Video | Agriculture | Confidence | Economy | Energy | Employment | Finance | Media | Property | RBNZ | Science | SOEs | Tax | Technology | Telecoms | Tourism | Transport | Search


Unisys Unveils Unisys Stealth® 5.0 Software Extending Protection

Unisys Unveils Unisys Stealth® 5.0 Software Extending Protection to Container and Kubernetes Environments to Secure New Workloads and Enhance Data Center Security

New version supports cloud workloads and application modernisation efforts with one consistent set of security policies that spans traditional and emerging environments

WELLINGTON, 25 February 2020Unisys Corporation (NYSE: UIS) today announced the availability of Unisys Stealth® 5.0, the latest version of its award-winning security software which now provides protection for data in container and Kubernetes environments, improving data center security and securing new workloads.

Stealth brings clients “always on” security and resilience, stopping even sponsored, sophisticated cyber attacks in their tracks. And should an attacker get inside, Stealth prevents data exfiltration so that the breach is a minor hiccup – not a major headline. And because Stealth can be implemented with no impact on an organisation’s existing infrastructure, it helps clients avoid the cost and disruption of “rip and replace” efforts, permitting them to continue to use their current security tools while strengthening their security posture.

Containers are environments in which microservices – functional components of applications used by developers – reside. Docker containers and Kubernetes – a tool for management of those containers – are quickly becoming the accepted standards to optimise workload deployment in enterprise environments and to make their data centers more efficient and agile. According to Gartner, “By 2022, more than 75% of global organisations will be running containerised applications in production, which is a significant increase from fewer than 30% today.” (Best Practices for Running Containers and Kubernetes in Production, February 2019)

By incorporating Stealth protection into these environments, organisations will be able to implement these technologies in a way that does not compromise their security or increase their attack surface.

Stealth 5.0 – generally available beginning today – can help enterprises streamline their security by deploying one set of consistent security policies that works across the client’s entire digital infrastructure, including desktops, servers, the cloud, Internet of Things devices and other legacy or modern infrastructure such as containers, virtual machines and physical servers. As workloads move from traditional environments to containerised deployments, and from on-premise to the cloud, Stealth accommodates these moves.

“Our clients are increasingly embracing the use of containers and Kubernetes as a means for more efficient applications development,” said Sudhir Mehta, global vice president, product management, Unisys. “With Stealth 5.0, we make the use of these technologies seamless from a security standpoint, so clients can realise the agility, availability, manageability and scalability advantages offered by containerised microservices – while minimising risk.”

Stealth reduces attack surfaces in these environments by creating dynamic, identity-driven microsegments called communities of interest (COIs). Through secure COIs, Stealth separates trusted systems, users and data from the untrusted. It further reduces attack surfaces by encrypting all communication between Stealth-protected assets and cloaking the assets from unauthorised users.

Stealth 5.0 also expands upon previous versions with the following additional capabilities:

  • Enhanced secure virtual gateway (SVG) capabilities: Stealth 5.0 expands next-generation SVG capabilities to include deployment in public clouds, so clients can extend security for diverse enterprise deployments while continuing support for a broad array of non-standard endpoints or endpoints they don’t control.
  • Expanded application program interface (API) and automation capabilities: Stealth 5.0 automates all Stealth management activities to enable rapid deployment, configuration and management for quick response to changing business needs while minimising manual work.
  • Enhanced Dynamic Isolation: Stealth 5.0 can reduce isolation time to 10 seconds or less to improve clients’ security postures with less opportunity for malware to propagate throughout their environments.

For more information on Unisys Stealth 5.0, go to

© Scoop Media

Business Headlines | Sci-Tech Headlines


Reserve Bank: RBNZ To Implement $30bn Large Scale Asset Purchase Programme Of NZ Govt Bonds

The Monetary Policy Committee (MPC) has decided to implement a Large Scale Asset Purchase programme (LSAP) of New Zealand government bonds. The negative economic implications of the coronavirus outbreak have continued to intensify. The Committee ... More>>


Elevate NZ: Venture Fund To Lift Productivity

The Government’s new $300 million venture capital fund - announced in last year’s Budget – is now open for business as the Elevate NZ Venture Fund. Finance Minister Grant Robertson says lifting New Zealand's productivity requires well-functioning ... More>>


COVID-19: Case Confirmed In NZ – Expert Reaction

After spreading across the globe for months, the first case of COVID-19 has been reported in New Zealand. The Ministry of Health says the risk of a community outbreak is low, due to their preparedness and the high awareness of the disease. The Science ... More>>


Agriculture: New Legislation To Boost Organics

New organics legislation will boost consumer confidence and help grow an innovative sector, says Food Safety Minister Damien O’Connor. “The Organics Product Bill, introduced to Parliament this week, aims to increase consumer confidence when purchasing ... More>>


Biodiversity Policy: Misinformation Circulating

Forest & Bird is concerned at misinformation circulating regarding a policy statement aimed at protecting New Zealand’s unique biodiversity. The National Policy Statement for Indigenous Biodiversity is being consulted on by the ... More>>