Industries > Technology

Integration of Unisys Stealth(R) Security with Dell Cyber Recovery Software

AsiaNet
2019-05-03 20:49

Already collect

LAS VEGAS and BLUE BELL, Pa., May 1, 2019 / Medianet International-AsiaNet/--

Stealth(TM) will make backup and recovery operations even more secure while 
allowing more flexible deployment and virtual "clean rooms" as a safe 
environment for restoring systems and data

Unisys Corporation (http://www.unisys.com/)(NYSE: UIS) today announced at Dell 
Technologies World 2019 that its award-winning Unisys Stealth(R)         ( 
http://www.unisys.com/offerings/security-solutions/unisys-stealth-products-and-services) 
security software suite has been integrated with Dell EMC Cyber Recovery 
software ( 
https://www.emc.com/about/news/press/2018/20181017-01.htm#globalnav=open ) to provide enhanced protection to clients’ cyber recovery operations. The integrated solution will be available beginning in June 2019.

Stealth(TM), which includes Dynamic Isolation(TM) capabilities to quickly isolate devices or users at the first sign of compromise, reduces attack surfaces in these environments by creating dynamic, identity-driven microsegments called communities of interest (COIs). By establishing secure COIs, Stealth separates trusted systems, users and data from the untrusted. It further reduces attack surfaces by encrypting all communication between Stealth-protected assets and cloaking the assets from unauthorized users.

With today's announcement, the capabilities provided by Stealth will increase 
security for users of Dell EMC Cyber Recovery, a solution that manages and 
automates isolation and recovery of business-critical backup data so that 
organizations can resume business operations quickly following ransomware or 
destructive cyberattacks. 

Stealth will apply cryptographic network isolation to help secure all traffic 
into, out of and within the Dell EMC Cyber Recovery Vault, in which assets are 
hidden from the attack surface. Stealth also provides a "virtual clean room" so 
that recovery operations can begin even before a cyber attack has been 
neutralized or eliminated from an enterprise network.


"The combination of Dell EMC Cyber Recovery and Unisys Stealth provides greater 
assurance for organizations looking for extra protection against hackers and 
malicious insiders who deliberately target data protection and backup 
infrastructure," said Jay Snyder, senior vice president, Global Alliances, Dell 
EMC. "We look forward to working with Unisys to provide our clients with the 
best possible defenses against attacks on critical backup data."

The integration of Stealth with Dell EMC Cyber Recovery software closely 
follows the announcement of the release of Stealth 4.0 (https://www.unisys.com/offerings/security-solutions/news%20release/unisys-announces-availability-of-unisys-stealth-four-security-software 
), the latest version of Stealth software that addresses threats associated 
with the ever-evolving digital landscape in which adoption of cloud, mobile and 
the Internet of Things continues to rise. Stealth 4.0 gives clients the ability 
to take immediate action to respond to security incidents, stopping attacks in 
progress.

"Many organizations may not realize that their backup capabilities are not designed to withstand and recover from cyber attacks, and these vulnerabilities can have highly damaging and costly results," said Eric Hutto, senior vice president and president, Enterprise Solutions,Unisys. "With Stealth and Dell EMC Cyber Recovery, organizations can be confident in their ability to restore business operations after a cyber attack. And by deploying Stealth Dynamic Isolation, organizations can greatly reduce the probability and scope of such attacks in the first place."

Unisys is a Dell EMC Titanium partner ( https://www.unisys.com/strategic-alliance-partners/dellemc) and one of Dell EMC's longest-standing partners. Through this collaboration, Unisys and Dell EMC deliver secure solutions to demanding environments including government, banking, airline reservations and cargo handling, addressing high-transaction environments supporting police, port, defense agencies and commercial enterprises worldwide.
Add comments

Latest comments

Latest News
News Most Viewed