Audience

Cybersecurity teams searching for an advanced IT Security solution

About Unisys Stealth

Traditional security controls are insufficient to protect from cyberattacks in the digital age, compelling organizations to adopt a Zero Trust Network. The principles are simple – trust no user or device, inside or outside the private network and grant as little access as possible upon reliable identification. Implementing these principles can be complex – solutions that require expensive, time-consuming upgrades to existing network infrastructure make the move to Zero Trust prohibitive. Unisys Stealth is a flexible cybersecurity software built on identity-based encrypted microsegmentation that transforms your existing network – both on-premises and in the cloud – into a Zero Trust Network. Unisys Stealth products and services offer cybersecurity solutions that maximize your security posture, maintain regulatory compliance and protect your organization.

Integrations

Ratings/Reviews

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Company Information

Unisys
Founded: 1986
United States
www.unisys.com/offerings/security-solutions/unisys-stealth-products-and-services

Videos and Screen Captures

You Might Also Like
Achieve perfect load balancing with a flexible Open Source Load Balancer Icon
Achieve perfect load balancing with a flexible Open Source Load Balancer

Take advantage of Open Source Load Balancer to elevate your business security and IT infrastructure with a custom ADC Solution.

Boost application security and continuity with SKUDONET ADC, our Open Source Load Balancer, that maximizes IT infrastructure flexibility. Additionally, save up to $470 K per incident with AI and SKUDONET solutions, further enhancing your organization’s risk management and cost-efficiency strategies.

Product Details

Platforms Supported
SaaS
Windows
Linux
On-Premises

Unisys Stealth Frequently Asked Questions

Q: What kinds of users and organization types does Unisys Stealth work with?
Q: What languages does Unisys Stealth support in their product?

Unisys Stealth Product Features

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Network Traffic Analysis (NTA)

Traffic Decryption
Anomalous Behavior Detection
Network Transaction Visibility
High Bandwidth Usage Monitoring
Identify High Network Traffic Sources
Historical Behavior Data
Stream Data to IDR or Data Lake