Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Unisys Unveils Stealth for Government and Commercial Organizations

November 21, 2008

Zalud’s Blog just got off the phone with David Gardiner, spokesperson for Unisys in an exclusive briefing on the Unisys Stealth Solution for Network, a new information-sharing solution that can transform the way government agencies and companies secure the flow of sensitive information internally and across organizational lines.

Public and private sector organizations are under increasing pressure to give users and partners access to new types and sources of information to support rapid collaborative decision-making. However, the drive toward real-time information sharing is complicated by organizations’ need to ensure that data is secure, accessible only by authorized users; and always available only to the right people at the right time.

The Unisys Stealth Solution for Network addresses these challenges in a new and revolutionary way. The Stealth solution promotes secure information sharing strategies through the use of communities of interest to enable sharing of the same physical or virtual information network without fear of another group accessing their data or workstations and servers. By assigning a digital workgroup key to each community of interest, Stealth can ensure that users cannot access data outside of their assigned communities. The benefit is a much simpler network infrastructure, increased speed extending enterprise information to the edge and enhanced security of network data.

“Effective security and communications are inevitably linked in a post 9-11 world,” said David McClure, managing vice president, Gartner Government Research. “Rapid, flexible and secure collaboration is needed to meet the challenges of today’s national security environment. Information needs to flow in the right directions that empower diverse users and partner organizations to confidently share information without maintaining separate networks and infrastructure.”

In a survey this year of more than 100 Defense IT professionals, Unisys found that nearly 60% of respondents who said they have to share information across organizational and security domains confronted barriers to doing so. More than half said they are not comfortable having people of differing security levels on the same network.

To address this challenge, the Stealth solution employs patented technology from Unisys and Security First Corp., Unisys partner on the Stealth program. Stealth encrypts data, “bit-splits” that data into multiple packets as it moves through the network, and then reassembles the information packets for delivery to authorized users. These packets are proven secure through the use of certified encryption and unique bit-level splitting of the encrypted data.

Unisys will first target the Stealth solution to the U.S. federal government market to address the increasing needs of federal agencies to cope with controlled information – information that is not secret but also not accessible to the general public. The U.S. federal government employed more than 4 million users of this sensitive information in 2007, a number expected to grow as other state, local and international governments continue to deploy homeland security initiatives.

“Stealth delivers the right information to the right people at the right time,” said Ted Davies, president of Unisys Federal Systems. “Our government clients have been asking for a security solution like this for years. With Stealth, we can help them to simplify their networks without sacrificing security, while delivering significant cost savings.”

Unisys also expects its Stealth solution to generate interest beyond the federal government, especially in homeland security projects in state and local governments, and in the financial and healthcare communities where data security is especially critical. The Unisys Security Index, also released today, shows that most U.S. consumers (62 percent) continue to be extremely or very concerned about misuse of their personal data. At the same time, the research shows much lower concerns for Internet commerce such as online banking or shopping indicating opportunities for government and business to encourage e-commerce if trusted networks exist.

The Stealth solution has been under development and extensive testing for over four years, including vetting by government information assurance experts and internationally known cryptology experts. For example, in June Unisys successfully completed a live demonstration of the Stealth Solution for Network at the Coalition Warrior Interoperability Demonstration 2008, a Joint Chiefs of Staff-directed annual event demonstrating cutting-edge information technology that is ready for deployment. For this demonstration, Stealth was installed on a live government sensitive network.

Using SecureParser from Security First, Stealth encrypts information in compliance with the government’s FIPS 140-2 standard. The solution is also under evaluation for Common Criteria certification for use in classified environments. 

Stealth is available now. In addition to the Unisys Stealth Solution for Network, Unisys also is developing the Unisys Stealth Solution for SAN (Storage Area Network), which will extend the benefits of increased security, agility, and cost reduction opportunities to the SAN environment.

Share This Story

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing