sb-au logo
Story image

Aquion signs on as first local Unisys Stealth value added reseller

IT services company Aquion has signed on as Unisys’ first ANZ value added reseller for its Unisys Stealth suite of security software.

Aquion, which has offices in Sydney, Melbourne and Auckland, will resell and support the software across New Zealand and Australia.

Stealth is targeted at the enterprise and government markets, protecting data in data centres, cloud and mobile infrastructures, and as its name suggests, helps conceal endpoints.

Audrey Lyon, Aquion general sales manager, says with Unisys Stealth, the IT services company can offer the latest in micro-segmentation techniques to prevent and reduce the impact of security breaches.

Tony Windever, Unisys Asia Pacific vice president and general manager, says: “The stakes are high for business leaders – cyber breaches can result in brand damage, market devaluation or loss of customers.

“But as our work and personal lives become increasingly hyerconnected, the risk of security breaches – whether accidental or deliberate – is inevitable.

“The Unisys approach to security is to not only prevent breaches, but also minimise the impact of breaches should they occur.”

Windever says Aquion has a ‘proven reputation’ for delivering security solutions in Australasia. The company specialises in enterprise grade software across security, ERP and networking.

Unisys claims the Stealth software-defined security portfolio applies a ‘novel approaches’ to new threats.

“By substituting traditional hardware topology for software-based cryptography, our Stealth Micro segmentation solutions prevent unauthorised access to sensitive information and reduce the attack surface, thereby making endpoints invisible to unauthorised users, including DBAs.

The offerings – which include five solutions – also tighten access control by focusing on user identity rather than physcial devices, protects data in motion through encryption, and enables customers to consolidate and virtualise networks, servers and cloud architectures.

Story image
Vulnerability discovered in DNS recursive resolvers that can be abused to launch DDoS attacks against any victim
Researchers have discovered a vulnerability in the implementation of DNS recursive resolvers that can be abused to launch disruptive DDoS attacks against any victim.More
Story image
Chinks in the armour: Why the post COVID-19 cloud is easy game for cybercriminals
Now’s the time for CIOs to pause and make sure their digital transformation projects are fit for today, and the future.More
Download image
Dynamic Workforce Risk, and how it can jeopardise your business
Almost everything about the modern business is changing in 2020. An evolved workforce is one of them - but many businesses don't see the risks. Here's how this could spell bad news.More
Story image
Five wine-tasting tips that should be applied to network security
What does network visibility really mean? Much like a blind wine tasting, we need to keep an open mind and trust what data is telling us without being biased by previous results.More
Story image
ExtraHop brings SaaS network detection and response solution to market
"Reveal(x) 360 is the culmination of a multi-year R&D investment to secure data centre, remote sites, and cloud workloads with frictionless deployment and actionable insights that can be securely accessed from anywhere.”More
Story image
New tech startup looks to help lawyers and finance pros
StructureFlow has launched to market, dubbing itself as a tech startup with the mission of helping lawyers and finance professionals visualise complex legal structures and transactions. More