“...Unisys's offering is well aligned to the main tenets of Zero Trust, as it delves into the process of discovering, identifying, mapping, and cloaking those assets that shouldn't be visible or accessible to those who aren't at the need-to-know level…”
CHASE CUNNINGHAM, FORRESTER RESEARCH
The Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers
Q4 2019
“...Organizations looking to implement a zero trust (ZT) architecture in their environment should implement Software-Defined Perimeter and consider Unisys Stealth® as the technology to apply it. As a penetration tester, a Stealth-aware network would severely limit my ability to pivot within the network, footprint the network and reach high value targets, harvest credentials, and perform man-in-the-middle attacks…”
Black Core Rising: Micro-Segmentation in the Software-Defined Perimeter
November 2019
ALISSA KNIGHT, AITE