SHARE
Facebook X Pinterest WhatsApp

Unisys Applies Micro Segmentation to IT Security

Why C-Level Execs Should Care More About IT Security Making a case that current approaches to IT security have proven largely ineffective, Unisys today launched a software-only version of its Stealth security solution based on a micro segmentation architecture. Thanks to the broad availability of IPsec, Tom Patterson, vice president and general manager for global […]

Written By
MV
Mike Vizard
Sep 15, 2015
Slide Show

Why C-Level Execs Should Care More About IT Security

Making a case that current approaches to IT security have proven largely ineffective, Unisys today launched a software-only version of its Stealth security solution based on a micro segmentation architecture.

Thanks to the broad availability of IPsec, Tom Patterson, vice president and general manager for global security solutions for Unisys, says it’s now feasible to apply a common approach to both digital and physical IT security. Making use of micro segmentation architecture, contends Patterson, will enable IT organizations to better isolate each piece of hardware. In the event of a breach, that device can’t be exploited to compromise the security of any other device on the network.

Patterson says IT security has historically focused on the application-centric approach to securing the IT environment. The challenge with that approach is that it is dependent on the skills of any given application developer to implement the right security controls. Given the number of high-profile breaches that now regularly occur, Patterson says it’s more than apparent how ineffective that approach really is. In contrast, by focusing instead at layer two and three of the network, Patterson says Unisys is making it possible to apply a software-defined approach to IT security anywhere across the extended enterprise.

Patterson says the shift to a micro segmentation approach to IT security requires organizations to put aside some of their traditional biases toward IT security. Instead of thinking in terms of an application construct, micro segmentation takes advantage of network virtualization and IPsec to isolate the underlying IT infrastructure in a much more granular way. When an attack is discovered, not only is it contained, information about the nature of that attack can then automatically be fed back to a security event information management (SIEM) that makes it possible to more readily identify that threat in the future.

While a micro segmentation approach to IT security may require adopting new approaches to how the network and overall data center are managed, given the current lack of success that most organizations are experiencing when it comes to IT security, it would appear the time may have finally come to try a fundamentally different approach altogether.

MV

Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a contributor to publications including Programmableweb, IT Business Edge, CIOinsight and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

Recommended for you...

Observability: Why It’s a Red Hot Tech Term
Tom Taulli
Jul 19, 2022
Top GRC Platforms & Tools in 2022
Jira vs. ServiceNow: Features, Pricing, and Comparison
Surajdeep Singh
Jun 17, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.