Unisys stealth in AWS marketplace

Unisys Stealth now available on AWS cloud

Unisys Corp. will make its Stealth security software, a tool that protects network assets by making them appear invisible to hackers, available through the Amazon Web Services Marketplace, the company announced Jan. 19.

Stealth uses “micro-segmentation” techniques to isolate network incursions and helps authorize users for access to privileged information, applications or parts of a network that those operating outside of a designated workgroup are not able to detect.

With Stealth on AWS, users can micro-segment their own portions of the cloud from other users while keeping their own encryption keys. They can also unify their internal security protections with those on the cloud, enforce virtual machine-to-machine encryption in the cloud and limit attack surfaces.

The solution was designed to provide advanced security to AWS customers while giving Unisys clients ease of access and scale of the AWS cloud, according to Unisys execs.

“Security and cloud computing are strategic priorities for businesses today,” said Peter Altabef, Unisys’ president and CEO. “Enterprise-proven security that evolves to meet future threats will provide additional assurance to enterprises and governments that are moving core operations to the cloud.”

Stealth on AWS also lets organizations extend workloads securely from data centers to the cloud, manage access via existing identity systems and add integrated supply chain partners to micro-segments without giving them broad access at the packet level and without new hardware, firewall rules or application changes.

Clients can acquire Stealth directly from the AWS Marketplace, where Unisys also offers an AWS Test Drive that provides access to a private sandbox using Stealth.

Alternately, enterprises that want to dynamically extend their on-premises infrastructure to AWS can use Stealth’s “cloudbursting” capability, which automates the shifting of secure workloads directly into AWS.

“Enterprises can now use Stealth as their single platform for securing both their data center and their cloud environments, substantially reducing the complexity and cost of multiple platforms,” said Tom Patterson, vice president and general manager for global security solutions for Unisys.

“This comprehensive level of protection removes roadblocks for many organizations looking to leverage the cloud and will unlock huge cost savings and business agility needed in today’s competitive environment,” Patterson said.

About the Author

Paul McCloskey is senior editor of GCN. A former editor-in-chief of both GCN and FCW, McCloskey was part of Federal Computer Week's founding editorial staff.


  • business meeting (Monkey Business Images/Shutterstock.com)

    Civic tech volunteers help states with legacy systems

    As COVID-19 exposed vulnerabilities in state and local government IT systems, the newly formed U.S. Digital Response stepped in to help. Its successes offer insight into existing barriers and the future of the civic tech movement.

  • data analytics (Shutterstock.com)

    More visible data helps drive DOD decision-making

    CDOs in the Defense Department are opening up their data to take advantage of artificial intelligence and machine learning tools that help surface insights and improve decision-making.

Stay Connected