Geekzone: technology news, blogs, forums
Guest
Welcome Guest.
You haven't logged in yet. If you don't have an account you can register now.
Unisys Always-On Access Powered by Stealth provides fast, encrypted remote access for workers
Posted on 9-Apr-2020 10:00 | Filed under: News



Unisys Corporation has announced the general availability of Unisys Always-On Access (AOA), powered by Stealth, its security software that provides unmatched protection to users working remotely from home or from alternative facilities.

 

Unisys AOA is very quick to deploy, enables remote work and continuous communications, and can be scaled to support secure access for users at organizations of any size.

 

Many businesses have relied on perimeter-based, Virtual Private Networks (VPNs) in order to provide remote access for a fraction of their workforce. As people increasingly work from home, businesses are challenged by VPNs that do not easily scale and can create a bottleneck that limit remote working for a majority of employees. Additionally, a hacker that compromises a traditional VPN gateway may then be able to move laterally inside the private network, putting large swaths of company data at risk.”

 

Unisys AOA quickly simplifies and improves network security even in hybrid/complex IT environments by dramatically reducing the traditional VPN attack surface and limiting access to only the applications needed, instead of access to the network. Stealth delivers identity-based microsegmentation by creating cryptographic communities of interest that separate trusted systems, users and data from the untrusted. Stealth employs hyper-secure encrypted IPsec tunnels to protect data from end-to-end – wherever users are in the world via any connection.

 

“There has been a massive shift in the workforce in recent weeks as people around the world are being asked to work from home, which can pose challenges to global operations and create unintended security risks,” said Vishal Gupta, chief technology officer and senior vice president of Products and Platforms, Unisys. “Employees today need secure remote access to vital data and applications to perform their work. Our Stealth security software delivers the speed, convenience, end-to-end secure access and scalability that businesses require to meet their customers’ and employees’ needs without missing a step.”

 

“New Zealand has a strong uptake of mobile technology so many workers are used to, and expect, the freedom to work remotely when they need to,” said Ashwin Pal, Director Security Services, Unisys Asia Pacific. “Typically their VPN is configured to support around 20 percent of the workforce working remotely at one time. However, COVID-19 has forced many organisations to move all, or a large proportion, of their workforce to work from home so the infrastructure risks running out of capacity, resulting in costly and time consuming upgrades. Unisys Always On Access powered by Stealth allows client machines secure access to critical servers without using a VPN.”

 

Unisys AOA can be delivered via Software-as-a-Service (SaaS) from a private or public cloud or as an on-premise solution. The SaaS capability offers a simplified, cost effective and customizable way for a business to pay for what it needs, while the subscription-based pricing model allows customers to scale up or down, as needed, to eliminate the risk of stranded costs should those needs change. And because Stealth is software-based, no bulky appliances are required.

 

Stealth brings clients “always-on” security and resilience, stopping even sponsored, sophisticated cyberattacks in their tracks. Stealth establishes a software-defined perimeter that serves as the backbone for a Zero Trust security strategy by overlaying the entire computing environment with one holistic, consistent, and unwavering set of security policies – encompassing desktops, servers, cloud, mobile, containers, Kubernetes and IoT.

 

Should an attacker get inside, Stealth prevents data exfiltration so that the breach is a minor hiccup – not a major headline. And because Stealth can be implemented with no impact on an organization’s existing infrastructure, it helps businesses avoid the cost and disruption of “rip and replace” efforts, permitting them to continue to use their current security tools while strengthening their security posture.

 

Stealth also includes Dynamic Isolation capabilities which quickly isolate devices or users at the first sign of compromise and effectively reduces attack surfaces by encrypting all communication between Stealth-protected assets and cloaking the assets from unauthorized users.

 



More information: https://www.unisys.com/stealth...





Twitter and LinkedIn »



Follow us to receive Twitter updates when new discussions are posted in our forums:



Follow us to receive Twitter updates when news items and blogs are posted in our frontpage:



Follow us to receive Twitter updates when tech item prices are listed in our price comparison site:



Trending now »

Hot discussions in our forums right now:

2019 Novel Coronavirus Covid-19 Discussion
Created by Batman, last reply by tdgeek on 25-May-2020 16:53 (9976 replies)
Pages... 664 665 666


NZ COVID Tracer app for Android and iOS
Created by freitasm, last reply by antonknee on 25-May-2020 10:38 (211 replies)
Pages... 13 14 15


Courier Post delays
Created by cyril7, last reply by Handsomedan on 25-May-2020 13:16 (412 replies)
Pages... 26 27 28


Calling anyone on Electric Kiwi: what is your average % saved on free hour?
Created by brownie112, last reply by antonknee on 21-May-2020 18:38 (61 replies)
Pages... 3 4 5


Computer games you used to play on PC [pre-2002]
Created by Wakrak, last reply by MikeAqua on 25-May-2020 15:23 (56 replies)
Pages... 2 3 4


Sky getting into broadband
Created by langi27, last reply by elpenguino on 25-May-2020 16:55 (67 replies)
Pages... 3 4 5


Replacement ONT cable
Created by Morozov, last reply by Lorenceo on 25-May-2020 15:56 (12 replies)

Is half the internet down?
Created by blackjack17, last reply by OzoneNZ on 25-May-2020 17:05 (22 replies)
Pages... 2