Stealth(core) Executive Brief
Secure traffic in the data center by cryptographically restricting lateral data access
The limitations of the perimeter security model are rapidly becoming clear, as attackers penetrate a vulnerable device and use that to move laterally within the datacenter. Unisys has created a completely different yet extremely effective way to secure many of the world’s most important enterprises.
Unisys Stealth® software-defined security cryptographically cloaks endpoints (servers and workstations) from any unauthorized traffic. Stealth(core) virtualizes the physical network backbone using cryptography to proactively protect data by restricting communication within the data center to pre-authorized groups of users and devices called Communities of Interest.