Story image

Unisys extends cyber protection to IoT and connected devices

18 Apr 2018

Unisys has moved to include Internet of Things (IoT) devices and other internet connected equipment in the new version of its Unisys Stealth security software suite.

The release of the suite’s microsegmentation software protects IoT devices and isolates them from untrusted network segments within a protected network.

The company says the Stealth-protected network helps to prevent intrusion and remote tampering on the devices, while protecting the corporate network from unsecured device compromised.

The technology extends not only to IoT devices, but connected equipment including baggage scanners, industrial control systems, surveillance cameras, and medical monitoring machines.

Healthcare is one of the most susceptible industries to cyber threats.

“Legacy medical devices that were not designed to be internet-accessible are now being connected to the internet as part of healthcare initiatives, increasing risks and the attack surface,” a statement from Gartner says.

Gartner recommends that organisations “create zones to proactively house connected medical devices segmentation.” Gartner identified microsegmentation as one of its “top technologies for information security in 2017.

Unisys says the healthcare industry provides an example of how medical devices are vulnerably to cyber attacks.

“Proprietary operating platforms and industry regulations often prohibit updates to the devices themselves, limiting organisations to the built-in security capabilities from device manufacturers. These purpose-built devices need the ability to extend security beyond static factory-delivered controls to keep up with rapidly evolving, sophisticated threats released on a daily basis,” the company states.

Unisys senior vice president of technology and CTO Tarek El-Sadany says that Stealth applies microsegmentation to devices and data that were previously vulnerable to both attack and unauthorized access.

“In a healthcare organisation, for example, Stealth can prevent and contain unauthorised access to medical devices and patient data, enabling secure, real-time data flow from devices to electronic heath record systems and reducing the cost of compliance with flexible security controls.”

Earlier this month Unisys announced that former IBM director of global managed security services Mathew Newfield as its corporate chief information security officer.

He will lead the Unisys corporate information security team, which is responsible for the design, development, and implementation of the Unisys corporate information security and risk program across all regions and functions.

Unisys is a global IT company that builds security-centric and high-performance solutions for business and government.

Its offerings include security software and services; digital transformation and workplace services; industry applications and services; and innovative software operating environments for high-intensity enterprise computing. 

Forget endpoints—it’s time to secure people instead
Security used to be much simpler: employees would log in to their PC at the beginning of the working day and log off at the end. That PC wasn’t going anywhere, as it was way too heavy to lug around.
DimData: Fear finally setting in amongst vulnerable orgs
New data ranking the ‘cybermaturity’ of organisations reveals the most commonly targeted sectors are also the most prepared to deal with the ever-evolving threat landscape.
IXUP goes "post-quantum" with security tech upgrade
The secure analytics company has also partnered with Deloitte as a reseller, and launched a SaaS offering on Microsoft Azure.
ExtraHop’s new partner program for enterprise security
New accreditations and partner portal enable channel partners to fast-track their expertise and build their security businesses.
Hackers increasingly ‘island hopping’ – so what does it mean?
Carbon Black's Rick McElroy discusses this new trend and what it means for the new age of cybercrime.
Trust without visibility is blind – Avi Networks
Enterprises are wanting to gain the trust of their customers, but are often found blindly defending themselves.
How to avoid becoming a cryptojacking victim - Bitglass
Large-scale cryptojacking is a lucrative business due to the popularity and value of cryptocurrencies like Bitcoin and Ethereum.
Symantec, Ixia combine efforts to secure hybrid networks
Ixia’s CloudLens and Symantec Security Analytics now feature complete integration, which allows Symantec customers to gain real-time visibility into their hybrid cloud environments.