Unisys has announced the availability of the Unisys Stealth Solution for Secure Virtual Terminal (SSVT), a secure solution residing on a federal government-certified USB device to help ensure that a mobile user's data is secure and readily available to those authorized to view it. According to Unisys, SSVT combines the power of Unisys Stealth Solution for Network with a customized, dedicated and portable device that allows a remote user to boot up and establish a "clean and secure session" linking to an enterprise network. The Unisys solution creates virtual "communities of interest," groups that can share the same physical or virtual network without fear of another group accessing their data or workstations and servers.
The patent-pending Unisys Stealth Solution uses advanced cryptography to secure data on shared networks. By assigning a cryptographic key to each community of interest, Stealth can "go dark" on the network and secure the endpoint so it cannot be detected by anyone other than those authorized as part of a community of interest.
The Unisys SSVT allows mobile users to easily add and manage more secure end-points, isolating important sensitive data away from non-authorized users so that hackers are not able to access, manipulate or even see their information.
"The Unisys Stealth Solution for Virtual Terminal is an ideal solution for mobile workers of financial institutions that want to protect high-value clients or online banking activities," said Rod Sapp, vice president, data center transformation and outsourcing products and technology, Unisys, in a statement released by the company. "We also see opportunities for government or enterprise teleworkers as well as emergency first responders who need secure, portable and immediate access to agency servers. Or it can be used to protect the transmission of digital forensic evidence such as video or audio assets used during criminal trials."
SSVT contains the SecureParser technology created by Security First Corporation, which cryptographically splits data (encrypts and "bit-splits" data, adds authentication and fault tolerant information) into multiple packets as it moves through the network and to storage devices, and then authenticates and reassembles the information packets for delivery exclusively to authorized users.