BYOD

Unisys has announced the availability of its Unisys Stealth for Mobile solution to address security concerns facing enterprises as growing numbers of their employees use mobile devices at work.

There has been a rapid rise in BYOD in the workplace, and that is expected to continue to grow. This has, however, introduced a sharp increase in cyber security risks.

Unisys Stealth for Mobile aims to enable secure access from data centres to the applications on mobile devices. The solution allows access based on the user’s identity, to help ensure authorised users reach or have visibility to only the information they are approved to access or see.

Unisys Stealth for Mobile is the latest addition to the Unisys Stealth cyber security products. Unisys Stealth uses data cloaking and encryption techniques to help organisations mitigate cyber security attacks and hacker incidents by rendering devices, data, and end users virtually invisible on the network. The solution creates secure user communities within an enterprise where only authorised users can access or see information.

The Unisys Stealth for Mobile solution combines Unisys Stealth technology with application wrapping security software that allows users to define specific security policies on a per-mobile application basis. Unisys Stealth for Mobile then adds a layer of identity-based security that gives users access and visibility rights to only the assets within the data centre they are entitled to access and see. The Unisys Stealth for Mobile solution is easy to implement, requiring no new code or application changes.

Rod Sapp, VP of products and technology, Unisys said: "Stealth for Mobile allows enterprises to capitalise on the productivity gains and customer service improvements associated with mobility and consumerisation of IT, while increasing assurance that their critical data remains safe. Unlike other security solutions such as virtual private networks, Unisys Stealth for Mobile cryptographically protects data all the way to the application – a much more secure approach for BYOD environments."