Unisys stealth in AWS marketplace

Unisys Stealth now available on AWS cloud

Unisys Corp. will make its Stealth security software, a tool that protects network assets by making them appear invisible to hackers, available through the Amazon Web Services Marketplace, the company announced Jan. 19.

Stealth uses “micro-segmentation” techniques to isolate network incursions and helps authorize users for access to privileged information, applications or parts of a network that those operating outside of a designated workgroup are not able to detect.

With Stealth on AWS, users can micro-segment their own portions of the cloud from other users while keeping their own encryption keys. They can also unify their internal security protections with those on the cloud, enforce virtual machine-to-machine encryption in the cloud and limit attack surfaces.

The solution was designed to provide advanced security to AWS customers while giving Unisys clients ease of access and scale of the AWS cloud, according to Unisys execs.

“Security and cloud computing are strategic priorities for businesses today,” said Peter Altabef, Unisys’ president and CEO. “Enterprise-proven security that evolves to meet future threats will provide additional assurance to enterprises and governments that are moving core operations to the cloud.”

Stealth on AWS also lets organizations extend workloads securely from data centers to the cloud, manage access via existing identity systems and add integrated supply chain partners to micro-segments without giving them broad access at the packet level and without new hardware, firewall rules or application changes.

Clients can acquire Stealth directly from the AWS Marketplace, where Unisys also offers an AWS Test Drive that provides access to a private sandbox using Stealth.

Alternately, enterprises that want to dynamically extend their on-premises infrastructure to AWS can use Stealth’s “cloudbursting” capability, which automates the shifting of secure workloads directly into AWS.

“Enterprises can now use Stealth as their single platform for securing both their data center and their cloud environments, substantially reducing the complexity and cost of multiple platforms,” said Tom Patterson, vice president and general manager for global security solutions for Unisys.

“This comprehensive level of protection removes roadblocks for many organizations looking to leverage the cloud and will unlock huge cost savings and business agility needed in today’s competitive environment,” Patterson said.

About the Author

Paul McCloskey is senior editor of GCN. A former editor-in-chief of both GCN and FCW, McCloskey was part of Federal Computer Week's founding editorial staff.


  • Records management: Look beyond the NARA mandates

    Pandemic tests electronic records management

    Between the rush enable more virtual collaboration, stalled digitization of archived records and managing records that reside in datasets, records management executives are sorting through new challenges.

  • boy learning at home (Travelpixs/Shutterstock.com)

    Tucson’s community wireless bridges the digital divide

    The city built cell sites at government-owned facilities such as fire departments and libraries that were already connected to Tucson’s existing fiber backbone.

Stay Connected