🗂️ Navigation

Unisys Stealth

Always-on security through microsegmentation.

Visit Website →

Overview

Unisys Stealth is a security software suite that uses identity-based microsegmentation to create secure Communities of Interest (COIs). It encrypts traffic between all members of a COI and cloaks endpoints, making them undetectable to unauthorized users. This approach reduces the attack surface and contains breaches by ensuring that users can only see and connect to the specific resources they are authorized to access.

✨ Key Features

  • Identity-driven microsegmentation
  • Dynamic isolation of endpoints and users
  • Endpoint cloaking
  • Always-on data encryption (IPsec)
  • Centralized policy management
  • Works across data center, cloud, and mobile

🎯 Key Differentiators

  • Strong focus on identity as the core of the security perimeter.
  • Endpoint cloaking makes assets invisible to attackers.
  • Dynamic isolation capabilities to quickly quarantine threats.

Unique Value: Creates invisible, software-defined perimeters based on user and device identity, effectively cloaking critical assets and stopping threats before they can spread.

🎯 Use Cases (5)

Protecting critical infrastructure and data. Securing hybrid cloud environments. Containing threats and preventing lateral movement. Enabling secure remote access. Meeting stringent compliance requirements.

✅ Best For

  • High-security microsegmentation for government and enterprise.

💡 Check With Vendor

Verify these considerations match your specific requirements:

  • Simple networks where identity-driven segmentation is overly complex.
  • Organizations looking for a lightweight, cloud-only ZTNA solution.

🏆 Alternatives

Illumio Akamai Guardicore AppGate SDP

Goes beyond simple access control by actively cloaking endpoints and using strong, identity-based cryptography to create secure enclaves, which can be a stronger security posture than some ZTNA solutions.

💻 Platforms

Windows Linux macOS iOS Android Cloud platforms

✅ Offline Mode Available

🔌 Integrations

Active Directory SIEM platforms Various identity providers

🛟 Support Options

  • ✓ Email Support
  • ✓ Phone Support
  • ✓ Dedicated Support (Managed Services tier)

🔒 Compliance & Security

✓ HIPAA ✓ BAA Available ✓ GDPR ✓ SSO ✓ FIPS 140-2 ✓ Common Criteria

💰 Pricing

Contact for pricing

✓ 14-day free trial

Visit Unisys Stealth Website →