54.2 F
Washington D.C.
Thursday, April 25, 2024

NSA Certifies Unisys Cybersecurity Offering

Unisys Corporation has announced that Unisys Stealth® has been certified as among the products eligible for use by governments in more than 20 countries to protect their most sensitive systems and information.

Stealth was evaluated and accredited by the National Information Assurance Partnership (NIAP) as meeting internationally-accepted standards fortrusted security products and solutions.

NIAP certification, established by the US National Security Agency (NSA) and the US National Institute of Standards and Technology, is recognized by governments in countries such as Australia, Canada, Germany, India, Malaysia, New Zealand and the United Kingdom. Only the most secure products achieve this very exclusive designation.

Stealth also was concurrently approved by the NSA’s Commercial Solutions for Classified (CSfC) program, opening the door to US federal agencies to purchase Stealth within composite solutions that protect classified systems and data.

“These certifications make some of the most advanced security technology available not only to the US intelligence community and Department of Defense, but to civilian agencies and governments in many other countries as well,” said Tom Patterson, chief trust officer, Unisys. “Achieving NIAP certification provides independent validation of the objective assurance that we’re abiding by the stringent security requirements demanded by federal agencies and top enterprises.”

For a product to be NIAP-certified, it must undergo evaluation in the United States at an approved Common Criteria Testing Laboratory. Additionally, the CSfC program requires specific selected requirements to be included in the evaluation validating that the product complies with the applicable NIAP-approved protection profile.

With the CSfC approval, US federal agencies can use Stealth in layered solutions protecting classified data, according to a statement by the National Security Agency/Central Security Service’s Information Assurance Directorate.

Stealth uses identity-based microsegmentation techniques and encryption to create segments within an organization where only authorized users can access information, while those without authorization cannot even see that those endpoints exist.

Stealth cryptographically confines their access to a single segment of the network, with no ability to move laterally to other parts of the organization. This helps organizations mitigate attacks and hacker incidents by rendering devices, data and end users undetectable on networks.

author avatar
Homeland Security Today
The Government Technology & Services Coalition's Homeland Security Today (HSToday) is the premier news and information resource for the homeland security community, dedicated to elevating the discussions and insights that can support a safe and secure nation. A non-profit magazine and media platform, HSToday provides readers with the whole story, placing facts and comments in context to inform debate and drive realistic solutions to some of the nation’s most vexing security challenges.
Homeland Security Today
Homeland Security Todayhttp://www.hstoday.us
The Government Technology & Services Coalition's Homeland Security Today (HSToday) is the premier news and information resource for the homeland security community, dedicated to elevating the discussions and insights that can support a safe and secure nation. A non-profit magazine and media platform, HSToday provides readers with the whole story, placing facts and comments in context to inform debate and drive realistic solutions to some of the nation’s most vexing security challenges.

Related Articles

Latest Articles