Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

Unisys Launches Micro-Segmentation Solution for AWS

Unisys Stealth Delivers Micro-segmentation for Amazon Web Services Cloud Deployments

Unisys Corporation said on Tuesday that it has made its Unisys Stealth micro-segmentation security solution available for Amazon Web Services (AWS) Cloud customers.

Unisys Stealth Delivers Micro-segmentation for Amazon Web Services Cloud Deployments

Unisys Corporation said on Tuesday that it has made its Unisys Stealth micro-segmentation security solution available for Amazon Web Services (AWS) Cloud customers.

Available immediately, the offering enables customers to micro-segment their cloud deployments from other users while keeping control of their own encryption keys.

Additionally, users can unify their internal security protections with those on the cloud, enforce virtual machine-to-machine encryption in the cloud, and reduce attack surfaces, Unisys said.  

Customers can also manage access via existing identity systems including Active Directory or LDAP; and add integrated supply chain partners to micro-segments without giving them broad access – at the packet level without any new hardware, firewall rules, or application changes.  

The Unisys Stealth software uses identity-based micro-segmentation techniques and encryption to protect data and applications on the AWS Cloud, and hides data and applications from hackers and unauthorized users by encrypting traffic between Stealth-protected endpoints. 

“With Stealth on AWS, organizations can easily integrate additional protection, comply with regulations, and micro-segment off their virtual machines from neighbors when working on the cloud,” the company said.  

“Unisys Stealth on AWS provides extra layers of security for enterprises moving their workloads to the AWS Cloud,” said Stephen Schmidt, chief information security officer, Amazon Web Services, Inc. “We are pleased this solution is now available on the AWS Marketplace, offering our customers immediate access to the security protection capabilities of Stealth.”    

Advertisement. Scroll to continue reading.

“Enterprises can now use Stealth as their single platform for securing both their data center and their cloud environments, substantially reducing the complexity and cost of multiple platforms,” said Tom Patterson, vice president and general manager for global security solutions, Unisys. “This comprehensive level of protection removes roadblocks for many organizations looking to leverage the cloud, and will unlock huge cost savings and business agility needed in today’s competitive environment.”  

Unisys Stealth is available directly from the AWS Marketplace.

Related Reading: Improving Security via Proper Network Segmentation 

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Professional services company Slalom has appointed Christopher Burger as its first CISO.

Allied Universal announced that Deanna Steele has joined the company as CIO for North America.

Former DoD CISO Jack Wilmer has been named CEO of defensive and offensive cyber solutions provider SIXGEN.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Conversations

SecurityWeek talks to Billy Spears, CISO at Teradata (a multi-cloud analytics provider), and Lea Kissner, CISO at cloud security firm Lacework.

Cloud Security

Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to Outlook.com and Exchange Online.

CISO Strategy

Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

Cloud Security

Microsoft and Proofpoint are warning organizations that use cloud services about a recent consent phishing attack that abused Microsoft’s ‘verified publisher’ status.