News Security

Unisys Introduces New Security Services for ServiceNow Clients

Solutions enable organizations to assess vulnerability, fortify response to cyber threats and protect strategic business assets

Unisys Corporation has announced new security services to help clients prevent and resolve security incidents through improved integration of security and IT operations. The new solutions include offerings for the ServiceNow Enterprise Cloud platform.
Expanding Unisys service management and security offerings, these new solutions enable clients to evaluate their existing security investments, processes and vulnerabilities to create a consolidated, closely managed system that provides continual insight into the organization’s security posture and the status of core IT assets and information necessary for digital business.

Comprising both security consulting and ongoing security managed services, the new solutions build on Unisys’ broad security expertise. Those for the ServiceNow platform build on key capabilities of the platform’s ServiceNow Security Operations (SecOps) module, as well as on governance, risk, compliance and security change management capabilities.

Ed Liebig, global vice president, Security Service Delivery, Unisys said, “Today’s digital businesses rely on strong governance and automation to quickly identify and resolve issues that can affect delivery of business and IT services and security of data for workers and customers. These new solutions enable clients to properly assess their current security environments, align security and IT operations for a holistic view of the health of business-critical enterprise resources and leverage the ServiceNow platform as the security command center for digital business.”

As per the release, for added security, clients can make Stealth an integral part of any of these service-based solutions. Stealth uses identity-based microsegmentation techniques and encryption to create segments within an organization where only authorized users can access information, while those without authorization cannot even see that those endpoints exist. Stealth uses cryptography to confine their access to a single segment of the network – which can include everything from public clouds to mobile devices – with no ability to move laterally to other parts of the organization.

Related posts

COAI announces its leadership for the year 2024-25 at AGM 2024


Mercury Security collaborates with HID


CFS ropes in new Global Head for IT