Express Computer
Home  »  News  »  Unisys unveils Stealth solution for mobile device threats

Unisys unveils Stealth solution for mobile device threats

0 24

Unisys Corporation has announced the availability of Unisys Stealth for mobile solution to address the major security concerns facing enterprises as growing numbers of their employees use consumer devices at work.

Within the next two years, hundreds of millions of people are expected to be using smartphones for work – many of which will be employee-owned devices. The rapid proliferation of such bring-your-own devices (BYOD) in the workplace has resulted in an alarming increase in cybersecurity risks.

Unisys Stealth for mobile enables secure access from data centers to the applications on mobile devices. The solution grants users access rights based on identity, to help ensure authorized users reach or have visibility to only the information they are approved to access or see.

Unisys Stealth uses advanced data cloaking and encryption techniques to help organizations mitigate cybersecurity attacks and hacker incidents by rendering devices, data, and end users virtually invisible on the network. The solution creates secure user communities within an enterprise where only authorized users can access or see information.

“Stealth for Mobile allows enterprises to capitalize on the productivity gains and customer service improvements associated with mobility and consumerization of IT, while increasing assurance that their critical data remains safe,” said Rod Sapp, Vice President, Products and Technology, Unisys. “Unlike other security solutions such as virtual private networks, Unisys Stealth for Mobile cryptographically protects data all the way to the application – a much more secure approach for BYOD environments.”

The new solution combines Unisys Stealth technology with application wrapping security software that allows users to define specific security policies on a per-mobile application basis. Unisys Stealth for mobile then adds a layer of identity-based security that gives users access and visibility rights to only the assets within the data center they are entitled to access and see.

It is easy to implement, requiring no new code or application changes. The solution is transparent to end users, who will have the same access rights no matter which device they use to access the datacenter. Unisys has entered into a worldwide reseller agreement to offer Mocana MAP, a leading application wrapping software, in connection with Stealth for mobile. Unisys also is a customer of Mocana MAP, in support of Unisys internal mobile initiatives.

Get real time updates directly on you device, subscribe now.

Leave A Reply

Your email address will not be published.

LIVE Webinar

Digitize your HR practice with extensions to success factors

Join us for a virtual meeting on how organizations can use these extensions to not just provide a better experience to its’ employees, but also to significantly improve the efficiency of the HR processes
REGISTER NOW 

Stay updated with News, Trending Stories & Conferences with Express Computer
Follow us on Linkedin
India's Leading e-Governance Summit is here!!! Attend and Know more.
Register Now!
close-image
Attend Webinar & Enhance Your Organisation's Digital Experience.
Register Now
close-image
Enable A Truly Seamless & Secure Workplace.
Register Now
close-image
Attend Inida's Largest BFSI Technology Conclave!
Register Now
close-image
Know how to protect your company in digital era.
Register Now
close-image
Protect Your Critical Assets From Well-Organized Hackers
Register Now
close-image
Find Solutions to Maintain Productivity
Register Now
close-image
Live Webinar : Improve customer experience with Voice Bots
Register Now
close-image
Live Event: Technology Day- Kerala, E- Governance Champions Awards
Register Now
close-image
Virtual Conference : Learn to Automate complex Business Processes
Register Now
close-image