Unisys Stealth coming to classified programs

Unisys Stealth coming to classified programs

Unisys’s Stealth security software solution, which provides identity-based micro-segmentation across a range of environments, received word from the National Security Agency that the platform is close to approval for NSA’s Commercial Solutions for Classified Program Components List

Stealth is currently in the contracting and evaluation phase of  NSA’s review, which means the product is now eligible for use in classified program solutions, a Unisys spokesperson told GCN.  “Stealth has implemented the collection of protocols and methods known as Suite B and is currently undergoing validation in accordance with the National Information Assurance Partnership,” the spokesperson confirmed in an email.

“What this signals is that we’re far enough in the process … that it’s OK to start using [Stealth] now,” Tom Patterson, Unisys global security lead told GCN.  “There’s confidence that we’ll successfully complete this [review],so it’s an OK to buy signal.”

“We’re really excited by this,” Unisys’s Jennifer Napper said.  The combination of NSA’s National Information Assurance Partnership and its Commercial Solutions for Classified Programs  will  “bring more innovation and solutions to protecting classified data … to the federal government faster,” she said. “Once they validate the commercial product, then it’s an opportunity to bring it to customers in months versus years.”

Napper, who is Unisys Federal Systems' group vice president for defense and intelligence, explained that when Stealth is deployed on an ultra-classified network such as the Intelligence Community Information Technology Enterprise – or IC ITE – it controls who sees what information by creating communities of interest.  For example, a team working on information regarding the Islamic State can pop up a community of interest and all information pertaining to the project would be shared within that community. But unless one has been granted access to the community, the files and folders for it are not even visible on the network, much less accessible. This fosters more secure information sharing and helps protect against the insider threat component.

“All this is done with Stealth at the packet level,” Patterson explained.  “So IC ITE is higher up in the stack and this is part of a system that helps or, god forbid a hacker, if they’re not in that community of interest.”

Particular parts of the Stealth network can be isolated for individuals working on a problem and closed once they’re done, Napper said. That capability gives government the power to quickly and easily determine where information goes and is a “game changer,” according to Patterson.

About the Author

Mark Pomerleau is a former editorial fellow with GCN and Defense Systems.

inside gcn

  • data science (chombosan/Shutterstock.com)

    4 steps to excellence in data analysis

Reader Comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group