Unisys announces the availability of Unisys Stealth 5.0

Unisys announced the availability of Unisys Stealth 5.0, the latest version of its award-winning security software which now provides protection for data in container and Kubernetes environments, improving data center security and securing new workloads.

 

Stealth 5.0 enable enterprises streamline their security by deploying one set of consistent security policies that works across the client’s entire digital infrastructure, including desktops, servers, the cloud, Internet of Things devices and other legacy or modern infrastructure such as containers, virtual machines and physical servers. As workloads move from traditional environments to containerized deployments, and from on-premise to the cloud, Stealth accommodates these moves.

“Our clients are increasingly embracing the use of containers and Kubernetes as a means for more efficient applications development,” said Sudhir Mehta, global vice president, product management, Unisys. “With Stealth 5.0, we make the use of these technologies seamless from a security standpoint, so clients can realize the agility, availability, manageability and scalability advantages offered by containerized microservices – while minimizing risk.”

Stealth reduces attack surfaces in these environments by creating dynamic, identity-driven microsegments called communities of interest (COIs). Through secure COIs, Stealth separates trusted systems, users and data from the untrusted. It further reduces attack surfaces by encrypting all communication between Stealth-protected assets and cloaking the assets from unauthorized users.

Stealth 5.0 also expands upon previous versions with the following additional capabilities:

  • Enhanced secure virtual gateway (SVG) capabilities: Stealth 5.0 expands next-generation SVG capabilities to include deployment in public clouds, so clients can extend security for diverse enterprise deployments while continuing support for a broad array of non-standard endpoints or endpoints they don’t control.
  • Expanded application program interface (API) and automation capabilities: Stealth 5.0 automates all Stealth management activities to enable rapid deployment, configuration and management for quick response to changing business needs while minimizing manual work.
  • Enhanced Dynamic Isolation: Stealth 5.0 can reduce isolation time to 10 seconds or less to improve clients’ security postures with less opportunity for malware to propagate throughout their environments.

For more information on Unisys Stealth 5.0, go to www.unisys.com/stealth.

Lost Password