Friday, 24 October 2025
30.8 C
Singapore
25.4 C
Thailand
30.4 C
Indonesia
28.6 C
Philippines

Red Hat: Building a secure foundation for hybrid cloud and AI in APAC

Red Hat Enterprise Linux 10 strengthens security and compliance for hybrid cloud and AI in APAC, helping enterprises navigate complex regulations.

Enterprises across Asia-Pacific are facing a perfect storm of regulatory scrutiny and rapid digital transformation. Governments are tightening rules on how data is collected, stored, and shared, while boards demand faster innovation and cost efficiency. At the same time, generative AI and advanced analytics are reshaping how businesses deliver services and make decisions, driving unprecedented demand for computing power and flexible infrastructure.

Hybrid cloud has emerged as the default operating model for this environment because it allows organisations to mix on-premises control with the agility of public cloud. Yet scaling securely across such a fragmented landscape is far from straightforward. Every new regulation and every new AI initiative adds layers of risk and complexity.

Against this backdrop, Red Hat Enterprise Linux (RHEL) 10 arrives at a critical moment. Designed with security, compliance, and AI-readiness in mind, it aims to provide a stable foundation that can span data centres, hyperscale clouds, and edge locations. Its capabilities go beyond operational efficiency. They signal a shift towards long-term resilience in an era where regulatory obligations and cyber threats evolve faster than ever.

The regulatory environment shaping cloud choices

Red Hat Building a secure foundation for hybrid cloud and AI in APAC - 1

Asia-Pacific’s regulatory environment is among the most diverse in the world, forcing enterprises to rethink one-size-fits-all approaches to IT. Singapore’s Personal Data Protection Act (PDPA) and the Monetary Authority of Singapore’s Technology Risk Management (MAS TRM) guidelines set high expectations for financial and personal data protection. Malaysia has been shaping its Central Bank Digital Technology (CBDT) framework, while Thailand’s PDPA and Indonesia’s Personal Data Protection (PDP) law are still maturing but already restrict how data can leave national borders. Vietnam’s strict localisation rules require certain data to be stored domestically, and China’s Personal Information Protection Law (PIPL) enforces even stricter controls on cross-border transfers. India’s Digital Personal Data Protection (DPDP) Act has added a new layer of compliance for the region’s largest emerging market.

For multinational enterprises, this patchwork means that regulatory risk extends beyond legal considerations. It directly shapes architecture choices. Running purely in a single public cloud may violate data residency requirements or create exposure if encryption standards diverge. Hybrid and multi-cloud models enable organisations to keep sensitive workloads local while still leveraging global infrastructure and services for scale and innovation.

Red Hat Building a secure foundation for hybrid cloud and AI in APAC - 2
Raj Das, Senior Director of Core RHEL Product Management, Red Hat | Image credit: Red Hat

However, this flexibility comes at a cost. Every additional platform increases complexity, and compliance controls must adapt accordingly to the workload. Raj Das, Senior Director of Core RHEL Product Management for Red Hat, emphasised this challenge: “The operating foundation has to be consistent everywhere – on-premises, at the edge, and across hyperscalers – so security and compliance controls travel with the workload.” Without such consistency, maintaining audit readiness across diverse environments becomes costly and error-prone.

RHEL 10 as the next-generation enterprise foundation

Red Hat Enterprise Linux 10 introduces several innovations designed to bring discipline to hybrid architectures. Its image-based OS delivery replaces incremental patching with reproducible, signed system images. Instead of modifying running servers directly, IT teams build known-good images and deploy them consistently across data centres and clouds.

Das explained the impact: “Image-based delivery minimises configuration drift and enables predictable rollbacks.” In regulated industries where unplanned changes can lead to compliance gaps or outages, this is significant. Auditors can trace every production system back to a single signed artefact, simplifying evidence gathering and reducing the time spent preparing for inspections. Early adopters have reported shorter maintenance windows, lower mean time to remediate, and more reliable service availability.

Future security threats are also being anticipated. Quantum computing could eventually break widely used encryption methods, allowing attackers to harvest encrypted data today and decrypt it once quantum machines mature. This so-called “harvest-now, decrypt-later” risk is driving urgency among security leaders. To prepare, RHEL 10 integrates post-quantum cryptography (PQC) algorithms. “RHEL 10 includes Post Quantum Cryptographic (PQC) algorithms to ensure that the operating system is Quantum Safe,” Das said. The technology is still emerging, but by offering hybrid modes that combine classical and quantum-safe encryption, Red Hat is providing organisations a secure path to experiment and plan transitions without re-architecting critical systems later.

Red Hat Building a secure foundation for hybrid cloud and AI in APAC - 4

Operational complexity remains another barrier to secure scale. As IT teams face talent shortages, AI-assisted management tools are becoming essential. RHEL 10 introduces features such as Lightspeed and Insights Planning to simplify lifecycle tasks, from patching to capacity forecasting. These tools can help less experienced administrators manage complex hybrid estates safely, allowing experts to focus on strategic improvements rather than routine maintenance.

Balancing the promise and risks of open source

Open source remains the backbone of enterprise IT. Its transparency and community-driven innovation fuel faster development and reduce vendor lock-in. But the same openness can expose organisations to hidden risks if supply chains are not properly secured.

