Unisys Stealth for Mobile solution protects against BYOD issues
Posted on 09 October 2013.
Unisys announced the Unisys Stealth for Mobile solution to address the security concerns facing enterprises as growing numbers of their employees use consumer devices at work.


Within the next two years, hundreds of millions of people are expected to be using smartphones for work many of which will be employee-owned devices. The rapid proliferation of BYOD in the workplace has resulted in an alarming increase in cybersecurity risks.

Unisys Stealth uses advanced data cloaking and encryption techniques to help organizations mitigate cybersecurity attacks and hacker incidents by rendering devices, data, and end users virtually invisible on the network. The solution creates secure user communities within an enterprise where only authorized users can access or see information.

"Stealth for Mobile allows enterprises to capitalize on the productivity gains and customer service improvements associated with mobility and consumerization of IT, while increasing assurance that their critical data remains safe," said Rod Sapp, vice president of products and technology, Unisys. "Unlike other security solutions such as virtual private networks, Unisys Stealth for Mobile cryptographically protects data all the way to the application a much more secure approach for BYOD environments."

The new solution combines Unisys Stealth technology with application wrapping security software that allows users to define specific security policies on a per-mobile application basis. Unisys Stealth for Mobile then adds a layer of identity-based security that gives users access and visibility rights to only the assets within the data center they are entitled to access and see.

The solution is easy to implement, requiring no new code or application changes. It's transparent to end users, who will have the same access rights no matter which device they use to access the data center.





Spotlight

The role of the cloud in the modern security architecture

Posted on 31 July 2014.  |  Stephen Pao, General Manager, Security Business at Barracuda Networks, offers advice to CISOs concerned about moving the secure storage of their documents into the cloud and discusses how the cloud shaping the modern security architecture.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Aug 1st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //