Stealth(cloud) Executive Brief
A comprehensive, innovative approach to cloud security
Unisys Stealth® software-defined security portfolio delivers a consistent security methodology across a range of deployment environments. It virtualizes the network using cryptography to restrict communication to pre-authorized groups of users and devices called Communities of Interest; it also cryptographically cloaks endpoints from unauthorized traffic.
Stealth(cloud) extends these capabilities to the cloud, securing data along the entire path from the datacenter to the cloud, automating the deployment of Stealth in the cloud, and providing one security approach that can be used in multiple different clouds.