Unisys has made a major play for the enterprise mobile security market with the release of Stealth in Sydney.
Unisys Stealth for mobile is the latest member of a growing family of Stealth cybersecurity products which uses advanced data cloaking and encryption techniques to help organisations mitigate cybersecurity attacks by making devices, data and end users virtually invisible on the network.
The solution creates secure user communities within an enterprise where only authorised users can access or see information.
Unisys vice-president, Rod Sapp, said it allowed enterprises to capitalise on the productivity gains and customer service improvement associated with mobility and consumerisation of IT, while increasing assurance that their critical data remains safe.
"Unlike other security solutions such as virtual private networks, cryptographically protects data all the way to the application - a much more secure approach for BYOD environments."
The new solution combines Unisys Stealth technology with application wrapping security software that allows users to define specific security policies on a per-mobile application basis.
Unisys Stealth for Mobile then adds a layer of identity-based security that gives users access and visibility rights to only the assets within the data centre they are entitled to access and see.
It requires no new code or application changes and is transparent to end users, who will have the same access rights no matter which device they use to access the data centre.
Unisys has entered into a worldwide reseller agreement to offer Mocana MAP, a leading application in connection with Stealth for Mobile.
APAC cybersecurity program manager, Paul Head-McNeil, said the strategy was based on embracing existing technology.
"The fundamental part is we are not trying to change people's investments in the mobile infrastructure side," he said.
"We want to extend the capability into the datacentre and provide security.
"We do this with the stealth for mobile software which provides a brokerage between the data centre and the device."
Sign up for Computerworld eNewsletters.