SlideShare a Scribd company logo
Unisys Stealth for Mobile

Secure Your Mobile Enterprise
Stronger Mobile Security Begins in the Data Center and
Secures the Entire Data Path

HIGHLIGHTS
ƒƒ Mobile security is more than the
device. Comprehensive mobile
security begins in the data center.
ƒƒ Go dark – conceal communication
endpoints. Make servers, devices
and other communication endpoints
undetectable.
ƒƒ BYOD with confidence. Mobile
access to enterprise data is based
on the user, not the device.
ƒƒ Secure remote access.
Teleworkers and partners can
access sensitive information from
mobile devices without fear of
compromise.

Mobile is the way business gets done. But in today’s increasingly connected
business environment, enterprises are more vulnerable than ever to compromising
sensitive corporate data and jeopardizing their business reputation. Unisys
Stealth™ for Mobile provides a comprehensive, innovative approach to mobile
security – one that begins in the data center and extends to mobile applications.
With Unisys Stealth for Mobile, security follows the user, not the device, so your
mission-critical data is protected from inside and outside your enterprise.

Today’s Mobile Security Makes Organizations Vulnerable
to Attack
Mobile security is a top concern for both enterprises and customers. The
proliferation of mobile devices is unstoppable. The chance of malware attack
is high. Gartner predicts that half of companies will require BYOD by 20171.
Already, 46% of organizations allowing BYOD have had a data breach attributed
to employee devices accessing the network2. Organizations have no option but
to adequately prepare for risks associated with employee-owned devices.
Today’s approach to mobile security just isn’t good enough. Most mobile
security approaches are restricted to protecting the device, offer inadequate
resistance to hackers and malware, and do not secure the entire data path
from the mobile device to the data center. How then can organizations better
secure their mobile environment to confidently secure access from employeeowned or third party mobile devices to the data center and enable BYOD?”

Secure the Entire Data Path
Adding layers of traditional security will do little to protect against increasingly
sophisticated mobile attacks. Protecting mission-critical data demands a new,
Previous | Next
innovative security approach that:

ƒƒ Secures the entire data path – from the mobile application
all the way to the data center
ƒƒ Conceals endpoints -- servers, devices, and other
communication endpoints -- from external and internal threats
ƒƒ Offers granular, customized security that follows the user,
not the device
Unisys Stealth for Mobile consists of three components and
supports iOS and Android-based mobile devices:

ƒƒ Stealth for Data Center Segmentation – darkens endpoints
and provides identity-based access through Stealth secure
Communities of Interest (COI)
ƒƒ Stealth for Mobile Software – Connects authenticated
mobile application users into the Stealth secure COI
ƒƒ 3rd Party Application Wrapping Software – Wraps security
policies around individual applications on a mobile device

(Click the Image to Enlarge)
mobile applications that are wrapped with fine-grained security
policies such as geo-fencing and location-masking, which only
allows application use within specified geographic boundaries.
Sensitive data – while at rest or in motion -- remains encrypted all
along the data path.
Unisys Stealth for Mobile enables organizations to:

ƒƒ Deploy secure mobile applications. Mobile applications,
such as those used for mobile banking or other apps used
for sensitive data transfer, can be secured and access
rights configured to a user irrespective of the device being
used – mobile device, laptop, or PC.
ƒƒ Implement BYOD remotely and locally. Applications on
tablets or phones can connect into the Stealth gateway to
help eliminate threats associated with BYOD.
ƒƒ Expand the client service portfolio. Organizations such
as telecommunications service providers can extend new
offerings such as security as a service.

You Can’t Hack What You Can’t See

(Click the Image to Enlarge)

Unisys Stealth for Mobile – From the Data Center
to the Mobile Application
Unisys Stealth for Mobile provides a more effective approach
to mobile security than today’s solutions. With Unisys
Stealth for Mobile, security starts in the data center where
advanced cloaking techniques make communication endpoints
undetectable to unauthorized users. Authorized users access
data through Unisys Stealth secure communities of interest from

1
2

Unisys Stealth strengthens enterprise-wide data protection by
making communication endpoints undetectable to unauthorized
users and securing data-in-motion across any network. Unisys
Stealth for Mobile extends this innovative data protection from
the data center to mobile applications and secures the entire
data path.
For more information, please contact:
Darren McGrath, Director, Mobility Solutions
darren.mcgrath@unisys.com
Rod Sapp, Vice President, Solution Management
rodney.sapp@unisys.com

www.unisys.com/stealth

Gartner report – “Bring Your Own Device: The Facts and the Future”
Decisive Analytics

© 2014 Unisys Corporation. All rights reserved.
Unisys, the Unisys logo, ClearPath, Unisys Stealth and Forward! by Unisys and the
Forward! by Unisys logo are registered trademarks or trademarks of Unisys Corporation.
All other brands and products referenced herein are acknowledged to be trademarks or
registered trademarks of their respective holders.
14-0050

