New Unisys Stealth(aware)™ Software Automates Implementation of Advanced Micro-Segmentation Security, Makes Digital Protection Accessible to More Organisations in the Fight Against Cybercrime


Built-in analytics and visualisation provide immediate insight into security risk for automatic configuration and deployment of award-winning Unisys Stealth® protection throughout the extended enterprise

London, UK. December 6, 2016Unisys Corporation (NYSE: UIS) announced today the launch of Stealth(aware)™, a new Unisys Stealth® software application that takes the fight to cybercrime by enabling organisations to easily deploy enterprise-wide, micro-segmentation security across extended networks with the touch of a button.

Recent high-profile data breaches have further validated concerns about digital enterprises, while incidents of denial-of-service attacks, insider threats, ransomware, targeted espionage and privacy breaches are expected to worsen in the coming years. At the same time, overstretched and under-resourced security teams are struggling to detect and remediate risks effectively. Through Stealth(aware), Unisys offers the ability to easily install advanced security into any organisation, making the most advanced protection through high-level cybersecurity more accessible to organisations of all sizes.

“Unisys has put a stake in the ground: we are committed to improving the quality of peoples’ lives through enhancing their digital security, and today’s launch of Unisys Stealth(aware) represents the latest way we deliver on this promise,” said Unisys President and CEO Peter Altabef. “The best cyber protection not only needs to work everywhere, operate efficiently and keep you ahead of the threat, but it must also be able to be easily deployed. Stealth(aware) meets these standards across the board.

“With data and systems secured by Unisys Stealth, clients are free to innovate and grow their businesses with a minimum level of the anxiety prevalent in our digital world. At Unisys, we call this securing your tomorrow.”

Analytics Speed Up Deployment, Visualisation Makes It Work
Available today and featuring an intuitive, graphical user interface, Stealth(aware) unleashes the Unisys Stealth micro-segmentation product portfolio – including applications focused on core, cloud, mobile, identity and analytics – which creates segments within an organisation where only authorised users can access information, while others (from malware to insiders to hackers) cannot even see that those segments exist.

In the case of Stealth(aware), built-in analytics automate and speed up deployment. Stealth(aware) software can analyse data traffic in a mid-sized company with thousands of nodes in just a few minutes, for example, providing instant visualisation and fine tuning controls that can produce segmentation policies able to be deployed at the push of a button. In addition, during testing Stealth(aware) was able to complete assessments of enterprise networks and their associated public clouds and integrated suppliers in minutes – without weeks of redesign and configuration.

“Unisys is building more intelligence into our products to improve the user experience and simplify the implementation of advanced security,” said Tarek El-Sadany, senior vice president of Technology and Chief Technology Officer, Unisys. “By designing Stealth(aware) to automate the discovery and deployment process, our clients can improve their level of security with faster implementation across the data center and the cloud. Stealth(aware) creates one security solution for an organisation’s hybrid enterprise in a simple interface that can be implemented by non-security experts.”

Stealth(aware) automates and customises the process of installing security within enterprises via three main components:

  • Auto-Discover – This feature automatically determines what endpoints, systems and associated network data flows exist on the network.
  • Auto-Configure – This capability uses the information obtained through Auto-Discover to generate security policies.
  • Auto-Deploy – This feature applies Unisys Stealth micro-segmentation protection based on those security policies – applying the optimal levels of protection to high-risk, high-value network traffic.

Key product highlights include:

  • Stealth(aware) leverages the latest industrial design technology to provide clients with graphical views of their infrastructure – both before and after the client installs Unisys Stealth protection. These views can be achieved in minutes using “drag and drop” and animation techniques to refine the client’s desired security end state. This visualisation enables clients to quickly and clearly understand both their vulnerabilities and path to remediation through advanced Unisys Stealth security. The resulting Stealth(aware) security profiles can be applied to other departments or functions within the enterprise and deployed with the push of a button.
  • Stealth(aware) also provides multiple enforcement modes, so clients can confidently and conveniently incorporate Unisys Stealth protection. For example, clients can initially choose a non-enforcement or learning mode to simply monitor what is occurring in their environment or how segmentation will impact it. They can then gradually increase the level of enforcement to advanced protection levels that prohibit visibility and access to data and assets to only “need to know” users. Different enforcement settings can be applied to different segments of their enterprise and simultaneously implemented.
  • Stealth(aware) can quickly learn of changes to clients’ infrastructures and highlight new vulnerabilities. The product’s analytics, visualisation and automation can then be used to immediately remediate these vulnerabilities, thereby defeating hackers who persistently and continually search for vulnerabilities in changing enterprise infrastructures.

