sb-au logo
Story image

Unisys launches latest version of its Stealth security software

Unisys today announced the launch of Stealth 5.0, the latest version of the company's flagship software for data centre security.

Unisys says the updated software now provides protection for data in container and Kubernetes environments, with the aim of improving data centre security and securing new workloads.

The company says the new Stealth version will stop more sophisticated cyber attacks, including sponsored threats. 

It will also prevent data exfiltration in the event of a breach, Unisys says.

“Our clients are increasingly embracing the use of containers and Kubernetes as a means for more efficient applications development,” says Unisys global vice president of product management Sudhir Mehta.

“We make the use of these technologies seamless from a security standpoint, so clients can realise the advantages offered by containerised microservices – while minimising risk.”

The new software, available as of today, is said to reduce attack surfaces by creating dynamic, identity-driven microsegments called communities of interest (COIs). 

Through secure COIs, Stealth creates a list of trusted systems, users and data and separates them from those that are untrusted.

It further reduces attack surfaces by encrypting all communication between Stealth-protected assets and cloaking the assets from unauthorised users.

Stealth 5.0 expands upon previous versions with the following additional capabilities:

Enhanced secure virtual gateway (SVG) capabilities 

Stealth 5.0 expands next-generation SVG capabilities to include deployment in public clouds.

Security can be extended for diverse enterprise deployments while continuing support for a broad array of non-standard endpoints or endpoints they don’t control.

Expanded application program interface (API) and automation capabilities

Stealth 5.0 automates all Stealth management activities for quick response to changing business needs while minimising manual work.

Enhanced dynamic isolation

Stealth 5.0 can reduce isolation time to 10 seconds or less to improve clients’ security postures with less opportunity for malware to propagate throughout their environments.

Implementation of the new software comes with ‘no impact’ on an organisation’s existing infrastructure, creating an opportunity for clients to use their current security tools as usual while improving their security standards.

Containers are environments in which microservices – functional components of applications used by developers – reside. 

Docker containers and Kubernetes – a tool for the management of those containers – are quickly becoming the accepted standards to optimise workload deployment in enterprise environments and to make their data centres more efficient and agile. 

According to Gartner, more than 75% of global organisations will be running containerised applications in production by 2022, a significant increase from fewer than 30% currently.

Unisys says organisations will not need to sacrifice their security or increase their attack surface if Stealth is introduced into these containerised applications.

Enterprises can streamline their security by deploying one set of consistent security policies that works across the client’s entire digital infrastructure.

Workloads are increasingly moving from traditional environments to containerised deployments, as well as from on-premise to the cloud. Unisys says Stealth 5.0 is a tool which can be used to facilitate this. 

Story image
OT networks warned of vulnerabilities in CodeMeter software
Manufacturers using the Wibu-Systems CodeMeter third-party licence management solution are being urged to remain vigilant and to urgently update the solution to CodeMeter version 7.10.More
Story image
The SASE triangle: How a CASB protects managed apps
Enterprises that fail to adapt to the modern business world when it comes to security are likely to fall prey to data breaches and experience a host of other problems, writes Bitglass product marketing manager Will Houcheime.More
Download image
Network functions virtualisation: What is is, how to use it, and why it matters
Network functions virtualisation (NFV) is fast becoming the go-to method of simplifying corporate networks from planning, through deployment and management.More
Story image
Fortinet’s ‘zero trust’ approach redefining security
Cornelius Mare, Fortinet A/NZ Director, Security Solutions, explains why taking a ‘zero trust network access’ approach to cybersecurity requires fully-integrated and comprehensive security services and policies.More
Story image
Video: 10 Minute IT Jams - The benefits of converged cloud security
Today, Techday speaks to Forcepoint senior sales engineer and solutions architect Matthew Bant, who discusses the benefits of a converged cloud security model, and the pandemic's role in complicating the security stack in organisations around the world.More
Story image
Cryptomining trojan malware discovered by ESET researchers
The malware, primarily targeting victims in Czechia and Slovakia, prioritises subterfuge through deployment of multiple techniques to avoid detection, and leans heavily on the Tor network and BitTorrent protocol to achieve its goals.More