secure your mobile enterprise
TRANSCRIPT
Previous | Next
Secure Your Mobile Enterprise Stronger Mobile Security Begins in the Data Center and Secures the Entire Data Path
Mobile is the way business gets done. But in today’s increasingly connected
business environment, enterprises are more vulnerable than ever to compromising
sensitive corporate data and jeopardizing their business reputation. Unisys
Stealth™ for Mobile provides a comprehensive, innovative approach to mobile
security – one that begins in the data center and extends to mobile applications.
With Unisys Stealth for Mobile, security follows the user, not the device, so your
mission-critical data is protected from inside and outside your enterprise.
Today’s Mobile Security Makes Organizations Vulnerable to Attack
Mobile security is a top concern for both enterprises and customers. The
proliferation of mobile devices is unstoppable. The chance of malware attack
is high. Gartner predicts that half of companies will require BYOD by 20171.
Already, 46% of organizations allowing BYOD have had a data breach attributed
to employee devices accessing the network2. Organizations have no option but
to adequately prepare for risks associated with employee-owned devices.
Today’s approach to mobile security just isn’t good enough. Most mobile
security approaches are restricted to protecting the device, offer inadequate
resistance to hackers and malware, and do not secure the entire data path
from the mobile device to the data center. How then can organizations better
secure their mobile environment to confidently secure access from employee-
owned or third party mobile devices to the data center and enable BYOD?”
Secure the Entire Data Path
Adding layers of traditional security will do little to protect against increasingly
sophisticated mobile attacks. Protecting mission-critical data demands a new,
Unisys Stealth for Mobile
HIGHLIGHTS
� Mobile security is more than the device. Comprehensive mobile security begins in the data center.
� Go dark – conceal communication endpoints. Make servers, devices and other communication endpoints undetectable.
� BYOD with confidence. Mobile access to enterprise data is based on the user, not the device.
� Secure remote access. Teleworkers and partners can access sensitive information from mobile devices without fear of compromise.
Previous | Next
innovative security approach that:
� Secures the entire data path – from the mobile application
all the way to the data center
� Conceals endpoints -- servers, devices, and other
communication endpoints -- from external and internal threats
� Offers granular, customized security that follows the user,
not the device
Unisys Stealth for Mobile consists of three components and
supports iOS and Android-based mobile devices:
� Stealth for Data Center Segmentation – darkens endpoints
and provides identity-based access through Stealth secure
Communities of Interest (COI)
� Stealth for Mobile Software – Connects authenticated
mobile application users into the Stealth secure COI
� 3rd Party Application Wrapping Software – Wraps security
policies around individual applications on a mobile device
mobile applications that are wrapped with fine-grained security
policies such as geo-fencing and location-masking, which only
allows application use within specified geographic boundaries.
Sensitive data – while at rest or in motion -- remains encrypted all
along the data path.
Unisys Stealth for Mobile enables organizations to:
� Deploy secure mobile applications. Mobile applications,
such as those used for mobile banking or other apps used
for sensitive data transfer, can be secured and access
rights configured to a user irrespective of the device being
used – mobile device, laptop, or PC.
� Implement BYOD remotely and locally. Applications on
tablets or phones can connect into the Stealth gateway to
help eliminate threats associated with BYOD.
� Expand the client service portfolio. Organizations such
as telecommunications service providers can extend new
offerings such as security as a service.
You Can’t Hack What You Can’t SeeUnisys Stealth strengthens enterprise-wide data protection by
making communication endpoints undetectable to unauthorized
users and securing data-in-motion across any network. Unisys
Stealth for Mobile extends this innovative data protection from
the data center to mobile applications and secures the entire
data path.
For more information, please contact:
Darren McGrath, Director, Mobility Solutions
Rod Sapp, Vice President, Solution Management
www.unisys.com/stealth
© 2014 Unisys Corporation. All rights reserved.
Unisys, the Unisys logo, ClearPath, Unisys Stealth and Forward! by Unisys and the Forward! by Unisys logo are registered trademarks or trademarks of Unisys Corporation. All other brands and products referenced herein are acknowledged to be trademarks or registered trademarks of their respective holders.
14-0050
1 Gartner report – “Bring Your Own Device: The Facts and the Future”2 Decisive Analytics
(Click the Image to Enlarge)
(Click the Image to Enlarge)
Unisys Stealth for Mobile – From the Data Center to the Mobile Application
Unisys Stealth for Mobile provides a more effective approach
to mobile security than today’s solutions. With Unisys
Stealth for Mobile, security starts in the data center where
advanced cloaking techniques make communication endpoints
undetectable to unauthorized users. Authorized users access
data through Unisys Stealth secure communities of interest from