Unisys Simplifies Microsegmentation to Enhance IT Security

Mike Vizard
Slide Show

5 Steps for Proactive Cyber Risk Management

Microsegmentation has emerged as one of the best IT security strategies IT organizations can employ because it logically isolates IT resources in a way that make it more challenging for cybercriminals to gain unilateral access to data once they bypass a firewall. Unisys today unveiled a Unisys Stealth application that makes it simpler for IT organizations to employ microsegmentation across both virtual and physical IT environments.

Tarek El-Sadany, senior vice president of technology and CTO of Unisys, says Unisys Stealth removes the complexity associated with microsegmentation by making it possible to automatically discover all the endpoints on the network, generate all the appropriate security policies, and then microsegment the network environment.

“We want to up level the security game,” says El-Sadany.

Stealthaware

Core to that capability is a set of Big Data analytics tools that Unisys has embedded in the Unisys Stealth application. Armed with that data, IT organizations can create a graphical view of the IT environment as well as track any changes that occur all the way out to the endpoint at the edge of an Internet of Things (IoT) environment, says El-Sadany.

The days when IT organizations could mainly rely on firewalls and anti-virus software to protect assets are now over. The challenge they now face is how to orchestrate a more layered approach to IT security that better limits risk to the organization. Microsegmentation is clearly a big piece of that equation, assuming, of course, that an IT organization can cope with implementing it.

Save



Add Comment      Leave a comment on this blog post

Post a comment

 

 

 

 


(Maximum characters: 1200). You have 1200 characters left.

 

null
null

 

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.