Unisys: How Secure is Your Data?

Dec 15, 2010

In today’s electronic world, criminals routinely use sophisticated means to steal personal identity data from both public and private organizations. As the stability of identification credentials is breached, one response is to turn to the collection of biometrics. Biometric identity solutions are emerging on a global scale as nations and industry recognize the integral role it will play in non-transferable, unique identification. However, as Canada’s Privacy Commissioner notes, many organizations, ”fail to adequately protect this sensitive information – leaving it vulnerable to hackers and identity thieves.”

One vulnerability occurs because current security practices often focus on collection and storage of the data, but ignore the risk incurred by the transmission of this data across network lines and geographical borders. As David Gardiner, Unisys expert in network security states, “one of the best defenses against an enemy, like a hacker, is to be undetected on the network.”

Government departments who collect and transmit personal identification data must protect privacy by assuming the responsibility of being stewards of that data throughout its life and use and ensure it can’t be breached either at rest or in motion, even when crossing department, geography, or network boundaries. Stewardship requires acknowledgement of all risk types and opportunities – from policies against carelessness, to technical solutions preventing access or manipulation.

Securing network equipment is a costly but necessary investment. First of all, maintenance is expensive and, as an additional complication, government enterprises often need to place data collection and supporting network devices in difficult-to-access remote locations as well as in mobile collection points such as airplanes, ships or vehicles – anywhere laptops are used.

Working with requirements from the U.S. Department of Defense to create a solution to maintain the secure separation of different classifications of data coexisting on a single network or shared storage, Unisys Corporation pioneered a ground-breaking solution that provides end-to-end military-grade data protection.

The Unisys Stealth Solution for Networks is a transformational solution that secures data-in-motion and controls the sharing of information within or across networks by employing an innovative cloaking technique. The cloaking technique provides unsurpassed security by making the end point devices invisible. “If you can’t be seen on a network, you can’t be attacked,” explains Gardiner. “Stealth provides government and commercial users with defense-grade protection of data that gives them confidence in their stewardship of sensitive information.”

Unlike virtual private network (VPN) options, Unisys makes communication from Stealth-enabled endpoints undetectable. Stealth is neither policy- nor device-based; it manages communications to multiple endpoints based on user authentication, regardless of device used.

Unisys Stealth Solution for Networks is deployed on existing communication networks, using the infrastructure investments already in place. It provides cost reduction through consolidation and cost avoidance in its ability to reuse network equipment, to limit environmental impact, and to reduce administration overhead. The solution also provides public service with forward-looking agility – not only in deployment but also in use.

With access dependent on login credentials, the user can be physically located just about anywhere. Any updates or changes to credentials can be centrally administered. Role changes (access rights) are easy to accomplish by the site’s identity management administrator, but each user’s credentials are securely wrapped with user-specific certificates.

Unisys Stealth Solution for Networks assures security by cryptographically transforming information using a bit-level, data-splitting algorithm that weaves the data into the very fabric of the network. The Stealth Solution cryptographic module is FIPS 140-2 certified through the use of SecureParser by Security First Corp and is “under evaluation” for Common Criteria EAL4, enabling Unisys Stealth to operate at classified levels within the military space and providing military-grade protection against attacks on data in motion as well as at rest.

Unisys Stealth Solution for Networks allows users in different agencies and orga­nizations to work securely on the same network, resulting in a cloaked network that secures data-in-motion and hides servers and PCs in plain sight. Unisys Stealth provides an economically viable, environmentally responsible option for government agencies who must now be stewards of the personal identification information they collect and transmit to protect and manage their citizens’ needs.

To discuss how Unisys Stealth Solution for Networks, Stealth Solution for Storage or Stealth Solution for Secure Virtual Terminal could secure your business transactions and data, please contact UNISYS CANADA: 613-940-4523.
© FrontLine Security 2010