Unisys Corp. is entering the network protection fray, building out a product that uses analytics and other technical approaches that could make it suitable for healthcare data environments.
The Blue Bell, Pa.-based company released its product, called Stealth(aware), which uses analytics to improve security across an enterprise, deploying an approach it calls micro-segmentation.
Unisys, an information technology company, says the security tools can be effective against common challenges now being faced by healthcare and other industries, including denial of service attacks, ransomware, privacy breaches and targeted espionage. The company says the application’s ease of use will make “cybersecurity more accessible to organizations of all sizes.”
Unisys says Stealth(aware) provides protection across several platforms—core networks, cloud, mobile, identity and analytics—to create segments within an organization. Authorized users can access information to which they are authorized, while others “from malware to insiders to hackers, cannot even see that those segments exist.”
Built-in analytics enable the application to examine data traffic quickly, enabling security professionals to visualize and adapt the segments, allowing them to manipulate the controls that produce the segmentation policies.
The company says the application can complete assessments of enterprise networks “and their associated public clouds and integrated suppliers in minutes,” eliminating lengthy redesign and configuration.
“Unisys is building more intelligence into our products to improve the user experience and simplify the implementation of advanced security," said Tarek El-Sadany, senior vice president of technology and chief technology officer for Unisys. “By designing Stealth(aware) to automate the discovery and deployment process, our clients can improve their level of security with faster implementation across the data center and the cloud. Stealth(aware) creates one security solution for an organization’s hybrid enterprise in a simple interface that can be implemented by non-security experts.”
(This article appears courtesy of our sister publication, Health Data Management)
Register or login for access to this item and much more
All Information Management content is archived after seven days.
Community members receive:
- All recent and archived articles
- Conference offers and updates
- A full menu of enewsletter options
- Web seminars, white papers, ebooks
Already have an account? Log In
Don't have an account? Register for Free Unlimited Access