Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Latest Version of Unisys Stealth Features New Automation and Visualization Tools to Accelerate Deployment and Simplify Management

Unisys Stealth 6.0 helps organizations achieve zero trust security quickly and provides real-time insights and security metrics to improve decision making

Unisys Corporation announced the availability of Unisys Stealth 6.0, which features enhanced visualization and dashboard tools to simplify an organization’s IT reporting and deployment – strengthening security posture and allowing businesses to reduce the complexity of their IT environment with the appropriate security policies. Stealth features artificial intelligence (AI)-driven automation to dramatically speed up installation, configuration and deployment in the enterprise in a matter of minutes.

Stealth 6.0, which uses micro-segmentation, encryption and dynamic isolation to contain threats and protect public, private, hybrid, multi-cloud and on-premises environments, is available for enterprise use to provide additional protection across the world’s largest cloud computing platforms, including Microsoft Azure, Amazon Web Services Cloud and Google Cloud. Stealth also provides virtual agent support across operating systems, including macOS, iOS, iPadOS and Android, enabling support for the broadest array of digital infrastructure in the IT industry.

Recommended AI News: GigRonin Appoints Former Microsoft Executive As Advisory Board Chair While Seizing Unique Opportunity For Growth

For many organizations, security teams have a lot of critical data to monitor and manage. When security architectures are not fully integrated, these teams often must spend significant time and resources manually analyzing security logs and data among solutions. A recent survey of global security leaders found that more than half (53%) said that setting and managing policies and complex deployments served as the biggest challenges to their organizations, while 51% cited the manual work needed for integration among solutions.

Related Posts
1 of 40,485

Recommended AI News: ACL Airshop Wins The Air Cargo News Innovation Award For The FindMyULD App

Stealth 6.0 expands upon previous versions to address these challenges through the delivery of compelling zero trust capabilities, including:

  • Automated, robust enterprise security that features AI and machine learning capabilities to reduce complexity by translating thousands of network communication flows into a streamlined set of security policies. The easy-to-use deployment Wizard enables quick implementation, while a robust API framework automates all Stealth installation, configuration and deployment activities – which can be done remotely and with thousands of endpoints installed at the same time in minutes.
  • A state-of-the-art visual interface that provides unmatched ease-of-use. Stealth’s visualization of the network environment makes it easy for organizations to spot potentially harmful traffic that needs to be secured immediately. It also provides at-a-glance insight into the applications and traffic flows that are protected by Stealth.
  • A comprehensive, real-time security dashboard that provides organizations with a clean, simplified look at the status of their network in a single view. This enables organizations to safely address their business outcomes with immediate insights about the environment to enable informed decisions, meet compliance requirements and improve the overall security of their enterprise.

“Unisys Stealth gives clients the ability to see, segment and secure the entirety of their global infrastructure through a single touchpoint,” said Vishal Gupta, chief technology officer and senior vice president of Products and Platforms, Unisys. “With more enterprises managing a remote workforce and increasing reliance on the cloud since the pandemic started, the need to consolidate and simplify security is more important than ever. Stealth combines identity-based access management with an easy-to-use interface and touchless provisioning that allows businesses to meet privacy and compliance standards while reducing cost and complexity.”

Recommended AI News: GovernmentCIO Acquired By Welsh, Carson, Anderson & Stowe

1 Comment
  1. Copper scrap metal says

    Copper scrap crushing Copper scrap legal considerations Metal reclamation and reutilization solutions
    Copper cable recycling statistics, Scrap metal cutting, Copper scrap trading company

Leave A Reply

Your email address will not be published.