Federal Insights, January-March 2016.
Unisys Federal Insights
Articles
 
Unisys Stealth (cloud)™ is now available on the AWS Marketplace
Getting to the cloud — safely! by Lance Vaughn
While cloud computing delivers numerous advantages over traditional data center infrastructure, it also presents unique challenges, especially when it comes to security. The agility of spinning up/down virtual machines quickly and efficiently, coupled with pay-as-you-consume cost models have enticed commercial organizations to adopt cloud-based computing services at a feverish pace.

However, in the federal space, security concerns have limited cloud services adoption. The development of Amazon’s GovCloud and Microsoft Azure Government cloud platforms, make secure cloud computing for the federal market a little closer to reality by removing several major stumbling blocks for public sector adoption, including some, but not all, of the security concerns. Traditional security methodologies, which have focused on the perimeter and defense-in-depth, have been proven less than effective against targeted, well-planned attack vectors such as spear phishing or insider threats. The question of “will our defenses hold” has been replaced with the very high probability that the breach (or breaches) have already taken place: So, now what? Organizations that have found it challenging to protect assets within a wholly owned datacenter environment will find the cloud even more challenging. In order to keep up with the rapidly changing threat scape, a new approach to security is required.

Welcome Unisys Stealth, a new, fully-certified NIAP and FIPS 140, and highly-effective approach to securing your assets -- even after the attackers have breached the fortress walls. Imagine for a moment, that you’re an attacker. You have done your homework, performed exhaustive reconnaissance, launched an extremely targeted phishing attack on your victim and voilà, you just received positive confirmation that your mark has taken the bait you now have root access on a laptop behind the victim’s firewall. The hard work is behind you, and you now are able to daisy chain, device to device, throughout the organization, unimpeded and undetected. But what if Stealth was already deployed on this same infrastructure? For the attacker this is devastating. The bad actor no longer has free rein and is now contained by Stealth’s secure micro-segmentation technology. Stealth not only contains the attacker by encrypting and segmenting the network into communities of interest (COIs) but actually cloaks or makes invisible devices in other COIs. The end result is that the attacker is not even able to see the existing assets on the network and simply can’t attack what isn’t there.

Stealth is a unique, software-based approach to security that enables organizations to secure infrastructure assets in a way that was previously virtually unattainable. Most organizations that attempted internal network segmentation via complex hardware architectures, utilizing firewalls and other rule-based technologies, have found this approach to be both costly and ultimately unsustainable. Utilizing Stealth, network owners can now create, “on-the-fly,” micro-segmented communities, employing existing identity infrastructures such as Active Directory or other Lightweight Directory Access Protocol(LDAP) solutions. Stealth software is hardware-independent and does not require any changes to the existing data center technologies to provide these benefits. Stealth is easily deployed in any cloud environment, but was engineered and tested specifically for both Amazon Web Services (AWS) and Microsoft Azure.

Since many security concerns continue to surround multi-tenant environments, like many clouds serve, Stealth can seamlessly and transparently prevent lateral movement of data, thus ensuring secure segregation of users, organizations and data. For mobile or remote-based users, the Stealth(mobile) solution provides secure access and data transmission and allows mobile devices and applications to securely access COIs no matter where they are in the world. Concerned with machine or industrial control system vulnerabilities? Stealth is also highly effective at protecting Supervisory control and data acquisition(SCADA), legacy applications and operating systems and other exposed technologies, which traditionally have been extremely challenging to secure due to lack of support or end of life issues.

Stealth represents a new way of securing your datacenter - whether traditional, public or private cloud based, and no other technology available today can deliver a comparable, certified, and scalable approach that addresses so many of the concerns facing security practitioners today.

 
 
Subscribe Now!
Subscribe to receive the Federal Insights newsletter by clicking the below button.
Click here to subscribe →
 
Click here to access Federal Insights newsletter 1.0 edition.
 

You can manage your email preferences via the links below.

Unsubscribe from Program | Unsubscribe from all Unisys Marketing Emails

Unisys
801 Lakeview Drive
Bluebell, PA 19422

We respect your privacy as set forth in our Privacy Notice.

If you are unable to view this link, please cut and paste the following into your browser: http://www.unisys.com/unisys-legal/privacy.