Previous | Next

More Related Content

PPTX
Mobile device security
PDF
Ensuring Mobile Device Security
PPT
Mobile Device Security
PDF
2010: Mobile Security - Intense overview
PDF
BYOD / Mobile-Device Security Guidelines for CxO's
PPT
2010: Mobile Security - WHYMCA Developer Conference
PPTX
Mobile Security Research Projects Help
PPTX
Mobile security
Mobile device security
Ensuring Mobile Device Security
Mobile Device Security
2010: Mobile Security - Intense overview
BYOD / Mobile-Device Security Guidelines for CxO's
2010: Mobile Security - WHYMCA Developer Conference
Mobile Security Research Projects Help
Mobile security

What's hot (20)

PPTX
Mobile security
PDF
New trends in Payments Security: NFC & Mobile
PDF
Mobile Security for Smartphones and Tablets
PDF
Mobile security - Intense overview
PDF
Wireless Security on Context (disponible en español)
PDF
Mobile Device Management & Data Protection
PDF
Mobile Security 101
PDF
Mobile Security
PDF
2015 Mobile Security Trends: Are You Ready?
PDF
Symantec Mobile Security Whitepaper June 2011
PDF
Cyber Security Intelligence
PPTX
Mobile Security
PDF
Paper Florencio Cano - Patient data security in a wireless and mobile world
PPTX
Mobile security
PPTX
SC Magazine & ForeScout Survey Results
PPTX
Mobile security
PDF
Cyber Security
PPTX
Top 2016 Mobile Security Threats and your Employees
PPTX
Chris D'Aguanno
PPTX
Threats of Public Wi-Fi
Mobile security
New trends in Payments Security: NFC & Mobile
Mobile Security for Smartphones and Tablets
Mobile security - Intense overview
Wireless Security on Context (disponible en español)
Mobile Device Management & Data Protection
Mobile Security 101
Mobile Security
2015 Mobile Security Trends: Are You Ready?
Symantec Mobile Security Whitepaper June 2011
Cyber Security Intelligence
Mobile Security
Paper Florencio Cano - Patient data security in a wireless and mobile world
Mobile security
SC Magazine & ForeScout Survey Results
Mobile security
Cyber Security
Top 2016 Mobile Security Threats and your Employees
Chris D'Aguanno
Threats of Public Wi-Fi
Ad

Viewers also liked (14)

PPTX
Enterprise Mobile Security
PPTX
Peregrine Guard - An Enterprise Mobile Security Product by i7 Networks
PPTX
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
PDF
Securing the Enterprise Mobile Perimeter
PPTX
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
PDF
Enterprise Mobile Security for PeopleSoft
PPTX
MOBOCOP Enterprise Mobile Security
PPTX
Are We There Yet? The Path Towards Securing the Mobile Enterprise
PDF
Five Trends from Mobile World Congress 2015
PDF
Enterprise Mobile Security
PDF
Best practices for mobile enterprise security and the importance of endpoint ...
PDF
Session 4 Enterprise Mobile Security
PDF
CIS13: Don't Let Mobile be the Achilles Heel for Your Enterprise Security
PDF
The Future of Enterprise Mobility: Predictions for 2014
Enterprise Mobile Security
Peregrine Guard - An Enterprise Mobile Security Product by i7 Networks
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
Securing the Enterprise Mobile Perimeter
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
Enterprise Mobile Security for PeopleSoft
MOBOCOP Enterprise Mobile Security
Are We There Yet? The Path Towards Securing the Mobile Enterprise
Five Trends from Mobile World Congress 2015
Enterprise Mobile Security
Best practices for mobile enterprise security and the importance of endpoint ...
Session 4 Enterprise Mobile Security
CIS13: Don't Let Mobile be the Achilles Heel for Your Enterprise Security
The Future of Enterprise Mobility: Predictions for 2014
Ad

Similar to Secure Your Mobile Enterprise (20)

