More

    Unisys Simplifies Microsegmentation to Enhance IT Security

    Slide Show

    5 Steps for Proactive Cyber Risk Management

    Microsegmentation has emerged as one of the best IT security strategies IT organizations can employ because it logically isolates IT resources in a way that make it more challenging for cybercriminals to gain unilateral access to data once they bypass a firewall. Unisys today unveiled a Unisys Stealth application that makes it simpler for IT organizations to employ microsegmentation across both virtual and physical IT environments.

    Tarek El-Sadany, senior vice president of technology and CTO of Unisys, says Unisys Stealth removes the complexity associated with microsegmentation by making it possible to automatically discover all the endpoints on the network, generate all the appropriate security policies, and then microsegment the network environment.

    “We want to up level the security game,” says El-Sadany.

    Stealthaware

    Core to that capability is a set of Big Data analytics tools that Unisys has embedded in the Unisys Stealth application. Armed with that data, IT organizations can create a graphical view of the IT environment as well as track any changes that occur all the way out to the endpoint at the edge of an Internet of Things (IoT) environment, says El-Sadany.

    The days when IT organizations could mainly rely on firewalls and anti-virus software to protect assets are now over. The challenge they now face is how to orchestrate a more layered approach to IT security that better limits risk to the organization. Microsegmentation is clearly a big piece of that equation, assuming, of course, that an IT organization can cope with implementing it.

    Save

    Mike Vizard
    Mike Vizard
    Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a contributor to publications including Programmableweb, IT Business Edge, CIOinsight and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

    Latest Articles