3. Unisys STEALTH solution for data security
1. Introduction
The Unisys Stealth Solution is a transformational way to protect
your network data. It starts by using certified encryption, then bit-
splits data into multiple slices as it moves through the network.
But more than that, the Stealth Solution allows multiple
communities of interest to share the same network without fear of
another group accessing their data or even their workstations and
servers.
The result is a much simpler network infrastructure, increased
agility to react to new opportunities, and enhanced security of
your network data.
NSA Awards Unisys Stealth EAL-4
4. Unisys STEALTH solution for data security
1. Introduction
To deliver the right information to the right people at the right time,
defense agencies need to overcome the challenge of securing a
collaborative environment.
There are, however, inhibitors to achieving this vision. Many defense
agencies have specific regulations for multi-level security. They
have environments across the world where the networks are often
unpredictable and at times unreliable.
NSA Awards Unisys Stealth EAL-4
5. Unisys STEALTH solution for data security
1. Introduction
As a result, defense agencies are forced to field multiple independent
global and regional networks to provide services to individuals who
need access to controlled unclassified information (CUI), secret,
and top-secret data.
Access to more than one of these networks requires multiple LANs
and PCs for the user. Simultaneously, the demand is growing to
share information across these networks
NSA Awards Unisys Stealth EAL-4
6. Unisys STEALTH solution for data security
1. Introduction
Physical security, such as maintaining separate LANs, is one way
defense agencies are securing data. By keeping the data physically
separated, certain security objectives can be achieved, but at what
cost?
There are challenges related to duplication of infrastructure, higher
maintenance costs, and information sharing among communities of
interest, such as coalition partners
The Unisys Stealth Solution for Network is designed specifically to
overcome this challenge and targets the SBU and classified
domains
NSA Awards Unisys Stealth EAL-4
7. Unisys STEALTH solution for data security
2. Description
The Stealth Solution for Network is a transformational solution that
secures data-in-motion and controls the sharing of information within
or across networks by employing an innovative cloaking
technique – all while vastly simplifying the infrastructure.
The Stealth Solution assures security by cryptographically
transforming information using a bit-level, data-splitting
algorithm that weaves the data into the very fabric of the network.
NSA Awards Unisys Stealth EAL-4
8. Unisys STEALTH solution for data security
2. Description
The Stealth Solution for Network:
Protects the confidentiality, integrity, and availability of data-in-
motion and data-at-rest
Allows multiple communities of interest to share the same network
securely
Cloaks Stealth Solution-equipped devices from unauthorized eyes
NSA Awards Unisys Stealth EAL-4
9. Unisys STEALTH solution for data security
2. Description
For defense and agency networks: It protects the security and
integrity of data on a single network by preventing unauthorized
access
For coalition operations: It allows nations to selectively control
the sharing of information across a common coalition network or
between a coalition network and a national network
For privacy concern: It creates communities of interest that
control access to information based upon user roles and
responsibilities
NSA Awards Unisys Stealth EAL-4
10. Unisys STEALTH solution for data security
2. Description
For cross-domain information sharing: It permits data classified
at different levels to coexist on a single network, enabling the
consolidation of different networks into a single IT infrastructure. It
offers users access only to the information they are authorized.
Permitting the consolidation of NIPR, SIPR, and JWICS-
connected LANs into a single IT infrastructure
NSA Awards Unisys Stealth EAL-4
11. Unisys STEALTH solution for data security
2. Description
The Stealth Solution for Network employs a Unisys-developed
information management architecture that fundamentally alters the
approach to data protection by directing and controlling parsed
data “slices”
The solution consists of appliances (with in-built software) that
are deployed throughout the network at key locations. Software also
resides on workstations and servers in the network.
NSA Awards Unisys Stealth EAL-4
12. Unisys STEALTH solution for data security
2. Description - Typical Agency Multi-Layered Infrastructure
NSA Awards Unisys Stealth EAL-4
13. Unisys STEALTH solution for data security
2. Description - Unisys Stealth Solution Infrastructure
The Stealth Solution consolidates installation
networks into one infrastructure and offers a
single interface to the Global Information Grid
NSA Awards Unisys Stealth EAL-4
14. Unisys STEALTH solution for data security
2. Description
The Unisys Stealth Solution for Network:
- Splitting and encryption embedded in the Stealth Solution
- Stealth endpoint runs in every workstation, server, and gateway
- Splits IP packets and controls access to data
- User workgroup keys control packet splitting and access to servers
The result is a cloaked network that secures data-in-motion and
hides servers and PCs in plain sight
NSA Awards Unisys Stealth EAL-4
15. Unisys STEALTH solution for data security
2. Description
The Stealth Solution for SAN:
Unisys is the only solution that enables data classified at different
security levels to coexist on a single storage area network while
vastly improving availability of stored data.
