SlideShare una empresa de Scribd logo
1 de 2
Descargar para leer sin conexión
XP in Quarantine
Isolate and Protect Your Mission Critical Systems

Isolate XP with Unisys Stealth
Support for Windows XP ends April 8, 2014. Some
organizations cannot migrate. Mission critical systems
such as process control, point of sale, ATMs, Electronic
Health Records, and other critical environments are
vulnerable to security compromise.

any other network locations, particularly the Internet, or
can be allowed access to specific resources, such as the
enterprise’s core IT services.
Authenticated network users, if not authorized into the
appropriate COI, would not be able to detect or access the
set(s) of XP endpoints, regardless of network topology.

Unisys StealthTM is innovative software-based security that
makes endpoints virtually invisible on a network to users
or systems not explicitly authorized into the same secure
community group, called a Community of Interest (COI).

With Stealth, cyber attackers and malware cannot interact
with the XP workstations in any way. These XP workstations
can be cordoned off from the enterprise and external
network without requiring any physical network changes.

Stealth-protected endpoints running Windows XP are
designed to be undetectable, visible only to the specific
users that require access. The endpoints continue to
execute the same applications and control the same
instrumentation or other downstream devices with no
network reconfiguration and no creation of “air-gap” network
segments. The endpoints can be prevented from reaching

Value of Stealth Isolation and Protection
Isolating XP systems from the remainder of the network
greatly reduces the attack surface for the entire enterprise.
XP systems are predicted to be under heavy cyber scanning
when security patches terminate. Removing these systems
from hacker visibility will drive hackers to move to easier
You Can’t Hack What You Can’t See

targets. Additionally, if an XP endpoint is compromised, the
breach would be limited to only those systems in the same
COI, similar to quarantine. The remaining enterprise network
is not impacted.

Unisys Stealth is innovative software-based security
technology that is designed to:
•	 Segregate assets running unsupported Windows OS’s
from the rest of the network

A Few Use Cases
Unisys Stealth isolates mission critical systems to foster
secure, continuous operations.

•	 Mitigate risk associated with connectivity to the enterprise
network when no longer receiving security updates for
legacy OS’s

•	 Automation and Process Control Systems - Systems that
monitor and control industrial and critical infrastructure
processes including manufacturing, power generation
and transmission, chemical processing, and water
treatment are under strict regulation for security,
compliance and availability. For stability reasons and
because instrumentation devices downstream of the
control systems may not have upgrade capability, these
environments are not candidates for timely OS upgrades.

•	 Darken the segregated systems from would-be attackers
so they are not discoverable via typical network scanning
techniques	
•	 Allow access to core IT services if required, while 	
restricting access to the Internet

Contact

•	 Point of Sale or Payment Card Systems - Merchants
utilizing Point of Sale or other payment card systems
running Windows XP will be challenged to remain
compliant with the Payment Card Industry Data Security
Standard (PCI DSS) which states merchants must
ensure that all system components and software are
protected from known vulnerabilities by having the latest
vendor-supplied security patches installed. With Windows
vendor supplied patches terminating for XP, Unisys
Stealth can be used to cloak Point of Sale devices and
PCI processing systems to facilitate compliance.

stealth@unisys.com

•	 Automated Teller Machines - ATMs running unsupported
XP may become non-compliant with PCI requirements.
•	 Electronic Health Records - Electronic Health Record
and HIPAA regulations require specific protections to
ensure the security and confidentiality of electronic health
information and mandate that action be taken to properly
safeguard this data. Unisys Stealth proactively controls
access to servers and applications based on COI keys.

