October, 2013 -
Within the next two years, hundreds of millions of people are expected to be using smartphones for work - many of which will be employee-owned devices. The rapid proliferation of such bring-your-own devices (BYOD) in the workplace has resulted in an alarming increase in cybersecurity risks.
Unisys Stealth for Mobile enables secure access from data centers to the applications on mobile devices. The solution grants users access rights based on identity, to help ensure authorized users reach or have visibility to only the information they are approved to access or see
Unisys Stealth for Mobile, announced at the Gartner Symposium/ITxpo 2013 being held here, is the latest member of a growing family of Unisys Stealth cybersecurity products. Unisys Stealth uses advanced data cloaking and encryption techniques to help organizations mitigate cybersecurity attacks and hacker incidents by rendering devices, data, and end users virtually invisible on the network. The solution creates secure user communities within an enterprise where only authorized users can access or see information.
"Stealth for Mobile allows enterprises to capitalize on the productivity gains and customer service improvements associated with mobility and consumerization of IT, while increasing assurance that their critical data remains safe," said
The new solution combines Unisys Stealth technology with application wrapping security software that allows users to define specific security policies on a per-mobile application basis. Unisys Stealth for Mobile then adds a layer of identity-based security that gives users access and visibility rights to only the assets within the data center they are entitled to access and see.
Unisys Stealth for Mobile is easy to implement, requiring no new code or application changes. The solution is transparent to end users, who will have the same access rights no matter which device they use to access the data center.
Most Popular Stories
- Bipartisan Budget Deal Gets Key Support in House
- TFA Recruiting DACA Recipients
- Bitcoin Clones Lurch Onto Financial Scene
- Clinton to Keynote Annual Simmons Leadership Conference
- Scotch Whisky Sales Raise Distillers' Spirits
- Holiday Shopping Off to a Slow Start This Season
- Health Coverage Disparities Emerge Among States
- Podesta Likely to Reject Keystone XL
- Fake Deaf Interpreter Was Hallucinating, Has Schizophrenia
- Tea Party Glum in Face of Bipartisan Budget Deal