Unisys Stealth Solution for Networks Certified by NSA to Protect Classified Government Data

Unisys announced that the Unisys Stealth Solution for Networks achieved EAL-4+ certification from the National Security Agency (NSA) as a secure solution for protection of data-in-motion across any network – private or public. This qualifies Stealth to protect U.S. Defense Department data classified up to the "secret" level.

The patent-pending Unisys Stealth Solution uses advanced data encryption to secure data on shared networks. Using the Unisys Stealth Solution, organizations can create defined communities of interest within a shared network and segregate data access so that one group of users cannot see or access another's data.

"Stealth has been successfully tested by U.S. Joint Forces Command, and last year a pilot project was completed for U.S. Special Operations Command," said Ted Davies, president of Unisys Federal Systems. "These efforts, in addition to the recent certification, demonstrate the solid credentials of our Stealth solution."

"We recently completed our year-long evaluation of the Unisys Stealth Solution," said Vincent A. Murdock, Joint Intelligence Operations Center, Information Technology Directorate, U.S. Joint Forces Command. "After careful evaluation at our Joint Intelligence Laboratory (JIL) on our closed networks, we determined that the system was able to successfully transmit, receive and manage data up to Secret level of classification on a distributed network. The JIL, located in Suffolk, Va., is designed to test, evaluate and assess processes and technologies that can assist DOD programs to better gather, share and use intelligence data."

The EAL-4+ certification was awarded by the National Information Assurance Partnership (NIAP), a U.S. government initiative headed by the NSA to test and validate security products and solutions. NIAP uses the Common Criteria Evaluation and Validation Scheme to help government and industry organizations purchase security products and solutions that will best meet their requirements.

Unisys will work with Security First Corp., creator of the SecureParser cryptographic technology used in the Unisys Stealth solution, to apply the solution for meeting the most stringent security and data availability requirements of military organizations, government agencies and commercial enterprises. SecureParser cryptographically splits data (encrypts and "bit-splits" data, adds authentication and fault tolerant information) into multiple packets as it moves through the network and to storage devices, and then authenticates and reassembles the information packets for delivery exclusively to authorized users.

The Unisys Stealth Solution uses a Unisys-developed network virtualization technology and tunneling protocol that supports information sharing among different user communities, while permitting data to be accessed only by users authorized to see it.
"The NSA certification is a clear validation of the power of the Unisys Stealth Solution to secure sensitive data while enabling government agencies to simplify their networks and achieve significant cost savings by eliminating the need for separate dedicated secure networks within organizations," said Gene Zapfel, managing partner, portfolio solutions, Unisys Federal Systems. "This certification helps to give users even greater levels of assurance of the ability of the Unisys Stealth Solution to meet their security requirements."


Featured

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

  • Report: Cyber Attackers Continue to Turn to AI-Based Tools to Avoid Detection

    Comcast Business recently released its 2025 Cybersecurity Threat Report, a comprehensive analysis of 34.6 billion cybersecurity events detected between June 1,2024 and May 31, 2025. Now in its third year, the report offers business leaders a unique perspective into the evolving threat landscape and provides actionable insights to help organizations strengthen their defenses and align cybersecurity with business risk. Read Now

  • Axis Communications Creates AI-powered Video Surveillance Orchestra

    What if cameras could not only see the world, but interpret it—and respond like orchestra musicians reading sheet music: instantly, precisely, and in perfect harmony? That’s what global network technology leader Axis Communications set to find out. Read Now

  • Just as Expected

    GSX produced a wonderful tradeshow earlier this week. Monday was surprisingly strong in the morning, and the afternoon wasn’t bad at all. That’s Monday’s results and asking attendees to travel on Sunday. Just a quick hint, no one wants to give up their weekend to travel and set up an exhibit booth. I’m just saying. Read Now

    • Industry Events
    • GSX
  • NOLA: The Crescent City

    Twenty years later we finds ourselves in New Orleans. Twenty years ago the aftermath of Hurricane Katrina forced exhibitors and attendees to look elsewhere for tradeshow floor space. Read Now

    • Industry Events
    • GSX

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities