Stealth™ Security by Unisys
Attacks Can't Be Prevented, but They Can Be Contained
Before crisis can occur, isolate and neutralize threats while keeping your business running.
Stealth(core)™
Stealth(identity)™
Use biometric security to manage, access and maintain transparency across your entire business
Stealth(services)™
Opt for our team to assist in installing Stealth™, or choose to integrate on your own. Either way, it takes no time at all.
Power & Control
Play by your rules. Stealth™ allows you to set your permissions on what network users see and where they go.
Eliminate Complexity
Make simplicity, clarity, and reassurance the foundations of your evolving security posture.
Adaptive & Resilient
Minimize the impact of attacks on business operations, customer reputation, and your future.
Breathing Room
Take crisis out of the question. Deal with breaches, attacks, and irregular activity on your time, not theirs.
Take Control Immediately with Seamless Deployment

Plan
1
Identify your critical assets and vulnerabilities to plan for complete security.

Deploy
2
Installation is quick. Stealth™ works with existing system architecture and legacy systems.

Secure
3
Micro-segmentation removes assumed trust from your security. You set the rules for users to follow.

Encrypt
4
Critical application traffic is encrypted to protect from in-motion compromises.

Optimize
5
Define the rules you want to play by as your business, staff and attack surface change.

1
Plan
Identify your critical assets and vulnerabilites to plan for complete endpoint security.
Deploy
Installation is seamless. Stealth® works with existing system architecture and legacy systems.
2


3
Encrypt
Micro-segmentation removes assumed trust from your security. You set the rules for users to follow.
Secure
Critical application traffic is analyzed and encrypted.
4


5
Optimize
Define the rules you want to play by as your business, your staff and the attack surface change.
Stealth(core)™
Stealth(core)™ serves as the foundation for Zero Trust across your entire network. Built on communities of interest to achieve micro-segmentation goals.
“Unisys is a trusted partner that has helped us expand our business. They have enabled our vision of a customer-centric, secure, digital bank offering, available 24x7, delivered in the Cloud.”
- Peter Hajszan, Head of Application Services, Bank ABC
“Protection of our borders is imperative to everything we do. Unisys has enabled us to strengthen our security measures through implementation of biometrics. ”
- Switzerland Ministry
Stealth(identity)™
Stealth(identity)™ uses biometric-based identity management to control network access and maintain transparency. Frictionless authentication improves the user experience and adds extra layers of defense without sacrificing accuracy, speed or performance.
Confidence that comes with Seamless Implementation.
Stealth™ (services) offer the expertise and best practices honed from implementing zero trust strategies from across industries for small to large businesses.
“
We have a large and diverse distribution network spanning ~3,100 operations and 10,000 stores. With Unisys Stealth®, we are centrally managing our cybersecurity operations while strengthening our global security posture and securing our operational environment.
Damian Apone, Director – Global Enterprise Security Program, Genuine Parts Company
Solving for Business Outcomes
Streamline time to security. Stealth™ is designed with adaptability at its core. The result? Micro-segmentation in seconds.
Resources
5 Ways to Deliver A Deadly Counterpunch to Ransomware
Ransomware is a specific type of malware designed to encrypt a computer’s content until the user pays to get the recovery key.
Deploy Zero Trust Container and Kubernetes Security
Unisys Stealth® for containers and Kubernetes incorporates our latest software-defined encrypted micro-segmentation (SDEM) technology to deliver on all Zero Trust attributes—persistent, ubiquitous, and elastic protection in demanding container environments.
Secure Your Legacy Systems With Stealth™
Your business evolution at some point requires upgrading, replacing, or decommissioning legacy endpoints. Micro-segmentation remains a powerful strategy for protecting other critical assets across your enterprise – the value of an investment in Stealth™ is not limited to the short term.
Connect with Us - Stealth™
Unisys — Always On.
Unisys partners with industry leaders to bring you integrated security solutions so you can rest more peacefully.
