Cryptographic protection can be implemented system-wide with a single command, limiting the need ... applications on top of a Red Hat Linux Enterprise base image,” Hellekson said.