sb-eu logo
Story image

Unisys launches latest version of its Stealth security software

Unisys today announced the launch of Stealth 5.0, the latest version of the company's flagship software for data centre security.

Unisys says the updated software now provides protection for data in container and Kubernetes environments, with the aim of improving data centre security and securing new workloads.

The company says the new Stealth version will stop more sophisticated cyber attacks, including sponsored threats. 

It will also prevent data exfiltration in the event of a breach, Unisys says.

“Our clients are increasingly embracing the use of containers and Kubernetes as a means for more efficient applications development,” says Unisys global vice president of product management Sudhir Mehta.

“We make the use of these technologies seamless from a security standpoint, so clients can realise the advantages offered by containerised microservices – while minimising risk.”

The new software, available as of today, is said to reduce attack surfaces by creating dynamic, identity-driven microsegments called communities of interest (COIs). 

Through secure COIs, Stealth creates a list of trusted systems, users and data and separates them from those that are untrusted.

It further reduces attack surfaces by encrypting all communication between Stealth-protected assets and cloaking the assets from unauthorised users.

Stealth 5.0 expands upon previous versions with the following additional capabilities:

Enhanced secure virtual gateway (SVG) capabilities 

Stealth 5.0 expands next-generation SVG capabilities to include deployment in public clouds.

Security can be extended for diverse enterprise deployments while continuing support for a broad array of non-standard endpoints or endpoints they don’t control.

Expanded application program interface (API) and automation capabilities

Stealth 5.0 automates all Stealth management activities for quick response to changing business needs while minimising manual work.

Enhanced dynamic isolation

Stealth 5.0 can reduce isolation time to 10 seconds or less to improve clients’ security postures with less opportunity for malware to propagate throughout their environments.

Implementation of the new software comes with ‘no impact’ on an organisation’s existing infrastructure, creating an opportunity for clients to use their current security tools as usual while improving their security standards.
 

Containers are environments in which microservices – functional components of applications used by developers – reside. 

Docker containers and Kubernetes – a tool for the management of those containers – are quickly becoming the accepted standards to optimise workload deployment in enterprise environments and to make their data centres more efficient and agile. 

According to Gartner, more than 75% of global organisations will be running containerised applications in production by 2022, a significant increase from fewer than 30% currently.

Unisys says organisations will not need to sacrifice their security or increase their attack surface if Stealth is introduced into these containerised applications.

Enterprises can streamline their security by deploying one set of consistent security policies that works across the client’s entire digital infrastructure.

Workloads are increasingly moving from traditional environments to containerised deployments, as well as from on-premise to the cloud. Unisys says Stealth 5.0 is a tool which can be used to facilitate this. 

Story image
Remote working trend bolsters cybersecurity investment - but downturn predicted
A new report from Canalys indicates investment in cybersecurity has increased 9.7% - but worsening economic conditions could turn the statistic around.More
Story image
Gartner recognises Pulse Secure for Zero Trust Network Access solution
In the market guide, Gartner states that ZTNA augments traditional VPN technologies for application access, and removes the excessive trust once required to allow employees and partners to connect and collaborate. More
Story image
Milestone adds XProtect to AWS marketplace
The XProtect product is a video management platform designed for surveillance and security.More
Story image
Why DX is not complete without a transformed security architecture
Secure Access Services Edge (SASE) is the process by which core WAN edge capabilities like SD-WAN, routing, and WAN optimisation at branch locations are integrated with cloud-based security services like secure web gateways, firewall-as-a-service, cloud access security brokers, and more.More
Story image
HackerOne launches penetration testing to empower digital transformation
“In today’s agile environments, pentest platforms should seamlessly integrate with every aspect of the software development lifecycle so that findings are quickly pushed to the right developer and vulnerabilities are fixed faster."More
Story image
Phishing becoming more prolific and impregnable - report
The study, conducted with VirusTotal and WHOIS XML, analysed more than 600,000 domains to accurately track malicious activity throughout the pandemic. More