³Ô¹ÏÍøÕ¾

Unisys Announces Availability of Unisys Stealth 4.0 Security Software

–New version of award-winning software adds protection to help clients implement Zero Trust networks that actively isolate malicious users and devices within minutes of identification

Unisys Corporation (NYSE:UIS) today announced the forthcoming availability of the latest version of its award-winning Unisys Stealth(R) security software suite, the industry’s first product with dynamic isolation(TM) capabilities to quickly isolate devices or users at the first sign of compromise. The new version, Stealth 4.0, will be generally available beginning April 15, 2019.

The new release of Stealth(TM) 4.0 software addresses threats associated with the ever-evolving digital landscape where adoption of cloud, mobile and the Internet of Things (IoT) continues to rise. Through its integration with the LogRhythm security incident and event management (SIEM) system, Stealth 4.0 gives clients the ability to take immediate action to respond to security incidents, stopping attacks in progress.

Stealth 4.0 also is fully integrated with Palo Alto Networks’ Panorama network security management console to import the traffic from Panorama and combine it with Stealth’s live traffic discovery to enable unprecedented network visibility and visualisation.

Stealth reduces attack surfaces in these environments by creating dynamic, identity-driven microsegments called communities of interest (COIs). By establishing secure COIs, Stealth separates trusted systems, users and data from the untrusted. It further reduces attack surfaces by encrypting all communication between Stealth-protected assets and cloaking the assets from unauthorised users.

“What makes Stealth 4.0 stand out is that it gives organisations the ability to continue to operate their business – even while under attack,” said Vishal Gupta, chief technology officer and senior vice president of Technology, Unisys. “Having the ability to not only identify but also isolate threats in a matter of seconds allows an organisation to respond forcefully to attacks without disruption. The alternative is organisations end up as the next public victim in the news cycle.”

Stealth 4.0 expands upon previous versions of the software suite with the following capabilities:

– Enhanced dynamic isolation: Stealth 4.0 empowers clients to respond quickly and proactively to threats through the ability to quickly and proactively isolate users and devices, working in tandem with LogRhythm SIEM systems to automate breach detection and response – shortening response time;

– Integration with Palo Alto Networks Panorama: Integration permits easier security policy deployment to increase network insight for vetting, validating and controlling all users to identify and block unwanted communication;

– Expanded automation: Stealth 4.0 introduces an expanded suite of standardised tools to enable unattended, automated installation and operations. These automation enhancements eliminate the need for repetitious and manual operations, reduce installation time and improve management capabilities for large enterprise deployments;

and

– Added contextual network security visualisation: Stealth 4.0 uses a combination of rule-based approaches and machine learning to classify and cluster network nodes to make it easier to understand what network assets are present and the communication between them.

/Public Release.