secure your mobile enterprise

2
Previous | Next Secure Your Mobile Enterprise Stronger Mobile Security Begins in the Data Center and Secures the Entire Data Path Mobile is the way business gets done. But in today’s increasingly connected business environment, enterprises are more vulnerable than ever to compromising sensitive corporate data and jeopardizing their business reputation. Unisys Stealth™ for Mobile provides a comprehensive, innovative approach to mobile security – one that begins in the data center and extends to mobile applications. With Unisys Stealth for Mobile, security follows the user, not the device, so your mission-critical data is protected from inside and outside your enterprise. Today’s Mobile Security Makes Organizations Vulnerable to Attack Mobile security is a top concern for both enterprises and customers. The proliferation of mobile devices is unstoppable. The chance of malware attack is high. Gartner predicts that half of companies will require BYOD by 2017 1 . Already, 46% of organizations allowing BYOD have had a data breach attributed to employee devices accessing the network 2 . Organizations have no option but to adequately prepare for risks associated with employee-owned devices. Today’s approach to mobile security just isn’t good enough. Most mobile security approaches are restricted to protecting the device, offer inadequate resistance to hackers and malware, and do not secure the entire data path from the mobile device to the data center. How then can organizations better secure their mobile environment to confidently secure access from employee- owned or third party mobile devices to the data center and enable BYOD?” Secure the Entire Data Path Adding layers of traditional security will do little to protect against increasingly sophisticated mobile attacks. Protecting mission-critical data demands a new, Unisys Stealth for Mobile HIGHLIGHTS Mobile security is more than the device. Comprehensive mobile security begins in the data center. Go dark – conceal communication endpoints. Make servers, devices and other communication endpoints undetectable. BYOD with confidence. Mobile access to enterprise data is based on the user, not the device. Secure remote access. Teleworkers and partners can access sensitive information from mobile devices without fear of compromise.

Upload: unisys-corporation

Post on 17-Jul-2015

83 views

Category:

Technology


2 download

TRANSCRIPT

Page 1: Secure Your Mobile Enterprise

Previous | Next

Secure Your Mobile Enterprise Stronger Mobile Security Begins in the Data Center and Secures the Entire Data Path

Mobile is the way business gets done. But in today’s increasingly connected

business environment, enterprises are more vulnerable than ever to compromising

sensitive corporate data and jeopardizing their business reputation. Unisys

Stealth™ for Mobile provides a comprehensive, innovative approach to mobile

security – one that begins in the data center and extends to mobile applications.

With Unisys Stealth for Mobile, security follows the user, not the device, so your

mission-critical data is protected from inside and outside your enterprise.

Today’s Mobile Security Makes Organizations Vulnerable to Attack

Mobile security is a top concern for both enterprises and customers. The

proliferation of mobile devices is unstoppable. The chance of malware attack

is high. Gartner predicts that half of companies will require BYOD by 20171.

Already, 46% of organizations allowing BYOD have had a data breach attributed

to employee devices accessing the network2. Organizations have no option but

to adequately prepare for risks associated with employee-owned devices.

Today’s approach to mobile security just isn’t good enough. Most mobile

security approaches are restricted to protecting the device, offer inadequate

resistance to hackers and malware, and do not secure the entire data path

from the mobile device to the data center. How then can organizations better

secure their mobile environment to confidently secure access from employee-

owned or third party mobile devices to the data center and enable BYOD?”

Secure the Entire Data Path

Adding layers of traditional security will do little to protect against increasingly

sophisticated mobile attacks. Protecting mission-critical data demands a new,

Unisys Stealth for Mobile

HIGHLIGHTS

� Mobile security is more than the device. Comprehensive mobile security begins in the data center.

� Go dark – conceal communication endpoints. Make servers, devices and other communication endpoints undetectable.

� BYOD with confidence. Mobile access to enterprise data is based on the user, not the device.

� Secure remote access. Teleworkers and partners can access sensitive information from mobile devices without fear of compromise.

Page 2: Secure Your Mobile Enterprise

Previous | Next

innovative security approach that:

� Secures the entire data path – from the mobile application

all the way to the data center

� Conceals endpoints -- servers, devices, and other

communication endpoints -- from external and internal threats

� Offers granular, customized security that follows the user,

not the device

Unisys Stealth for Mobile consists of three components and

supports iOS and Android-based mobile devices:

� Stealth for Data Center Segmentation – darkens endpoints

and provides identity-based access through Stealth secure

Communities of Interest (COI)

� Stealth for Mobile Software – Connects authenticated

mobile application users into the Stealth secure COI

� 3rd Party Application Wrapping Software – Wraps security

policies around individual applications on a mobile device

mobile applications that are wrapped with fine-grained security

policies such as geo-fencing and location-masking, which only

allows application use within specified geographic boundaries.

Sensitive data – while at rest or in motion -- remains encrypted all

along the data path.

Unisys Stealth for Mobile enables organizations to:

� Deploy secure mobile applications. Mobile applications,

such as those used for mobile banking or other apps used

for sensitive data transfer, can be secured and access

rights configured to a user irrespective of the device being

used – mobile device, laptop, or PC.

� Implement BYOD remotely and locally. Applications on

tablets or phones can connect into the Stealth gateway to

help eliminate threats associated with BYOD.

� Expand the client service portfolio. Organizations such

as telecommunications service providers can extend new

offerings such as security as a service.

You Can’t Hack What You Can’t SeeUnisys Stealth strengthens enterprise-wide data protection by

making communication endpoints undetectable to unauthorized

users and securing data-in-motion across any network. Unisys

Stealth for Mobile extends this innovative data protection from

the data center to mobile applications and secures the entire

data path.

For more information, please contact:

Darren McGrath, Director, Mobility Solutions

[email protected]

Rod Sapp, Vice President, Solution Management

[email protected]

www.unisys.com/stealth

© 2014 Unisys Corporation. All rights reserved.

Unisys, the Unisys logo, ClearPath, Unisys Stealth and Forward! by Unisys and the Forward! by Unisys logo are registered trademarks or trademarks of Unisys Corporation. All other brands and products referenced herein are acknowledged to be trademarks or registered trademarks of their respective holders.

14-0050

1 Gartner report – “Bring Your Own Device: The Facts and the Future”2 Decisive Analytics

(Click the Image to Enlarge)

(Click the Image to Enlarge)

Unisys Stealth for Mobile – From the Data Center to the Mobile Application

Unisys Stealth for Mobile provides a more effective approach

to mobile security than today’s solutions. With Unisys

Stealth for Mobile, security starts in the data center where

advanced cloaking techniques make communication endpoints

undetectable to unauthorized users. Authorized users access

data through Unisys Stealth secure communities of interest from