industry news
Subscribe Now

​Unisys Stealth® Integrates New Microsoft Application Program Interface to Provide Uninterrupted Security for Critical Workloads in Microsoft Azure

​New interface enables clients to automatically update Stealth security settings to protect access to Azure services without disruption

BLUE BELL, Pa., September 30, 2019 – Unisys Corporation (NYSE: UIS) today announced that its award-winning Unisys Stealth® security software suite now leverages the new Microsoft Azure Service Tag Discovery Application Program Interface (API) for additional security for clients accessing cloud-based Azure services. Stealth™ will work with the new API to update security configuration rules automatically to enable uninterrupted access to Azure services. 

The Service Tag Discovery API, now available for public testing, provides a critical capability for enterprise clients that require secure access to Microsoft Azure services without disruption. It gives clients the ability to accelerate the migration of sensitive workloads into Azure, protecting the most sensitive and critical government and commercial data via hyper-secure tunnels, while enabling client adoption of zero trust architecture models.

In 2016, Unisys announced the availability of Unisys Stealth(cloud)™ for Microsoft Azure to seamlessly deliver award-winning Stealth microsegmentation security from clients’ enterprises to Azure. Expanding upon the security built into Azure, Stealth layers on additional security countermeasures, unifies security management for enterprises using the cloud and creates a highly efficient link to transfer workloads to Azure in a safe, efficient and cost-effective manner. The new API automates previously manual administrative processes to ensure uninterrupted protection, even as organizations and security requirements change and evolve.

“Stealth represents a key security solution for organizations that want to accelerate and extend their operational and applications reach and access to the Azure cloud at the highest productivity and sensitivity levels,” said Sudhir Mehta, global vice president of Security Products and Strategy, Unisys. “We are continuing to work with Microsoft on several ongoing efforts to leverage this new exciting release.”

Stealth, which includes Dynamic Isolation™ capabilities to quickly isolate devices or users at the first sign of compromise, reduces attack surfaces in these environments by creating dynamic, identity-driven microsegments called communities of interest (COIs). By establishing secure COIs, Stealth separates trusted systems, users and data from the untrusted and reduces attack surfaces by encrypting all communication between Stealth-protected assets and cloaking the assets from unauthorized users.

“Service Tag Discovery API clients get the benefits of the combined security capabilities of Unisys Stealth and Azure, in a way that is uninterrupted and requires no manual updates to keep track of authorized traffic and devices,” said Jeff Cohen, partner group project manager, Microsoft Azure at Microsoft Corp. “We look forward to teaming with Unisys to help more government and commercial clients accelerate their migration to the Azure cloud.”

About Unisys

Unisys is a global information technology company that builds high-performance, security-centric solutions for the most demanding businesses and governments. Unisys offerings include security software and services; digital transformation and workplace services; industry applications and services; and innovative software operating environments for high-intensity enterprise computing. For more information on how Unisys builds better outcomes securely for its clients across the Government, Financial Services and Commercial markets, visit www.unisys.com.

Follow Unisys on Twitter and LinkedIn.

Leave a Reply

featured blogs
Jul 8, 2020
Through our Pricing and Delivery tool in My Samtec, customers could always access their customer-specific pricing by logging in and entering a part number. However that functionality came with the limitation of having to navigate to a separate part of the website to see that ...
Jul 6, 2020
If you were in the possession of one of these bodacious beauties, what sorts of games and effects would you create using the little scamp?...
Jul 3, 2020
[From the last episode: We looked at CNNs for vision as well as other neural networks for other applications.] We'€™re going to take a quick detour into math today. For those of you that have done advanced math, this may be a review, or it might even seem to be talking down...

Featured Video

Product Update: DesignWare® Foundation IP

Sponsored by Synopsys

Join Prasad Saggurti for an update on Synopsys’ DesignWare Foundation IP, including the world’s fastest TCAMs, widest-voltage GPIOs, I2C & I3C IOs, and LVDS IOs. Synopsys Foundation IP is silicon-proven in 7nm in more than 500,000 customer wafers, and 5nm is in development.

Click here for more information about DesignWare Foundation IP: Embedded Memories, Logic Libraries & GPIO

Featured Paper

Cryptography: Fundamentals on the Modern Approach

Sponsored by Maxim Integrated

Learn about the fundamental concepts behind modern cryptography, including how symmetric and asymmetric keys work to achieve confidentiality, identification and authentication, integrity, and non-repudiation.

Click here to download the whitepaper

Featured Chalk Talk

MCU32 Graphics Overview

Sponsored by Mouser Electronics and Microchip

Graphical interfaces add a whole new dimension to embedded designs. But, designing a full-blown graphics interface is a major challenge for most embedded systems designers. In this episode of Chalk Talk, Amelia Dalton and Kurt Parker from Microchip Technology explain how you can add a modern graphics user interface to your next embedded design without a big learning curve.

Click here for more information about Microchip Technology MPLAB® X Integrated Development Environment