Unisys Stealth Solution for Networks Certified by NSA to Protect Classified Government Data

Unisys announced that the Unisys Stealth Solution for Networks achieved EAL-4+ certification from the National Security Agency (NSA) as a secure solution for protection of data-in-motion across any network – private or public. This qualifies Stealth to protect U.S. Defense Department data classified up to the "secret" level.

The patent-pending Unisys Stealth Solution uses advanced data encryption to secure data on shared networks. Using the Unisys Stealth Solution, organizations can create defined communities of interest within a shared network and segregate data access so that one group of users cannot see or access another's data.

"Stealth has been successfully tested by U.S. Joint Forces Command, and last year a pilot project was completed for U.S. Special Operations Command," said Ted Davies, president of Unisys Federal Systems. "These efforts, in addition to the recent certification, demonstrate the solid credentials of our Stealth solution."

"We recently completed our year-long evaluation of the Unisys Stealth Solution," said Vincent A. Murdock, Joint Intelligence Operations Center, Information Technology Directorate, U.S. Joint Forces Command. "After careful evaluation at our Joint Intelligence Laboratory (JIL) on our closed networks, we determined that the system was able to successfully transmit, receive and manage data up to Secret level of classification on a distributed network. The JIL, located in Suffolk, Va., is designed to test, evaluate and assess processes and technologies that can assist DOD programs to better gather, share and use intelligence data."

The EAL-4+ certification was awarded by the National Information Assurance Partnership (NIAP), a U.S. government initiative headed by the NSA to test and validate security products and solutions. NIAP uses the Common Criteria Evaluation and Validation Scheme to help government and industry organizations purchase security products and solutions that will best meet their requirements.

Unisys will work with Security First Corp., creator of the SecureParser cryptographic technology used in the Unisys Stealth solution, to apply the solution for meeting the most stringent security and data availability requirements of military organizations, government agencies and commercial enterprises. SecureParser cryptographically splits data (encrypts and "bit-splits" data, adds authentication and fault tolerant information) into multiple packets as it moves through the network and to storage devices, and then authenticates and reassembles the information packets for delivery exclusively to authorized users.

The Unisys Stealth Solution uses a Unisys-developed network virtualization technology and tunneling protocol that supports information sharing among different user communities, while permitting data to be accessed only by users authorized to see it.
"The NSA certification is a clear validation of the power of the Unisys Stealth Solution to secure sensitive data while enabling government agencies to simplify their networks and achieve significant cost savings by eliminating the need for separate dedicated secure networks within organizations," said Gene Zapfel, managing partner, portfolio solutions, Unisys Federal Systems. "This certification helps to give users even greater levels of assurance of the ability of the Unisys Stealth Solution to meet their security requirements."


Featured

  • Why Communication is Key in an Emergency

    During an emergency, communication with the outside world can be a critical component when it comes to response time and saving lives. Emergency communications typically consist of alerts and warnings; directives about evacuating the premises; information about response status, and other matters that can impact response and recovery. Read Now

  • Trust But Verify

    Today’s world is built on software—whether it is third-party applications, open-source libraries, in-house developed tools, operating systems, containers or firmware. Organizations worldwide depend on these diverse software components to power their operations, connect with customers, and drive innovation. However, this reliance on software comes with hidden dangers: the blind trust placed in these software products. Many companies assume that the software they purchase, and use is secure and free from vulnerabilities, but recent high-profile software supply chain breaches have proven otherwise. The reality is that every piece of software, no matter how reputable the source, increases the organization’s attack surface and poses new risks. Read Now

  • Impact on Digital Transformation

    A 2023 Statista report projects that by 2030 there will be 30 billion Internet of Things (IoT) devices in use. That is three times as many as there were in 2020. The numbers continue to grow because connecting sensors and systems, especially across a business, promises big efficiency gains and new insights. As such, the IoT and IIoT (Industrial Internet of Things) have become a launching pad for digital transformation -- not only for individual organizations but for entire industries. Read Now

  • Optimizing Security and Business Performance with Clarity and Control

    In recent years, the security sector has experienced a significant influx of innovative technologies that have fundamentally transformed how organizations design, implement, and oversee their security programs. The widespread adoption of cloud-based infrastructure, edge processing, and AI or machine learning (ML) driven analytics has brought about revolutionary changes in applications such as access control, video surveillance and emerging areas like threat detection and drone identification. Read Now

Featured Cybersecurity

Webinars

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3