Unisys Stealth delivers micro-segmentation on the Amazon Web Services Cloud for improved security and management, lower costs and faster results.
today announced it will provide enterprises with its Unisys Stealth micro-segmentation
security solution on the Amazon
Web Services (AWS) Cloud, available for customers to acquire and deploy from the AWS Marketplace
The solution will provide advanced security to AWS customers, while providing Unisys clients with the ease of access and scale of the AWS Cloud
. Unisys said it optimized its Stealth offering to give AWS customers a fast and convenient way to protect vital information and applications against evolving threats.
“Security and cloud computing are strategic priorities for businesses today,” said Peter Altabef, Unisys’ president and CEO, in a statement. “Enterprise-proven security that evolves to meet future threats will provide additional assurance to enterprises and governments that are moving core operations to the cloud. Integrating Stealth onto the AWS Cloud advances Unisys’ leadership in security, and reflects our commitment to continually deliver innovation that solves real-world business challenges.”
AWS provides a scalable, low-cost infrastructure platform used by more than a million active customers across 190 countries. With Stealth on AWS, organizations can easily integrate additional protection, comply with regulations, and micro-segment off their virtual machines from neighbors when working on the cloud, Unisys said.
“Security is top of mind for our customers, and at AWS, it’s our number one priority,” said Stephen Schmidt, chief information security officer at AWS, in a statement. “Unisys Stealth on AWS
provides extra layers of security for enterprises moving their workloads to the AWS Cloud.”
The solution is another step in Unisys’ reinvention as an IT technology and services company focused on secure digital transformation. It also illustrates Unisys’ asset-light strategy of working with cloud technology providers, which complements Unisys’ own capabilities in infrastructure and service management, analytics, application services and software, as well as security.
“Enterprises can now use Stealth as their single platform for securing both their data center and their cloud environments, substantially reducing the complexity and cost of multiple platforms,” said Tom Patterson, vice president and general manager for global security solutions at Unisys, in a statement. “This comprehensive level of protection removes roadblocks for many organizations looking to leverage the cloud, and will unlock huge cost savings and business agility needed in today’s competitive environment.”
With Stealth on AWS, users can quickly and easily micro-segment their own portions of the cloud from other users while keeping their own encryption keys. They can unify their internal security protections with those on the cloud, enforce virtual machine-to-machine encryption in the cloud, and reduce attack surfaces.
software uses identity-based micro-segmentation techniques and encryption to protect data and applications on the AWS Cloud. Stealth protection makes data and applications invisible to hackers and unauthorized users by encrypting traffic between all Stealth-protected endpoints.
Companies and governments have been long advised to ‘segment’ their networks, so that an attack on one segment can’t affect the rest of the network, said Patterson. This good advice hasn’t changed, he added. “But since networks have evolved from very straightforward to include a complex web of mobile, cloud, IoT, clients and suppliers around the world, the technology needed to enforce these segments needed to evolve into these new ‘micro-segments,’” Patterson told eWEEK.
“Micro-segments can be deployed and managed anywhere an IP packet can go, and thus are the affordable, scalable and trusted method needed in today’s operating environments.”