cloud is perhaps the most strategic decision IT leaders will make this decade. It s a choice that will determine
HPC ON WALL ST OPENSTACK AND BIG DATA. Brent Holden Chief Field Architect, Eastern US April 2014
HPC ON WALL ST OPENSTACK AND BIG DATA Brent Holden Chief Field Architect, Eastern US April 2014 OPENSTACK FOR HIGH PUT-THROUGH DATA WORKLOADS ARE EVOLVING CLOUD WORKLOADS TRADITIONAL WORKLOADS Typically
MONITORING RED HAT GLUSTER SERVER DEPLOYMENTS With the Nagios IT infrastructure monitoring tool
TECHNOLOGY DETAIL MONITORING RED HAT GLUSTER SERVER DEPLOYMENTS With the Nagios IT infrastructure monitoring tool INTRODUCTION Storage system monitoring is a fundamental task for a storage administrator.
INFOBrief. Red Hat Enterprise Linux 4. Key Points
INFOBrief Red Hat Enterprise Linux 4 Key Points Red Hat Enterprise Linux 4 (RHEL 4) is the first release from Red Hat to support the 2.6 operating system kernel. This is a significant release as it contains
Binary Tree Support. Comprehensive User Guide
Binary Tree Support Comprehensive User Guide Updated: 5/14/2013 TABLE OF CONTENTS About this Guide... 4 Standard Support... 4 Advanced Support... 4 Service Level Agreement (SLA)... 5 Binary Tree Support
Bacula Systems Enterprise Edition. Enterprise-Ready Open Source Backup and Restore
Bacula Systems Enterprise Edition Enterprise-Ready Open Source Backup and Restore Bacula Systems SA 2010 Who am I Arno Lehmann One of eight founders of Bacula Systems SA Working with Bacula since 2004
ITIL V3 - The Future Is Here
ITIL V3 - The Future Is Here Copyright Notice Copyright Axios Systems 2007. The information, which is contained in this document, is the property of Axios Systems. The contents of the document must not
JBoss Enterprise Middleware
JBoss Enterprise Middleware The foundation of your open source middleware reference architecture Presented By : Sukanta Basak Red Hat -- Vital Statistics Headquarters in Raleigh, NC Founded in 1993 Over
Spirent CLEAR Mobility. End-to-End Mobile Network Infrastructure Test and Lab Automation Solutions
End-to-End Infrastructure Test and Lab Automation Solutions End-to-End Infrastructure Test and Lab Automation Solutions Customer Experience Automating end-to-end user experience of data, voice and video
RED HAT ENTERPRISE LINUX 6 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) OVERVIEW. Version 1, Release 8. 24 July 2015
RED HAT ENTERPRISE LINUX 6 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) OVERVIEW Version 1, Release 8 24 July 2015 Developed by Red Hat, NSA, and for the DoD Trademark Information Names, products, and
PINK ELEPHANT THOUGHT LEADERSHIP WHITE PAPER DEVELOPING AN IT SERVICE MANAGEMENT TRAINING STRATEGY & PLAN
PINK ELEPHANT THOUGHT LEADERSHIP WHITE PAPER DEVELOPING AN IT SERVICE MANAGEMENT TRAINING STRATEGY & PLAN Executive Summary Developing and implementing an overall IT Service Management (ITSM) training
Five Cloud Strategy Must -Dos for the CIO
Issue 2 Five Cloud Strategy Must -Dos for the CIO 1 Five Cloud Strategy Must -Dos for the CIO When Building a Private Cloud, Start Small, Think Big 5 About Red Hat Featuring research from Even if your
ACI ON DEMAND DELIVERS PEACE OF MIND
DELIVERS PEACE OF MIND SERVICE LINE FLYER ACI ON DEMAND ACCESS TO THE LATEST RELEASES OF FEATURE-RICH SOFTWARE AND SYSTEMS, INCLUDING INTEGRATION WITH VALUE- ADDED THIRD PARTIES IMPLEMENTATION CONFIGURED
RED HAT JBOSS FUSE SERVICE WORKS 6 COMPARED WITH MULE ESB ENTERPRISE 3.4
RED HAT JBOSS FUSE SERVICE WORKS 6 COMPARED WITH MULE ESB ENTERPRISE 3.4 COMPETITIVE REVIEW, APRIL 2014 INTRODUCTION The ability to integrate systems and share data across the enterprise is a common datacenter
TRANSFORMING I.T. WITH AN OPEN HYBRID CLOUD
