Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Independent Report on Zero Trust Providers Cites Unisys as a Strong Performer

Report Says Unisys Stealth® Cybersecurity Solution “Offers a Unique Approach to Microsegmentation and Zero Trust”

Unisys Corporation announced that Forrester Research, Inc. has named the company as a “Strong Performer” in its newly published report, “The Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers, Q4 2019.” The independent research firm states that “Forrester’s Zero Trust framework is recognized as a preferred approach to cybersecurity.”

Forrester based its evaluation of Unisys on the company’s cybersecurity software solutions and services, which include Stealth(core)™ and Stealth(identity)™. Stealth™ uses identity-based encrypted microsegmentation to dynamically isolate threats, secure hard-to-patch critical systems and combat ransomware. According to Forrester, Zero Trust mandates a granular approach to security, focusing on where the threat is most likely to occur in most cases, with the end user – and controlling access to the data they require upon reliable identification.

Read More: Citi Partners with Software Fintech to Launch Refreshed Digital Investment Portal

Related Posts
1 of 28,745

The report states: “Unisys Stealth offers a unique approach to microsegmentation and Zero Trust. . . . Unisys’s offering is well aligned to the main tenets of Zero Trust, as it delves into the process of discovering, identifying, mapping, and cloaking those assets that shouldn’t be visible or accessible to those who aren’t at the need-to-know level. . . . Its use of the affinity-level setting on its tooling is a useful function and one of the few real applications of actual machine learning that we’ve seen in production in any security analytics or automation system.”

The Unisys roadmap for getting to Zero Trust is based on its well-established, five-step methodology. The methodology leverages the company’s deep experience and broad portfolio of security solutions to provide a complete, start-to-finish, Zero Trust implementation.

Read More: AI & Data Analytics Company Inzata Introduces One-Click Enrichments to Make Business Data More Valuable

“We believe that this recognition by a leading research firm reinforces Unisys’ status as a premier provider of innovative, Zero Trust solutions,” said Christopher Kloes, vice president, Unisys Security Solutions. “These solutions enable our clients to secure vital information assets as they pursue digital transformation to improve services to clients, tap new revenue streams and grow more competitive in the global marketplace.”

Read More: Klaytn’s Fastest-Growing Blockchain Ecosystem: Numerous Global Exchanges, Wallets, and DApp Listing Sites Join Kakao’s Klaytn

Leave A Reply

Your email address will not be published.