View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
  2. Cybersecurity
November 11, 2013

Unisys launches mobile solution to protect against BYOD security risks

The Unisys Stealth for Mobile solution helps to protect against cyber security risks created by the rise of mobile devices used in the workplace.

By Kate Heslop

BYOD

Unisys has announced the availability of its Unisys Stealth for Mobile solution to address security concerns facing enterprises as growing numbers of their employees use mobile devices at work.

There has been a rapid rise in BYOD in the workplace, and that is expected to continue to grow. This has, however, introduced a sharp increase in cyber security risks.

Unisys Stealth for Mobile aims to enable secure access from data centres to the applications on mobile devices. The solution allows access based on the user’s identity, to help ensure authorised users reach or have visibility to only the information they are approved to access or see.

Unisys Stealth for Mobile is the latest addition to the Unisys Stealth cyber security products. Unisys Stealth uses data cloaking and encryption techniques to help organisations mitigate cyber security attacks and hacker incidents by rendering devices, data, and end users virtually invisible on the network. The solution creates secure user communities within an enterprise where only authorised users can access or see information.

The Unisys Stealth for Mobile solution combines Unisys Stealth technology with application wrapping security software that allows users to define specific security policies on a per-mobile application basis. Unisys Stealth for Mobile then adds a layer of identity-based security that gives users access and visibility rights to only the assets within the data centre they are entitled to access and see. The Unisys Stealth for Mobile solution is easy to implement, requiring no new code or application changes.

Rod Sapp, VP of products and technology, Unisys said: "Stealth for Mobile allows enterprises to capitalise on the productivity gains and customer service improvements associated with mobility and consumerisation of IT, while increasing assurance that their critical data remains safe. Unlike other security solutions such as virtual private networks, Unisys Stealth for Mobile cryptographically protects data all the way to the application – a much more secure approach for BYOD environments."

Content from our partners
Unlocking growth through hybrid cloud: 5 key takeaways
How businesses can safeguard themselves on the cyber frontline
How hackers’ tactics are evolving in an increasingly complex landscape

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU