Think You Have Total Cyber Protection? The Unisys Stealth™ award-winning premise is simple: identify critical assets, build a compartmentalized security model based on need-toknow permissions, and cloak and isolate vulnerable systems. HIGHLIGHTS Solution Features: Cloaks Endpoints Mitigation and Quarantine using Dynamic Granular Control™ Isolates Critical Assets Protects Data in Motion Powerful, Centralized Management Detailed Reporting In-Depth Application Awareness Heuristic Malware Identification and Detection File Inspection and Flow Monitoring No Disruption to Infrastructure Now, complement your Stealth defense with rapidPHIRE™, an intuitive cyber intelligence platform that allows for on-demand Stealth validation. Verify the integrity and configuration of your Stealth enabled endpoints and easily see which devices belong to which Communities of Interest. Better yet, rapidPHIRE™ integrates seamlessly with Stealth - no changes required. rapidPHIRE™ combines network traffic inspection, endpoint monitoring, machine learning, automated analytics, and Dynamic Granular Control™ into a single comprehensive cyber intelligence solution. Now, for the first time, users have complete visibility into the Cyber Kill Chain®. Ultimate Defense and Mitigation Don’t fight yesterday’s battles. Instead of just detecting and reacting to compromises and the latest Advanced Persistent Threats (APTs), Stealth with rapidPHIRE™ prevents them from ever happening. When dealing with the ever-present insider threat, quickly and easily mitigate compromised endpoints by isolating them in a dedicated Quarantine Community of Interest. Use Cases Tracking and remediating insider threats Threat visualization and protection of Point-of-Sale and ATM systems Cyber incident response and forensics Data center segmentation Accessing and protecting information over untrusted networks and platforms Stealth Deploym ent Configuration LicenseOnlyCOI ServiceCOI wdafoe ADCOI-AuthServ Inadeau ServiceAcctAuth FinanceCOI QuarantineCOI bhope bflae AuthServer FinanceRole ServiceAcctlegal Legal ServiceAcctFinance rmuise Redraw Finance User with multiple COIs samyotte AD Group Cleartext cdodunski wteeple rlow RnDRole CTUser RnD AdminUser PL Stealth COI AuthAdmin AdminUser Cleartext COI Quarantine LegalROle CEO rwilliams CFO User with single COI Stealth Role QuarantineRole LegalCOI CleartextRole CleartextCOI ServiceAcctRnD AdminCOI RnDCOI thuang CyRIN Intelligence Network Traffic Inspection 1 Automated Incident Response Endpoint Monitoring User Behaviour /Heuristics 3rd Party System Event Monitoring Security Operations Centre Correlate Collect Analyze Critical Asset Monitoring (e.g MS Sharepoint, Exchange, SQL Server) 1 Real-time Application Notification Report Data Export Vizualization Custom Stealth Interfaces With custom views tailored to Stealth, rapidPHIRE™ provides comprehensive visibility into how your Stealth network is mapped and allows for immediate remediation and mitigation. In one simple view, find out who is allowed to communicate, what communications have been allowed, and what communications have been denied. The Stealth operational view provides comprehensive awareness of your network Continuous Monitoring Endpoint Awareness Traffic Analysis File Analytics Application Awareness Geolocation Multi-Platform File Integrity PCI Compliance Critical Asset Security Intelligence Web Servers In one screen, see what communications are permitted and which attacks are being blocked by Stealth The deployment view provides a more detailed view of your Stealth installation Mitigate end points quickly by placing them into quarantine Database Servers File Servers Mobile Device Coverage Supports Android Application Connections Threat Monitoring 3rd party integration For more information visit: www.rapidphire.com www.unisys.com/stealth © 2015 Unisys Corporation. All rights reserved. Unisys, Unisys Stealth and other Unisys products and services mentioned herein, as well as their respective logos, are trademarks or registered trademarks of Unisys Corporation. rapidPHIRE and Dynamic Granular Control are trademarks of Phirelight Security Solutions Inc. Cyber Kill Chain is a registered trademark of Lockheed Martin Corporation. Printed in the United States of America 03/15 15-0058
© Copyright 2024