Unisys Stealth
Always-on security through microsegmentation.
Overview
Unisys Stealth is a security software suite that uses identity-based microsegmentation to create secure Communities of Interest (COIs). It encrypts traffic between all members of a COI and cloaks endpoints, making them undetectable to unauthorized users. This approach reduces the attack surface and contains breaches by ensuring that users can only see and connect to the specific resources they are authorized to access.
✨ Key Features
- Identity-driven microsegmentation
- Dynamic isolation of endpoints and users
- Endpoint cloaking
- Always-on data encryption (IPsec)
- Centralized policy management
- Works across data center, cloud, and mobile
🎯 Key Differentiators
- Strong focus on identity as the core of the security perimeter.
- Endpoint cloaking makes assets invisible to attackers.
- Dynamic isolation capabilities to quickly quarantine threats.
Unique Value: Creates invisible, software-defined perimeters based on user and device identity, effectively cloaking critical assets and stopping threats before they can spread.
🎯 Use Cases (5)
✅ Best For
- High-security microsegmentation for government and enterprise.
💡 Check With Vendor
Verify these considerations match your specific requirements:
- Simple networks where identity-driven segmentation is overly complex.
- Organizations looking for a lightweight, cloud-only ZTNA solution.
🏆 Alternatives
Goes beyond simple access control by actively cloaking endpoints and using strong, identity-based cryptography to create secure enclaves, which can be a stronger security posture than some ZTNA solutions.
💻 Platforms
✅ Offline Mode Available
🔌 Integrations
🛟 Support Options
- ✓ Email Support
- ✓ Phone Support
- ✓ Dedicated Support (Managed Services tier)
🔒 Compliance & Security
💰 Pricing
✓ 14-day free trial
🔄 Similar Tools in Network Segmentation
Cisco Secure Workload (formerly Tetration)
Provides holistic workload protection for multi-cloud data centers by enabling microsegmentation....
Illumio Core
Stops breaches from spreading across hybrid IT with Zero Trust Segmentation....
Akamai Guardicore Segmentation
A software-based microsegmentation solution that provides deep visibility and granular policy contro...
Zscaler Private Access (ZPA)
A cloud service that provides zero trust, secure access to internal applications without placing use...
Palo Alto Networks Prisma Cloud
A comprehensive CNAPP that provides security from code to cloud, including microsegmentation....
Tufin
A security policy automation platform that provides visibility and control over network segmentation...