sb-au logo
Story image

Unisys launches latest version of its Stealth security software

Unisys today announced the launch of Stealth 5.0, the latest version of the company's flagship software for data centre security.

Unisys says the updated software now provides protection for data in container and Kubernetes environments, with the aim of improving data centre security and securing new workloads.

The company says the new Stealth version will stop more sophisticated cyber attacks, including sponsored threats. 

It will also prevent data exfiltration in the event of a breach, Unisys says.

“Our clients are increasingly embracing the use of containers and Kubernetes as a means for more efficient applications development,” says Unisys global vice president of product management Sudhir Mehta.

“We make the use of these technologies seamless from a security standpoint, so clients can realise the advantages offered by containerised microservices – while minimising risk.”

The new software, available as of today, is said to reduce attack surfaces by creating dynamic, identity-driven microsegments called communities of interest (COIs). 

Through secure COIs, Stealth creates a list of trusted systems, users and data and separates them from those that are untrusted.

It further reduces attack surfaces by encrypting all communication between Stealth-protected assets and cloaking the assets from unauthorised users.

Stealth 5.0 expands upon previous versions with the following additional capabilities:

Enhanced secure virtual gateway (SVG) capabilities 

Stealth 5.0 expands next-generation SVG capabilities to include deployment in public clouds.

Security can be extended for diverse enterprise deployments while continuing support for a broad array of non-standard endpoints or endpoints they don’t control.

Expanded application program interface (API) and automation capabilities

Stealth 5.0 automates all Stealth management activities for quick response to changing business needs while minimising manual work.

Enhanced dynamic isolation

Stealth 5.0 can reduce isolation time to 10 seconds or less to improve clients’ security postures with less opportunity for malware to propagate throughout their environments.

Implementation of the new software comes with ‘no impact’ on an organisation’s existing infrastructure, creating an opportunity for clients to use their current security tools as usual while improving their security standards.

Containers are environments in which microservices – functional components of applications used by developers – reside. 

Docker containers and Kubernetes – a tool for the management of those containers – are quickly becoming the accepted standards to optimise workload deployment in enterprise environments and to make their data centres more efficient and agile. 

According to Gartner, more than 75% of global organisations will be running containerised applications in production by 2022, a significant increase from fewer than 30% currently.

Unisys says organisations will not need to sacrifice their security or increase their attack surface if Stealth is introduced into these containerised applications.

Enterprises can streamline their security by deploying one set of consistent security policies that works across the client’s entire digital infrastructure.

Workloads are increasingly moving from traditional environments to containerised deployments, as well as from on-premise to the cloud. Unisys says Stealth 5.0 is a tool which can be used to facilitate this. 

Story image
Attivo Networks raises the stakes against 'Ransomware 2.0'
“Advanced human-controlled ransomware can evade endpoint security controls and after initial compromise, move laterally to cause maximum damage, do data exfiltration and encrypt data."More
Story image
Claroty and Deloitte partner up to deliver cybersecurity for industrial tech
“Industrial organisations are keen to transform themselves into digital utilities, but often security can be an obstacle rather than an enabler of digital transformation.”More
Story image
Businesses move to cloud-based security solutions in a bid to support remote working
Cloud-based security tools are becoming increasingly popular following the rise in remote working during COVID-19, including a marked increase in businesses using such tools to protect of corporate financial information.More
Story image
Research: Rapid growth of embedded security market inevitable
With the rise of IoT, as cybercriminals find new ways to gain access to devices, new secure embedded hardware can block their points of entry.More
Link image
How to deploy containerised apps in your cloud infrastructure
Move your business into the future - take advantage of a free consultation to pinpoint how container-based applications can propel your cloud infrastructure to new heights.More
Download image
Strengthen the weakest link in your security chain
Globalisation. Remote working. High-turnover workforces. These factors and more add up to make increasingly dynamic workforces - and without proper management, your business could fall behind.More