“With the availability of Stealth(aware), Unisys is providing an opportunity for enterprises to obtain the benefits of some of the most advanced security techniques available,” said Doug Cahill, senior analyst, cybersecurity, Enterprise Strategy Group Inc. “As cyber threats become more sophisticated and damaging, advanced security tools will become essential to all public and private sector organisations, regardless of their size or resources.”

About Unisys
Unisys is a global information technology company that specialises in providing industry-focused solutions integrated with leading-edge security to clients in the government, financial services and commercial markets. Unisys offerings include security solutions, advanced data analytics, cloud and infrastructure services, application services and application and server software. For more information, visit www.unisys.com.

Have any Question or Comment?

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

::::::::::::::::::::::::::::::::::6733:::::::::::::::::::::::::::::::::;;

:::::::::::::::::::::::::::::925:::::::::::::::::::::::::::::::

TRIO STEEL IS ONE OF THE MOST TRUSTED BRAND AND LEADING EXPORTER AND SUPPLIER OF CARBON STEEL, ALLOY STEEL & STAINLESS STEEL PIPES & PIPE FITTINGS MATERIAL. Triosteel is one of the leading Suppliers and Exporters of API 5L Pipe in Singapore. Triosteel also Exports to many countries like Indonesia, Iran, Saudi Arabia & many more. An API 5L pipe is manufactured by adhering to the specifications laid down by the International Organization for Standardization (ISO) 3183.

2780

buy! buy! CHEAP! Telefonie VoIP CHEAP! buy! buy! CHEAP!

2781

buy! buy! CHEAP! Telefonie VoIP CHEAP! buy! buy! CHEAP!

——————————————–

For the 2012 MLB period, we found an totals forecast Joao’s Renowned Over/Under João Zorro Gonçalves, Zcode Totals Pro, System of the time with progressions that have been successful over 98 98% ... We eventually perfected our over/under program ( Zcodesystemexclusive ), although it h-AS has brought years of investigation. Five Steps to Making a Winning MLB Method: 1. Execute appropriate cash management tools. 2. MLB rules that are comprehend. 3.Extensive testing back to make sure successful longterm results ...

——————————————–

There is always a challenge when you're dealing with the Foreign Exchange Market. That's just the nature of the beast. The best thing you can do is to learn about how the market operates as a whole so that you will be ready to meet these challenges. iq option penipu Never be misled by any profit gains in binary options. This is the number-one way traders end up losing their money and ultimately failing. Remember that the same things that make you laugh can make you cry in this market, and you can lose that $700.

——————————————–

Learning Polish has never been this fun and easy as with our podcasts Learn Polish with Polishpod101 Start today and become conversational in Polish in no time

——————————————–

The Best Website Agen Poker Resmi www.sakupoker.com Terpercaya come join

——————————————–

Do you need edmonton phone systems service ? Call complete communications today!

——————————————–

High-tech solutions for easy start-up of your IPTV/OTT-business

——————————————–

——————————————–

If you want to purchase not only one item, you have a chance to enjoy privileges. There is a sale’ tab on the site which offers a fantastic range of reduced counterfeit watches and accessories, such as sunglasses, cufflinks, watch straps and pens. Luxury Jewelry Replica At MCA.MN On Sale You get a 5% discount if you buy two pieces, this discount increases to 10% if you buy 4 pieces or more. There is free international shipping on all orders on this site. We also offer customers a free return anytime with a 100% money back guarantee.

——————————————–