The scale of this issue is growing. According to the 2024 Open Source Security and Risk Analysis (OSSRA) report, 74% of audited codebases contained high-risk vulnerabilities, a 54% jump from the previous year. The XZ Utils backdoor, discovered earlier this year, highlighted how a single compromised dependency can have a cascading impact across the industry. Attackers patiently embedded malicious code into a widely used compression library, impacting countless downstream projects.

Red Hat Building a secure foundation for hybrid cloud and AI in APAC - 3

Das warned that “blind trust in transitive dependencies is unsafe.” He urged enterprises to maintain Software Bill of Materials (SBOMs), insist on verified and signed content, and design rapid incident response paths.

Red Hat’s approach reflects years of investment in supply chain security. As a CVE Numbering Authority, the company issues timely vulnerability advisories and coordinates responses with global agencies such as the Cybersecurity and Infrastructure Security Agency (CISA). Internally, Red Hat enforces lifecycle discipline, from rigorous package signing to controlled build environments, and contributes resources back to upstream projects to reduce maintainer fatigue, a key factor in preventing similar supply chain compromises.

This level of governance is increasingly expected by both regulators and large customers. Financial institutions and critical infrastructure operators are increasingly demanding demonstrable provenance for software components, mirroring the supply chain transparency rules in other industries.

Hybrid cloud and AI as growth drivers for APAC enterprises

Hybrid cloud is no longer just about cost optimisation. It is becoming an enabler of AI adoption. IDC forecasts that more AI workloads will shift to private and hybrid clouds as organisations seek both elasticity and control over sensitive training data. Public cloud still plays a role in experimentation and scale, but enterprises want the ability to run production AI systems where compliance and latency requirements can be tightly managed.

Standardising on an enterprise Linux platform is proving pivotal in this shift. Das said, “Customers typically see reduced maintenance effort, a stronger security posture, and the ability to redeploy talent to higher-value work.” In practice, this means IT teams can focus on building and deploying AI models rather than managing inconsistent infrastructure.

Real-world examples are emerging across the region. In Singapore, the national health technology agency IHiS uses Red Hat OpenShift Service on AWS (ROSA) to deliver citizen-facing digital services securely and at speed, a model that other regulated sectors are beginning to emulate. Similar strategies are emerging in Australia’s banking sector and Japan’s manufacturing industry, where hybrid AI deployments are striking a balance between innovation and data protection obligations.

Red Hat Building a secure foundation for hybrid cloud and AI in APAC - 5
Image credit: Red Hat

Red Hat’s OpenShift offerings, including managed services like ROSA and Azure Red Hat OpenShift (ARO), extend the same operational and security standards across on-premises data centres, hyperscalers, and edge locations. This reduces overhead, speeds up time to market, and provides a common governance model, which is essential as AI-driven automation expands beyond central IT and into line-of-business functions.

The road ahead

For technology leaders in the APAC region, the message is clear: regulatory complexity and emerging security threats require a new level of operational discipline. Hybrid cloud is here to stay, but without a consistent and secure foundation, its benefits can be quickly undermined by compliance gaps and cyber risks.

RHEL 10’s arrival signals that the enterprise operating system itself is evolving to meet these pressures. It has moved beyond being simply infrastructure and now acts as a governance and security anchor for AI-era workloads. As Das put it, Red Hat’s goal is to “cope with the rapidly accelerating innovation cycles in a secure fashion without leaving anyone behind. That is the Open Source Way!”

In the coming years, expect regulators to push harder on software supply chain transparency and quantum safety. IT teams will increasingly lean on automation and AI to manage complexity. Enterprises that invest early in secure and consistent platforms will not only adapt to this change but turn it into a competitive advantage.

Hot this week

OpenAI launches ChatGPT Atlas, a browser built around AI assistance

OpenAI launches ChatGPT Atlas, a new browser with built-in AI that helps users browse, plan, and work more efficiently.

Twitch CEO responds to streamer assault at TwitchCon 2025

Twitch CEO Dan Clancy responds to streamer Emiru’s assault at TwitchCon 2025 amid criticism over safety and Twitch’s handling of the incident.

NTT DATA strengthens global insurance leadership with acquisition of Alchemy Technology Services

NTT DATA acquires Alchemy Technology Services to strengthen its global insurance capabilities and accelerate digital transformation worldwide.

Shopee partners with Meta to boost creator earnings and shopping experiences

Shopee partners with Meta to enhance Facebook shopping and empower creators with new affiliate and livestream tools across Southeast Asia.

Rubrik introduces Agent Cloud to accelerate secure enterprise AI adoption

Rubrik launches Agent Cloud, a new platform enabling enterprises to monitor, govern, and undo AI agent actions across major platforms.

Amazon introduces revamped Luna game streaming service with new multiplayer collection

Amazon revamps Luna with new multiplayer games, smartphone controls, and a refreshed library for Prime members and subscribers.

Leica launches new M-mount camera that ditches the rangefinder

Leica unveils the M EV1, its first M-series camera with an electronic viewfinder, marking a bold step beyond its iconic rangefinder design.

Ledger unveils Nano Gen5, redefining the crypto wallet as a personal digital signer

Ledger launches the Nano Gen5, redefining its crypto wallet as a secure digital identity signer for the modern online world.

Chiang Mai University to join IBM-NUS research and innovation centre and IBM Quantum Network

Chiang Mai University joins IBM and NUS to advance AI and quantum research, aiming to strengthen innovation and digital skills across Southeast Asia.

Related Articles

Popular Categories