For more information visit www.unisys.com/stealthxp
© 2014 Unisys Corporation. All rights reserved.
Unisys, the Unisys logo, ClearPath and Unisys Stealth are registered trademarks or trademarks of Unisys Corporation.
All other brands and products referenced herein are acknowledged to be trademarks or registered trademarks of their respective holders.
Printed in the United States of America 	

01/14	

14-0013-B

Más contenido relacionado

La actualidad más candente

IT Network Security Policy
IT Network Security PolicyIT Network Security Policy
IT Network Security Policyssuser06c4a6
 
LTS Secure SIEM Features
LTS Secure SIEM Features LTS Secure SIEM Features
LTS Secure SIEM Features rver21
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 pptvasanthimuniasamy
 
Ghassan farra it security a cio perspective
Ghassan farra   it security a cio perspectiveGhassan farra   it security a cio perspective
Ghassan farra it security a cio perspectivenooralmousa
 
Ch14-Software Engineering 9
Ch14-Software Engineering 9Ch14-Software Engineering 9
Ch14-Software Engineering 9Ian Sommerville
 
Information security management best practice
Information security management best practiceInformation security management best practice
Information security management best practiceparves kamal
 
Ch02 mis-ctrl-appl
Ch02 mis-ctrl-applCh02 mis-ctrl-appl
Ch02 mis-ctrl-applSR NAIDU
 
Basics of Information System Security
Basics of Information System SecurityBasics of Information System Security
Basics of Information System Securitychauhankapil
 
Information Assurance And Security - Chapter 2 - Lesson 1
Information Assurance And Security - Chapter 2 - Lesson 1Information Assurance And Security - Chapter 2 - Lesson 1
Information Assurance And Security - Chapter 2 - Lesson 1MLG College of Learning, Inc
 
Coping issues with data security
Coping issues with data securityCoping issues with data security
Coping issues with data securityEffOne_Technologies
 
Structure of iso 27001
Structure of iso 27001Structure of iso 27001
Structure of iso 27001CUNIX INDIA
 
Information Security Management 101
Information Security Management 101Information Security Management 101
Information Security Management 101Jerod Brennen
 
Policy and procedure of hospitals
Policy and procedure of hospitalsPolicy and procedure of hospitals
Policy and procedure of hospitalsMohammed Alabdali
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to securityMukesh Chinta
 
security and system mainatance
security and system mainatancesecurity and system mainatance
security and system mainatanceKudzi Chikwatu
 
Data/File Security & Control
Data/File Security & ControlData/File Security & Control
Data/File Security & ControlAdetula Bunmi
 

La actualidad más candente (20)

What every executive needs to know about information technology security
What every executive needs to know about information technology securityWhat every executive needs to know about information technology security
What every executive needs to know about information technology security
 
IT Network Security Policy
IT Network Security PolicyIT Network Security Policy
IT Network Security Policy
 
LTS Secure SIEM Features
LTS Secure SIEM Features LTS Secure SIEM Features
LTS Secure SIEM Features
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
 
Ghassan farra it security a cio perspective
Ghassan farra   it security a cio perspectiveGhassan farra   it security a cio perspective
Ghassan farra it security a cio perspective
 
Ch14-Software Engineering 9
Ch14-Software Engineering 9Ch14-Software Engineering 9
Ch14-Software Engineering 9
 
Information security management best practice
Information security management best practiceInformation security management best practice
Information security management best practice
 
Ch02 mis-ctrl-appl
Ch02 mis-ctrl-applCh02 mis-ctrl-appl
Ch02 mis-ctrl-appl
 
Basics of Information System Security
Basics of Information System SecurityBasics of Information System Security
Basics of Information System Security
 
Information Assurance And Security - Chapter 2 - Lesson 1
Information Assurance And Security - Chapter 2 - Lesson 1Information Assurance And Security - Chapter 2 - Lesson 1
Information Assurance And Security - Chapter 2 - Lesson 1
 
Coping issues with data security
Coping issues with data securityCoping issues with data security
Coping issues with data security
 
Structure of iso 27001
Structure of iso 27001Structure of iso 27001
Structure of iso 27001
 
Information Security Management 101
Information Security Management 101Information Security Management 101
Information Security Management 101
 
Policy and procedure of hospitals
Policy and procedure of hospitalsPolicy and procedure of hospitals
Policy and procedure of hospitals
 
