Unisys has launched its range of advanced security products and solutions, including a new software-based release of the Unisys Stealth solution, that is said to help organisations protect their digital and physical assets in Cloud, mobile and enterprise environments.
The software integrator said the new security products and solutions are a key part of the company's growth strategy.
According to a company statement, the solutions include products based on the latest version of Unisys Stealth software, which delivers identity-based micro-segmentation to protect sensitive data by making communication endpoints undetectable to unauthorised parties.
The new products are completely software-based and can be immediately incorporated into an organisation's existing eco-system including clients, servers, Clouds, industrial control systems, Internet of Things, mobile devices, customers, and supply chain partners.
Unisys said the new Stealth products are part of a comprehensive portfolio of security solutions for location, perimeter and surveillance security; identity management and biometrics; secure image processing and analytics; as well as efficient managed services and global consulting to address all aspects of its clients' security requirements.
Unisys vice-president and general manager for global security solutions, Tom Patterson, said with enterprises becoming increasingly interconnected environments and cyber threats becoming business threats, security professionals can no longer protect their enterprises with an outdated focus on building walls and counting events.
"Instead, enterprises need to accept that bad guys will get in somehow, and they must layer in advanced defences that minimise harm with identity-based micro-segmentation," he said.
The company said its solution establishes secure "segments" within an enterprise where only authorised users can access information. Unauthorised users cannot access the information - or even see that it exists.
The offering is based on a software design that eliminates operational costs associated with additional hardware and is said to cut deployment times by up to half. Leveraging global Internet Protocol Security (IPSec) standards, the Stealth code aims to allow easier configuration and integration and provide a highly-enhanced interface for configuring, monitoring and managing the Stealth environment.
Key product updates and new releases include:
- Stealth(Core): Secures data using micro-segmentation and cryptography to limit a user's - or potential attacker's - view of data and services to only a segment of the enterprise.
- Stealth(Mobile): Enables authenticated and secure access to application processing environments in the data centre from mobile applications by using application wrapping software to encrypt data-in-motion from the mobile app across the Internet.
- Stealth(Cloud): Extends the same level of protection to enterprises that wish to leverage the cost-savings benefits of using the public cloud but have been reluctant to do so due to security concerns.
Source: ARN Australia
Sign up for Computerworld eNewsletters.