Unisys reports that its Stealth(aware)™ application makes digital protection accessible to more organizations in the fight against cybercrime
BLUE BELL, Pa.—Recent high-profile data breaches have further validated concerns about digital enterprises, while incidents of denial-of-service attacks, insider threat, ransomware, targeted espionage, and privacy breaches are expected to worsen in the coming years. At the same time, overstretched and under-resourced security teams are struggling to detect and remediate risks effectively.
A new software application recently launched by Unisys Corporation, called Stealth(aware)™, is said to protect against cybercrime by enabling organizations to easily deploy enterprise-wide, micro-segmentation security across extended networks with the touch of a button. Stealth(aware) creates segments within an organization where only authorized users can access information, while others, from malware to insiders to hackers, cannot even see that those segments exist.
Offering built-in analytics, Stealth(aware) automates and speeds up deployment and can analyze data traffic in a mid-sized company with thousands of nodes in just a few minutes, the company reports. As a result, it is said to provide instant visualization and fine tuning controls that can produce segmentation policies able to be deployed at the push of a button. During testing, Stealth(aware) was reported to complete assessments of enterprise networks and their associated public clouds and integrated suppliers in minutes, without weeks of redesign and configuration.
“Unisys is building more intelligence into our products to improve the user experience and simplify the implementation of advanced security,” said Tarek El-Sadany, senior vice president of technology and chief technology officer, Unisys, in a press release. “By designing Stealth(aware) to automate the discovery and deployment process, our clients can improve their level of security with faster implementation across the data center and the cloud. Stealth(aware) creates one security solution for an organization’s hybrid enterprise in a simple interface that can be implemented by non-security experts.”
Stealth(aware) automates and customizes the process of installing security within enterprises via three main components: Auto-Discover, which automatically determines what endpoints, systems, and associated network data flows exist on the network; Auto-Configure, which uses the information obtained through Auto-Discover to generate security policies; And Auto-Deploy, which applies Unisys Stealth micro-segmentation protection based on those security policies, applying the optimal levels of protection to high-risk, high-value network traffic, according to Unisys.
Stealth(aware) provides multiple enforcement modes. Clients can initially choose a non-enforcement or learning mode to simply monitor what is occurring in their environment or how segmentation will impact it. They can then gradually increase the level of enforcement to advanced protection levels that allow visibility and access to data and assets to only “need to know” users. Different enforcement settings can be applied to different segments of their enterprise and simultaneously implemented.
Stealth(aware) can also quickly learn of changes to clients’ infrastructures and highlight new vulnerabilities, Unisys reports. The product’s analytics, visualization, and automation can then be used to immediately remediate these vulnerabilities, thereby defeating hackers who persistently and continually search for vulnerabilities in changing enterprise infrastructures.