sb-as logo
Story image

Unisys launches latest version of its Stealth security software

Unisys today announced the launch of Stealth 5.0, the latest version of the company's flagship software for data centre security.

Unisys says the updated software now provides protection for data in container and Kubernetes environments, with the aim of improving data centre security and securing new workloads.

The company says the new Stealth version will stop more sophisticated cyber attacks, including sponsored threats. 

It will also prevent data exfiltration in the event of a breach, Unisys says.

“Our clients are increasingly embracing the use of containers and Kubernetes as a means for more efficient applications development,” says Unisys global vice president of product management Sudhir Mehta.

“We make the use of these technologies seamless from a security standpoint, so clients can realise the advantages offered by containerised microservices – while minimising risk.”

The new software, available as of today, is said to reduce attack surfaces by creating dynamic, identity-driven microsegments called communities of interest (COIs). 

Through secure COIs, Stealth creates a list of trusted systems, users and data and separates them from those that are untrusted.

It further reduces attack surfaces by encrypting all communication between Stealth-protected assets and cloaking the assets from unauthorised users.

Stealth 5.0 expands upon previous versions with the following additional capabilities:

Enhanced secure virtual gateway (SVG) capabilities 

Stealth 5.0 expands next-generation SVG capabilities to include deployment in public clouds.

Security can be extended for diverse enterprise deployments while continuing support for a broad array of non-standard endpoints or endpoints they don’t control.

Expanded application program interface (API) and automation capabilities

Stealth 5.0 automates all Stealth management activities for quick response to changing business needs while minimising manual work.

Enhanced dynamic isolation

Stealth 5.0 can reduce isolation time to 10 seconds or less to improve clients’ security postures with less opportunity for malware to propagate throughout their environments.

Implementation of the new software comes with ‘no impact’ on an organisation’s existing infrastructure, creating an opportunity for clients to use their current security tools as usual while improving their security standards.
 

Containers are environments in which microservices – functional components of applications used by developers – reside. 

Docker containers and Kubernetes – a tool for the management of those containers – are quickly becoming the accepted standards to optimise workload deployment in enterprise environments and to make their data centres more efficient and agile. 

According to Gartner, more than 75% of global organisations will be running containerised applications in production by 2022, a significant increase from fewer than 30% currently.

Unisys says organisations will not need to sacrifice their security or increase their attack surface if Stealth is introduced into these containerised applications.

Enterprises can streamline their security by deploying one set of consistent security policies that works across the client’s entire digital infrastructure.

Workloads are increasingly moving from traditional environments to containerised deployments, as well as from on-premise to the cloud. Unisys says Stealth 5.0 is a tool which can be used to facilitate this. 

Story image
Marriott International reports breach affecting 5.2 million customers
Marriott said in statement that an ‘unexpected’ amount of guest information may have been accessed in mid-January this year, using the login credentials of two employees at one of the company’s franchise properties.More
Story image
Zero trust security gaining momentum as a cybersecurity model
The model is centred on the belief that organisations should not automatically trust anything inside or outside its perimeters and instead must verify anything trying to connect to its systems before granting access, according to CSO.More
Story image
COVID-19: Surfshark joins growing list of companies offering free services
The VPN service has recently announced its intention to offer free six-month subscriptions for small businesses, as more countries tighten quarantine measures and finances become strained.More
Story image
ForgeRock appoints new execs to lead IAM growth
“Identity and Access Management is foundational to a modern security architecture especially now as we are experiencing a paradigm shift towards Zero Trust."More
Story image
CompTIA absorbs cybersecurity info-sharing group
“There is great interest from managed service providers and other organisations to be part of an information-sharing body dedicated to cybersecurity, the global MSP community and its customers.” More
Story image
Kaspersky announces update to Microsoft Office 365 security solution as COVID-19 threats emerge
The upgrade introduces enhanced anti-phishing capabilities with a dedicated anti-spoofing feature, as well as bolstered protection within Microsoft Teams.More