Unisys Stealth 4.0 Security Software
News Release
Unisys Announces Availability of Unisys Stealth® 4.0 Security Software, the First Product with Dynamic Isolation™ Capabilities to Quickly Isolate Users and Devices at the First Sign of Trouble
New version of award-winning software adds protection to help clients implement Zero Trust networks that actively isolate malicious users and devices within minutes of identification
WELLINGTON, New Zealand and RSA CONFERENCE 2019, SAN FRANCISCO, 6 March 2019 – Unisys Corporation (NYSE: UIS) today announced the forthcoming availability of the latest version of its award-winning Unisys Stealth® security software suite, the industry’s first product with dynamic isolation™ capabilities to quickly isolate devices or users at the first sign of compromise. The new version, Stealth 4.0, will be generally available beginning 15 April 2019.
The new release of Stealth™ 4.0 software addresses threats associated with the ever-evolving digital landscape where adoption of cloud, mobile and the Internet of Things (IoT) continues to rise. Through its integration with the LogRhythm security incident and event management (SIEM) system, Stealth 4.0 gives clients the ability to take immediate action to respond to security incidents, stopping attacks in progress.
Stealth 4.0 also is fully integrated with Palo Alto Networks’ Panorama network security management console to import the traffic from Panorama and combine it with Stealth’s live traffic discovery to enable unprecedented network visibility and visualisation.
Stealth reduces attack surfaces in these environments by creating dynamic, identity-driven microsegments called communities of interest (COIs). By establishing secure COIs, Stealth separates trusted systems, users and data from the untrusted. It further reduces attack surfaces by encrypting all communication between Stealth-protected assets and cloaking the assets from unauthorised users.
“What makes Stealth 4.0 stand out is that it gives organisations the ability to continue to operate their business – even while under attack, said Vishal Gupta, chief technology officer and senior vice president of Technology, Unisys. “Having the ability to not only identify but also isolate threats in a matter of seconds allows an organisation to respond forcefully to attacks without disruption. The alternative is organisations end up as the next public victim in the news cycle.”
Stealth 4.0 expands upon previous versions of the software suite with the following capabilities:
• Enhanced dynamic isolation: Stealth 4.0 empowers clients to respond quickly and proactively to threats through the ability to quickly and proactively isolate users and devices, working in tandem with LogRhythm SIEM systems to automate breach detection and response – shortening response time;
• Integration with Palo Alto Networks Panorama: Integration permits easier security policy deployment to increase network insight for vetting, validating and controlling all users to identify and block unwanted communication;
• Expanded automation: Stealth 4.0 introduces an expanded suite of standardised tools to enable unattended, automated installation and operations. These automation enhancements eliminate the need for repetitious and manual operations, reduce installation time and improve management capabilities for large enterprise deployments; and
• Added contextual network security visualisation: Stealth 4.0 uses a combination of rule-based approaches and machine learning to classify and cluster network nodes to make it easier to understand what network assets are present and the communication between them.
For more information on Unisys Stealth 4.0, go to www.unisys.com/stealth.
About Unisys
Unisys is a global information technology company that builds high-performance, security-centric solutions for the most demanding businesses and governments on Earth. Unisys offerings include security software and services; digital transformation and workplace services; industry applications and services; and innovative software operating environments for high-intensity enterprise computing. For more information on how Unisys builds better outcomes securely for its clients across the Government, Financial Services and Commercial markets, visit www.unisys.co.nz
Follow Unisys on Twitter and LinkedIn.