Unisys Stealth™ establishes “micro-segments” within an enterprise where only authorized users can access information. Unauthorized users cannot access the information – or even see that it exists. Even if a bad actor gets in, Stealth sees to it that they are cryptographically contained to a single segment of the network, with no access to move laterally to other parts of the enterprise. Stealth requires no new hardware, no new firewall rules, and no new application changes. Our most current version of Stealth, which added the ability to leverage the industry standard IPsec protocol suite as well as other key enhancements, conforms to National Security Agency's National Information Assurance Partnership (NIAP) Protection Profile for IPsec Virtual Private Networks and will soon complete validation.
And, Unisys Stealth micro-segmentation security solution is now on the Amazon Web Services (AWS) Cloud, available for customers to acquire and deploy from the AWS Marketplace. The solution provides advanced security to AWS customers, in addition to the ease of access and scale of the AWS Cloud. Take a test drive today.
To learn more about Stealth for micro-segmentation, check out www.unisys.com/stealth and contact us today at stealth@unisys.com. |