Software With Built-In Analytics, Visualization Provides Immediate Security Risk Insight
By Christine Kern, contributing writer
Unisys Stealth(aware) helps enterprises combat cybercrime faster.
Cyber security risks are on the rise, particularly against healthcare institutions, because of the valuable sensitive data they hold on a daily basis.
According to Everbridge, ransomware attacks occurred in half of all hospitals over the past year, leading to serious consequences in their wake. Cyberattacks come in a variety of forms and can either expose patient data or put patients’ health at risk by blocking access to EHRs and other electronic information. U.S. News & World Report wrote, “Hospitals are rubber dinghies in a sea of hacker sharks.”
In order to better combat these escalating attacks, Unisys Corporation has announced the launch of Stealth(aware)™, a new Unisys Stealth® software application that enables organizations to easily deploy enterprise-wide, micro-segmentation security across extended networks with the touch of a button.
Recent high-profile data breaches have further validated concerns about digital enterprises, while incidents of denial-of-service attacks, insider threats, ransomware, targeted espionage, and privacy breaches are expected to worsen in the coming years. Some 112 million health records were compromised in 2015 alone, with the top 10 data breaches accounting for 111 million of them. And data breaches cost the healthcare industry an estimated $6 billion.
At the same time, security teams are overstretched and under-resourced, struggling to detect and remediate risks effectively. Stealth(aware) offers the ability to install advanced security into any organization, making the most advanced protection through high-level cybersecurity more accessible to organizations of all sizes.
The Stealth(aware) system uses analytics to hasten deployment and visualization to make it work. The Unisys Stealth micro-segmentation product portfolio creates segments within an organization where only authorized users can access information, while others (from malware to insiders to hackers) cannot even see that those segments exist. This cuts response time to just a few minutes, helping to mitigate the impact of a breach and forestall major repercussions.
Stealth(aware) includes three main components:
- Auto-Discover — this feature automatically determines what endpoints, systems, and associated network data flows exist on the network.
- Auto-Configure — this capability uses the information obtained through Auto-Discover to generate security policies.
- Auto-Deploy — this feature applies Unisys Stealth micro-segmentation protection based on those security policies, applying the optimal levels of protection to high-risk, high-value network traffic.
“With the availability of Stealth(aware), Unisys is providing an opportunity for enterprises to obtain the benefits of some of the most advanced security techniques available,” said Doug Cahill, senior analyst, cybersecurity, Enterprise Strategy Group Inc.” As cyber threats become more sophisticated and damaging, advanced security tools will become essential to all public and private sector organizations, regardless of their size or resources.”