industry news
Subscribe Now

​Unisys Stealth® Integrates New Microsoft Application Program Interface to Provide Uninterrupted Security for Critical Workloads in Microsoft Azure

​New interface enables clients to automatically update Stealth security settings to protect access to Azure services without disruption

BLUE BELL, Pa., September 30, 2019 – Unisys Corporation (NYSE: UIS) today announced that its award-winning Unisys Stealth® security software suite now leverages the new Microsoft Azure Service Tag Discovery Application Program Interface (API) for additional security for clients accessing cloud-based Azure services. Stealth™ will work with the new API to update security configuration rules automatically to enable uninterrupted access to Azure services. 

The Service Tag Discovery API, now available for public testing, provides a critical capability for enterprise clients that require secure access to Microsoft Azure services without disruption. It gives clients the ability to accelerate the migration of sensitive workloads into Azure, protecting the most sensitive and critical government and commercial data via hyper-secure tunnels, while enabling client adoption of zero trust architecture models.

In 2016, Unisys announced the availability of Unisys Stealth(cloud)™ for Microsoft Azure to seamlessly deliver award-winning Stealth microsegmentation security from clients’ enterprises to Azure. Expanding upon the security built into Azure, Stealth layers on additional security countermeasures, unifies security management for enterprises using the cloud and creates a highly efficient link to transfer workloads to Azure in a safe, efficient and cost-effective manner. The new API automates previously manual administrative processes to ensure uninterrupted protection, even as organizations and security requirements change and evolve.

“Stealth represents a key security solution for organizations that want to accelerate and extend their operational and applications reach and access to the Azure cloud at the highest productivity and sensitivity levels,” said Sudhir Mehta, global vice president of Security Products and Strategy, Unisys. “We are continuing to work with Microsoft on several ongoing efforts to leverage this new exciting release.”

Stealth, which includes Dynamic Isolation™ capabilities to quickly isolate devices or users at the first sign of compromise, reduces attack surfaces in these environments by creating dynamic, identity-driven microsegments called communities of interest (COIs). By establishing secure COIs, Stealth separates trusted systems, users and data from the untrusted and reduces attack surfaces by encrypting all communication between Stealth-protected assets and cloaking the assets from unauthorized users.

“Service Tag Discovery API clients get the benefits of the combined security capabilities of Unisys Stealth and Azure, in a way that is uninterrupted and requires no manual updates to keep track of authorized traffic and devices,” said Jeff Cohen, partner group project manager, Microsoft Azure at Microsoft Corp. “We look forward to teaming with Unisys to help more government and commercial clients accelerate their migration to the Azure cloud.”

About Unisys

Unisys is a global information technology company that builds high-performance, security-centric solutions for the most demanding businesses and governments. Unisys offerings include security software and services; digital transformation and workplace services; industry applications and services; and innovative software operating environments for high-intensity enterprise computing. For more information on how Unisys builds better outcomes securely for its clients across the Government, Financial Services and Commercial markets, visit www.unisys.com.

Follow Unisys on Twitter and LinkedIn.

Leave a Reply

featured blogs
Oct 13, 2019
In part 3 of this blog series we looked at what typically is the longest stage in designing a PCB Routing and net tuning.  In part 4 we will finish the design process by looking at planes, and some miscellaneous items that may be required in some designs. Planes Figure 8...
Oct 13, 2019
https://youtu.be/8BM28qwHyUk Made at Arm TechCon (camera Randy Smith) Monday: What Is Quantum Supremacy? Tuesday: It's Ada Lovelace Day Today Wednesday: The First Woman to Receive the Kaufman... [[ Click on the title to access the full blog on the Cadence Community site...
Oct 11, 2019
The FPGA (or ACAP) universe gathered at the San Jose Fairmount last week during the Xilinx Developer Forum. Engineers, data scientists, analysts, distributors, alliance partners and more came to learn about the latest hardware, software and system level solutions from Xilinx....
Oct 11, 2019
Have you ever stayed awake at night pondering palindromic digital clock posers?...
Oct 11, 2019
[From the last episode: We looked at subroutines in computer programs.] We saw a couple weeks ago that some memories are big, but slow (flash memory). Others are fast, but not so big '€“ and they'€™re power-hungry to boot (SRAM). This sets up an interesting problem. When ...