Unisys Stealth for Mobile
Security starts in the datacenter and extends to mobile devices
Unisys Stealth® for Mobile enables authenticated and secure access to application processing environments in the data center from mobile applications. With Unisys Stealth for Mobile, security starts in the data center and extends to mobile devices. It leverages application wrapping software that encrypts data-in-motion from the mobile app across the Internet – securing it from hackers and evesdroppers. Unisys Stealth for Mobile secures the entire data path by protecting critical servers and virtual machines with Data Center Segmentation, connecting authenticated mobile users into secure Communities of Interest, and wrapping applications on the mobile device.