Unisys Stealth(analytics) delivers a predictive model to determine who to trust, access the current risk levels, and to improve an organization’s ability to determine the root cause of a security breach. The analytics platform ingests data from multiple data sets including Unisys Stealth®, physical and cyber security solutions, network infrastructure, and other solutions connecting to the internal and external environment. Stealth(analytics) recognizes patterns across multiple environments to predict security breaches and support the forensics discovery process. The Stealth Security Data Lake provides a new level of context to develop actionable insights to security risks and events.
Dynamic Trust Relations Between End Points - “On the Fly” definable rules based algorithms to determine who trusts who based on End Points.
Multi-dimensional Cyber-attack Detection - Detect systematic patterns in security logs from multiple security solutions like Unisys Stealth, malware solutions, and network log files to identify attacks and higher probability security incidents.
Security Data Enrichment - Add context to raw security data to make it meaningful, informative, and actionable to predict advanced cyber-attacks.
Integrated Security Data Lake - Consolidate Unisys Stealth, cyber security tools, physical security, and other operational systems to predict cyber and physical risk levels and security threats.
Flexible and scalable analytics platform - Cloud based integrated advanced data analytics platform to start quickly eliminating costly setup and resource requirements.
It’s time to try a fresh approach to security.
Learn more about
Note: Unisys Stealth® technology includes advanced cryptography which is governed by export and import restrictions globally, on a country by country basis. Not all Stealth solutions may be offered in all markets.