Apani Ov V9
Apani Ov V9Apani Ov V9
Apani Ov V9
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
security and system mainatance
security and system mainatancesecurity and system mainatance
security and system mainatance
 
Renovo CE IT Overview
Renovo CE IT OverviewRenovo CE IT Overview
Renovo CE IT Overview
 
Data/File Security & Control
Data/File Security & ControlData/File Security & Control
Data/File Security & Control
 
System security
System securitySystem security
System security
 

Destacado

Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...Unisys Corporation
 
Unisys Stealth Industries Infographic
Unisys Stealth Industries InfographicUnisys Stealth Industries Infographic
Unisys Stealth Industries InfographicUnisys Corporation
 
Stealth Secures Along Every Step of Your Journey Infographic
Stealth Secures Along Every Step of Your Journey InfographicStealth Secures Along Every Step of Your Journey Infographic
Stealth Secures Along Every Step of Your Journey InfographicUnisys Corporation
 
Digital Generation CPG (German)
Digital Generation CPG (German)Digital Generation CPG (German)
Digital Generation CPG (German)Unisys Corporation
 
Managed Security Services Infographic
Managed Security Services InfographicManaged Security Services Infographic
Managed Security Services InfographicUnisys Corporation
 
SURVEY RESULTS: ACCELERATING INNOVATION AND THE DIGITAL JOURNEY - INFOGRAPHIC
SURVEY RESULTS: ACCELERATING INNOVATION AND THE DIGITAL JOURNEY - INFOGRAPHICSURVEY RESULTS: ACCELERATING INNOVATION AND THE DIGITAL JOURNEY - INFOGRAPHIC
SURVEY RESULTS: ACCELERATING INNOVATION AND THE DIGITAL JOURNEY - INFOGRAPHICUnisys Corporation
 

Destacado (8)

Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
 
Secure Your Mobile Enterprise
Secure Your Mobile EnterpriseSecure Your Mobile Enterprise
Secure Your Mobile Enterprise
 
Unisys Client 360
Unisys Client 360Unisys Client 360
Unisys Client 360
 
Unisys Stealth Industries Infographic
Unisys Stealth Industries InfographicUnisys Stealth Industries Infographic
Unisys Stealth Industries Infographic
 
Stealth Secures Along Every Step of Your Journey Infographic
Stealth Secures Along Every Step of Your Journey InfographicStealth Secures Along Every Step of Your Journey Infographic
Stealth Secures Along Every Step of Your Journey Infographic
 
Digital Generation CPG (German)
Digital Generation CPG (German)Digital Generation CPG (German)
Digital Generation CPG (German)
 
Managed Security Services Infographic
Managed Security Services InfographicManaged Security Services Infographic
Managed Security Services Infographic
 
SURVEY RESULTS: ACCELERATING INNOVATION AND THE DIGITAL JOURNEY - INFOGRAPHIC
SURVEY RESULTS: ACCELERATING INNOVATION AND THE DIGITAL JOURNEY - INFOGRAPHICSURVEY RESULTS: ACCELERATING INNOVATION AND THE DIGITAL JOURNEY - INFOGRAPHIC
SURVEY RESULTS: ACCELERATING INNOVATION AND THE DIGITAL JOURNEY - INFOGRAPHIC
 

Similar a XP in Quarantine - Isolate and Protect Your Mission Critical Systems

ZERO DAY PLUS presentation
ZERO DAY PLUS presentationZERO DAY PLUS presentation
ZERO DAY PLUS presentationAlexander Rogan
 
Simplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USMSimplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USMAlienVault
 
Genesys-2-Brochure-Web
Genesys-2-Brochure-WebGenesys-2-Brochure-Web
Genesys-2-Brochure-WebGiovanni Maree
 
PCI Compliance white paper
PCI Compliance white paper PCI Compliance white paper
PCI Compliance white paper HelpSystems
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxMohammad512578
 
IBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter MostIBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter MostPrecisely
 
Securing Industrial Control System
Securing Industrial Control SystemSecuring Industrial Control System
Securing Industrial Control SystemHemanth M
 
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSesTECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSesSymantec
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
Introduction to Embedded System Architecture and Design.docx.pdf
Introduction to Embedded System Architecture and Design.docx.pdfIntroduction to Embedded System Architecture and Design.docx.pdf
Introduction to Embedded System Architecture and Design.docx.pdfArshak28
 
Operational Technology Security Solution for Utilities
Operational Technology Security Solution for UtilitiesOperational Technology Security Solution for Utilities
Operational Technology Security Solution for UtilitiesKrishna Chennareddy
 

Similar a XP in Quarantine - Isolate and Protect Your Mission Critical Systems (20)

OwnYIT CSAT + SIEM
OwnYIT CSAT + SIEMOwnYIT CSAT + SIEM
OwnYIT CSAT + SIEM
 
AXENT-Everything-IDS
AXENT-Everything-IDSAXENT-Everything-IDS
AXENT-Everything-IDS
 
ZERO DAY PLUS presentation
ZERO DAY PLUS presentationZERO DAY PLUS presentation
ZERO DAY PLUS presentation
 
Aensis idps 1000 v ext_eng
Aensis idps 1000  v ext_engAensis idps 1000  v ext_eng
Aensis idps 1000 v ext_eng
 
Simplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USMSimplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USM
 
Genesys-2-Brochure-Web
Genesys-2-Brochure-WebGenesys-2-Brochure-Web
Genesys-2-Brochure-Web
 
PCI Compliance white paper
PCI Compliance white paper PCI Compliance white paper
PCI Compliance white paper
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
Ecommerce Security
Ecommerce SecurityEcommerce Security
Ecommerce Security
 
IBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter MostIBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter Most
 
Securing Industrial Control System
Securing Industrial Control SystemSecuring Industrial Control System
Securing Industrial Control System
 
Core Trace PCI DSS Compliance
Core Trace PCI DSS ComplianceCore Trace PCI DSS Compliance
Core Trace PCI DSS Compliance
 
Security and Control.ppt
Security and Control.pptSecurity and Control.ppt
Security and Control.ppt
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Linux Security best Practices with Fedora
Linux Security best Practices with FedoraLinux Security best Practices with Fedora
Linux Security best Practices with Fedora
 
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSesTECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
386sum08ch8
386sum08ch8386sum08ch8
386sum08ch8
 
Introduction to Embedded System Architecture and Design.docx.pdf
Introduction to Embedded System Architecture and Design.docx.pdfIntroduction to Embedded System Architecture and Design.docx.pdf
Introduction to Embedded System Architecture and Design.docx.pdf
 
Operational Technology Security Solution for Utilities
Operational Technology Security Solution for UtilitiesOperational Technology Security Solution for Utilities
Operational Technology Security Solution for Utilities
 

Más de Unisys Corporation

Unisys Integrated Medical Device Management - Executive Brief
Unisys Integrated Medical Device Management - Executive BriefUnisys Integrated Medical Device Management - Executive Brief
Unisys Integrated Medical Device Management - Executive BriefUnisys Corporation
 
Privacy and Security by Design
Privacy and Security by DesignPrivacy and Security by Design
Privacy and Security by DesignUnisys Corporation
 
DAS DILEMMA MIT DER GENERATION „DIGITAL“
DAS DILEMMA MIT DER GENERATION „DIGITAL“DAS DILEMMA MIT DER GENERATION „DIGITAL“
DAS DILEMMA MIT DER GENERATION „DIGITAL“Unisys Corporation
 
