News Security

Unisys Enables Enterprise-wide Micro-Segmentation Security with Stealth(aware)

New Unisys Stealth(aware) Software Automates Implementation of Advanced Micro-Segmentation Security, Makes Digital Protection Accessible to More Organizations in the Fight Against Cybercrime

Built-in analytics and visualization provide immediate insight into security risk for automatic configuration and deployment of award-winning Unisys Stealth protection throughout the extended enterprise

Unisys Corporation announced the launch of Stealth(aware), a new Unisys Stealth software application that takes the fight to cybercrime by enabling organizations to easily deploy enterprise-wide, micro-segmentation security across extended networks with the touch of a button.

Recent high-profile data breaches have further validated concerns about digital enterprises, while incidents of denial-of-service attacks, insider threats, ransomware, targeted espionage and privacy breaches are expected to worsen in the coming years. At the same time, overstretched and under-resourced security teams are struggling to detect and remediate risks effectively. Through Stealth(aware), Unisys offers the ability to easily install advanced security into any organization, making the most advanced protection through high-level cybersecurity more accessible to organizations of all sizes.

Unisys President and CEO Peter Altabef said, “Unisys has put a stake in the ground: we are committed to improving the quality of peoples’ lives through enhancing their digital security, and today’s launch of Unisys Stealth(aware) represents the latest way we deliver on this promise. The best cyber protection not only needs to work everywhere, operate efficiently and keep you ahead of the threat, but it must also be able to be easily deployed.

Stealth(aware) meets these standards across the board. With data and systems secured by Unisys Stealth, clients are free to innovate and grow their businesses with a minimum level of the anxiety prevalent in our digital world. At Unisys, we call this securing your tomorrow.”

Available today and featuring an intuitive, graphical user interface, Stealth(aware) unleashes the Unisys Stealth micro-segmentation product portfolio – including applications focused on core, cloud, mobile, identity and analytics – which creates segments within an organization where only authorized users can access information, while others (from malware to insiders to hackers) cannot even see that those segments exist.

In the case of Stealth(aware), built-in analytics automate and speed up deployment. Stealth(aware) software can analyze data traffic in a mid-sized company with thousands of nodes in just a few minutes, for example, providing instant visualization and fine tuning controls that can produce segmentation policies able to be deployed at the push of a button. In addition, during testing Stealth(aware) was able to complete assessments of enterprise networks and their associated public clouds and integrated suppliers in minutes – without weeks of redesign and configuration.

Tarek El-Sadany, senior vice president of Technology and Chief Technology Officer, Unisys said, “Unisys is building more intelligence into our products to improve the user experience and simplify the implementation of advanced security. By designing Stealth(aware) to automate the discovery and deployment process, our clients can improve their level of security with faster implementation across the data center and the cloud. Stealth(aware) creates one security solution for an organization’s hybrid enterprise in a simple interface that can be implemented by non-security experts.”

Doug Cahill, senior analyst, cybersecurity, Enterprise Strategy Group Inc. said, “With the availability of Stealth(aware), Unisys is providing an opportunity for enterprises to obtain the benefits of some of the most advanced security techniques available. As cyber threats become more sophisticated and damaging, advanced security tools will become essential to all public and private sector organizations, regardless of their size or resources.”

Related posts

Sophos Appoints Torjus Gylstorff as Sophos’ CRO

enterpriseitworld

The ERP revolution is here: Why point solutions might be failing your business

enterpriseitworld

TD SYNNEX to Amplify Global Footprint of eScan

enterpriseitworld
x