Red Hat Enterprise Virtualization 3.0 Offers Performance and Scalability Improvements

Red Hat has released a new version of its open-source enterprise virtualization platform, Red Hat Enterprise Virtualization (RHEV) 3.0. This version introduces new enterprise virtualization management features and improved performance and scalability for Linux and Windows workloads.

The core product, RHEV for Servers, provides server virtualization, and the optional RHEV for Desktops add-on provides virtual desktop infrastructure. RHEV for Servers includes the oVirt open virtualization management system, RHEV Manager, and the kernel-based virtual machine (KVM) hypervisor, RHEV Hypervisor. It supports server operating systems as virtual guests.

The Red Hat Enterprise Virtualization Manager platform is now built on Red Hat Enterprise Linux 6 and JBoss Enterprise Application Platform. Red Hat claims that this new platform provides performance and scalability improvements.

Key features of Red Hat Enterprise Virtualization 3.0 include:

  • Power user portal for self-service provisioning;
  • Exposure of all RHEV commands through an open-source, community-driven RESTful API;
  • New text-based GUI for RHEV Hypervisor;
  • Reduced latency as a result of moving the kernel-based virtual machine (KVM) networking stack from the userspace into the Linux kernel;
  • Kernel samepage merging (KSM) memory overcommitment to enable users to define more RAM in their virtual machines than is present in the physical host;
  • Support for SELinux and new sVirt capabilities, including Mandatory Access Control (MAC) for enhanced virtual machine and hypervisor security;
  • Support for VM-level "Do Not Migrate" option and VM-host pinning;
  • Integration with Cisco's Virtual Machine Fabric Extender (VM-FEX) technology; and
  • User interface enhancements.

Red Hat Enterprise Virtualization 3.0 is now available worldwide. Additional information and a fully supported 60-day trial version are available on the Red Hat site.

About the Author

Leila Meyer is a technology writer based in British Columbia. She can be reached at [email protected].

Featured

  • AI microchip under cybersecurity attack, surrounded by symbols of threats like a skull, spider, lock, and warning shield

    Report Finds Agentic AI Protocol Vulnerable to Cyber Attacks

    A new report from Backslash Security has identified significant security vulnerabilities in the Model Context Protocol (MCP), technology introduced by Anthropic in November 2024 to facilitate communication between AI agents and external tools.

  • silhouetted student stands before the White House, surrounded by abstract digital graphics of brains, circuits, and AI elements

    White House Sets Sights on AI Education

    A new executive order from President Donald Trump aims to advance America's position in artificial intelligence technology by incorporating AI into education and providing AI training for educators.

  • abstract pattern of cybersecurity, ai and cloud imagery

    Report Identifies Malicious Use of AI in Cloud-Based Cyber Threats

    A recent report from OpenAI identifies the misuse of artificial intelligence in cybercrime, social engineering, and influence operations, particularly those targeting or operating through cloud infrastructure. In "Disrupting Malicious Uses of AI: June 2025," the company outlines how threat actors are weaponizing large language models for malicious ends — and how OpenAI is pushing back.

  • Two hands shaking in the center with subtle technology icons, graphs, binary code, and a padlock in the dark blue background

    Two Areas for K-12 Schools to Assess for When to Work with a Managed Services Provider

    The complexity of today’s IT network infrastructure and increased cybersecurity risk are quickly moving beyond many school districts’ ability to manage on their own. But a new technology model, a partnership with a managed services provider, offers a way forward for schools to overcome these challenges.