DIE NEUE DIGITALE INFRASTRUKTUR FÜR DIGITALE MITARBEITER DER NÄCHSTEN GENERAT...
DIE NEUE DIGITALE INFRASTRUKTUR FÜR DIGITALE MITARBEITER DER NÄCHSTEN GENERAT...DIE NEUE DIGITALE INFRASTRUKTUR FÜR DIGITALE MITARBEITER DER NÄCHSTEN GENERAT...
DIE NEUE DIGITALE INFRASTRUKTUR FÜR DIGITALE MITARBEITER DER NÄCHSTEN GENERAT...Unisys Corporation
 
STEHEN DIE ENDBENUTZER DER GENERATION „DIGITAL“FÜR DAS ENDE VON IT-TRANSPAREN...
STEHEN DIE ENDBENUTZER DER GENERATION „DIGITAL“FÜR DAS ENDE VON IT-TRANSPAREN...STEHEN DIE ENDBENUTZER DER GENERATION „DIGITAL“FÜR DAS ENDE VON IT-TRANSPAREN...
STEHEN DIE ENDBENUTZER DER GENERATION „DIGITAL“FÜR DAS ENDE VON IT-TRANSPAREN...Unisys Corporation
 
DIE GENERATION DIGITAL UND DIE IT-LÜCKE IN UNTERNEHMEN.
 DIE GENERATION DIGITAL UND DIE IT-LÜCKE IN UNTERNEHMEN. DIE GENERATION DIGITAL UND DIE IT-LÜCKE IN UNTERNEHMEN.
DIE GENERATION DIGITAL UND DIE IT-LÜCKE IN UNTERNEHMEN.Unisys Corporation
 
Digital Gen: Hybrid IT Infographic
Digital Gen: Hybrid IT Infographic Digital Gen: Hybrid IT Infographic
Digital Gen: Hybrid IT Infographic Unisys Corporation
 
Digital Gen: Security Infographic
Digital Gen: Security InfographicDigital Gen: Security Infographic
Digital Gen: Security InfographicUnisys Corporation
 
Digital Gen: End User Services Infographic
Digital Gen: End User Services InfographicDigital Gen: End User Services Infographic
Digital Gen: End User Services InfographicUnisys Corporation
 
​​Unisys Stealth(cloud)™ for Azure Infographic
​​Unisys Stealth(cloud)™ for Azure Infographic​​Unisys Stealth(cloud)™ for Azure Infographic
​​Unisys Stealth(cloud)™ for Azure InfographicUnisys Corporation
 
Digital Generation Infographic
Digital Generation InfographicDigital Generation Infographic
Digital Generation InfographicUnisys Corporation
 
Digital Generation: Security Infographic
Digital Generation: Security InfographicDigital Generation: Security Infographic
Digital Generation: Security InfographicUnisys Corporation
 
Unisys Border Control / Protection Infographic
Unisys Border Control / Protection InfographicUnisys Border Control / Protection Infographic
Unisys Border Control / Protection InfographicUnisys Corporation
 
Unisys Security Insights Infographic: France
Unisys Security Insights Infographic: FranceUnisys Security Insights Infographic: France
Unisys Security Insights Infographic: FranceUnisys Corporation
 
Unisys Security Insights Infographic: Netherlands
Unisys Security Insights Infographic: NetherlandsUnisys Security Insights Infographic: Netherlands
Unisys Security Insights Infographic: NetherlandsUnisys Corporation
 
Unisys Security Insights Infographic: Spain
Unisys Security Insights Infographic: SpainUnisys Security Insights Infographic: Spain
Unisys Security Insights Infographic: SpainUnisys Corporation
 
Unisys Security Insights Infographic: China
Unisys Security Insights Infographic: ChinaUnisys Security Insights Infographic: China
Unisys Security Insights Infographic: ChinaUnisys Corporation
 

Más de Unisys Corporation (20)

Elevate™ by Unisys
Elevate™ by UnisysElevate™ by Unisys
Elevate™ by Unisys
 
Unisys Integrated Medical Device Management - Executive Brief
Unisys Integrated Medical Device Management - Executive BriefUnisys Integrated Medical Device Management - Executive Brief
Unisys Integrated Medical Device Management - Executive Brief
 
