fitgap

Unisys Stealth(core)

Features
Ease of use
Ease of management
Quality of support
Affordability
Market presence
Take the quiz to check if Unisys Stealth(core) and its alternatives fit your requirements.
Pricing from
Contact the product provider
Free Trial unavailable
Free version unavailable
User corporate size
Small
Medium
Large
User industry
  1. Public sector and nonprofit organizations
  2. Healthcare and life sciences
  3. Information technology and software

What is Unisys Stealth(core)

Unisys Stealth(core) is a network security product focused on microsegmentation and identity-based controls to reduce lateral movement across enterprise environments. It is used by security and infrastructure teams to isolate workloads, endpoints, and users across on-premises and cloud networks without relying solely on traditional network perimeter boundaries. The product emphasizes logical segmentation and encrypted communications between protected endpoints, with policy enforcement based on identity and context. It is commonly positioned as part of a broader zero trust architecture program.

pros

Identity-based segmentation controls

Stealth(core) centers segmentation policies on identity and trust relationships rather than only IP addresses and VLAN boundaries. This approach can better accommodate dynamic environments where workloads move and addresses change. It also supports use cases where segmentation must follow users/devices across different network zones. For organizations pursuing zero trust, this aligns policy with authenticated entities and least-privilege access.

Reduces lateral movement paths

Microsegmentation limits east-west connectivity so compromised endpoints have fewer reachable targets. This is particularly relevant for data center and hybrid environments where flat networks increase blast radius. By enforcing allow-listed communications between protected assets, teams can narrow permitted flows to what applications require. This complements perimeter controls that primarily focus on north-south traffic.

Fits zero trust programs

The product maps to zero trust networking patterns by emphasizing explicit trust decisions and segmented access. It can be deployed as a control layer to support compliance-driven isolation requirements for sensitive systems. Security teams can use it to implement segmentation milestones without redesigning the entire network fabric. This makes it suitable for phased adoption alongside existing security tooling.

cons

Deployment and policy complexity

Microsegmentation programs typically require discovery, dependency mapping, and iterative policy tuning to avoid disrupting applications. Organizations may need significant coordination between security, network, and application owners to define and validate allowed flows. Initial rollout can be slower in environments with undocumented application dependencies. Ongoing change management is required as applications evolve.

Endpoint coverage requirements

Segmentation enforcement generally depends on deploying and maintaining software components on endpoints/workloads or integrating tightly with the environment. Assets that cannot run required components (legacy systems, certain appliances, unmanaged devices) may need alternative controls. Mixed coverage can create enforcement gaps that must be addressed with compensating network controls. This can increase operational overhead in heterogeneous estates.

Ecosystem depth varies by need

Compared with some platforms in this space, organizations may find differences in breadth of integrations, visualization, and automated policy workflows depending on their tooling stack. If teams require extensive third-party integrations, advanced dependency analytics, or highly automated policy orchestration, they should validate capabilities against their requirements. Fit with cloud-native constructs and multi-cloud operations should be confirmed during evaluation. These factors can affect time-to-value and day-2 operations.

Seller details

Unisys Corporation
Blue Bell, Pennsylvania, USA
1986
Public
https://www.unisys.com/
https://x.com/Unisys
https://www.linkedin.com/company/unisys/

Tools by Unisys Corporation

Unisys Digital Workplace Solutions
Unisys Data Transformation
Unisys Stealth(core)
Unisys Attack Surface Discovery
Unisys ClearPath AIS
Unisys ClearPath MCP
Unisys ClearPath OS 2200
Unisys ClearPath Visual IDE
Unisys Data Center Management
Unisys Data Exchange
Unisys Device Subscription Service (DSS)
Unisys Experience-as-a-Service (XaaS)
Unisys Next-Gen Service Desk
Unisys Stealth(identity)
Unisys Sustainable Workplace
Unisys Unified Endpoint Management
Unisys Workplace-as-s-Service

Popular categories

All categories