Unisys Corporation has announced the general availability of Unisys Always-On Access (AOA), powered by Stealth, its security software that provides unmatched protection to users working remotely from home or from alternative facilities.
Unisys AOA is very quick to deploy, enables remote work and continuous communications, and can be scaled to support secure access for users at organizations of any size.
Many businesses have relied on perimeter-based, Virtual Private Networks (VPNs) in order to provide remote access for a fraction of their workforce. As people increasingly work from home, businesses are challenged by VPNs that do not easily scale and can create a bottleneck that limit remote working for a majority of employees. Additionally, a hacker that compromises a traditional VPN gateway may then be able to move laterally inside the private network, putting large swaths of company data at risk.”
Unisys AOA quickly simplifies and improves network security even in hybrid/complex IT environments by dramatically reducing the traditional VPN attack surface and limiting access to only the applications needed, instead of access to the network. Stealth delivers identity-based microsegmentation by creating cryptographic communities of interest that separate trusted systems, users and data from the untrusted. Stealth employs hyper-secure encrypted IPsec tunnels to protect data from end-to-end – wherever users are in the world via any connection.
“There has been a massive shift in the workforce in recent weeks as people around the world are being asked to work from home, which can pose challenges to global operations and create unintended security risks,” said Vishal Gupta, chief technology officer and senior vice president of Products and Platforms, Unisys. “Employees today need secure remote access to vital data and applications to perform their work. Our Stealth security software delivers the speed, convenience, end-to-end secure access and scalability that businesses require to meet their customers’ and employees’ needs without missing a step.”
“New Zealand has a strong uptake of mobile technology so many workers are used to, and expect, the freedom to work remotely when they need to,” said Ashwin Pal, Director Security Services, Unisys Asia Pacific. “Typically their VPN is configured to support around 20 percent of the workforce working remotely at one time. However, COVID-19 has forced many organisations to move all, or a large proportion, of their workforce to work from home so the infrastructure risks running out of capacity, resulting in costly and time consuming upgrades. Unisys Always On Access powered by Stealth allows client machines secure access to critical servers without using a VPN.”
Unisys AOA can be delivered via Software-as-a-Service (SaaS) from a private or public cloud or as an on-premise solution. The SaaS capability offers a simplified, cost effective and customizable way for a business to pay for what it needs, while the subscription-based pricing model allows customers to scale up or down, as needed, to eliminate the risk of stranded costs should those needs change. And because Stealth is software-based, no bulky appliances are required.
Stealth brings clients “always-on” security and resilience, stopping even sponsored, sophisticated cyberattacks in their tracks. Stealth establishes a software-defined perimeter that serves as the backbone for a Zero Trust security strategy by overlaying the entire computing environment with one holistic, consistent, and unwavering set of security policies – encompassing desktops, servers, cloud, mobile, containers, Kubernetes and IoT.
Should an attacker get inside, Stealth prevents data exfiltration so that the breach is a minor hiccup – not a major headline. And because Stealth can be implemented with no impact on an organization’s existing infrastructure, it helps businesses avoid the cost and disruption of “rip and replace” efforts, permitting them to continue to use their current security tools while strengthening their security posture.
Stealth also includes Dynamic Isolation capabilities which quickly isolate devices or users at the first sign of compromise and effectively reduces attack surfaces by encrypting all communication between Stealth-protected assets and cloaking the assets from unauthorized users.