Privacy and Security by Design
Privacy and Security by DesignPrivacy and Security by Design
Privacy and Security by Design
 
Digital Generation CPG UK
Digital Generation CPG UKDigital Generation CPG UK
Digital Generation CPG UK
 
DAS DILEMMA MIT DER GENERATION „DIGITAL“
DAS DILEMMA MIT DER GENERATION „DIGITAL“DAS DILEMMA MIT DER GENERATION „DIGITAL“
DAS DILEMMA MIT DER GENERATION „DIGITAL“
 
DIE NEUE DIGITALE INFRASTRUKTUR FÜR DIGITALE MITARBEITER DER NÄCHSTEN GENERAT...
DIE NEUE DIGITALE INFRASTRUKTUR FÜR DIGITALE MITARBEITER DER NÄCHSTEN GENERAT...DIE NEUE DIGITALE INFRASTRUKTUR FÜR DIGITALE MITARBEITER DER NÄCHSTEN GENERAT...
DIE NEUE DIGITALE INFRASTRUKTUR FÜR DIGITALE MITARBEITER DER NÄCHSTEN GENERAT...
 
STEHEN DIE ENDBENUTZER DER GENERATION „DIGITAL“FÜR DAS ENDE VON IT-TRANSPAREN...
STEHEN DIE ENDBENUTZER DER GENERATION „DIGITAL“FÜR DAS ENDE VON IT-TRANSPAREN...STEHEN DIE ENDBENUTZER DER GENERATION „DIGITAL“FÜR DAS ENDE VON IT-TRANSPAREN...
STEHEN DIE ENDBENUTZER DER GENERATION „DIGITAL“FÜR DAS ENDE VON IT-TRANSPAREN...
 
DIE GENERATION DIGITAL UND DIE IT-LÜCKE IN UNTERNEHMEN.
 DIE GENERATION DIGITAL UND DIE IT-LÜCKE IN UNTERNEHMEN. DIE GENERATION DIGITAL UND DIE IT-LÜCKE IN UNTERNEHMEN.
DIE GENERATION DIGITAL UND DIE IT-LÜCKE IN UNTERNEHMEN.
 
Digital Gen: Hybrid IT Infographic
Digital Gen: Hybrid IT Infographic Digital Gen: Hybrid IT Infographic
Digital Gen: Hybrid IT Infographic
 
Digital Gen Infographic
Digital Gen InfographicDigital Gen Infographic
Digital Gen Infographic
 
Digital Gen: Security Infographic
Digital Gen: Security InfographicDigital Gen: Security Infographic
Digital Gen: Security Infographic
 
Digital Gen: End User Services Infographic
Digital Gen: End User Services InfographicDigital Gen: End User Services Infographic
Digital Gen: End User Services Infographic
 
​​Unisys Stealth(cloud)™ for Azure Infographic
​​Unisys Stealth(cloud)™ for Azure Infographic​​Unisys Stealth(cloud)™ for Azure Infographic
​​Unisys Stealth(cloud)™ for Azure Infographic
 
Digital Generation Infographic
Digital Generation InfographicDigital Generation Infographic
Digital Generation Infographic
 
Digital Generation: Security Infographic
Digital Generation: Security InfographicDigital Generation: Security Infographic
Digital Generation: Security Infographic
 
Unisys Border Control / Protection Infographic
Unisys Border Control / Protection InfographicUnisys Border Control / Protection Infographic
Unisys Border Control / Protection Infographic
 
Unisys Security Insights Infographic: France
Unisys Security Insights Infographic: FranceUnisys Security Insights Infographic: France
Unisys Security Insights Infographic: France
 
Unisys Security Insights Infographic: Netherlands
Unisys Security Insights Infographic: NetherlandsUnisys Security Insights Infographic: Netherlands
Unisys Security Insights Infographic: Netherlands
 
Unisys Security Insights Infographic: Spain
Unisys Security Insights Infographic: SpainUnisys Security Insights Infographic: Spain
Unisys Security Insights Infographic: Spain
 
