sb-as logo
Story image

Unisys launches Stealth security solution in AWS cloud

Unisys has announced its Stealth micro-segmentation security solution will be available on the Amazon Web Services (AWS) cloud.

AWS provides a scalable, low-cost infrastructure platform used by more than a million active customers across 190 countries around the world.

With Stealth on AWS, users can micro-segment their own portions of the cloud from other users while keeping their own encryption keys, Unisys says.

Customers can unify their internal security protections with those on the cloud, enforce virtual machine-to-machine encryption in the cloud, and reduce attack surfaces, the company says. 

In addition, Stealth on AWS allows organisations to extend entire workloads securely from data centres to the cloud; manage access via existing identity systems including Active Directory or LDAP; and add integrated supply chain partners to micro-segments without giving them broad access - all at the packet level without new hardware, firewall rules, or application changes.

Unisys Stealth software uses identity-based micro-segmentation techniques and encryption to protect data and applications on the AWS Cloud.

Stealth protection makes data and applications invisible to hackers and unauthorised users by encrypting traffic between all Stealth-protected endpoints, Unisys says. 

Clients can acquire Stealth directly from the AWS Marketplace, where Unisys also offers an AWS Test Drive that allows enterprises to access a private sandbox using Stealth.

Alternately, enterprises that want to dynamically extend their on-premise infrastructure to AWS can use Stealth’s 'cloudbursting' capability, which automates the shifting of secure workloads directly into AWS.

“Enterprises can now use Stealth as their single platform for securing both their data centre and their cloud environments, substantially reducing the complexity and cost of multiple platforms,” says Tom Patterson, Unisys vice president and general manager for global security solutions.

“This comprehensive level of protection removes roadblocks for many organisations looking to leverage the cloud, and will unlock huge cost savings and business agility needed in today’s competitive environment," he says.

Looking to reinvent itself, Unisys has a renewed focused in on securing digital transformation and adopted an asset-light strategy of working with cloud technology providers.

This complements Unisys’ own advanced capabilities in infrastructure and service management, analytics, application services and software, as well as security, the company says.

“Security and cloud computing are strategic priorities for businesses today,” says Peter Altabef, Unisys president and chief executive officer.

“Enterprise-proven security that evolves to meet future threats will provide additional assurance to enterprises and governments that are moving core operations to the cloud.

“Integrating Stealth onto the AWS Cloud advances Unisys’ leadership in security, and reflects our commitment to continually deliver innovation that solves real-world business challenges,” Altabef says.

“Security is top of mind for our customers, and at AWS, it’s our number one priority. Unisys Stealth on AWS provides extra layers of security for enterprises moving their workloads to the AWS Cloud,” says Stephen Schmidt, Amazon Web Services chief information security officer.

Link image
Webinar: The key to video chat privacy
Complete privacy is not always guaranteed on video chats. Here's how to secure your communications on a multi-tenant public cloud.More
Story image
Microsoft is most imitated brand for phishing attacks in Q3
Popular phishing tactics using the Microsoft brand used email campaigns to steal credentials of Microsoft accounts, luring victims to click on malicious links which redirect them to a fraudulent Microsoft login page. More
Story image
Ransomware attacks skyrocketed in past three months - Check Point
The daily global average of ransomware attacks jumped 50% in last quarter, compared to 1st half of 2020.More
Story image
How are industrial enterprises faring with the rise of cyber threats?
The majority of industrial enterprises face an increase in cyber threats since the COVID-19 pandemic began, according to a new report from Claroty titled The Critical Convergence of IT and OT Security in a Global Crisis.More
Story image
Why zero trust could fail due to lack of understanding​, not technology
Security architects are being forced to re-examine the concept of identity, with many turning to a zero trust security model to provide a better architecture for protecting their sensitive resources.More
Story image
CrowdStrike targets Zero Trust blind spot with new offering
CrowdStrike has officially launched CrowdStrike Falcon Zero Trust Assessment (ZTA), designed to aid in overall security posture by delivering continuous real-time assessments across all endpoints in an organisation regardless of the location, network or user. More