sb-as logo
Story image

Unisys launches latest version of its Stealth security software

Unisys today announced the launch of Stealth 5.0, the latest version of the company's flagship software for data centre security.

Unisys says the updated software now provides protection for data in container and Kubernetes environments, with the aim of improving data centre security and securing new workloads.

The company says the new Stealth version will stop more sophisticated cyber attacks, including sponsored threats. 

It will also prevent data exfiltration in the event of a breach, Unisys says.

“Our clients are increasingly embracing the use of containers and Kubernetes as a means for more efficient applications development,” says Unisys global vice president of product management Sudhir Mehta.

“We make the use of these technologies seamless from a security standpoint, so clients can realise the advantages offered by containerised microservices – while minimising risk.”

The new software, available as of today, is said to reduce attack surfaces by creating dynamic, identity-driven microsegments called communities of interest (COIs). 

Through secure COIs, Stealth creates a list of trusted systems, users and data and separates them from those that are untrusted.

It further reduces attack surfaces by encrypting all communication between Stealth-protected assets and cloaking the assets from unauthorised users.

Stealth 5.0 expands upon previous versions with the following additional capabilities:

Enhanced secure virtual gateway (SVG) capabilities 

Stealth 5.0 expands next-generation SVG capabilities to include deployment in public clouds.

Security can be extended for diverse enterprise deployments while continuing support for a broad array of non-standard endpoints or endpoints they don’t control.

Expanded application program interface (API) and automation capabilities

Stealth 5.0 automates all Stealth management activities for quick response to changing business needs while minimising manual work.

Enhanced dynamic isolation

Stealth 5.0 can reduce isolation time to 10 seconds or less to improve clients’ security postures with less opportunity for malware to propagate throughout their environments.

Implementation of the new software comes with ‘no impact’ on an organisation’s existing infrastructure, creating an opportunity for clients to use their current security tools as usual while improving their security standards.
 

Containers are environments in which microservices – functional components of applications used by developers – reside. 

Docker containers and Kubernetes – a tool for the management of those containers – are quickly becoming the accepted standards to optimise workload deployment in enterprise environments and to make their data centres more efficient and agile. 

According to Gartner, more than 75% of global organisations will be running containerised applications in production by 2022, a significant increase from fewer than 30% currently.

Unisys says organisations will not need to sacrifice their security or increase their attack surface if Stealth is introduced into these containerised applications.

Enterprises can streamline their security by deploying one set of consistent security policies that works across the client’s entire digital infrastructure.

Workloads are increasingly moving from traditional environments to containerised deployments, as well as from on-premise to the cloud. Unisys says Stealth 5.0 is a tool which can be used to facilitate this.