Whether yours is a communications, life sciences, healthcare, retail, or travel and transportation enterprise, everyone in the commercial industry is facing similar, formidable business challenges.
With Unisys, you’ll have all the solutions and services you need to tackle your most complex business and IT problems, and achieve full digital transformation.
Energize and increase the productivity of your users with a digital workplace that meets their needs and minimizes frustration with IT support.
Multi- and hybrid-cloud operations are complex and costly. Increase your chances of success and get the business value you need.
Process millions of transactions daily, seamlessly incorproate contemporary tools and interfaces, and keep your business-critical apps secure.
Keep your customers and your reputation safe while simplifying your IT ecosystem. Neutralize threats before they become a crisis.
Unlock the value of your data to identify new markets, uncover new opportunities and reach new heights.
Apps are at the heart of growing businesses. Deliver results with better user experiences.
Many industries are facing a similar situation: rising costs, demands for IT modernization, and cybersecurity risks. We offer tailored solutions for your industry to address these challenges.
Get notified when a Capture the Flag challenge is available!
Do You ThinkYou Can Hack It?
The Unisys Stealth® Capture the Flag Challenge is looking for cybersecurity developers, pen testers, and hackers to break into the Unisys Stealth® environment. Can you hack it? We are so confident in the Stealth™ solution capabilities that we’re willing to pay a bounty if you are able to “capture the flag.”
What is Unisys Stealth®?
Stealth™ is a software suite trusted by government and commercial organizations to protect sensitive systems from cyber threats with identity-driven, software-defined micro-segmentation. Stealth creates communities of interest (COI) that establish exclusive communication channels between members based on trusted identities. Community members cannot initiate or accept communication from non-members and cryptography restricts non-members from intercepting intra-community communications
Learn more about
Unisys Stealth® Solutions
Highlights of past CTFs
The Unisys CTF Challenge was held at RSA in February 26th, 2020.
The one day event allowed the participants to try to hack into Unisys Stealth® environment. The goal of this challenge was to highlight Unisys Stealth® environment and how secure it truly is. If anyone was to succeed, they would win $10,000.
A total of 21 people participated, and no one was able to compromise the Stealth™ environment. However, $10,000 was donated to WiCyS in support of their Veterans Assistance Program!
Follow us on#StealthCTF
Here is what we heard:
“The event was incredibly well put together, however Stealth is very frustrating! I have been doing CTF eventsfor 12 years and this is one CTF that has stumped me from the very beginning.”Nicholas Frangia
“Before coming here, I thought it wasn’t going to be hard. Now, it feels very well implementedand I need to rethink my strategy.”Priyal Shah
“Holy cow, this is hard!”Wally Ly
Copyright © Unisys 2020