Unisys Security Insights Infographic: China
Unisys Security Insights Infographic: ChinaUnisys Security Insights Infographic: China
Unisys Security Insights Infographic: China
 

Último

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 

Último (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 

XP in Quarantine - Isolate and Protect Your Mission Critical Systems

  • 1. XP in Quarantine Isolate and Protect Your Mission Critical Systems Isolate XP with Unisys Stealth Support for Windows XP ends April 8, 2014. Some organizations cannot migrate. Mission critical systems such as process control, point of sale, ATMs, Electronic Health Records, and other critical environments are vulnerable to security compromise. any other network locations, particularly the Internet, or can be allowed access to specific resources, such as the enterprise’s core IT services. Authenticated network users, if not authorized into the appropriate COI, would not be able to detect or access the set(s) of XP endpoints, regardless of network topology. Unisys StealthTM is innovative software-based security that makes endpoints virtually invisible on a network to users or systems not explicitly authorized into the same secure community group, called a Community of Interest (COI). With Stealth, cyber attackers and malware cannot interact with the XP workstations in any way. These XP workstations can be cordoned off from the enterprise and external network without requiring any physical network changes. Stealth-protected endpoints running Windows XP are designed to be undetectable, visible only to the specific users that require access. The endpoints continue to execute the same applications and control the same instrumentation or other downstream devices with no network reconfiguration and no creation of “air-gap” network segments. The endpoints can be prevented from reaching Value of Stealth Isolation and Protection Isolating XP systems from the remainder of the network greatly reduces the attack surface for the entire enterprise. XP systems are predicted to be under heavy cyber scanning when security patches terminate. Removing these systems from hacker visibility will drive hackers to move to easier
  • 2. You Can’t Hack What You Can’t See targets. Additionally, if an XP endpoint is compromised, the breach would be limited to only those systems in the same COI, similar to quarantine. The remaining enterprise network is not impacted. Unisys Stealth is innovative software-based security technology that is designed to: • Segregate assets running unsupported Windows OS’s from the rest of the network A Few Use Cases Unisys Stealth isolates mission critical systems to foster secure, continuous operations. • Mitigate risk associated with connectivity to the enterprise network when no longer receiving security updates for legacy OS’s • Automation and Process Control Systems - Systems that monitor and control industrial and critical infrastructure processes including manufacturing, power generation and transmission, chemical processing, and water treatment are under strict regulation for security, compliance and availability. For stability reasons and because instrumentation devices downstream of the control systems may not have upgrade capability, these environments are not candidates for timely OS upgrades. • Darken the segregated systems from would-be attackers so they are not discoverable via typical network scanning techniques • Allow access to core IT services if required, while restricting access to the Internet Contact • Point of Sale or Payment Card Systems - Merchants utilizing Point of Sale or other payment card systems running Windows XP will be challenged to remain compliant with the Payment Card Industry Data Security Standard (PCI DSS) which states merchants must ensure that all system components and software are protected from known vulnerabilities by having the latest vendor-supplied security patches installed. With Windows vendor supplied patches terminating for XP, Unisys Stealth can be used to cloak Point of Sale devices and PCI processing systems to facilitate compliance. stealth@unisys.com • Automated Teller Machines - ATMs running unsupported XP may become non-compliant with PCI requirements. • Electronic Health Records - Electronic Health Record and HIPAA regulations require specific protections to ensure the security and confidentiality of electronic health information and mandate that action be taken to properly safeguard this data. Unisys Stealth proactively controls access to servers and applications based on COI keys. For more information visit www.unisys.com/stealthxp © 2014 Unisys Corporation. All rights reserved. Unisys, the Unisys logo, ClearPath and Unisys Stealth are registered trademarks or trademarks of Unisys Corporation. All other brands and products referenced herein are acknowledged to be trademarks or registered trademarks of their respective holders. Printed in the United States of America 01/14 14-0013-B