As organisations scale their digital capabilities with cloud, mobile and IoT to improve customer experiences and operational efficiencies, security perimeters become more difficult to define and defend. Traditional security controls are insufficient to protect from cyberattacks in the digital age, compelling organizations to adopt a Zero Trust Network. The principles are simple – trust no user or device, inside or outside the private network and grant as little access as possible upon reliable identification.
Unisys Stealth® is a software suite, distributed locally by Agilient and is trusted by government and commercial organisations to transform your existing network—both on-premises and in the cloud—into a Zero Trust Network through identity-based microsegmentation. Stealth™ network overlay technology requires no changes to your existing network or applications.
Stealth enables unprecedented network visibility inside and across network zones through live traffic discovery. Built-in contextual intelligence uses a combination of rules-based and machine learning techniques to classify and cluster assets into simple network maps. Better network insight allows you to see assets and data flows to prioritise security needs as well as vet, validate and control all users and devices to identify and block unwanted communication.
Stealth reduces risk by creating dynamic, identity-based microsegments called communities of interest (COI). Stealth treats all network traffic as untrusted and permits communication only when COI membership is confirmed. By establishing secure COI, Stealth separates trusted systems, users and data from the untrusted. All communications between COI members and Stealth-protected assets are encrypted and endpoints are concealed from non-members.
Through interoperability with your existing security information and event management (SIEM) systems and user-friendly application programming interface (API) integrations, security operations can now take immediate action to respond to security incidents, stopping attacks in progress. Stealth dynamically isolates devices and users at the first sign of compromise.
“Unisys Stealth solution protects our intellectual property which is key to our ability to do business with governmental agencies and meet regulatory requirements around the world.”
– – Earl Barnes, Head of Infrastructure,
Operations and Cybersecurity, Flowserve
You can deploy Stealth incrementally and scale it efficiently using rich APIs and advanced automation. Stealth provides API and robust scripting support for unattended automated installation. It is also easy to use and manage, reducing the complexity, expense and operations associated with firewall, VLAN and VPN static security controls.
In our digital world, critical applications and systems deliver vital access to energy, transportation, financial services and healthcare as well as strong national security and defense. Industry-leading organisations trust Unisys to maximise security posture across IT, OT and production environments. Unisys Security Solutions and Agilient combine expert consulting, advanced technologies and managed services that span the entire security lifecycle.