One of the biggest security challenges that organizations face today is verifying identities of users authorized to access data. Expansion of IT perimeters into mobile devices as well as public and private clouds makes access management based on trusted identities more complex and challenging. Without a comprehensive approach and framework, organizations are unlikely to fully protect themselves against this pervasive threat.
Unisys’ Award-Winning Identity Management Solution
Our state-of-the-art, service-oriented platform enables comprehensive identity management through biometrics for critical purposes such as case management, national security and law enforcement. The following are the two core components of the Stealth(identity) solution:
Our unique library of electronic identity artifacts is an open platform built on industry standards. It is highly scalable, reusable and compatible to all technologies and vendors, and it integrates all the modules of identity life cycle, case management, audit and monitoring features, policy-driven controls and compliances.
Multi-Factor Authentication (MFA) - This unique multi-layer approach customizable to each organization’s security requirements, unifies multi-modal biometric types – fingerprint, iris, voice, signature and face with non-biometric credentials – for accurate authentication and watch list verification.
What can you achieve through Stealth(identity)?
- Conclusive authentication - Authenticate “something you have” (a smartphone), “something you know” (a PIN/ passphrase), “something you are” (multi-modal biometrics, e.g., face, voice), and “somewhere you are” (GPS) to confirm the end user’s identity.
- Identity management services - We can manage federated identities for you, using biometric-based transactional security for individual risk profile assurance.
Location Perimeter and Surveillance Security |
Stealth(identity) Image Processing |
Stealth(identity) Fraud Detection