In the digital age, traditional security can no longer protect a dynamic network environment against the growing threat of cyberattacks. Static security controls are difficult to manage, update and operate—increasing security and compliance costs, while limiting agility. Organisations need a new approach to security with a Zero Trust Network that trusts no user or device, on the inside or outside, only granting least-privilege access upon reliable identification. Part of Unisys Stealth® security software suite, Stealth(core)™ provides foundational capabilities—identity-based microsegmentation, dynamic isolation, cryptographic cloaking and encryption of data in motion—that transform your existing network into a Zero Trust Network without added implementation and management complexity.
Stealth™ reduces risk by creating dynamic, identity-based microsegments called communities of interest (COI). Stealth treats all network traffic as untrusted, permitting communication only when COI membership is confirmed. By establishing secure COI, Stealth separates trusted systems, users and data from the untrusted. It further reduces risk by encrypting all communication between Stealth-protected assets and cloaking them from unauthorized users. Stealth packet inspection enablement allows authorised personnel to inspect communications without compromising data in transit.
Through interoperability with existing security information and event management (SIEM) systems and user-friendly application programming interface (API) integrations, Stealth enables immediate action in response to security incidents, stopping attacks in progress. Stealth dynamically isolates devices and users at the first sign of compromise. It also utilises identity management systems, such as Active Directory, to manage memberships to COI for efficient identity-based controls and management.
A software-only solution, Stealth is easy to use and deploy, requires no changes to your existing network or applications and allows you to reduce complexity, expense and operation of static security controls in your dynamic organisation. A reduced attack surface limits the regulatory audit footprint for lower compliance costs.
An expanded suite of standardised tools, including APIs and robust scripting support, enables unattended automated installation. These automation enhancements eliminate the need for repetitive and manual operations, reducing installation time and improving management capabilities.
Stealth(core) enables uniform security policies across a range of endpoints and workloads, including physical servers, virtual machines, operational technology (OT) and purpose-built devices. You can deploy Stealth incrementally and scale it efficiently using rich APIs and automation. The same protection extends to the cloud and mobile environments using Stealth(cloud)™ and Stealth(mobile)™. Stealth is also capable of securing workloads behind network devices such as routers and load balancers.
In our digital world, critical applications and systems deliver vital access to energy, transportation, financial services and healthcare as well as strong national security and defense. Industry-leading organisations trust Unisys to maximise security posture across IT, OT and production environments. Unisys Security Solutions and Agilient combine expert consulting, advanced technologies and managed services that span the entire security lifecycle.