Whitepaper TRANSFORMING I.T. WITH AN OPEN HYBRID CLOUD Gordon Haff EXECUTIVE SUMMARY Information technology is increasingly at the core of how organizations service their customers and differentiate themselves
Symantec Client Management Suite 8.0
IT Flexibility. User Freedom. Data Sheet: Endpoint Management Overview of Symantec Client Management Suite Symantec Client Management Suite automates time-consuming and redundant tasks for deploying, managing,
An Oracle Technical Article October 2014. Certification with Oracle Linux 5
An Oracle Technical Article October 2014 Certification with Oracle Linux 5 Introduction... 1 Comparing Oracle Linux 5 and Red Hat Enterprise Linux (RHEL) 5.. 2 Checking the /etc/ File... 2 Checking for
Red Hat & SAP Support Overview
Red Hat & SAP Support Overview 2015 SAP SAPPHIRE NOW Terry Bowling Senior Technical Account Manager David Wood Technical Account Manager Upcoming teasers Red Hat... more than just linux Specialty Based
APPENDIX 1 SUBSCRIPTION SERVICES
APPENDIX 1 SUBSCRIPTION SERVICES Red Hat sells subscriptions that entitle you to receive Red Hat services and/or Software during the period of the subscription (generally, one or three years). This Appendix
Foundations for your. portable cloud
Foundations for your portable cloud Start Today Red Hat s cloud vision is unlike that of any other IT vendor. We recognize that IT infrastructure is and will continue to be composed of pieces from many
RED HAT CLOUDFORMS ENTERPRISE- GRADE MANAGEMENT FOR AMAZON WEB SERVICES
TECHNOLOGY DETAIL RED HAT CLOUDFORMS ENTERPRISE- GRADE MANAGEMENT FOR AMAZON WEB SERVICES ABSTRACT Do you want to use public clouds like Amazon Web Services (AWS) to flexibly extend your datacenter capacity,
applications. JBoss Enterprise Application Platform
JBoss Enterprise Application Platform What is it? JBoss Enterprise Application Platform is the industryleading platform for next-generation enterprise Java applications. It provides a stable, open source
openshift enterprise whitepaper Gordon Haff
openshift enterprise whitepaper The Road to Enterprise PaaS Gordon Haff EXECUTIVE SUMMARY Platform-as-a-Service (PaaS) provides an abstraction that makes developers more productive by helping them focus
TABLE OF CONTENTS RED HAT GLOBAL SYSTEMS INTEGRATOR (GSI) PARTNER PROGRAM GUIDE
RED HAT GLOBAL SYSTEMS INTEGRATOR (GSI) PARTNER PROGRAM GUIDE TABLE OF CONTENTS INTRODUCTION 2 PARTNERSHIP LEVELS 2 GLOBAL SYSTEMS INTEGRATOR LINES OF BUSINESS 2 Reselling Rights for Global Systems Integrators
WHITE PAPER Managing Linux in the Enterprise: The Red Hat Network Approach
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com WHITE PAPER Managing Linux in the Enterprise: The Red Hat Network Approach Sponsored by: Red Hat Tim
Invest in your business with Ubuntu Advantage.
Invest in your business with Ubuntu Advantage. Expert advice. Specialist tools. Dedicated support. Introducing Ubuntu Advantage Contents 02 Introducing Ubuntu Advantage 03 Ubuntu Advantage 04 - Landscape
RED HAT ENTERPRISE VIRTUALIZATION PERFORMANCE: SPECVIRT BENCHMARK
RED HAT ENTERPRISE VIRTUALIZATION PERFORMANCE: SPECVIRT BENCHMARK AT A GLANCE The performance of Red Hat Enterprise Virtualization can be compared to other virtualization platforms using the SPECvirt_sc2010
Putting open source to the test: The making of JBoss Enterprise Middleware
Putting open source to the test: The making of JBoss Enterprise Middleware Through a rigorous productization process, JBoss Enterprise Middleware teams continually harden and transform cutting-edge open
SELECTING THE RIGHT HOST INTRUSION PREVENTION SYSTEM:
SELECTING THE RIGHT HOST INTRUSION PREVENTION SYSTEM: 12 Key Questions to Ask Executive Summary Host Intrusion Prevention Systems (HIPS) complement perimeter defenses, and play a vital role in protecting
