...

Red Hat OpenShift 4.20 Enhances Security of the Modern Application Platform to Unite Enterprise IT, from Virtual Machines to AI

OpenShift

The latest release of Red Hat OpenShift 4.20 delivers a major step forward in uniting enterprise IT. It unites across legacy infrastructure, containers, and AI-driven workloads. In addition, it strengthens security and broadens virtualization support in hybrid cloud and sovereign environments. 

Stronger Security at the Core

OpenShift 4.20 introduces initial support for post-quantum cryptography (PQC) algorithms. This is to protect mutual TLS (mTLS) traffic between control-plane components. Along​‍​‌‍​‍‌​‍​‌‍​‍‌ with that, it allows bring-your-own OpenID Connect identity providers. Also, the External Secrets Operator is introduced for the lifecycle management of secrets from external vaults. The general availability of Red Hat Advanced Cluster Security 4.9 and the improvements to Trusted Artifact Signer and Trusted Profile Analyzer provide more profound compliance and identity controls for Platform Plus ​‍​‌‍​‍‌​‍​‌‍​‍‌customers. 

Scaling AI and Bridging Infrastructure

Moreover, OpenShift 4.20 helps organizations move AI workloads from experiment to production faster. It brings in the LeaderWorkerSet (LWS) API for large, distributed AI model orchestration. Also, an Image Volume Source that enables integration of new models without rebuilding containers. At the same time, virtualization capabilities are enhanced. The platform now supports CPU load-aware rebalancing, Arm architecture, and extends bare-metal virtualization deployments on Oracle Cloud. 

In effect, organizations can run traditional VMs and modern containerised applications side by side on a unified platform. Moreover, with increased support for edge and sovereign cloud deployments, OpenShift 4.20 positions itself as a consistent foundation across the full IT spectrum.

In short, Red Hat’s update signals that enterprise platforms must deliver not just containers, but unified infrastructure, advanced security, and AI-ready capabilities to meet tomorrow’s demands. This announcement is a transition tool for IT executives to move from their current setup to the next-gen ​‍​‌‍​‍‌​‍​‌‍​‍‌revolution.

To explore how Security Operations Centers (SOC) play a crucial role in defending against modern cyber threats, read our latest SOC News.

Source: Businesswire