Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Secure Your Mobile Enterprise

273 views

Published on

To learn more visit: http://www.unisys.com/stealth

Mobile is the way business gets done. But in today’s increasingly connected business environment, enterprises are more vulnerable than ever to compromising sensitive corporate data and jeopardizing their business reputation. Unisys StealthTM for Mobile provides a comprehensive, innovative approach to mobile security – one that begins in the data center and extends to mobile applications. With Unisys Stealth for Mobile, security follows the user, not the device, so your mission-critical data is protected from inside and outside your enterprise.

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Secure Your Mobile Enterprise

  1. 1. Unisys Stealth for Mobile Secure Your Mobile Enterprise Stronger Mobile Security Begins in the Data Center and Secures the Entire Data Path HIGHLIGHTS ƒƒ Mobile security is more than the device. Comprehensive mobile security begins in the data center. ƒƒ Go dark – conceal communication endpoints. Make servers, devices and other communication endpoints undetectable. ƒƒ BYOD with confidence. Mobile access to enterprise data is based on the user, not the device. ƒƒ Secure remote access. Teleworkers and partners can access sensitive information from mobile devices without fear of compromise. Mobile is the way business gets done. But in today’s increasingly connected business environment, enterprises are more vulnerable than ever to compromising sensitive corporate data and jeopardizing their business reputation. Unisys Stealth™ for Mobile provides a comprehensive, innovative approach to mobile security – one that begins in the data center and extends to mobile applications. With Unisys Stealth for Mobile, security follows the user, not the device, so your mission-critical data is protected from inside and outside your enterprise. Today’s Mobile Security Makes Organizations Vulnerable to Attack Mobile security is a top concern for both enterprises and customers. The proliferation of mobile devices is unstoppable. The chance of malware attack is high. Gartner predicts that half of companies will require BYOD by 20171. Already, 46% of organizations allowing BYOD have had a data breach attributed to employee devices accessing the network2. Organizations have no option but to adequately prepare for risks associated with employee-owned devices. Today’s approach to mobile security just isn’t good enough. Most mobile security approaches are restricted to protecting the device, offer inadequate resistance to hackers and malware, and do not secure the entire data path from the mobile device to the data center. How then can organizations better secure their mobile environment to confidently secure access from employeeowned or third party mobile devices to the data center and enable BYOD?” Secure the Entire Data Path Adding layers of traditional security will do little to protect against increasingly sophisticated mobile attacks. Protecting mission-critical data demands a new, Previous | Next
  2. 2. innovative security approach that: ƒƒ Secures the entire data path – from the mobile application all the way to the data center ƒƒ Conceals endpoints -- servers, devices, and other communication endpoints -- from external and internal threats ƒƒ Offers granular, customized security that follows the user, not the device Unisys Stealth for Mobile consists of three components and supports iOS and Android-based mobile devices: ƒƒ Stealth for Data Center Segmentation – darkens endpoints and provides identity-based access through Stealth secure Communities of Interest (COI) ƒƒ Stealth for Mobile Software – Connects authenticated mobile application users into the Stealth secure COI ƒƒ 3rd Party Application Wrapping Software – Wraps security policies around individual applications on a mobile device (Click the Image to Enlarge) mobile applications that are wrapped with fine-grained security policies such as geo-fencing and location-masking, which only allows application use within specified geographic boundaries. Sensitive data – while at rest or in motion -- remains encrypted all along the data path. Unisys Stealth for Mobile enables organizations to: ƒƒ Deploy secure mobile applications. Mobile applications, such as those used for mobile banking or other apps used for sensitive data transfer, can be secured and access rights configured to a user irrespective of the device being used – mobile device, laptop, or PC. ƒƒ Implement BYOD remotely and locally. Applications on tablets or phones can connect into the Stealth gateway to help eliminate threats associated with BYOD. ƒƒ Expand the client service portfolio. Organizations such as telecommunications service providers can extend new offerings such as security as a service. You Can’t Hack What You Can’t See (Click the Image to Enlarge) Unisys Stealth for Mobile – From the Data Center to the Mobile Application Unisys Stealth for Mobile provides a more effective approach to mobile security than today’s solutions. With Unisys Stealth for Mobile, security starts in the data center where advanced cloaking techniques make communication endpoints undetectable to unauthorized users. Authorized users access data through Unisys Stealth secure communities of interest from 1 2 Unisys Stealth strengthens enterprise-wide data protection by making communication endpoints undetectable to unauthorized users and securing data-in-motion across any network. Unisys Stealth for Mobile extends this innovative data protection from the data center to mobile applications and secures the entire data path. For more information, please contact: Darren McGrath, Director, Mobility Solutions darren.mcgrath@unisys.com Rod Sapp, Vice President, Solution Management rodney.sapp@unisys.com www.unisys.com/stealth Gartner report – “Bring Your Own Device: The Facts and the Future” Decisive Analytics © 2014 Unisys Corporation. All rights reserved. Unisys, the Unisys logo, ClearPath, Unisys Stealth and Forward! by Unisys and the Forward! by Unisys logo are registered trademarks or trademarks of Unisys Corporation. All other brands and products referenced herein are acknowledged to be trademarks or registered trademarks of their respective holders. 14-0050 Previous | Next

×