Whitepaper

Unisys Stealth

Unisys Stealthâ„¢ software-defined security cryptographically cloaks endpoints (servers and workstations) from any unauthorized traffic. Stealth virtualizes the physical network backbone using cryptography to proactively protect data by restricting communication within the data center to pre-authorized groups of users and devices called Communities of Interest.