News Security

Unisys Extends Protection to Container and Kubernetes Environments

New version supports cloud workloads and application modernization efforts with one consistent set of security policies that spans traditional and emerging environments

Unisys Corporation unveils Unisys Stealth  5.0, the latest version of its award-winning security software which now provides protection for data in container and Kubernetes environments, improving data center security and securing new workloads.

Stealth brings clients “always on” security and resilience, stopping even sponsored, sophisticated cyber attacks in their tracks. And should an attacker get inside, Stealth prevents data exfiltration so that the breach is a minor hiccup – not a major headline. And because Stealth can be implemented with no impact on an organization’s existing infrastructure, it helps clients avoid the cost and disruption of “rip and replace” efforts, permitting them to continue to use their current security tools while strengthening their security posture.

Containers are environments in which microservices – functional components of applications used by developers – reside. Docker containers and Kubernetes – a tool for management of those containers – are quickly becoming the accepted standards to optimize workload deployment in enterprise environments and to make their data centers more efficient and agile. By incorporating Stealth protection into these environments, organizations will be able to implement these technologies in a way that does not compromise their security or increase their attack surface.

Stealth 5.0 – generally available beginning today – can help enterprises streamline their security by deploying one set of consistent security policies that works across the client’s entire digital infrastructure, including desktops, servers, the cloud, Internet of Things devices and other legacy or modern infrastructure such as containers, virtual machines and physical servers. As workloads move from traditional environments to containerized deployments, and from on-premise to the cloud, Stealth accommodates these moves.

Related posts

Akamai Rolls Out Cloud Infrastructure and Services Powered by NVIDIA

enterpriseitworld

eScan CyberSecurity Partners with Dr Batra’s Group to Safeguard Innovative Healthcare Solutions

enterpriseitworld

Palo Alto Networks Delivers the Industry’s First Cloud-Optimized SOC Platform

enterpriseitworld
x