Unisys Stealth now available on AWS cloud
Connecting state and local government leaders
The solution was designed to provide advanced security to AWS customers while giving Unisys clients ease of access and scale of the AWS cloud.
Unisys Corp. will make its Stealth security software, a tool that protects network assets by making them appear invisible to hackers, available through the Amazon Web Services Marketplace, the company announced Jan. 19.
Stealth uses “micro-segmentation” techniques to isolate network incursions and helps authorize users for access to privileged information, applications or parts of a network that those operating outside of a designated workgroup are not able to detect.
With Stealth on AWS, users can micro-segment their own portions of the cloud from other users while keeping their own encryption keys. They can also unify their internal security protections with those on the cloud, enforce virtual machine-to-machine encryption in the cloud and limit attack surfaces.
The solution was designed to provide advanced security to AWS customers while giving Unisys clients ease of access and scale of the AWS cloud, according to Unisys execs.
“Security and cloud computing are strategic priorities for businesses today,” said Peter Altabef, Unisys’ president and CEO. “Enterprise-proven security that evolves to meet future threats will provide additional assurance to enterprises and governments that are moving core operations to the cloud.”
Stealth on AWS also lets organizations extend workloads securely from data centers to the cloud, manage access via existing identity systems and add integrated supply chain partners to micro-segments without giving them broad access at the packet level and without new hardware, firewall rules or application changes.
Clients can acquire Stealth directly from the AWS Marketplace, where Unisys also offers an AWS Test Drive that provides access to a private sandbox using Stealth.
Alternately, enterprises that want to dynamically extend their on-premises infrastructure to AWS can use Stealth’s “cloudbursting” capability, which automates the shifting of secure workloads directly into AWS.
“Enterprises can now use Stealth as their single platform for securing both their data center and their cloud environments, substantially reducing the complexity and cost of multiple platforms,” said Tom Patterson, vice president and general manager for global security solutions for Unisys.
“This comprehensive level of protection removes roadblocks for many organizations looking to leverage the cloud and will unlock huge cost savings and business agility needed in today’s competitive environment,” Patterson said.