Red Hat Virtualization Description

Red Hat®, Virtualization is an enterprise virtualization platform which supports key virtualization workloads, including resource-intensive and crucial applications. It is built on Red Hat Enterprise Linux®, KVM and fully supported Red Hat. With a solid foundation, virtualize your resources, processes, applications, and ensure a cloud-native, containerized future. Automate, manage, modernize and modernize virtualization workloads. Red Hat Virtualization automates daily operations and manages your VMs in Red Hat OpenShift. This uses the Linux®, skills your team already has and will continue to use for future business needs. Red Hat Enterprise Linux, Red Hat Ansible Automation Platform and Red Hat OpenStack® Platform are integrated to create a platform and partner solution that improves IT productivity and drives a higher return.

Integrations

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
Red Hat
Year Founded:
1993
Headquarters:
United States
Website:
www.redhat.com

Media

Red Hat Virtualization Screenshot 1
Recommended Products
Secure your business by securing your people. Icon
Secure your business by securing your people.

Over 100,000 businesses trust 1Password

Take the guesswork out of password management, shadow IT, infrastructure, and secret sharing so you can keep your people safe and your business moving.

Product Details

Platforms
SaaS
Windows
Linux
Type of Training
Documentation
Customer Support
Online

Red Hat Virtualization Features and Options

Virtualization Software

Archiving & Retention
Capacity Monitoring
Data Mobility
Desktop Virtualization
Disaster Recovery
Namespace Management
Performance Management
Version Control
Virtual Machine Monitoring

Server Virtualization Software

Audit Management
Health Monitoring
Live Machine Migration
Multi-OS Virtual Machines
Patching / Backup
Performance Log
Performance Optimization
Rapid Provisioning
Security Management
Type 1 / Type 2 Hypervisor

IT Security Software

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Network Security Software

Access Control
Analytics / Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning