Think You Have Total Cyber Protection?

Transcription

Think You Have Total Cyber Protection?
Think You Have Total Cyber Protection?
The Unisys Stealth™ award-winning premise is simple: identify critical
assets, build a compartmentalized security model based on need-toknow permissions, and cloak and isolate vulnerable systems.
HIGHLIGHTS
Solution Features:
ƒƒ Cloaks Endpoints
ƒƒ Mitigation and Quarantine using
Dynamic Granular Control™
ƒƒ Isolates Critical Assets
ƒƒ Protects Data in Motion
ƒƒ Powerful, Centralized Management
ƒƒ Detailed Reporting
ƒƒ In-Depth Application Awareness
ƒƒ Heuristic Malware Identification and
Detection
ƒƒ File Inspection and Flow Monitoring
ƒƒ No Disruption to Infrastructure
Now, complement your Stealth defense with rapidPHIRE™, an intuitive
cyber intelligence platform that allows for on-demand Stealth validation.
Verify the integrity and configuration of your Stealth enabled endpoints
and easily see which devices belong to which Communities of Interest.
Better yet, rapidPHIRE™ integrates seamlessly with Stealth - no changes
required.
rapidPHIRE™ combines network traffic inspection, endpoint monitoring,
machine learning, automated analytics, and Dynamic Granular Control™
into a single comprehensive cyber intelligence solution. Now, for the first
time, users have complete visibility into the Cyber Kill Chain®.
Ultimate Defense and Mitigation
Don’t fight yesterday’s battles. Instead of just detecting and reacting to
compromises and the latest Advanced Persistent Threats (APTs), Stealth
with rapidPHIRE™ prevents them from ever happening.
When dealing with the ever-present insider threat, quickly and easily
mitigate compromised endpoints by isolating them in a dedicated
Quarantine Community of Interest.
Use Cases
ƒƒ Tracking and remediating insider threats
ƒƒ Threat visualization and protection of Point-of-Sale and ATM systems
ƒƒ Cyber incident response and forensics
ƒƒ Data center segmentation
ƒƒ Accessing and protecting information over untrusted networks and
platforms
Stealth Deploym ent Configuration
LicenseOnlyCOI
ServiceCOI
wdafoe
ADCOI-AuthServ
Inadeau
ServiceAcctAuth
FinanceCOI
QuarantineCOI
bhope
bflae
AuthServer
FinanceRole
ServiceAcctlegal
Legal
ServiceAcctFinance
rmuise
Redraw
Finance
User with multiple COIs
samyotte
AD Group
Cleartext
cdodunski
wteeple
rlow
RnDRole
CTUser
RnD
AdminUser
PL
Stealth COI
AuthAdmin
AdminUser
Cleartext COI
Quarantine
LegalROle
CEO
rwilliams
CFO
User with single COI
Stealth Role
QuarantineRole
LegalCOI
CleartextRole
CleartextCOI
ServiceAcctRnD
AdminCOI
RnDCOI
thuang
CyRIN
Intelligence
Network Traffic
Inspection
1
Automated Incident
Response
Endpoint
Monitoring
User Behaviour
/Heuristics
3rd Party System
Event Monitoring
Security Operations
Centre
Correlate
Collect
Analyze
Critical Asset Monitoring
(e.g MS Sharepoint,
Exchange, SQL Server)
1
Real-time Application
Notification
Report
Data Export
Vizualization
Custom Stealth Interfaces
With custom views tailored to Stealth, rapidPHIRE™ provides
comprehensive visibility into how your Stealth network is
mapped and allows for immediate remediation and mitigation.
In one simple view, find out who is allowed to communicate,
what communications have been allowed, and what
communications have been denied.
ƒƒ The Stealth operational view provides comprehensive
awareness of your network
Continuous Monitoring
Endpoint Awareness
ƒƒ Traffic Analysis
ƒƒ File Analytics
ƒƒ Application Awareness
ƒƒ Geolocation
ƒƒ Multi-Platform
ƒƒ File Integrity
ƒƒ PCI Compliance
Critical Asset Security
Intelligence
ƒƒ Web Servers
ƒƒ In one screen, see what communications are permitted and
which attacks are being blocked by Stealth
ƒƒ The deployment view provides a more detailed view of your
Stealth installation
ƒƒ Mitigate end points quickly by placing them into quarantine
ƒƒ Database Servers
ƒƒ File Servers
Mobile Device Coverage
ƒƒ Supports Android
ƒƒ Application Connections
ƒƒ Threat Monitoring
ƒƒ 3rd party integration
For more information visit:
www.rapidphire.com
www.unisys.com/stealth
© 2015 Unisys Corporation. All rights reserved.
Unisys, Unisys Stealth and other Unisys products and services mentioned herein, as well as their
respective logos, are trademarks or registered trademarks of Unisys Corporation. rapidPHIRE and
Dynamic Granular Control are trademarks of Phirelight Security Solutions Inc. Cyber Kill Chain is a
registered trademark of Lockheed Martin Corporation.
Printed in the United States of America
03/15
15-0058