PDF
Top 10 Types of Cyber Security Explained.pdf
PPTX
Endpoint Security Solutions
PDF
Mobile Security Threats In Organisations: 4 Challenges To Navigate And Solve
DOC
report on Mobile security
PDF
10 Reasons to Strengthen Security with App & Desktop Virtualization
PDF
Moving Beyond MDM: Why Legacy Mobile Security Products Don't Work
PDF
Cyber security notes or Mca/bca about security
PDF
Lookout Mobile Endpoint Security Datasheet (US - v2.5)
PDF
IRJET- Android Device Attacks and Threats
PDF
Why Endpoint Security Is Critical in a Remote Work Era?
PDF
State ofmobilesecurity
PDF
880 st011
PDF
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
PDF
InstaSafe Zero Trust Access - Key Features and Benefits
PDF
Survey On Mobile User’s Data Privacy Threats And Defence Mechanism
PDF
Cn35499502
PDF
Protect Your Organization with Multi-Layered Approach to Anti-Phishing
PDF
Security in IoT Mobile Apps Safeguarding Your Devices and Da.pdf
PDF
4192 sslvpn sb_0412
PDF
What Is Cyber Security? | Cyberroot Risk Advisory
Top 10 Types of Cyber Security Explained.pdf
Endpoint Security Solutions
Mobile Security Threats In Organisations: 4 Challenges To Navigate And Solve
report on Mobile security
10 Reasons to Strengthen Security with App & Desktop Virtualization
Moving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Cyber security notes or Mca/bca about security
Lookout Mobile Endpoint Security Datasheet (US - v2.5)
IRJET- Android Device Attacks and Threats
Why Endpoint Security Is Critical in a Remote Work Era?
State ofmobilesecurity
880 st011
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
InstaSafe Zero Trust Access - Key Features and Benefits
Survey On Mobile User’s Data Privacy Threats And Defence Mechanism
Cn35499502
Protect Your Organization with Multi-Layered Approach to Anti-Phishing
Security in IoT Mobile Apps Safeguarding Your Devices and Da.pdf
4192 sslvpn sb_0412
What Is Cyber Security? | Cyberroot Risk Advisory

More from Unisys Corporation (20)

PDF
Elevate™ by Unisys
PDF
Unisys Integrated Medical Device Management - Executive Brief
PDF
Privacy and Security by Design
PDF
Digital Generation CPG (German)
PDF
Digital Generation CPG UK
PDF
SURVEY RESULTS: ACCELERATING INNOVATION AND THE DIGITAL JOURNEY - INFOGRAPHIC
PDF
Unisys Client 360
PDF
Stealth Secures Along Every Step of Your Journey Infographic
PDF
DAS DILEMMA MIT DER GENERATION „DIGITAL“
PDF
DIE NEUE DIGITALE INFRASTRUKTUR FÜR DIGITALE MITARBEITER DER NÄCHSTEN GENERAT...
PDF
STEHEN DIE ENDBENUTZER DER GENERATION „DIGITAL“FÜR DAS ENDE VON IT-TRANSPAREN...
PDF
DIE GENERATION DIGITAL UND DIE IT-LÜCKE IN UNTERNEHMEN.
PDF
Digital Gen: Hybrid IT Infographic
PDF
Digital Gen Infographic
PDF
Digital Gen: Security Infographic
PDF
Digital Gen: End User Services Infographic
PDF
​​Unisys Stealth(cloud)™ for Azure Infographic
PDF
Managed Security Services Infographic
PDF
Unisys Stealth Industries Infographic
PDF
Digital Generation Infographic
Elevate™ by Unisys
Unisys Integrated Medical Device Management - Executive Brief
Privacy and Security by Design
Digital Generation CPG (German)
Digital Generation CPG UK
SURVEY RESULTS: ACCELERATING INNOVATION AND THE DIGITAL JOURNEY - INFOGRAPHIC
Unisys Client 360
Stealth Secures Along Every Step of Your Journey Infographic
DAS DILEMMA MIT DER GENERATION „DIGITAL“
DIE NEUE DIGITALE INFRASTRUKTUR FÜR DIGITALE MITARBEITER DER NÄCHSTEN GENERAT...
STEHEN DIE ENDBENUTZER DER GENERATION „DIGITAL“FÜR DAS ENDE VON IT-TRANSPAREN...
DIE GENERATION DIGITAL UND DIE IT-LÜCKE IN UNTERNEHMEN.
Digital Gen: Hybrid IT Infographic
Digital Gen Infographic
Digital Gen: Security Infographic
Digital Gen: End User Services Infographic
​​Unisys Stealth(cloud)™ for Azure Infographic
Managed Security Services Infographic
Unisys Stealth Industries Infographic
Digital Generation Infographic

Recently uploaded (20)

PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Machine learning based COVID-19 study performance prediction
PDF
cuic standard and advanced reporting.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Approach and Philosophy of On baking technology
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Electronic commerce courselecture one. Pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Modernizing your data center with Dell and AMD
The Rise and Fall of 3GPP – Time for a Sabbatical?
“AI and Expert System Decision Support & Business Intelligence Systems”
Digital-Transformation-Roadmap-for-Companies.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Machine learning based COVID-19 study performance prediction
cuic standard and advanced reporting.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Chapter 3 Spatial Domain Image Processing.pdf
Approach and Philosophy of On baking technology
Mobile App Security Testing_ A Comprehensive Guide.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
NewMind AI Weekly Chronicles - August'25 Week I
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Electronic commerce courselecture one. Pdf
Review of recent advances in non-invasive hemoglobin estimation
NewMind AI Monthly Chronicles - July 2025
Modernizing your data center with Dell and AMD

