Unisys Announces Integration of Unisys Stealth® Security with Industry-Leading Cyber Recovery Software for Improved Cyber Resilience
Stealth™ will make backup and recovery operations even more secure while allowing more flexible deployment and virtual "clean rooms" as a safe environment for restoring systems and data
LAS VEGAS and BLUE BELL, Pa., May 1, 2019 – Unisys Corporation (NYSE: UIS) today announced at Dell Technologies World 2019 that its award-winning Unisys Stealth® security software suite has been integrated with Dell EMC Cyber Recovery software to provide enhanced protection to clients' cyber recovery operations. The integrated solution will be available beginning in June 2019.
Stealth™, which includes Dynamic Isolation™ capabilities to quickly isolate devices or users at the first sign of compromise, reduces attack surfaces in these environments by creating dynamic, identity-driven microsegments called communities of interest (COIs). By establishing secure COIs, Stealth separates trusted systems, users and data from the untrusted. It further reduces attack surfaces by encrypting all communication between Stealth-protected assets and cloaking the assets from unauthorized users.
With today's announcement, the capabilities provided by Stealth will increase security for users of Dell EMC Cyber Recovery, a solution that manages and automates isolation and recovery of business-critical backup data so that organizations can resume business operations quickly following ransomware or destructive cyberattacks.
Stealth will apply cryptographic network isolation to help secure all traffic into, out of and within the Dell EMC Cyber Recovery Vault, in which assets are hidden from the attack surface. Stealth also provides a "virtual clean room" so that recovery operations can begin even before a cyberattack has been neutralized or eliminated from an enterprise network.
"The combination of Dell EMC Cyber Recovery and Unisys Stealth provides greater assurance for organizations looking for extra protection against hackers and malicious insiders who deliberately target data protection and backup infrastructure," said Jay Snyder, senior vice president, Global Alliances, Dell EMC. "We look forward to working with Unisys to provide our clients with the best possible defenses against attacks on critical backup data."
The integration of Stealth with Dell EMC Cyber Recovery software closely follows the announcement of the release of Stealth 4.0, the latest version of Stealth software that addresses threats associated with the ever-evolving digital landscape in which adoption of cloud, mobile and the Internet of Things continues to rise. Stealth 4.0 gives clients the ability to take immediate action to respond to security incidents, stopping attacks in progress.
"Many organizations may not realize that their backup capabilities are not designed to withstand and recover from cyberattacks, and these vulnerabilities can have highly damaging and costly results," said Eric Hutto, senior vice president and president, Enterprise Solutions, Unisys. "With Stealth and Dell EMC Cyber Recovery, organizations can be confident in their ability to restore business operations after a cyberattack. And by deploying Stealth Dynamic Isolation, organizations can greatly reduce the probability and scope of such attacks in the first place."
Unisys is a Dell EMC Titanium partner and one of Dell EMC's longest-standing partners. Through this collaboration, Unisys and Dell EMC deliver secure solutions to demanding environments including government, banking, airline reservations and cargo handling, addressing high-transaction environments supporting police, port, defense agencies and commercial enterprises worldwide.
About Unisys
Unisys is a global information technology company that builds high-performance, security-centric solutions for the most demanding businesses and governments on Earth. Unisys offerings include security software and services; digital transformation and workplace services; industry applications and services; and innovative software operating environments for high-intensity enterprise computing. For more information on how Unisys builds better outcomes securely for its clients across the Government, Financial Services and Commercial markets, visit www.unisys.com.
Follow Unisys on Twitter and LinkedIn.
###
RELEASE NO.: 0501/9674
Unisys and other Unisys products and services mentioned herein, as well as their respective logos, are trademarks or registered trademarks of Unisys Corporation. Any other brand or product referenced herein is acknowledged to be a trademark or registered trademark of its respective holder.