Forum latest

New 'Stealth' Technology Secures Data On Shared Networks
General
Written by Daniel   
Wednesday, 19 November 2008 10:58
Unisys combines encryption and bit-splitting to keep data all in the workgroup

Nov 18, 2008 | 05:11 PM
By Tim Wilson
DarkReading

The problem seems simple: How can data be transmitted over a large, shared network, yet restricted so that only a small group of individuals on the network can read it?

The possible answers, as most security professionals will tell you, are anything but simple.

Unisys today took a crack at this complex problem with the introduction of Stealth Solution for Network, a patented method of encrypting and "bit-splitting" data into smaller pieces while encrypting them again.

The idea behind Stealth is to allow organizations to restrict the exchange of sensitive data to a fixed group of individuals who have the keys to encrypt and decrypt it --without forcing them to use a discrete network. Stealth can be used on an enterprise network to prevent other groups in the organization from viewing data, or it can be used over virtual networks or the Internet to help protect sensitive data from being accessed by outsiders, Unisys says.

Stealth can also be used to keep users from straying outside their secure communities, Unisys states. By assigning a digital workgroup key to each community of interest, Stealth can ensure that users cannot access data outside of their assigned communities, the company says. "Stealth delivers the right information to the right people at the right time," says Ted Davies, president of Unisys Federal Systems. "Our government clients have been asking for a security solution like this for years. With Stealth, we can help them to simplify their networks without sacrificing security, while delivering significant cost savings."   [Dark Reading...]       [Comments...]
 

See also

None found.


Hardware | Windows | Linux | Security | Mobile Devices | Gaming
Tech Business | Editorial | General News | folding@home

Forum | Download Files

Copyright ©2001 - 2012, AOA Forums.  All rights reserved.

Alliance of Overclocking Arts

Links monetized by VigLink

Don't Click Here Don't Click Here Either