Plus for SANs, it eliminates the need for complex and expensive
remote mirror data replication software.
NSA Awards Unisys Stealth EAL-4
16. Unisys STEALTH solution for data security
2. Description
The Stealth Solution for SAN:
Multiple communities of interest
(or domains) can safely share storage
NSA Awards Unisys Stealth EAL-4
17. Unisys STEALTH solution for data security
2. Description
The Stealth Solution for SAN:
Even when local storage disks are unavailable,
data can be read from other storage
devices, re-assembled, and decrypted
For unique “always-on” capabilities
NSA Awards Unisys Stealth EAL-4
18. Unisys STEALTH solution for data security
2. Description
The Stealth Solution for SAN:
Protects the confidentiality, integrity, and availability of data-at-rest
Allows multiple communities of interest to share the same storage
network securely
Provides “always-on” data availability
NSA Awards Unisys Stealth EAL-4
19. Unisys STEALTH solution for data security
2. Description
The Stealth Solution for SAN:
For defense and agency networks: It protects the security
and integrity of data on a single network or SAN by preventing
unauthorized access
For coalition operations: It allows nations to selectively
control the sharing of information across a common coalition
network or SAN or between a coalition infrastructure and a
national infrastructure
NSA Awards Unisys Stealth EAL-4
20. Unisys STEALTH solution for data security
2. Description
The Stealth Solution for SAN:
For privacy concerns: It creates communities of interest that
control access to information based upon user roles and
responsibilities
For cross-domain information sharing: It permits data
classified at different levels to coexist on a single network or
SAN, enabling the consolidation of different networks and SAN
into a single infrastructure. It offers users access only to the
information they are authorized
NSA Awards Unisys Stealth EAL-4
21. Unisys STEALTH solution for data security
3. Implementation
Unisys Corporation was tasked, to demonstrate and validate a
Cryptographic Bit Splitting Technology (CBST) solution
The goal was to determine possible benefits for :
Joint Improvised Explosive Device Defeat Organization (JIEDDO)
field operations
United States Joint Forces Command (USJFCOM)
Joint Transformation Center – Intelligence (JTC-I)
Joint Intelligence Laboratory (JIL) network convergence, and
other applications.
NSA Awards Unisys Stealth EAL-4
22. Unisys STEALTH solution for data security
3. Implementation – U.S. Special Operations Command
Unisys Corporation was tasked, under Defense Information Systems
Agency (DISA) Encore II to analyze the existing United States Special
Operations Command (USSOCOM) Tactical Local Area Network
(TACLAN) infrastructure, and subsequently develop and demonstrate a
prototype solution integrating Unisys Stealth Solution for Network and
Stealth Solution for Storage Area Network (SAN) into the TACLAN
Version 9.0 system. The customer for the project is the USSOCOM-
TACLAN Program Management Office (PMO).
The goal of the project is to provide a prototype that will enhance overall
TACLAN operability by allowing for a smaller footprint, distributed and
secure data storage, and easy integration into the current spiral
development track of the TACLAN program
NSA Awards Unisys Stealth EAL-4
24. Unisys STEALTH solution for data security
4. Certificate
Unisys Stealth Solution for Networks Certified by NSA to Protect Classified
Government Data
Patent-pending Unisys solution provides encrypted "virtual communities of interest"
to protect data across any public or private network
BLUE BELL, Pa., April 13, 2011 /PRNewswire/ -- Unisys today announced that the Unisys
Stealth Solution for Network achieved EAL-4+ certification from the National Security
Agency (NSA) as a secure solution for protection of data-in-motion across any network --
private or public. This qualifies Stealth to protect U.S. Defense Department data
classified up to the "secret" level.
NSA Awards Unisys Stealth EAL-4
25. Unisys STEALTH solution for data security
5. Conclusion
The Unisys Stealth Solution: Securing Networks and SANs
Splitting and encryption embedded in the Stealth Solution
Stealth management software controls access to data within a
community of interest
User workgroup keys control access to a specific community of
interest
The result is a cloaked network or SAN that secures data-in-
motion and data-at-rest and hides data in plain sight
NSA Awards Unisys Stealth EAL-4
26. Unisys STEALTH solution for data security
5. Conclusion
Revolutionary Security - With Stealth, you have a much simpler
and more cost-effective consolidated infrastructure, vastly
increased data availability for mission critical applications, and
enhanced security and privacy of your data
Unisys Stealth Solution - Secure Solutions for Defense
Agencies
The Stealth Solution enables you to get the right information to the
right people at the right time, SECURELY!
NSA Awards Unisys Stealth EAL-4