Unisys, a global information technology company, has announced the launch of Stealth(aware), a new Unisys Stealth software application that helps companies in the fight against cyber-crime by enabling organizations to easily deploy enterprise-wide, micro-segmentation security across extended networks with the touch of a button.
Recent high-profile data breaches have further validated concerns about digital enterprises, while incidents of denial-of-service attacks, insider threat, ransomware, targeted espionage and privacy breaches are expected to worsen in the coming years. At the same time, overstretched and under-resourced security teams are struggling to detect and remediate risks effectively. Through Stealth(aware), Unisys offers the ability to easily install advanced security into any organization, making the most advanced protection through high-level, cyber-security more accessible to organizations of all sizes.
Featuring an intuitive, graphical user interface, Stealth(aware) unleashes the Unisys Stealth micro-segmentation product portfolio—including applications focused on core, cloud, mobile, identity and analytics—which creates segments within an organization where only authorized users can access information, while others (from malware to insiders to hackers) cannot even see that those segments exist.
Built-in analytics. In the case of Stealth(aware), built-in analytics automate and speed up deployment. Stealth(aware) software can analyze data traffic in a mid-sized company with thousands of nodes in just a few minutes, for example, providing instant visualization and fine tuning controls that can produce segmentation policies able to be deployed at the push of a button. In addition, during testing Stealth(aware) was able to complete assessments of enterprise networks and their associated public clouds and integrated suppliers in minutes – without weeks of redesign and configuration.
Stealth(aware) automates and customizes the process of installing security within enterprises via three main components:
Auto-Discover: This feature automatically determines what endpoints, systems and associated network data flows exist on the network.
Auto-Configure: This capability uses the information obtained through Auto-Discover to generate security policies.
Auto-Deploy: This feature applies Unisys Stealth micro-segmentation protection based on those security policies – applying the optimal levels of protection to high-risk, high-value network traffic.
As a key product highlight, Stealth(aware) leverages the latest industrial design technology to provide clients with graphical views of their infrastructure—both before and after the client installs Unisys Stealth protection. These views can be achieved in minutes using “drag and drop” and animation techniques to refine the client’s desired security end state.
This visualization enables clients to quickly and clearly understand both their vulnerabilities and path to remediation through advanced Unisys Stealth security. The resulting Stealth(aware) security profiles can be applied to other departments or functions within the enterprise and deployed with a push of a button.
Additionally, Stealth(aware) provides multiple enforcement modes, so clients can confidently and conveniently incorporate Unisys Stealth protection. For example, clients can initially choose a non-enforcement or learning mode to simply monitor what is occurring in their environment or how segmentation will impact it.
They can then gradually increase the level of enforcement to advanced protection levels that prohibit visibility and access to data and assets to only “need to know” users. Different enforcement settings can be applied to different segments of their enterprise and simultaneously implemented.
Finally, Stealth(aware) can quickly learn of changes to clients’ infrastructures and highlight new vulnerabilities. The product’s analytics, visualization and automation can then be used to immediately remediate these vulnerabilities, thereby defeating hackers who persistently and continually search for vulnerabilities in changing enterprise infrastructures.