Regional Site Challenges
As companies look to multiple geographies for new business opportunities, IT challenges can quickly become a nightmare. Confidentiality requirements or geopolitical challenges that may compromise IP and data integrity necessitate that systems at geographically dispersed centers be kept separate from the corporate data center. However, some regional access to the corporate data center is required. And some 'super-users' may require access to a subset of systems at any location. Consider an information embassy designed to protect data and resources within its boundaries and to control and secure access to and from the embassy.
An Information Embassy with Stealth
Unisys Stealth Solution® ("Unisys Stealth") helps secure sensitive data, servers and applications within a specific regional site, as well as assets in the corporate data center, to accomplish these objectives:
- Isolate regional site assets from local threats
- Further segregate regional site assets from each other
- Allow selective regional site access to the corporate data center
Unisys Stealth® allows enterprises to shield data assets within a designated region while controlling access to corporate assets from users in that region. Creating an information embassy with Unisys Stealth enables an organization to establish a secure regional site in various geographic locations.
Stealth Provides a Better Strategy
To secure and isolate regional sites, companies usually construct separate physical networks for each region, though this is not foolproof since the vulnerable connection points provide a target for attacks. Not only is configuring and maintaining separate physical networks an expensive and complex endeavor; it hampers support
administrators who need access to all systems and networks. In an age when access to information is critical to success, separate topologies inhibit synergy, creating a liability when data must be shared between isolated regions.