+ All Categories
Home > Documents > Unisys Stealth Microsegmentation Protects the Critical · Stealth (aware) Stealth(core) Identity...

Unisys Stealth Microsegmentation Protects the Critical · Stealth (aware) Stealth(core) Identity...

Date post: 22-Mar-2020
Category:
Upload: others
View: 27 times
Download: 0 times
Share this document with a friend
1
HOW TO GET STARTED Test drive stealth: unisys.com/sandbox Request a live demo: unisys.com/stealthdemo Contact Unisys: [email protected] Follow us: @UnisysCorp Unisys Unisys Stealth ® Microsegmentation Protects the Critical Six Key Elements of Stealth Microsegmentation is a security strategy that segments your network into smaller elements and manages them with IT security policies. Think of traditional security as a bank vault, and microsegmentation as a safe deposit box inside it. Microsegmentation allows you to quickly and easily separate physical networks into logical microsegments. Each microsegment is protected, dramatically lowering risk. If a threat gets inside the vault, it can only unlock the boxes with the right keys. What is microsegmentation? Stealth TM is a software suite trusted by government and commercial organizations to protect sensitive systems from cyber threats with identity-driven, software-defined microsegmentation. Stealth creates communities of interest (COI) that establish exclusive communication channels between members based on trusted identities. Community members cannot initiate or accept communication from non-members and cryptography restricts non-members from intercepting intra-community communications. What is Unisys Stealth? What can you do with Stealth? How Stealth Works identity based microsegmentation Encrypted data in motion Asset cloaking Transparent to applications Integration with Identity Management Automation APIs AD / LDAP 7. Application 6. Presentation 5. Session 4. Transport 3. Network 2. Data Link 1. Physical NIC Stealth Intercept Encrypt data in motion Prevent packet sniffing with AES-256 encryption Enable adaptive security Integrate existing security tools to correlate, detect and respond Prevent fraud Verify identities with physical and behavioral biometrics Know your network Visualize, model and design informed security Cloak critical assets Cryptographically hide critical assets from adversaries Easy microsegmentation Isolate assets, regardless of environment, network or device Consistent security scheme for cloud workloads Integrate with existing security tools to correlate, detect and respond to threats without adding complexity Identity management systems manage COI membership to reduce management overhead Reduce mobile attack surface Live network visibility Stealth (aware) Stealth(core) Identity and Access Management Security Information and Event Management Stealth (Cloud) Stealth (mobile) Protect physical servers, virtual machines, purpose-built devices, operational technology and more COI reduce internal firewalls and VLANs with identity based microsegmentation Elastic microsegmentation allows access to multiple COI Overlay technology means no changes to existing network Isolate legacy assets Protect assets behind network devices Add behavioral biometrics and multifactor authentication Stealth (identity)
Transcript

HOW TO GET STARTEDTest drive stealth: unisys.com/sandbox Request a live demo: unisys.com/stealthdemo

Contact Unisys: [email protected] Follow us: @UnisysCorp Unisys

Unisys Stealth® Microsegmentation Protects the Critical

Six Key Elements of Stealth

Microsegmentation is a security strategy that segments your network into smaller elementsand manages them with IT security policies.

Think of traditional security as a bank vault, and microsegmentation as a safe deposit box inside it. Microsegmentation allows you to quickly and easily separate physical networks into logical microsegments. Each microsegment is protected, dramatically lowering risk. If a threat gets inside the vault, it can only unlock the boxes with the right keys.

What is microsegmentation?StealthTM is a software suite trusted by government and commercial organizations to protect sensitive systems from cyber threats with identity-driven, software-defined microsegmentation. Stealth creates communities of interest (COI) that establish exclusive communication channels between members based on trusted identities. Community members cannot initiate or accept communication from non-members and cryptography restricts non-members from intercepting intra-community communications.

What is Unisys Stealth?

What can you do with Stealth?

How Stealth Works

identity basedmicrosegmentation

Encrypteddata in motion

Assetcloaking

Transparentto applications

Integration withIdentity Management

AutomationAPIs

AD / LDAP7. Application

6. Presentation

5. Session

4. Transport

3. Network

2. Data Link

1. Physical

NIC

Stealth Intercept

Encrypt data in motionPrevent packet sniffing with AES-256 encryption

Enable adaptive securityIntegrate existing security tools to correlate, detect and respond

Prevent fraudVerify identities with physical and behavioral biometrics

Know your networkVisualize, model and design informed security

Cloak critical assetsCryptographically hide critical assets from adversaries

Easy microsegmentationIsolate assets, regardless of environment, network or device

Consistent security schemefor cloud workloads

Integrate with existing security tools tocorrelate, detect and respond to threats

without adding complexityIdentity management systemsmanage COI membership to

reduce management overhead

Reduce mobileattack surface

Live networkvisibility

Stealth(aware)

Stealth(core)

Identity andAccess Management

Security Informationand Event Management

Stealth(Cloud)

Stealth(mobile)

Protect physical servers, virtualmachines, purpose-built devices,operational technology and more

COI reduce internal firewalls and VLANs with identity based microsegmentation

Elastic microsegmentationallows access to multiple COI

Overlay technology meansno changes to existing network

Isolate legacyassets

Protect assetsbehind network devices

Add behavioral biometricsand multifactor authentication

Stealth(identity)

Recommended