Wednesday 16 October 2013

Unisys unveils Stealth for Mobile software to meet BYOD concerns

Hacker
Security firm Unisys has unveiled a new tool called Stealth for Mobile that is designed to offer protection from the growing threat to data theft caused by the bring your own device (BYOD) trend.
Vice president of global security solutions at Unisys, Neil Fisher, told V3 the tool works by hiding critical information and data centre processes from hackers to offer protection all the way through the network.
"Mobile security needs to begin in the data centre where an organisation's ‘crown jewels' - its most mission-critical data - are kept. Unisys Stealth darkens endpoints in the data centre and uses identity-based security, so the crown jewels are virtually invisible to those not authorised to see them," he explained.
Fisher added the Stealth service also features mobile software that can be used to authenticate and organise device users' privileges. This means managers can control what information each user is accessing and spot unauthorised activity.
"Once the crown jewels are secure, the same protection can extend to mobile applications with Unisys Stealth for Mobile. The technology uses the strengths of Unisys Stealth data protection and extends it to applications on mobile devices, helping to hide Stealth-enabled communities and virtual processing environments from unauthorised users," he said.
The service also has application wrapping software designed to let administrators set specific security policies on a per-app basis. Fisher said the combined package will offer businesses protection against a variety of cyber threats.
"Stealth for Mobile helps secure the most critical assets in the data centre from threats introduced by mobile devices. It makes use of application wrapping software that encrypts data-in-motion from the mobile app across the internet - keeping it secure from hackers and eavesdroppers," he said.
"Unlike mobile VPN technologies which encrypt data only to the enterprise boundary, Stealth for Mobile extends that encryption right up to the servers in the data centre."
He claimed Stealth is the first service to offer enterprise businesses such holistic defences against hackers: "Unisys Stealth uses unique security techniques to allow clients to increase data security while simplifying security management, and use public networks such as the internet without exposing their data communications to cyber threats."
Threats to business networks are being exposed all the time. Only last week Adobe admitted it was the victim of a huge theft of data on 2.9 million of its customers, while source code for its products was also stolen.

No comments:

Post a Comment