Secure Your Mobile Enterprise

  • 1. Unisys Stealth for Mobile Secure Your Mobile Enterprise Stronger Mobile Security Begins in the Data Center and Secures the Entire Data Path HIGHLIGHTS ƒƒ Mobile security is more than the device. Comprehensive mobile security begins in the data center. ƒƒ Go dark – conceal communication endpoints. Make servers, devices and other communication endpoints undetectable. ƒƒ BYOD with confidence. Mobile access to enterprise data is based on the user, not the device. ƒƒ Secure remote access. Teleworkers and partners can access sensitive information from mobile devices without fear of compromise. Mobile is the way business gets done. But in today’s increasingly connected business environment, enterprises are more vulnerable than ever to compromising sensitive corporate data and jeopardizing their business reputation. Unisys Stealth™ for Mobile provides a comprehensive, innovative approach to mobile security – one that begins in the data center and extends to mobile applications. With Unisys Stealth for Mobile, security follows the user, not the device, so your mission-critical data is protected from inside and outside your enterprise. Today’s Mobile Security Makes Organizations Vulnerable to Attack Mobile security is a top concern for both enterprises and customers. The proliferation of mobile devices is unstoppable. The chance of malware attack is high. Gartner predicts that half of companies will require BYOD by 20171. Already, 46% of organizations allowing BYOD have had a data breach attributed to employee devices accessing the network2. Organizations have no option but to adequately prepare for risks associated with employee-owned devices. Today’s approach to mobile security just isn’t good enough. Most mobile security approaches are restricted to protecting the device, offer inadequate resistance to hackers and malware, and do not secure the entire data path from the mobile device to the data center. How then can organizations better secure their mobile environment to confidently secure access from employeeowned or third party mobile devices to the data center and enable BYOD?” Secure the Entire Data Path Adding layers of traditional security will do little to protect against increasingly sophisticated mobile attacks. Protecting mission-critical data demands a new, Previous | Next
  • 2. innovative security approach that: ƒƒ Secures the entire data path – from the mobile application all the way to the data center ƒƒ Conceals endpoints -- servers, devices, and other communication endpoints -- from external and internal threats ƒƒ Offers granular, customized security that follows the user, not the device Unisys Stealth for Mobile consists of three components and supports iOS and Android-based mobile devices: ƒƒ Stealth for Data Center Segmentation – darkens endpoints and provides identity-based access through Stealth secure Communities of Interest (COI) ƒƒ Stealth for Mobile Software – Connects authenticated mobile application users into the Stealth secure COI ƒƒ 3rd Party Application Wrapping Software – Wraps security policies around individual applications on a mobile device (Click the Image to Enlarge) mobile applications that are wrapped with fine-grained security policies such as geo-fencing and location-masking, which only allows application use within specified geographic boundaries. Sensitive data – while at rest or in motion -- remains encrypted all along the data path. Unisys Stealth for Mobile enables organizations to: ƒƒ Deploy secure mobile applications. Mobile applications, such as those used for mobile banking or other apps used for sensitive data transfer, can be secured and access rights configured to a user irrespective of the device being used – mobile device, laptop, or PC. ƒƒ Implement BYOD remotely and locally. Applications on tablets or phones can connect into the Stealth gateway to help eliminate threats associated with BYOD. ƒƒ Expand the client service portfolio. Organizations such as telecommunications service providers can extend new offerings such as security as a service. You Can’t Hack What You Can’t See (Click the Image to Enlarge) Unisys Stealth for Mobile – From the Data Center to the Mobile Application Unisys Stealth for Mobile provides a more effective approach to mobile security than today’s solutions. With Unisys Stealth for Mobile, security starts in the data center where advanced cloaking techniques make communication endpoints undetectable to unauthorized users. Authorized users access data through Unisys Stealth secure communities of interest from 1 2 Unisys Stealth strengthens enterprise-wide data protection by making communication endpoints undetectable to unauthorized users and securing data-in-motion across any network. Unisys Stealth for Mobile extends this innovative data protection from the data center to mobile applications and secures the entire data path. For more information, please contact: Darren McGrath, Director, Mobility Solutions darren.mcgrath@unisys.com Rod Sapp, Vice President, Solution Management rodney.sapp@unisys.com www.unisys.com/stealth Gartner report – “Bring Your Own Device: The Facts and the Future” Decisive Analytics © 2014 Unisys Corporation. All rights reserved. Unisys, the Unisys logo, ClearPath, Unisys Stealth and Forward! by Unisys and the Forward! by Unisys logo are registered trademarks or trademarks of Unisys Corporation. All other brands and products referenced herein are acknowledged to be trademarks or registered trademarks of their respective holders. 14-0050 Previous | Next