Tech 10 Security Products: Advanced Threat Protection

4. Stealth Cloaks Systems From Attackers

Unisys Stealth uses a data cloaking technique to mask endpoint systems and shield network traffic from external attackers. Unisys said its product is unique by creating segmented networks based on user identities and making endpoints appear dark on the network. Stealth software protects endpoint communication through an encrypted tunnel to a Stealth protected server.

Get a roundup of CRN's security coverage right to your inbox with the Security Advisor newsletter.